- Get link
- X
- Other Apps
Featured Post
- Get link
- X
- Other Apps
SEBA Class 10 Computer Science Solutions – 2025
Chapter 1 | Computer Science
INTRODUCTION TO COMPUTER NETWORKS
1. What is a computer network?
Ans: a computer network is a set of computers and other
units that are connected with each other. In a computer network information or
resources can be shared among connected computers.
2. Write some example of wired technology.
Ans: coaxial cable, twisted pair cable, optical fibre cable
etc.
3. Write some examples of wireless technologies?
Ans: Bluetooth, Wi-Fi, WiMAX, etc.
4. Write the full form of the following
PAN, LAN, MAN, WAN
Ans: PAN- Personal Area Network.
LAN - Local Area Network.
MAN- Metropolitan Area Network.
WAN -Wide Area Network.
5. Based on their connecting technology how many types of
computer networks are there?
Ans: based on the connecting technology a computer network
can be classified as wired wireless or hybrid network.
6. What is personal area network?
Ans: Personal Area Network networks are normally set up for
individual use within a limited geographical range. In normal circumstances
personal area network offers a network range of about 10 m from Central device
to the other communicating devices.
For example someone can set up a personal area network
between his laptop and other electronic gadgets like a smartphone.
7. What is a local area network?
Ans: In local area network a number of units are connected
to each other in a small area such as building office etc with the help of a
common communication path like a switch or a similar connecting device. This
type of network systems are used in banks, cyber cafes or schools etc.
8. What is Metropolitan Area Network?
Ans: MAN or Metropolitan area networks are normally spread
over in entire City or white geographic location. A Metropolitan area network
does not have to be in urban areas only. The term Metropolitan implies the size
of the computer network not the class or type of the area that it serves. A
Metropolitan Area Network is formed by interconnecting multiple LAN's that are
within a limited geographic area. MANs typically Marge the networks of multiple
organisations to establish communication among them or to share common
resources.
9. What is Wide Area Network ?
Ans: white area networks are formed by connecting devices
from multiple locations across the globe. Wide area networks are often established
with leased telecommunication circuits. In comparison to a Metropolitan Area
Network wide area network is wider with respect to geographical location.
10. What is leased telecommunication circuit?
Ans: leased telecommunication circuits is a communication
line between two or more locations functioning according to a commercial
contract.
11. What is hostname?
Ans: The host name is the name of a computer or any
connected device in a computer network. It is also known as computer name.
12. What is an internet protocol address or IP address?
Ans: an internet protocol address is a numerical level that
is assigned to network devices to identify them uniquely. IP addresses are
unique identifiers of a computer in a computer network.
13. How many types of Internet protocol address and what are
they?
Ans: there are two types of IP addresses a) internet
protocol version 4 (IPv4) and b) internet protocol version 6 (IPv6).
14. What is the use of IP addresses?
Ans: IP addresses uniquely identify devices on a network,
enabling communication by acting as a digital address, similar to a physical
address for internet devices. They are essential for devices to send and
receive data across networks, including the internet.
15. What is MAC address?
Ans: media access control address for MAC address is a
unique identifier assigned to a network interface controller. Mac addresses are
also called burned in addresses or Ethernet hardware addresses or Ethernet
physical addresses.
16. What is a network interface card?
Ans: a network interface card is a hardware component that
is used to connect a computer to a computer network. Network interface cards
are also called network adaptors or LAN adaptors.
17. What is hub?
Ans: I have is a networking device that connects other computer
networking devices together. When is signal tribes a long distance the strength
of the signal decreases gradually. In such a situation a how can we used to act
as a repeater which amplifies signals that deteriorate after travelling
longistances over connecting cables.
18. What is switch?
Ans: a switch is also a networking device that connects
other computer networking devices. A switch is a multiport device. A switch
maintenance Sam routing information about Aadhar network devices in the
internal network.
19. What is a router?
Ans: router is a type of network device which are used to
interconnect two or more heterogeneous computer networks. A router can be
considered as a small computer that is usually dedicated to special purpose
with multiple input and output network interfaces.
20. Write the full form of SSID.
Ans: Service set identifier.
21. What is SSID?
Ans: A Service Set Identifier or SSID is a sequence of
characters that refers to a wireless local area network.
22. Write the full form of TCP, IP, POP, SMTP, HTTP, HTTPS.
Ans: TCP- Transmission Control Protocol ,
IP-Internet Protocol ,
POP- Post Office Protocol.
SMTP - Simple Mail Transfer Protocol.
http- Hypertext Transfer Protocol,
https- Hypertext Transfer Protocol Secure.
23. What do you mean by HTTP and HTTPS?
Ans: The HTTP protocol is the foundation of the World Wide Web which is used for fetching web resources such as HTML Documents or other web pages. HTTP is a client server protocol.
HTTPS is a combination of the hypertext transfer protocol with added security features by looking at the uniform resource locator or URL in the web address bar of your browser you can easily identify whether you are browsing using http or https.
24. What is the difference between http and https?
Ans: The main difference between http and https is ----
In an HTTP communication data are sent without encryption. But in https data are sent after encryption. Encryption is the process of converting information to our data into a code to prevent unauthorised access.
25. Write a disadvantage of FTP protocol.
Ans: the main disadvantage of FTP protocol is that eat does not encrypt username password and data when login in to the server and data transfer.
26. What is the function of 'ping' command?
Ans: 'Ping' command is used to verify the connectivity between two computers. The syntex of the command is ping<target host> .
27. Why ipconfig command is used?
Ans: the ipconfig command is used to determine a computer's networking information such as the IP address address of its default gateway etc.
28. Write the difference between internet protocol version 4 and internet protocol version 6.
Ans: The difference between Internet Protocol Version 4 and Internet Protocol Version 6 are:

29. Write the function of DHPC server?
Ans: DHPC server maintains a pool of IP addresses and based on a request it assigns an IP address from the pull to a computer. To acquire an automatic IP address there should be a DHPC server in the network.
30. How MAC addresses become Globally unique?
Ans: MAC address is assigned by hardware manufacturers and a user cannot modify it. A media access control address or MAC address is composed of 12 hexa decimal digits. out of which the group of first 6 hexa decimal digits is called OUI or organisational unique identifier. A Globally recognise committee IEEE registration authority committee assigns unique OUI to hardware manufacturers to see it as a prefix of Mac address. The uniqueness of the remaining 6 hexadecimal digits is maintained by each manufacturer individually does Mac addresses become globally unique.
..........................................................................................................................................................
Important notes.
* PAN's ownership is private.
* Personal area network offers network range of about 10 m from a central device.
* Internet is an example of Wide Area Network or WAN.
* NIC is the part where the network cable physically connects.
* MAC addresses cannot be changed by a user.
* MAC addresses is composed for 12 hexadecimal digits.
* Network interface cards are also called network adaptors or LAN adaptors.
* The main functionality of the access point is to provide wireless network connectivity.
* In an http communication data sent without encryption.
---------------------------------------------------------------------------------------------------------------
EXERCISE
I. FILL IN THE
BLANKS:
1. The hostname command is used to display_____.
Ans. Name of the computer.
2. The length of a IPv4 and a IPv6 is____and___.
Ans. 32 bit; 128 bit.
3. An access point is used to connect_____.
Ans. Wireless network.
4. The ping command is used to verify____.
Ans. The connectivity between two computers.
5. HTTPS transfer______data.
Ans. Encrypted.
II. MULTIPLE CHOICE
QUESTIONS:
1. Which device is required to connect multiple
heterogeneous networks?
(A) Hub (B)
Switch (C) Router (D) Access Point
Ans. (C) Router.
2. Which is the largest type of computer network?
(A) PAN (B)
LAN (C) MAN (D) WAN
Ans. (D) WAN.
3. Which protocol transfers encrypted data instead of plain
data?
(A) HTTP (B)
HTTPS (C) FTP (D) SMTP
Ans. (B) HTTPS.
4. How many bytes are reserved for OUI in a MAC address?
(A) 3 (B)
8 (C) 24 (D) 12
Ans. (C) 24.
5. IP address can be automatically assigned if the network
is connected with
(A) Access Point (B)
Mail Server (C) Web
Server (D) DHPC Server
Ans. (D) DHPC Server.
III. SHORT ANSWER QUESTIONS:
1. Mention the names of components required to set up a MAN
network. Draw a block diagram of a MAN network labeling the name of each
component.
Ans. Computer network components are the major parts which
are needed to install the software. Some important network components are a
Network Interface card, Router, HUB, Switch, Repeater, Bridge, server, and
Modem.
2. Why hostname
should not be used to identify a computer in a computer network?
Ans. Hostname is not a reliable way to identify a computer
network because a hostname can be changed easily, and multiple hosts can have
the same hostname. Additionally, a single host can have multiple network
interfaces, each with a different hostname.
3. Give five examples
of valid and five examples of invalid IPv4 addresses.
Ans. A valid IPv4 address must be in the form of A.B.C.D,
where A, B, C, and D are numbers from 0-255.
Valid IPv4 Addresses:
192.168.0.1
192.158.1.1
10.0.0.1
255.255.255.255
0.0.0.0
Invalid IPv4
Addresses:
192.168.1.256 (256 is outside the 0-255 range)
192.168.1.00 (leading zero in a number)
192.168.1.1.1 (too many numbers)
192.168.1a.1 (letters are not allowed)
255.255.255.267 (267 is outside the 0-255 range)
4. Can we compare
HTTP and FTP protocols? Mention their functionality.
Ans. HTTP is used to transfer web pages between a client and
a server while FTP is used to transmit files among different hosts.
Comparison between HTTP and FTP:
|
Sl No |
HTTP |
FTP |
|
1 |
HTTP is Hyper Text Transfer Protocol |
FTP is a File Transfer Protocol. |
|
2 |
It is the set of rules that how web pages are transferred on
different computers over the internet. |
It is the set of rules that permit the downloading and uploading the
files on the computer over the internet. |
|
3 |
We use HTTP for providing various web pages from the web browser to
the web server. |
The URLs that use the HTTP protocol begin with HTTP. |
|
4. |
HTTP does not require authentication. |
FTP requires a password. |
5. How many 16 port
switches required to connect 31 computers in a network?
Ans. A 16-port switch can connect 16 computers together. To
connect 31 computers in a network, we need either a larger switch or 2 numbers
of 16 port switches.
---------------------------------------------------------------------------------------------------------------------------
ALSO READ:
SEBA Class 10 Computer Science Solutions
----------------------------------------------------------------------------------------------------------------------------
IMPORTANT LINKS
HTML COLOR CODE: Get HTML color codes, Hex color codes, RGB and HSL values with our color picker, color chart and HTML color names.
class 10 computer science chapter 1
Computer Science class 10
hostname
http
https
IP address
LAN
SEBA Class 10 Computer Science Solutions
SSID
- Get link
- X
- Other Apps

