Introduction to Computer Networks – 9th Class Computer Science (New Syllabus)

Discover the basics of computer networks in 9th class computer science (new syllabus). Understand networking types, protocols, security, and real-world applications with simple explanations.

MCQs


1. What is the primary objective of computer networks?

Options:
(a) Increase computational power
(b) Enable resource sharing and data communication ✅
(c) Enhance graphic capabilities
(d) Improve software development

Explanation:
The primary goal of computer networks is to allow multiple devices to communicate and share resources such as files, printers, and the internet.

Tip:
Always focus on the main purpose—data sharing and communication in networks.


2. Which device is used to connect multiple networks and direct data packets between them?

Options:
(a) Switch
(b) Hub
(c) Router ✅
(d) Modem

Explanation:
A router connects different networks and determines the best path for forwarding data packets between them.

Tip:

  • A switch is used within a network to connect devices.
  • A hub is a basic networking device that broadcasts data to all connected devices.
  • A modem connects a network to the internet.

3. Which layer of the OSI model is responsible for node-to-node data transfer and error detection?

Options:
(a) Physical Layer
(b) Data Link Layer ✅
(c) Network Layer
(d) Transport Layer

Explanation:
The Data Link Layer ensures error detection and node-to-node data transfer, using protocols like Ethernet and MAC addressing.

Tip:

  • Physical Layer deals with hardware transmission (cables, signals).
  • Network Layer handles IP addressing and routing.
  • Transport Layer ensures end-to-end delivery (e.g., TCP/UDP).

4. What is the function of the Domain Name System (DNS)?

Options:
(a) Assign IP addresses dynamically
(b) Translate domain names to IP addresses ✅
(c) Secure data communication
(d) Monitor network traffic

Explanation:
DNS translates human-readable domain names (e.g., google.com) into IP addresses (e.g., 8.8.8.8), allowing browsers to access websites.

Tip:

  • DHCP assigns IP addresses dynamically.
  • DNS only translates domain names.

5. Which method of data transmission uses a dedicated communication path?

Options:
(a) Packet Switching
(b) Circuit Switching ✅
(c) Full-Duplex
(d) Half-Duplex

Explanation:
Circuit Switching establishes a dedicated communication path between sender and receiver (e.g., traditional telephone calls).

Tip:

  • Packet Switching (used in the internet) divides data into packets sent over different routes.
  • Full-Duplex & Half-Duplex relate to communication direction.

6. What is encapsulation in the context of network communication?

Options:
(a) Converting data into a secure format
(b) Wrapping data with protocol information ✅
(c) Monitoring network traffic
(d) Translating domain names to IP addresses

Explanation:
Encapsulation is the process of adding protocol-specific headers and trailers to data as it moves through network layers.

Tip:
Encapsulation follows the OSI model:

  1. Application Layer (data)
  2. Transport Layer (segments)
  3. Network Layer (packets)
  4. Data Link Layer (frames)
  5. Physical Layer (bits)

7. Which protocol is used for reliable data transfer in the TCP/IP model?

Options:
(a) HTTP
(b) FTP
(c) TCP ✅
(d) UDP

Explanation:
TCP (Transmission Control Protocol) ensures reliable data transmission using error checking and acknowledgment.

Tip:

  • UDP (User Datagram Protocol) is faster but unreliable (used in streaming).
  • HTTP & FTP are application-layer protocols.

8. What is the main purpose of a firewall in network security?

Options:
(a) Convert data into a secure format
(b) Monitor and control network traffic ✅
(c) Assign IP addresses
(d) Translate domain names

Explanation:
A firewall acts as a security barrier, filtering incoming and outgoing traffic based on predefined rules.

Tip:
Firewalls prevent unauthorized access and cyber attacks.


9. Which network topology connects all devices to a central hub?

Options:
(a) Ring
(b) Mesh
(c) Bus
(d) Star ✅

Explanation:
In a Star Topology, all devices are connected to a central hub or switch, which manages communication.

Tip:

  • Ring Topology: Devices are connected in a loop.
  • Mesh Topology: Every device is interconnected.
  • Bus Topology: A single central cable connects all devices.

10. What is a key benefit of using computer networks in businesses?

Options:
(a) Increase computational power
(b) Enable resource sharing and efficient communication ✅
(c) Enhance graphic capabilities
(d) Improve software development

Explanation:
Computer networks enhance communication and allow resource sharing, reducing costs and improving efficiency.

Tip:

  • Always focus on connectivity and resource-sharing when answering network-related benefits.

Short Questions with Answers

1. Define data communication and list its key components.
Answer: Data communication is the exchange of data between devices through a transmission medium. The key components are:

  • Sender (originates data)
  • Receiver (accepts data)
  • Transmission Medium (carries data)
  • Message (actual data being transmitted)
  • Protocol (rules governing communication)

Key Words: Data exchange, sender, receiver, transmission, protocol


2. Explain the role of routers in a computer network.
Answer: Routers direct data packets between networks, ensuring efficient data transmission by selecting the best path. They connect different networks, manage traffic, and provide security features like firewalls.

Key Words: Data packets, network connection, routing, path selection, traffic management


3. What are the main functions of the Network Layer in the OSI model?
Answer: The Network Layer is responsible for:

  • Logical addressing (assigning IP addresses)
  • Routing (determining the best path)
  • Packet forwarding (moving data across networks)
  • Fragmentation (breaking data into smaller packets)

Key Words: IP addressing, routing, forwarding, fragmentation


4. Describe the difference between packet switching and circuit switching.
Answer:

  • Packet Switching: Data is broken into packets, which travel independently and reassemble at the destination (e.g., Internet).
  • Circuit Switching: A dedicated communication path is established for the entire session (e.g., telephone calls).

Key Words: Packet-based, independent transmission, dedicated path, real-time communication


5. What is the purpose of the Dynamic Host Configuration Protocol (DHCP)?
Answer: DHCP automatically assigns IP addresses to devices in a network, reducing manual configuration and ensuring efficient IP management.

Key Words: IP assignment, automation, network configuration, address management


6. How does encapsulation ensure secure communication in a network?
Answer: Encapsulation wraps data with headers and encryption, protecting it during transmission. It helps maintain integrity, confidentiality, and proper data routing.

Key Words: Data protection, headers, encryption, security, integrity


7. Differentiate between TCP and UDP in terms of data transfer reliability.
Answer:

  • TCP (Transmission Control Protocol): Reliable, connection-oriented, ensures data delivery with error checking.
  • UDP (User Datagram Protocol): Faster, connectionless, no guarantee of delivery but efficient for real-time applications.

Key Words: Reliable, connection-oriented, error checking, fast, connectionless


8. Explain the importance of encryption in network security.
Answer: Encryption converts data into an unreadable format, preventing unauthorized access and ensuring confidentiality, integrity, and secure communication.

Key Words: Data security, confidentiality, encryption, unauthorized access


9. What are the advantages of using a star topology in a network?
Answer:

  • Easy Troubleshooting: Faults are isolated to a single device.
  • Scalability: Easy to add new devices.
  • Better Performance: Dedicated links prevent data collisions.

Key Words: Central hub, easy maintenance, scalability, reliability


10. How do firewalls contribute to network security?
Answer: Firewalls monitor and filter incoming/outgoing traffic, blocking unauthorized access and preventing cyber threats like malware and hacking attempts.

Key Words: Traffic filtering, security, unauthorized access, malware prevention

Here are the detailed answers for your long questions, suitable for a 9th-grade level:


1. Objectives of Computer Networks and Resource Sharing

Objectives:

  • Communication: Networks allow users to send emails, messages, and video calls.
  • Resource Sharing: Users can share printers, files, and internet access.
  • Data Storage and Retrieval: Cloud storage helps store and retrieve data from anywhere.
  • Centralized Management: Large organizations manage data through servers efficiently.
  • Security and Access Control: Networks enable secure data access through authentication.

Examples of Resource Sharing:

  • A school shares one printer for all classrooms.
  • Offices store employee data on a shared database.
  • Students access online study materials through networked computers.

2. Simplex Communication – Time Calculation

Given:

  • Data Rate = 500 bps
  • Message Sizes: (a) 10 kilobits, (b) 10 kilobytes

(a) Transmission time for 10 kilobits Time=Total bits/Transmission Rate=10,000/500=20 seconds

(b) Transmission time for 10 kilobytes
1 Byte = 8 Bits → 10 KB = 10,000×8= 80,000 bits

Time=80,000/500=160 seconds=2 minutes 40 seconds


3. Packet Switching vs. Circuit Switching

Packet Switching

  • Data is divided into packets and sent through different routes.
  • Efficient use of bandwidth.
  • Used in the Internet (e.g., emails, web browsing).

Circuit Switching

  • A dedicated path is established for the whole communication.
  • More reliable but less efficient.
  • Used in traditional telephone systems.

4. Importance of Protocols and Key Protocols

Role of Protocols:

  • Standardize communication between devices.
  • Ensure data is transmitted accurately.
  • Manage error detection and correction.

Key Protocols:

  • TCP/IP: Manages internet communication.
  • HTTP: Transfers web pages.
  • DNS: Converts website names to IP addresses.
  • DHCP: Assigns IP addresses to devices.

5. Network Security Methods

  • Firewalls: Block unauthorized access to networks.
  • Encryption: Converts data into unreadable code to protect privacy.
  • Antivirus Software: Detects and removes malicious software.

6. Real-World Applications of Networks

  • Business: Online banking, e-commerce.
  • Education: E-learning platforms like Google Classroom.
  • Healthcare: Online patient records and telemedicine.

7. Comparison of Network Topologies

TopologyStructureAdvantagesDisadvantages
StarCentral hub connects devicesEasy troubleshootingFailure of hub affects all
RingEach device connected to two othersLess data collisionFailure of one node affects all
BusSingle central cableCost-effectiveSlow with high traffic
MeshEvery node connects to multiple othersHigh reliabilityExpensive to set up

8. Shift Cipher with Shift Amount = 4

Encryption:

SECURITY → WMXYVMI
(S → W, E → I, C → G, etc.)

Decryption:

WMXYVMI → SECURITY
(W → S, M → I, etc.)


9. IPv4 Address Calculation

(a) Total Unique IPv4 Addresses

IPv4 uses 32 bits, so the total addresses: 232=4,294,967,296

(b) Addresses Left After Reserving 10%

10%×4,294,967,296=429,496,729.6≈429,496,72910

Remaining=4,294,967,296−429,496,729=3,865,470,567