top of page

MSC-CSC-105Computer Network and Internet PYQ

Feb 10

16 min read

0

115

0

What is Modulation?

Modulation is the process of varying a carrier wave's properties (like amplitude or frequency) to encode information.

What do you mean by Digital Signal?

A digital signal is a discrete signal that represents information using a sequence of discrete values.

Explain Hyper Linking.

Hyperlinking allows users to navigate between different web pages or resources by clicking on text or images.

What do you mean by Web Browser?

A web browser is a software application used to access and display web pages.

What is Home Page of the website?

The home page is the main or introductory page of a website, usually displayed first when a user visits the site.

 

MSC CS 105 PYQ
MSC CS 105 PYQ


What are the different types of Transmission Medium?

Transmission media are the physical pathways used to transmit data signals. They can be broadly categorized into two types:

Wired Media:

●     Copper Cables: These are the most common type, such as Ethernet cables, used for local area networks (LANs). They are relatively inexpensive but have limitations in terms of bandwidth and distance.

●     Optical Fiber: These cables transmit data as light signals, offering significantly higher bandwidth and longer distances compared to copper cables. They are more expensive but are crucial for high-speed networks and long-distance communication.

Wireless Media:

●     Radio Waves: These are used in various wireless technologies, including Wi-Fi, Bluetooth, and cellular networks. They offer flexibility and mobility but can be susceptible to interference.

●     Microwaves: These are used for satellite communication and point-to-point links. They have high bandwidth but are more directional and require specialized equipment.

Define IP Protocol.

IP (Internet Protocol) is the fundamental protocol that enables communication across the internet. It is responsible for addressing and routing data packets from source to destination. Each device connected to the internet has a unique IP address, which acts like a postal address for online communication. IP ensures that data packets are delivered to the correct destination by breaking down data into smaller packets and routing them through the network based on their destination addresses.

Explain different types of Internet Services.

The internet offers a wide range of services:

●     World Wide Web (WWW): This is the most well-known service, allowing users to access and browse web pages through web browsers.

●     Email: Enables the sending and receiving of electronic messages.

●     File Transfer Protocol (FTP): Used for transferring files between computers.

●     Voice over IP (VoIP): Enables voice communication over the internet, such as making phone calls using services like Skype or Zoom.

●     Video Conferencing: Allows multiple people to communicate and collaborate in real-time using video and audio.

●     E-commerce: Facilitates online buying and selling of goods and services.

●     Cloud Computing: Provides access to computing resources like storage, processing power, and software over the internet.

What is Repeater?

A repeater is a network device that receives a weak signal, amplifies it, and retransmits it to extend the range of a network. It is commonly used in wired networks, especially in situations where the signal weakens over long distances or due to obstacles. Repeaters help maintain a strong and consistent signal throughout the network.

Explain Firewall.

A firewall is a security system that acts as a gatekeeper between a computer network and the internet. It monitors incoming and outgoing network traffic and blocks unauthorized access. Firewalls can be hardware devices or software programs. They play a crucial role in protecting a network from cyber threats such as hackers, viruses, and malware. Firewalls can be configured to allow or block traffic based on various criteria, such as IP addresses, ports, and protocols.

What is HTTP?

HTTP (Hypertext Transfer Protocol) is the foundation of communication on the World Wide Web. It defines the rules and formats for exchanging information between web browsers and web servers. When you type a URL into your browser and press Enter, your browser sends an HTTP request to the web server hosting the website. The server then processes the request and sends an HTTP response back to your browser, which displays the requested webpage.

What is Cookie?

A cookie is a small piece of data that a website stores on your computer or mobile device. When you visit a website, it may create a cookie on your device to track your browsing activity and preferences. Cookies can be used for various purposes, such as:

●     Personalization: Websites can use cookies to remember your preferences, such as language, currency, and previous purchases.

●     Authentication: Cookies can be used to keep you logged in to a website, so you don't have to enter your credentials every time you visit.

●     Tracking: Websites can use cookies to track your browsing behavior, which can be used for advertising and analytics.

What is Network? Explain the following:

A network is a collection of interconnected devices (computers, servers, printers, etc.) that can communicate and share resources. These devices are connected through various media like cables, wires, or wireless signals. Networks enable users to share data, applications, and devices, facilitating efficient communication and collaboration.

a) LAN (Local Area Network):

●     A LAN typically covers a small geographic area, such as a single building or a small office.

●     It connects devices within a limited area, allowing for high-speed data transfer and resource sharing.

●     Common examples include Ethernet networks connecting computers in a home or office.

 

b) MAN (Metropolitan Area Network):

●     A MAN spans a larger area than a LAN, covering a city or a metropolitan region.

●     It connects multiple LANs within a city, often using high-speed technologies like fiber optics.

●     MANs are used by organizations like universities, government agencies, and large corporations.

c) WAN (Wide Area Network):

●     A WAN covers a very large geographic area, such as a country or even the entire globe.

●     The internet is the most prominent example of a WAN, connecting millions of computers and networks worldwide.

●     WANs typically use a combination of technologies, including leased lines, satellite links, and public networks.

What do you mean by Topology? Explain various types of Network Topologies.

Network Topology refers to the physical or logical arrangement of devices in a network. It defines how the devices are connected and how data flows between them.

Here are some common network topologies:

●     Bus Topology: In this topology, all devices are connected to a single central cable. Data is transmitted in both directions along the cable. While simple to set up, a break in the cable can disrupt the entire network.

●     Star Topology: In this topology, all devices are connected to a central hub or switch. This is a popular topology as it is easy to manage and allows for easy addition or removal of devices. However, if the central device fails, the entire network goes down.

●     Ring Topology: In this topology, devices are connected in a closed loop, with each device connected to its two neighbors. Data travels in one direction around the ring. Ring topologies are less common today, as they can be more complex to troubleshoot.

●     Mesh Topology: In this topology, every device is connected directly to every other device. This provides high redundancy but can be expensive and complex to set up.

●     Tree Topology: This topology resembles an inverted tree, with a root node (often a server) and branches connecting other devices. It combines features of both star and bus topologies.

Write difference between the following:

a) Packet switching and Circuit switching

●     Circuit Switching: In circuit switching, a dedicated physical connection is established between the source and destination before data transmission begins. This connection remains active for the duration of the communication. Examples include traditional phone calls.

●     Packet Switching: In packet switching, data is broken down into small units called packets. Each packet is transmitted independently and may follow a different route through the network. Packet switching is more efficient for handling varying data loads and is the foundation of the internet.

b) Internet and Intranet

●     Internet: The internet is a global network of interconnected computers and networks. It is publicly accessible and allows anyone with an internet connection to access information and communicate with others.

●     Intranet: An intranet is a private network within an organization that is accessible only to authorized users. It is used for internal communication, collaboration, and resource sharing within the organization. Intranets often use internet technologies but are restricted to internal users.

Write the steps of creating a webpage.

Creating a webpage involves a series of steps that combine planning, design, and coding. Here's a general overview:

  1. Planning and Content Creation:




○     Define Purpose and Goals: Determine the purpose of the website (e.g., informational, e-commerce, portfolio).1 Set clear objectives and target audience.

○     Content Strategy: Plan the website's content (text, images, videos) and structure (navigation, pages).

○     User Experience (UX) Design: Consider user needs and create a user-friendly interface with intuitive navigation and clear calls to action.2

  1. Design and Prototyping:



○     Wireframing: Create basic layouts and page structures using wireframing tools to visualize the website's design.3

○     Visual Design: Design the visual elements, including color schemes, typography, imagery, and overall aesthetics.4

○     Prototyping: Create interactive prototypes to test the design and user flow before coding.5

  1. Coding:



○     HTML (HyperText Markup Language): Use HTML to structure the content and elements of the webpage.6

○     CSS (Cascading Style Sheets): Use CSS to style the appearance of the webpage, controlling layout, colors, fonts, and visual presentation.7

○     JavaScript: Use JavaScript to add interactivity, dynamic behavior, and advanced features to the webpage.8

  1. Testing and Debugging:



○     Browser Testing: Test the webpage in different browsers (Chrome, Firefox, Safari, etc.) to ensure compatibility and responsiveness.9

○     Cross-Browser Compatibility: Ensure the website looks and functions as expected across different browsers and devices.

○     Accessibility Testing: Verify that the website is accessible to users with disabilities (e.g., screen reader compatibility).

○     Debugging: Fix any errors or bugs that arise during testing.

 


  1. Deployment and Maintenance:



○     Upload to Web Server: Upload the website files to a web server (e.g., using FTP) to make it accessible online.10

○     Domain Name Setup: Register a domain name (e.g., example.com) and point it to the web server.11

○     Website Maintenance: Regularly update content, fix bugs, improve security, and ensure the website remains functional and relevant.12

Write difference between TCP and UDP.

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two fundamental protocols for network communication.13 Here are their key differences:

●     Reliability:

○     TCP is a reliable protocol that ensures data is delivered correctly and in order.14 It uses mechanisms like acknowledgments and retransmissions to handle packet loss and errors.

○     UDP is an unreliable protocol that does not guarantee data delivery or order.15 It is faster but may result in data loss or corruption.

●     Connection-Oriented vs. Connectionless:

○     TCP is a connection-oriented protocol, meaning it establishes a connection between the sender and receiver before data transmission.16

○     UDP is a connectionless protocol, meaning it does not establish a connection.17 Data is sent as independent datagrams.

 

●     Overhead:

○     TCP has higher overhead due to its reliability mechanisms, which can lead to slower performance.

○     UDP has lower overhead, making it suitable for applications that prioritize speed over reliability, such as streaming audio or video.18

●     Applications:

○     TCP is used for applications that require reliable data delivery, such as file transfer (FTP), email, and web browsing.19

○     UDP is used for applications that prioritize speed and efficiency, such as streaming media, online gaming, and DNS..

○          

Explain various conditional statements in JavaScript.

Conditional statements in JavaScript allow you to control the flow of execution based on certain conditions.21 They are essential for making decisions and creating dynamic behavior in your code. Here are some common conditional statements:

●     if statement: Executes a block of code if a specified condition is true.

●     JavaScript

if (condition) {

    // Code to execute if condition is true

}

●    

●    

●     if...else statement: Executes one block of code if the condition is true, and another block if it's false.22

●     JavaScript

if (condition) {

    // Code to execute if condition is true

} else {

    // Code to execute if condition is false

}

●    

●    

●     if...else if...else statement: Allows you to check multiple conditions and execute a different block of code for each condition.23

●     JavaScript

if (condition1) {

    // Code to execute if condition1 is true

} else if (condition2) {

    // Code to execute if condition2 is true

} else {

    // Code to execute if none of the conditions are true

}

●    

●    

●     switch24 statement: Evaluates an expression and executes a block of code corresponding to a matching case.25

●     JavaScript

switch (expression) {

    case value1:

        // Code to execute if expression matches value1

        break;

    case value2:

        // Code to execute if expression matches value2

        break;

    default:

        // Code to execute if no case matches

}

●    

●    

Conditional statements are fundamental for creating interactive and responsive web applications.26

 

 

 

 

Explain about cyber laws and intellectual property rights.

Cyber Laws:

●     Cyber laws are a set of legal rules and regulations that govern the use of computers and the internet.27

●     They cover a wide range of issues, including data privacy, online security, intellectual property, cybercrime, and electronic commerce.

●     Examples of cyber laws include the Digital Millennium Copyright Act (DMCA), the Computer Fraud and Abuse Act (CFAA), and the Electronic Communications Privacy Act (ECPA).

Intellectual Property Rights:

●     Intellectual property rights (IPRs) protect the creations of the mind, such as inventions, literary and artistic works, designs, and symbols.28

●     They give creators exclusive rights to their work, allowing them to control how it is used and to benefit from their creations.29

●     Types of IPR include:

○     Copyright: Protects literary and artistic works, such as books, music, and software.30

○     Patents: Protect inventions and new technologies.31

○     Trademarks: Protect brand names and logos.32

Cyber Laws and Intellectual Property Rights:

Cyber laws play a crucial role in protecting intellectual property rights in the digital world.33 They address issues like copyright infringement, software piracy, and online counterfeiting. Cyber laws also provide frameworks for protecting user data and privacy in the digital environment.34

For 'n' devices in a network, what is the number of cable links required for mesh and bus topology?

●     Mesh: n*(n-1)/2

●     Bus: n-1

Define Bandwidth.

Bandwidth is the amount of data that can be transmitted over a communication channel in a given time.

What is Mail Server?

A mail server is a computer system that handles sending, receiving, and storing emails.

What is Anti-aliasing?

Anti-aliasing is a technique to smooth the jagged edges of digital images or graphics.

 

What are the advantages of layered model protocol? Compare TCP/IP and OSI model.

Advantages of Layered Model Protocols:

●     Modularity: Breaks down complex communication into smaller, manageable layers.1 This simplifies development, troubleshooting, and upgrades.2

●     Flexibility: Allows for independent development and modification of each layer without affecting others.3

●     Standardization: Promotes interoperability between different systems and vendors.4

●     Efficiency: Enhances efficiency by dividing tasks among different layers.5

 

 

Comparison of TCP/IP and OSI Model:

●     TCP/IP:

○     Developed by the U.S. Department of Defense.6

○     Focuses on practical implementation and has four layers (Application, Transport, Internet, Network Interface).7

○     More flexible and easier to implement.

●     OSI Model:

○     Developed by the International Organization for Standardization.8

○     Provides a theoretical and comprehensive framework with seven layers.9

○     More complex but offers a better conceptual understanding of network communication.


Describe the four stages of the life-cycle of an applet at the Appletcontext. How does init() and start() differ in an applet? Explain the life-cycle of an applet with a diagram and compare it with life-cycle of a thread.16

Applet Lifecycle Stages:

  1. Initialization: init() method is called once when the applet is loaded. It's used to initialize the applet's resources and set up the initial state.

  2. Starting: start() method is called when the applet becomes visible on the screen. It's used to start any ongoing activities, such as animation or background tasks.

  3. Stopping: stop() method is called when the applet is no longer visible on the screen. It's used to pause any ongoing activities.

  4. Destroying: destroy() method is called when the applet is being removed from the page. It's used to release any resources acquired by the applet.

init() vs. start():

●     init() is called only once during the applet's lifetime, while start() and stop() can be called multiple times.

●     init() is used for initial setup, while start() is used to resume activities after the applet has been stopped.

Comparison with Thread Lifecycle:

●     Applet lifecycle is closely related to the thread lifecycle. An applet can be associated with one or more threads.17

●     The applet's start() method typically starts a new thread to perform background tasks.

●     The applet's stop() method can pause or interrupt the thread's execution.

●     The applet's destroy() method should ensure that any threads associated with the applet are properly terminated.

Discuss the JavaScript objects and HTML DOM objects.

JavaScript Objects:

●     JavaScript is an object-oriented language.

●     Objects represent entities with properties (attributes) and methods (functions).18

●     Built-in objects include:

○     String: Represents a sequence of characters.

○     Number: Represents numerical values.

○     Array: Represents an ordered collection of values.

○     Date: Represents a date and time.

○     Math: Provides mathematical functions and constants.

HTML DOM Objects:

●     The HTML DOM (Document Object Model) represents the structure of an HTML document as a tree of objects.19

●     Each element in the HTML document is represented as an object in the DOM.20

●     You can use JavaScript to access and manipulate these DOM objects.

●     Examples:

○     document: Represents the entire HTML document.

○     window: Represents the browser window.

○     element: Represents an HTML element (e.g., document.getElementById()).

○     event: Represents an event (e.g., click, mouseover).

Describe the mechanism of catching errors in JavaScript with suitable example.

JavaScript provides the try...catch...finally block to handle errors gracefully.

●     try block: Encloses the code that might throw an error.

●     catch block: Executes if an error occurs within the try block. It receives an error object as an argument, which contains information about the error.

●     finally block: Executes regardless of whether an error occurs or not.21 It's often used to clean up resources.

Example:

JavaScript

try {

    let result = 10 / 0; // This will throw a "Divide by zero" error

    console.log(result);

} catch (error) {

    console.error("An error occurred:", error);

} finally {

    console.log("This block always executes.");

}

 

Write short notes on the following:

(a) ADSL

ADSL (Asymmetric Digital Subscriber Line) is a broadband technology that provides high-speed data transmission over existing copper telephone lines.22 It offers faster download speeds than upload speeds, which is suitable for activities like web browsing and downloading.

(b) Video Conferencing

Video conferencing is a technology that enables real-time, two-way communication using video and audio.23 It allows people in different locations to connect and collaborate as if they were in the same room. Video conferencing is widely used for business meetings, online education, and social interactions.24

 

Firewall

A firewall is a security system that acts as a gatekeeper between a computer or network and the internet. It monitors incoming and outgoing network traffic and blocks unauthorized access. Firewalls can be implemented as hardware devices or software programs.

Firewalls use various techniques to control network traffic:

●     Packet filtering: Examines individual data packets based on their source and destination addresses, ports, and protocols.

●     State inspection: Tracks the state of network connections to identify and block suspicious traffic.

●     Application-level gateways: Filters traffic at the application level, such as blocking specific protocols or applications.

Firewalls play a critical role in protecting computer systems and networks from cyber threats, such as hackers, viruses, and malware.

 

What is ISDN?

ISDN stands for Integrated Services Digital Network, a set of standards for transmitting voice, data, and video.

What is IPR?

IPR stands for Intellectual Property Rights. These are legal rights that protect creations of the mind, such as inventions, literary and artistic works, designs, and symbols. IPRs give creators exclusive rights over their work, allowing them to control its use and benefit from their creations.

Write short notes on the following:

(a) IPV4:

IPv4 (Internet Protocol version 4) is the original addressing system for devices on the internet. It uses 32-bit addresses, which limits the number of unique addresses available. This limitation has become a significant challenge as the number of internet-connected devices has exploded.

(b) IPv6:

IPv6 (Internet Protocol version 6) is the next-generation addressing system. It uses 128-bit addresses, providing a vastly larger address space to accommodate the growing number of devices. IPv6 is gradually being adopted to address the limitations of IPv4.

Describe the use of Proxy Server.

A proxy server acts as an intermediary between a user's computer and the internet. It can be used for various purposes, including:

●     Caching: Storing frequently accessed web pages and files on the proxy server, reducing latency and improving performance.

●     Filtering: Blocking access to certain websites or content, such as inappropriate or malicious websites.

●     Security: Protecting the internal network from external threats by acting as a firewall and filtering traffic.

●     Anonymity: Hiding the user's IP address, providing a degree of anonymity online.

What is HTML? Explain its various tags in detail.

HTML (HyperText Markup Language) is the standard markup language for creating the structure of web pages. It uses tags, which are keywords enclosed in angle brackets (<>), to define the different elements of a webpage, such as headings, paragraphs, images, and links.

Here are some of the most common HTML tags:

●     <html>: The root element of an HTML document.

●     <head>: Contains meta-information about the document, such as the title and character set.

●     <title>: Defines the title that appears in the browser tab.

●     <body>: Contains the visible content of the webpage.

●     <h1> to <h6>: Defines headings of different levels (from largest to smallest).

●     <p>: Defines a paragraph of text.

●     <br>: Inserts a line break.

●     <img>: Inserts an image.

●     <a>: Creates a hyperlink to another webpage or resource.

●     <ul> and <ol>: Create unordered and ordered lists, respectively.

●     <li>: Defines a list item within a list.

●     <table>: Creates a table.

●     <tr>: Defines a table row.

●     <td>: Defines a table cell.

 

Example:

HTML

<!DOCTYPE html>

<html>

<head>

    <title>My Webpage</title>

</head>

<body>

 

    <h1>Welcome to my webpage!</h1>

    <p>This is a paragraph of text.</p>

 

    <ul>

        <li>Item 1</li>

        <li>Item 2</li>

    </ul>

 

    <a href="https://www.example.com">Link to another website</a>

 

</body>

</html>

 

HTML tags provide the basic structure and content of a webpage. By combining these tags with CSS (Cascading Style Sheets) for styling and JavaScript for interactivity, you can create complex and dynamic web pages.

What is WWW? Explain its elements.

WWW stands for World Wide Web, a system of interconnected hypertext documents accessed via the internet. It allows users to navigate between pages using hyperlinks.

Elements of the WWW:

●     Web Pages: These are the individual documents that make up the web. They are written in HTML and can contain text, images, videos, and other multimedia content.

●     Web Servers: These are computers that store and deliver web pages in response to requests from web browsers.

●     Web Browsers: These are software applications (like Chrome, Firefox, Safari) that allow users to access and view web pages.

●     Hyperlinks: These are clickable links that connect one web page to another.

●     URL (Uniform Resource Locator): This is the address of a web page, used to locate and access it.

●     HTTP (Hypertext Transfer Protocol): This is the protocol used for communication between web browsers and web servers.

What is ASP and explain its uses and various features.

ASP (Active Server Pages) is a server-side scripting language developed by Microsoft. It allows developers to create dynamic and interactive web pages.

Uses of ASP:

●     Web Applications: Building dynamic websites, such as e-commerce sites, online forums, and content management systems.

●     Database Connectivity: Interacting with databases to retrieve and store data for web applications.

●     Business Logic: Implementing business rules and logic on the server-side.

Features of ASP:

●     Scripting Language: ASP uses VBScript or JScript for scripting.

●     Server-Side Execution: ASP code is executed on the web server, not on the client's browser.

●     Component-Based Architecture: ASP supports the use of COM (Component Object Model) components for code reusability.

●     Database Connectivity: Provides built-in support for connecting to databases like Microsoft SQL Server.

●     Session Management: Allows tracking user sessions and storing session data.

ASP, while still used in some legacy systems, has been largely superseded by newer technologies like ASP.NET and other server-side languages like PHP, Python, and Node.js.

 

 

 

 

Comments

Share Your ThoughtsBe the first to write a comment.
bottom of page