Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Networks – Worksheet 2

1. What is Spam?
2. Expand HTTP [Compt. 2014, 2013]
3. What is PPP?
4. What is VOIP?
5. What is voicemail?
Pavithra Karthik

6. What is videoconferencing?
7. Write one example each of URL and IP address. [SQP 2016]
8. What do the following top level domains signify? [2015]
(i) .com (ii). org
9. Distinguish between MAC address and IP address with the help of example of
each. [2015, CBSE TextBook]
10. Given below are two addresses : [Compt. 2014]
(i) http://www.abc.com/index.htm
(ii) 182.68.9.165
Identify which one of the above is an IP address and which one is a URL.
11. What do the following top level domains signify ? [Compt. 2014]
(i) .edu (ii) .org
12. IP addresses of two computers on a network: [CBSE TextBook]
a. Can be the same b. Cannot be the same c. Are not defined d. Must match with a
third computer
13. A domain name maps to[CBSE TextBook]
a. A URL b. An IP address c. A website d. All of the above
14. Give some examples of domain names and URLs. How is a domain name
different from a URL? [CBSE TextBook]
15. What is domain name resolution? [CBSE TextBook]
16. Explain in brief any 2 security threats to Computer networks. [SQP 2016]
(or) What is meant by "Denial of Service" with reference to Internet service ? [2014]
17. List 2 measures to secure a network. [2015, Compt. 2014]
Or List some methods which are used for network security. [CBSE Textbook]
18. Mr. John wants to prevent unauthorized access to/from his company's local
area network. Write the name of a system (software/ hardware), which he should
install to do the same. [SQP 2015]
19. Ms. Taufiq Ahmed wants to prevent unauthorized access to/from his
company's local area network. Write the name of a system (software/ hardware),
which he should install to do the same. [2012]
20. Define the following with reference to Threats to Network Security. [2012]
Pavithra Karthik

Or How is a Trojan Horse harmful to a network ? [Compt. 2014]


(i) Trojan Horse
(ii) Worm
21. Snooping is
a. A threat to data security b. Not a threat to data security c. Good for laptops
d. A topology
22. Define Network security? What kind of attacks can be made on data and
computer networks? [CBSE Textbook]
23. When the user browses a website, the web server sends a text file to the
web browser. What is the name of this?

You might also like