Welcome to “INTERNET and WEB Practice Questions with Solutions (Part-2)” – a comprehensive study guide designed to help CBSE Board Class 12 students deepen their understanding of Internet and Web concepts. This study material builds on the foundation laid in Part-1 and covers a wide range of advanced topics related to Internet and Web, including protocols, MAC Address, IP Address, and more
Question : What is protocol? Name any 5 protocols.
Answer : In computing, a protocol refers to a set of rules or procedures that define how data is transmitted and received over a network. Protocols ensure that devices and software applications can communicate with each other effectively, and they define the format and structure of the data being transmitted.
Here are five common protocols used in computer networking:
- TCP/IP (Transmission Control Protocol/Internet Protocol): TCP/IP is the standard protocol used for transmitting data over the internet. It provides a reliable, connection-oriented service for sending and receiving data packets.
- HTTP (Hypertext Transfer Protocol): HTTP is the protocol used for transmitting data between web servers and web browsers. It defines the format and structure of web pages and other resources, and enables web browsers to retrieve and display content from web servers.
- FTP (File Transfer Protocol): FTP is a protocol used for transferring files between computers over a network. It provides a simple, reliable method for uploading and downloading files.
- SMTP (Simple Mail Transfer Protocol): SMTP is the protocol used for transmitting email messages between email servers. It defines the format and structure of email messages and ensures that they are delivered to the correct recipient.
- DNS (Domain Name System): DNS is a protocol used for translating domain names into IP addresses. It enables users to access websites and other resources on the internet by typing in a human-readable domain name, rather than a numerical IP address.
Question : John needs to transfer a large file from his office computer to his home computer. Name the protocol used by John.
Answer : File Transfer Protocol (FTP)
Question : Sarah needs to send an email to her colleagues at work using her email client. Name the protocol used by Sarah
Answer: Simple Mail Transfer Protocol (SMTP)
Question : Alex is working from home and needs to participate in a conference call with his colleagues. He wants to use his computer and a headset to make the call. Name the protocol used by Alex.
Answer : Voice over Internet Protocol (VoIP).
Question : Difference between MAC address and IP Address.
MAC Address | IP Address |
MAC address stands for Media Access Control address. | IP address stands for Internet Protocol address. |
It is a unique identifier assigned to the network interface card (NIC) of a device. | It is a unique identifier assigned to a device connected to a network. |
It is a physical address that is burned into the NIC by the manufacturer. | It is a logical address that is assigned by the network administrator or DHCP server. |
It is used to identify devices within a local network. | It is used to identify devices on a global network. |
It is a 48-bit address and represented in hexadecimal format | It is a 32-bit or 128-bit address and represented in decimal format. |
It operates at the Data Link layer (layer 2) of the OSI model. | It operates at the Network layer (layer 3) of the OSI model. |
It does not change even if the device is moved to a different network. | It can change if the device is moved to a different network or if the IP address lease expires. |
It is not routable, meaning it cannot be used to identify devices outside of the local network. | It is routable, meaning it can be used to identify devices outside of the local network. |
Examples of MAC addresses are 00:0a:95:9d:68:16, 00:1b:44:11:3a:b7, etc. | Examples of IP addresses are 192.168.1.1, 10.0.0.1, 172.16.0.1, etc. |
Question : Tanya is a web developer. She has designed a login from to input the login id and password of the user. She has to write a script to check whether the login id and the corresponding password as entered by the user are correct or not. What kind of script from the following will be most suitable for doing the same. [CBSE Sample Paper I, 2012]
i) JSP ii) Client Side Script iii) VB Script
Answer : i) JSP
Question : Ramanathan’s friend Suryansh visited his office for giving an invitation for his wedding. During the visit, he requested Ramanathan to work on his office computer to send an urgent mail. While working on the computer, Suryansh was tempted by seeing some important documents on his desktop and cleverly uploaded them to his Online Folder without taking his consent (Suryansh did not even inform Ramanathan about this). What name from the following would you give to the above act committed by Suryansh? [CBSE Sample Paper I]
i) Trojan ii) Cyber Crime iii) Virus
Answer : ii) Cyber Crime
Question : What out of the following, will you use to have an audio-visual chat with an expert sitting in a far-away place to fix-up a technical issue, [CBSE Delhi 12; OD 12]
i) email ii) VoIP iii) FTP
Answer : ii) VoIP
Question : Name three Client Side Scripting language and three Server Side language.
Answer : Client Side Scripting : JavaScript, PHP, TypeScript, Dart
Server Side Scripting: PHP, Python, Ruby
Question : Expand the following terms :
LAN | Local Area Network | WLL | Wireless in Local Loop |
OSI | Open System Interconnect | TCP/IP | Transmission Control Protocol/Internet Protocol |
FTP | File Transfer Protocol | PPP | Point to Point Protocol |
WAN | Wide Area Network | XML | Extensible Markup Language |
WWW | World Wide Web | HTML | Hyper Text Markup Language |
GSM | Global System for Mobile Communication | URL | Uniform Resource Locator |
CDMA | Code Division Multiple Access | SMS | Short Message Service |
HTTP | Hyper Text Transfer Protocol | MAN | Metropolitan Area Network |
ARPANET | Advanced Research Projects Agency Network | DHTML | Dynamic Hyper Text Markup Language |
MODEM | MOdulator DEModulator | ISP | Internet Service Provider |
OSI | Open System Interconnect | GNU | GNU’s Not Unix |
FLOSS | Free Libre/Livre and Open Source Software | GPL | General Public Licence |
FSF | Free Software Foundation | W3C | World Wide Web Consortium |
OSS | Open Source Software |
Question : What is the difference between Shareware and Freeware Software?
Answer : Freeware refers to software that is completely free to use and distribute. This means that users can download and use the software without paying anything, and they are not required to purchase a license or provide any personal information. Freeware is typically available for personal or non-commercial use, and it may be limited in terms of features or functionality.
Shareware, on the other hand, is software that is free to use for a limited trial period. After the trial period expires, users are required to pay for a license if they wish to continue using the software. Shareware is often fully functional during the trial period, so users can get a sense of what the software can do before they decide whether to purchase it. Shareware is typically available for both personal and commercial use.
Question : What is the difference between Open Source Software and Proprietary Software?
Answer : Open source software refers to software that is freely available and can be modified and distributed by anyone. The source code of open source software is available for users to view and modify, which means that users have the ability to customize the software to meet their specific needs. Open source software is typically licensed under an open source license, which allows users to use, modify, and distribute the software without restrictions.
Proprietary software, on the other hand, is software that is owned and licensed by a specific company or organization. The source code of proprietary software is not freely available, which means that users cannot view or modify it. Proprietary software is typically licensed under a proprietary license, which restricts how users can use the software and may require users to pay a fee to use it.
Question : Name any two Open Source Software and two Proprietary Software.
Answer : Open Source Software : Mozilla Firefox, VLC Media Player, Linux
Proprietary Software : Microsoft Windows, Adobe Photoshop, Microsoft Office.
Question : What is the difference between Hackers and Crackers?
Answer : A hacker is someone who is skilled in computer programming and has an interest in exploring and understanding computer systems. Hackers are often motivated by a desire to learn and innovate, and they may use their skills to improve computer security, develop new software, or test the limits of computer systems. Hackers are not necessarily malicious or criminal in their activities, and some may even work in the computer security industry.
A cracker, on the other hand, is someone who uses their programming skills to break into computer systems or steal information. Crackers are motivated by malicious intent and may engage in activities like stealing passwords, injecting viruses or malware, or causing other types of damage to computer systems. Crackers are often associated with criminal activities and may be prosecuted under computer crime laws.