Easy2Siksha.com
GNDU QUESTION PAPERS 2022
B.com 6
th
SEMESTER
WINDOWS AND NETWORKING
(Group III: Computer Applicaons & E-Business)
Time Allowed: 3 Hours Maximum Marks: 50
Note: Aempt Five quesons in all, selecng at least One queson from each secon. The
Fih queson may be aempted from any secon. All quesons carry equal marks.
SECTION-A
1. Which are various funcons of Operang System ? Which are various types of OS?
2. Explain following:
(a) Computer VIRUS
(b) Cryptology
(c) System Tray
SECTION-B
3. Explain following:
(a) Ribbon
(b) Conguring Recycle bin
(c) Windows Search parameters
4. What is run dialog box? Which are various ways to invoke it ? Which are various uses of
it?
Easy2Siksha.com
SECTION-C
5. What is dierence between synchronous and asynchronous transmission? Which are
dierent transmission modes?
6. What is mulplexing? Explain any two types of mulplexing.
SECTION-D
7. What is importance of network security? Which are dierent types of threats to
network security ?
8. What is rewall? Which are its components and benets ?
Easy2Siksha.com
GNDU ANSWER PAPERS 2022
B.com 6
th
SEMESTER
WINDOWS AND NETWORKING
(Group III: Computer Applicaons & E-Business)
Time Allowed: 3 Hours Maximum Marks: 50
Note: Aempt Five quesons in all, selecng at least One queson from each secon. The
Fih queson may be aempted from any secon. All quesons carry equal marks.
SECTION-A
1. Which are various funcons of Operang System ? Which are various types of OS?
Ans: 󹵙󹵚󹵛󹵜 Introduction: What is an Operating System?
Imagine your computer or smartphone as a busy office. There are files (documents),
workers (programs), machines (hardware), and many tasks happening at once. Now, who
manages everything so that work runs smoothly?
That “manager” is the Operating System (OS).
Examples of operating systems include Windows OS, Linux, macOS, and Android.
󼩏󼩐󼩑 Functions of Operating System
An operating system performs many important tasks. Let’s understand them one by one in a
simple and relatable way.
󺃱󺃲󺃳󺃴󺃵 1. Process Management
Easy2Siksha.com
6
Think of processes as tasks like opening a browser, playing music, or writing in MS Word.
Easy2Siksha.com
The OS:
Creates and deletes processes
Allocates CPU time to each process
Ensures multitasking (running multiple apps smoothly)
󷷑󷷒󷷓󷷔 Example: When you listen to music while browsing the internet, the OS manages both
tasks efficiently.
󹴍󹴒󹴎󹴏󹴐󹴑 2. Memory Management
Easy2Siksha.com
Memory (RAM) is like a workspace desk. The OS decides:
Which program gets how much memory
When to allocate and deallocate memory
How to avoid conflicts between programs
󷷑󷷒󷷓󷷔 Without this, your system would crash frequently.
󹴗󹴘 3. File Management
Easy2Siksha.com
The OS organizes your data into files and folders.
It:
Creates, deletes, and modifies files
Maintains directory structure
Controls file access and permissions
󷷑󷷒󷷓󷷔 Example: Saving your assignment in a folder is managed by the OS.
󼽸󼽹 4. Device Management
Easy2Siksha.com
Your system has many devices like:
Easy2Siksha.com
Keyboard
Mouse
Printer
The OS:
Communicates with hardware using drivers
Manages input/output operations
Ensures devices work properly
󷷑󷷒󷷓󷷔 Example: When you print a document, the OS coordinates with the printer.
󹺟󹺠󹺡󹺞 5. Security and Protection
Easy2Siksha.com
5
The OS keeps your system safe and secure by:
Managing user accounts and passwords
Preventing unauthorized access
Protecting data from viruses and threats
󷷑󷷒󷷓󷷔 Example: Login password on your laptop.
󹍬󼍁󼍂󹍮󸁗󼍃󼍄󼍅󼍆󼍇󼍈󼍉󻞶󼍊󹍯󹍰󸢻󼍋󸢼󸢽󼍌󼍍󼍎 6. User Interface (UI)
Easy2Siksha.com
This is how users interact with the system.
Types:
GUI (Graphical User Interface) icons, windows
CLI (Command Line Interface) text commands
󷷑󷷒󷷓󷷔 Example: Clicking icons in Windows or typing commands in terminal.
󹷂󹷃󹷄󹷅󹷆󹷇󹷈󹷋󹷉󹷊 7. Resource Management
The OS acts like a resource manager:
CPU
Memory
Storage
Devices
It ensures fair usage so that no program monopolizes resources.
󹵍󹵉󹵎󹵏󹵐 8. Error Detection & Handling
The OS:
Detects system errors
Fixes or reports them
Keeps logs for troubleshooting
󷷑󷷒󷷓󷷔 Example: “System error” or “Not responding” messages.
󼩺󼩻 Types of Operating Systems
Now let’s explore different types of operating systems in an easy way.
󷹞󷹟󷹠󷹡 1. Single User Operating System
Easy2Siksha.com
Easy2Siksha.com
Designed for one user at a time
Example: Windows 10
󷷑󷷒󷷓󷷔 Common in personal computers.
󷹢󷹣 2. Multi-User Operating System
Easy2Siksha.com
Multiple users can use the system simultaneously
Used in servers and mainframes
󷷑󷷒󷷓󷷔 Example: UNIX
󼾌󼾍󼾑󼾎󼾏󼾐 3. Batch Operating System
Easy2Siksha.com
Jobs are collected and processed in batches
No direct user interaction
󷷑󷷒󷷓󷷔 Used in early computers.
󽁗 4. Time-Sharing Operating System
Easy2Siksha.com
6
CPU time is divided among users
Fast switching gives illusion of simultaneous use
󷷑󷷒󷷓󷷔 Example: Linux
Easy2Siksha.com
󷄧󹹨󹹩 5. Real-Time Operating System (RTOS)
Provides quick response within a fixed time
Used in critical systems
󷷑󷷒󷷓󷷔 Example:
Air traffic control
Medical equipment
󷇳 6. Distributed Operating System
Easy2Siksha.com
Easy2Siksha.com
Multiple computers work together as one system
Resources are shared across network
󹸔󹸗󹸘󹸕󹸖󹸙 7. Mobile Operating System
Easy2Siksha.com
Designed for smartphones and tablets
󷷑󷷒󷷓󷷔 Examples:
Android
iOS
󹵍󹵉󹵎󹵏󹵐 Simple Diagram of Operating System
Here’s a basic idea of how an OS works:
User
Application Software
Operating System
(Manager of System)
Hardware (CPU, RAM, Devices)
󷷑󷷒󷷓󷷔 The OS acts as a bridge between user and hardware.
󷘹󷘴󷘵󷘶󷘷󷘸 Conclusion
An operating system is the heart of a computer system. Without it, your computer would
be like a machine with no control or coordination.
It manages processes, memory, files, and devices
It provides security and user interface
It ensures smooth and efficient functioning
Different types of OS are designed for different needsfrom personal computers to large
servers and real-time systems.
󷷑󷷒󷷓󷷔 In simple words:
Operating System = Manager + Coordinator + Protector of your computer
2. Explain following:
(a) Computer VIRUS
(b) Cryptology
Easy2Siksha.com
(c) System Tray
Ans: Introduction
In the world of computers, we often hear terms like virus, cryptology, and system tray.
These may sound technical, but they are part of everyday computing. Understanding them
helps us appreciate how computers work, how they are protected, and how we interact
with them. Let’s explore each concept step by step in a clear, engaging way.
(a) Computer Virus
What is a Computer Virus?
A computer virus is a type of malicious software program designed to disrupt normal
computer operations, steal information, or damage data. Just like a biological virus infects
living organisms, a computer virus infects files and spreads across systems.
Characteristics of a Computer Virus
1. Self-replicating: A virus can copy itself and spread to other files or systems.
2. Activation Trigger: It often activates when a user runs an infected program.
3. Damage Potential: It may delete files, corrupt data, or slow down systems.
4. Hidden Nature: Viruses often disguise themselves to avoid detection.
Types of Computer Viruses
File Infector Virus: Attaches to executable files.
Macro Virus: Targets documents like Word or Excel files.
Boot Sector Virus: Infects the boot sector of storage devices.
Polymorphic Virus: Changes its code to avoid detection.
Example
If you download a pirated game, it may contain a virus. Once installed, the virus could
corrupt your files or steal passwords.
(b) Cryptology
What is Cryptology?
Cryptology is the science of secure communication. It combines two fields:
Cryptography: The art of creating codes and ciphers to protect information.
Cryptanalysis: The art of breaking codes and finding weaknesses.
Importance of Cryptology
Easy2Siksha.com
Protects sensitive information like bank transactions, emails, and military
communications.
Ensures privacy and confidentiality in the digital age.
Forms the backbone of cybersecurity.
Key Concepts in Cryptology
1. Encryption: Converting plain text into unreadable code (cipher text).
2. Decryption: Converting cipher text back into plain text.
3. Keys: Special codes used to encrypt and decrypt information.
4. Algorithms: Mathematical formulas used in encryption (e.g., RSA, AES).
Example
When you shop online, your credit card details are encrypted using cryptology. Hackers
cannot read the encrypted data without the secret key.
(c) System Tray
What is the System Tray?
The system tray is a small area on the taskbar of your computer (usually at the bottom-right
corner in Windows). It displays icons for background applications and system notifications.
Features of the System Tray
1. Quick Access: Provides shortcuts to commonly used settings like volume, Wi-Fi, and
battery.
2. Background Programs: Shows icons for antivirus, cloud storage, or messaging apps
running in the background.
3. Notifications: Displays alerts like software updates, incoming emails, or low battery
warnings.
4. Customization: Users can choose which icons appear in the tray.
Example
When you connect to Wi-Fi, the system tray shows a small network icon. Clicking it lets you
manage connections quickly.
Real-Life Connection
Computer Virus: Reminds us to be cautious when downloading files.
Cryptology: Ensures our online banking and WhatsApp chats remain private.
System Tray: Makes everyday computing easier by giving quick access to essential
tools.
Conclusion
Easy2Siksha.com
A computer virus is a harmful program that spreads and damages systems.
Cryptology is the science of secure communication, protecting data through
encryption and decryption.
The system tray is a user-friendly interface element that shows background
applications and notifications.
Together, these concepts highlight the balance between threats (viruses), protection
(cryptology), and usability (system tray) in the digital world.
SECTION-B
3. Explain following:
(a) Ribbon
(b) Conguring Recycle bin
(c) Windows Search parameters
Ans: (a) Ribbon
Easy2Siksha.com
What is Ribbon?
The Ribbon is like a smart toolbar placed at the top of many Windows applications such as
File Explorer, Microsoft Word, Excel, etc. It organizes commands into tabs so that you can
easily find what you need.
Think of it like a toolbox in a workshop. Instead of searching for tools everywhere,
everything is arranged neatly in sections.
Easy2Siksha.com
Structure of Ribbon
The Ribbon is divided into three main parts:
1. Tabs
o These are the main categories like:
Home
Insert
View
o Each tab contains related tools.
2. Groups
o Inside each tab, commands are grouped.
o Example: In File Explorer, the Home tab has groups like Clipboard, Organize,
New.
3. Commands (Buttons)
o These are the actual actions like Copy, Paste, Delete.
Example (File Explorer Ribbon)
--------------------------------------------------
| File | Home | Share | View |
--------------------------------------------------
| Copy | Paste | Delete | Rename | New Folder |
--------------------------------------------------
Why Ribbon is Useful
Easy to use (no need to remember commands)
Saves time
Visually organized
Beginner-friendly
Simple Understanding
Imagine you are cooking. Instead of searching for spices everywhere, they are arranged in
labeled boxes. That’s exactly what the Ribbon does—it organizes tools so you can work
faster.
(b) Configuring Recycle Bin
Easy2Siksha.com
5
What is Recycle Bin?
The Recycle Bin is like a dustbin for your computer. When you delete a file, it doesn’t
disappear immediatelyit goes into the Recycle Bin so you can restore it if needed.
Why Configure Recycle Bin?
Sometimes, you may want:
To increase storage size
To permanently delete files immediately
To get a warning before deleting
That’s where configuration comes in.
Easy2Siksha.com
How to Configure Recycle Bin
1. Right-click on the Recycle Bin icon
2. Click on Properties
3. You will see different options
Main Settings Explained
1. Custom Size
o You can set how much space Recycle Bin can use.
o If full, old files will be deleted automatically.
2. Don’t Move Files to Recycle Bin
o Files will be deleted permanently (no recovery).
o Use carefully!
3. Display Delete Confirmation Dialog
o Shows a warning before deleting files.
Diagram of Recycle Bin Settings
--------------------------------------
| Recycle Bin Properties |
--------------------------------------
| (•) Custom Size: 5000 MB |
| ( ) Don't move files to Recycle Bin|
| [] Display delete confirmation |
--------------------------------------
| OK Cancel |
--------------------------------------
Simple Understanding
Think of a real dustbin at home:
Small dustbin = fills quickly
Big dustbin = stores more waste
No dustbin = everything thrown away instantly
So, configuring Recycle Bin means deciding how your “computer dustbin” behaves.
(c) Windows Search Parameters
Easy2Siksha.com
Easy2Siksha.com
What are Windows Search Parameters?
Windows Search parameters are filters or rules that help you find files quickly and
accurately.
Instead of searching everything, you can narrow down results using conditions like:
File type
Date
Size
Name
Why Use Search Parameters?
Imagine you have 1000 files. Searching manually would take hours. But using filters, you can
find your file in seconds.
Common Search Parameters
1. Name
o Example: report
o Finds files with the name "report"
2. Type
o Example: type:pdf
o Finds only PDF files
3. Date
o Example: date:today
o Finds files created today
4. Size
o Example: size:>10MB
o Finds files larger than 10MB
Example Search
type:pdf date:this week size:<5MB
󷷑󷷒󷷓󷷔 This will show:
Only PDF files
Created this week
Smaller than 5MB
Easy2Siksha.com
Diagram of Search Process
Search Box → Enter Keywords + Filters → Results
Example:
"assignment type:docx date:yesterday"
↓ ↓ ↓
Filtered Results Only
Advanced Search Options
You can also use:
Boolean operators (AND, OR)
Wildcards (*)
Indexing options (faster search)
Simple Understanding
Think of searching clothes in your cupboard:
You don’t check everything
You filter like:
o “Only black shirts”
o “Only winter clothes”
That’s exactly how search parameters work in Windows.
Conclusion
All three conceptsRibbon, Recycle Bin configuration, and Windows Search parameters
are designed to make your computer usage easier and smarter.
Ribbon helps you access tools quickly without confusion.
Recycle Bin configuration gives you control over deleted files.
Windows Search parameters save time by helping you find files instantly.
Together, they improve your efficiency and make working on a computer more organized
and stress-free.
Easy2Siksha.com
4. What is run dialog box? Which are various ways to invoke it ? Which are various uses of
it?
Ans: Introduction
If you’ve ever used a Windows computer, you might have noticed a small but powerful tool
called the Run dialog box. It looks simplea tiny window with a text field—but it’s like a
secret doorway into the deeper functions of your system. With just a few keystrokes, you
can open programs, access system utilities, and even launch hidden features.
1. What is the Run Dialog Box?
Definition: The Run dialog box is a built-in Windows utility that allows users to
quickly open applications, files, folders, and system settings by typing commands.
Purpose: It saves time by bypassing menus and shortcuts. Instead of clicking through
multiple windows, you can directly launch what you need.
Analogy: Think of it as a “magic portal” where you type a spell (command), and the
computer instantly takes you to the desired place.
2. Ways to Invoke the Run Dialog Box
There are several ways to open the Run dialog box. Knowing these shortcuts makes you
faster and more efficient.
(a) Keyboard Shortcut
The most common way: Press Windows Key + R.
Instantly opens the Run dialog box.
(b) Start Menu
Click the Start button.
Type “Run” in the search bar.
Select the Run app.
(c) Task Manager
Press Ctrl + Shift + Esc to open Task Manager.
Click File → Run new task.
This opens a Run-like dialog box.
(d) Command Prompt or PowerShell
Type start run in Command Prompt or PowerShell.
This launches the Run dialog box.
(e) Right-Click Start Menu (Windows 10/11)
Easy2Siksha.com
Right-click the Start button.
Select Run from the menu.
3. Uses of the Run Dialog Box
The Run dialog box is incredibly versatile. Here are its main uses:
(a) Opening Programs Quickly
Instead of searching for apps, type their names.
Example:
o notepad → Opens Notepad.
o calc → Opens Calculator.
o mspaint → Opens Paint.
(b) Accessing System Utilities
Run commands can open hidden system tools.
Examples:
o cmd → Opens Command Prompt.
o control → Opens Control Panel.
o regedit → Opens Registry Editor.
o msconfig → Opens System Configuration.
(c) Opening Folders and Files
Type a file path to open it directly.
Example:
o C:\Users\Public\Documents → Opens the Documents folder.
(d) Internet Shortcuts
Type a website address to open it in your default browser.
Example:
o www.google.com → Opens Google.
(e) Administrative Tasks
IT professionals use Run to quickly access advanced tools.
Example:
o services.msc → Opens Services Manager.
o eventvwr → Opens Event Viewer.
(f) Troubleshooting
Run helps diagnose problems by opening tools like:
o dxdiag → DirectX Diagnostic Tool.
o perfmon → Performance Monitor.
Easy2Siksha.com
4. Diagram Run Dialog Box Functions
Run Dialog Box
|
|-- Open Programs (notepad, calc, paint)
|-- Access System Utilities (cmd, control, regedit)
|-- Open Folders/Files (C:\ path)
|-- Internet Shortcuts (www.google.com)
|-- Administrative Tools (services.msc, eventvwr)
|-- Troubleshooting (dxdiag, perfmon)
5. Real-Life Example
Imagine you’re in a hurry to check your computer’s performance. Instead of clicking through
menus:
Press Windows + R.
Type perfmon.
Instantly, the Performance Monitor opens.
This saves time and makes you look like a computer wizard.
6. Benefits of Using the Run Dialog Box
1. Speed: Launch apps and tools instantly.
2. Efficiency: Avoid navigating through menus.
3. Power: Access hidden system utilities.
4. Flexibility: Open files, folders, and websites.
5. Professional Use: IT admins rely on Run for quick troubleshooting.
Conclusion
The Run dialog box may look small, but it’s one of the most powerful tools in Windows. It
allows you to open programs, access system utilities, manage files, and even troubleshoot
problemsall with a few keystrokes.
SECTION-C
5. What is dierence between synchronous and asynchronous transmission? Which are
dierent transmission modes?
Ans: 󹷂󹷃󹷄󹷅󹷆󹷇󹷈󹷋󹷉󹷊 Difference Between Synchronous and Asynchronous Transmission
+ Types of Transmission Modes
Easy2Siksha.com
When data is sent from one device to another (like from your computer to the internet), it
doesn’t just travel randomly—it follows certain rules and methods of transmission.
Two very important methods are:
Synchronous Transmission
Asynchronous Transmission
Let’s break them down step by step 󷶹󷶻󷶼󷶽󷶺
󹼧 1. Asynchronous Transmission (Simple & Flexible)
󹲉󹲊󹲋󹲌󹲍 Idea:
In asynchronous transmission, data is sent one character (byte) at a time, and each
character has its own timing.
󷷑󷷒󷷓󷷔 Think of it like sending WhatsApp messages one by one instead of sending a long
paragraph at once.
󹵍󹵉󹵎󹵏󹵐 How it works:
Each character is sent with:
Start bit → tells receiver data is coming
Data bits → actual information
Stop bit → tells receiver data ended
󹵋󹵉󹵌 Diagram:
| Start | Data (Character) | Stop | Gap | Start | Data | Stop |
0 10101010 1 0 11001100 1
󷷑󷷒󷷓󷷔 Notice the gap between characters this is very important.
󷄧󼿒 Features:
No need for strict synchronization
Easy to implement
Easy2Siksha.com
Cheap and widely used
󽆱 Disadvantages:
Slower due to gaps between characters
Extra bits (start & stop) increase overhead
󹵝󹵟󹵞 Example:
Keyboard typing
Serial communication (UART)
󹼧 2. Synchronous Transmission (Fast & Efficient)
󹲉󹲊󹲋󹲌󹲍 Idea:
In synchronous transmission, data is sent continuously in blocks (frames) without gaps.
󷷑󷷒󷷓󷷔 Think of it like sending a full paragraph in one go instead of word-by-word.
󹵍󹵉󹵎󹵏󹵐 How it works:
Data is grouped into frames
No start/stop bits for each character
Sender and receiver are synchronized using a clock
󹵋󹵉󹵌 Diagram:
| Frame Start | Data Data Data Data Data | Frame End |
↑ Continuous stream (no gaps) ↑
󷄧󼿒 Features:
Faster transmission
No extra bits per character
Efficient for large data
Easy2Siksha.com
󽆱 Disadvantages:
More complex
Requires synchronization (clock timing)
󹵝󹵟󹵞 Example:
Network communication (Ethernet)
High-speed data transfer
󹻦󹻧 Key Differences (Easy Comparison Table)
Feature
Asynchronous Transmission
Synchronous Transmission
Data Sending
One character at a time
Block/frame of data
Speed
Slower
Faster
Synchronization
Not required
Required
Extra Bits
Start & Stop bits
No extra bits per character
Efficiency
Less efficient
More efficient
Complexity
Simple
Complex
Example
Keyboard input
Internet data transfer
󹼧 3. What are Transmission Modes?
Now let’s understand the second part of your question:
󷷑󷷒󷷓󷷔 Transmission modes tell us how data flows between two devices.
There are three main modes:
󹼦 (1) Simplex Mode (One-Way Communication)
󹲉󹲊󹲋󹲌󹲍 Idea:
Data flows in only one direction.
󹵋󹵉󹵌 Diagram:
Easy2Siksha.com
Sender ───────── Receiver
󹵝󹵟󹵞 Example:
TV broadcast
Radio
󷷑󷷒󷷓󷷔 You can receive data but cannot send back.
󹼦 (2) Half-Duplex Mode (Two-Way, but One at a Time)
󹲉󹲊󹲋󹲌󹲍 Idea:
Data flows in both directions, but not at the same time.
󹵋󹵉󹵌 Diagram:
Sender ──────── Receiver
(but one direction at a time)
󹵝󹵟󹵞 Example:
Walkie-talkie
󷷑󷷒󷷓󷷔 One person speaks, the other listens.
󹼦 (3) Full-Duplex Mode (Two-Way Simultaneous)
󹲉󹲊󹲋󹲌󹲍 Idea:
Data flows in both directions at the same time.
󹵋󹵉󹵌 Diagram:
Sender ──────── Receiver
(both send & receive simultaneously)
Easy2Siksha.com
󹵝󹵟󹵞 Example:
Mobile phone calls
Video calls
󷷑󷷒󷷓󷷔 Both people can talk at the same time.
󹻦󹻧 Quick Comparison of Transmission Modes
Mode
Direction
Simultaneous?
Example
Simplex
One-way
󽆱 No
TV, Radio
Half-Duplex
Two-way
󽆱 No
Walkie-talkie
Full-Duplex
Two-way
󷄧󼿒 Yes
Phone calls
󷘹󷘴󷘵󷘶󷘷󷘸 Final Understanding (In Simple Words)
Asynchronous Transmission
→ Like sending messages one by one with pauses
Synchronous Transmission
→ Like sending a full file continuously without stopping
Simplex Mode
→ One-way only
Half-Duplex Mode
→ Two-way, but one at a time
Full-Duplex Mode
→ Two-way at the same time
󷄧󼿒 Conclusion
Understanding these concepts helps you see how communication works in computers and
networks.
If data is small and irregular → Asynchronous is used
If data is large and continuous → Synchronous is better
And depending on how devices communicate:
One-way → Simplex
Two-way but turn-by-turn → Half-duplex
Easy2Siksha.com
Two-way simultaneously → Full-duplex
6. What is mulplexing? Explain any two types of mulplexing.
Ans: Introduction
Imagine you’re at a busy railway station. Multiple trains need to use the same track, but
only one train can pass at a time. To manage this, the station schedules trains so they can
share the track efficiently. In computer networks and communication systems, a similar
concept exists called multiplexing.
Multiplexing is the technique of sending multiple signals or data streams over a single
communication channel. It’s like combining several conversations into one line, then
separating them at the other end. This makes communication faster, cheaper, and more
efficient.
1. What is Multiplexing?
Definition: Multiplexing is a method of combining multiple signals into one medium
for transmission, then separating them back at the destination.
Purpose: To maximize the use of available bandwidth and reduce costs.
Analogy: Think of a highway with multiple lanes. Cars (signals) travel together on the
same road (channel), but each lane keeps them organized.
2. General Features of Multiplexing
1. Efficiency: Makes better use of communication channels.
2. Cost-Effective: Reduces the need for multiple physical lines.
3. Flexibility: Can handle different types of signals (voice, video, data).
4. Separation at Destination: Uses demultiplexing to split signals back into their
original form.
3. Types of Multiplexing
There are several types, but let’s focus on two major ones:
(a) Time Division Multiplexing (TDM)
Concept: Each signal gets a fixed time slot in which it can transmit data.
How it Works:
o Imagine a classroom where each student gets 1 minute to speak.
o After one finishes, the next speaks, and so on.
o Similarly, in TDM, signals take turns using the channel.
Features:
o Works well for digital signals.
o Requires synchronization between sender and receiver.
Easy2Siksha.com
Example: Telephone networks use TDM to allow multiple calls over the same line.
(b) Frequency Division Multiplexing (FDM)
Concept: Each signal is transmitted at a different frequency within the same channel.
How it Works:
o Think of radio stations. Many stations broadcast simultaneously, but each
uses a different frequency.
o Listeners tune in to the frequency they want.
Features:
o Works well for analog signals.
o Requires bandwidth large enough to accommodate multiple frequencies.
Example: Cable TV uses FDM to deliver multiple channels over one cable.
4. Diagram Multiplexing
Multiplexing
|
|-- Time Division Multiplexing (TDM)
| |-- Signals share channel by time slots
|
|-- Frequency Division Multiplexing (FDM)
|-- Signals share channel by different frequencies
5. Real-Life Examples
TDM Example: In digital communication, multiple phone calls are transmitted over
the same fiber optic cable by assigning each call a time slot.
FDM Example: FM radio stations broadcast simultaneously, but each station has its
own frequency band.
6. Benefits of Multiplexing
1. Efficient Use of Resources: Maximizes bandwidth.
2. Cost Savings: Fewer physical channels needed.
3. Scalability: Easy to add more signals.
4. Flexibility: Supports both analog and digital communication.
7. Limitations
Requires complex equipment for multiplexing and demultiplexing.
Synchronization issues in TDM.
Bandwidth limitations in FDM.
Conclusion
Multiplexing is the backbone of modern communication systems. It allows multiple signals
to share the same channel, making communication efficient and cost-effective.
Easy2Siksha.com
TDM organizes signals by time slots.
FDM organizes signals by frequency bands.
Together, they ensure that our phones, radios, TVs, and internet connections work smoothly
without needing separate lines for every signal.
SECTION-D
7. What is importance of network security? Which are dierent types of threats to
network security ?
Ans: 󹺟󹺠󹺡󹺞 What is Network Security? (Easy Idea)
Imagine your computer network like a house. Inside this house, you have your important
things—photos, documents, passwords, bank details, etc. Now, if you don’t lock your doors
or install security, anyone can walk in and steal or damage your belongings.
󷷑󷷒󷷓󷷔 Network security is like putting locks, CCTV cameras, and guards on your digital house
(network) to keep your data safe from unauthorized access, misuse, or attacks.
󷈷󷈸󷈹󷈺󷈻󷈼 Importance of Network Security
Network security is extremely important in today’s digital world. Let’s understand this in a
simple and relatable way.
1. 󺬥󺬦󺬧 Protects Sensitive Data
Every day, we use the internet for:
Banking
Shopping
Social media
Online classes
All these activities involve personal information. Network security ensures that hackers
cannot steal your passwords, bank details, or private data.
2. 󹺣󹺤󹺥 Maintains Privacy
Without network security, anyone could:
Easy2Siksha.com
Read your emails
Access your photos
Track your activities
Security measures like encryption ensure that only authorized users can see the data.
3. 󹳾󹳿󹴀󹴁󹴂󹴃 Prevents Unauthorized Access
Think of a password as a lock. Network security adds extra layers of protection, such as:
Firewalls
Authentication systems
This prevents unknown users from entering your system.
4. 󽁗 Ensures Smooth Operation
If a network is attacked, systems may:
Crash
Slow down
Stop working
Network security helps keep systems running smoothly without interruptions.
5. 󹳎󹳏 Prevents Financial Loss
Cyber attacks can lead to:
Fraud
Data theft
Business loss
Good security saves money by preventing these risks.
6. 󷪏󷪐󷪑󷪒󷪓󷪔 Protects Business Reputation
For companies, a data breach can damage trust. Customers may stop using their services.
Network security helps maintain credibility and trust.
Easy2Siksha.com
󹵍󹵉󹵎󹵏󹵐 Simple Diagram of Network Security
Here’s a basic idea of how network security works:
Easy2Siksha.com
󷷑󷷒󷷓󷷔 In this diagram:
The internet represents external users (including attackers)
The firewall/security layer acts like a gatekeeper
The internal network contains your protected data
󽁔󽁕󽁖 Types of Threats to Network Security
Now let’s understand the different dangers (threats) that can harm a network.
1. 󻛟󻛠󻛡󻛢󻛣󻛤󻛥󻛦󻛪󻛧󻛨󻛩󻛫󻛬󻛭󻛮 Malware (Malicious Software)
Malware is harmful software designed to damage or steal data.
Types of malware:
Virus
Worm
Trojan
󷷑󷷒󷷓󷷔 Example: A file you download may secretly contain a virus that damages your system.
2. 󷗧󷗣󷗤󷗨󷗩󷗪󷗫󷗬󷗥󷗭󷗦 Phishing Attacks
This is a trick to fool users into giving personal information.
󷷑󷷒󷷓󷷔 Example:
You receive a fake email saying:
“Your bank account is blocked. Click here to verify.”
If you click and enter details, hackers steal your data.
3. 󹲙󹲚 Denial of Service (DoS) Attack
In this attack, the hacker floods a network with too many requests.
󷷑󷷒󷷓󷷔 Result:
System becomes slow
Easy2Siksha.com
Website crashes
It’s like too many people entering a shop at once, making it impossible for real customers to
enter.
4. 󸛵󸛶󸀊󸀋󸛷󸀌󸛸󸛹󸛺󸛻󸀍󸀎󸛼󸀏󸛽󸀐󸀑󸀒󸀓󸀔󸛾󸀕󸛿 Man-in-the-Middle Attack
In this attack, a hacker secretly intercepts communication between two parties.
󷷑󷷒󷷓󷷔 Example:
You are sending money online, and the attacker secretly captures the data.
5. 󹺢 Password Attacks
Hackers try to guess or steal passwords using:
Brute force (trying many combinations)
Keyloggers (recording what you type)
6. 󸀱󸀲󸀳󸀴󸀵󸀶󻳌󻳍󼍛󼍜󻳎󼍙󼌱󼍝󼍞󼍟󼍠󼍡󷼱󻳐󻳑󻳒󼍚󻳔󻳕󼍢󸀷󼍣 Insider Threats
Not all threats come from outside. Sometimes:
Employees
Trusted users
may misuse access intentionally or accidentally.
7. 󹿶󹿷󹿸󹿹󹿺󹿻󹿼󹿽󹿾󹿿󺀍󺀎󺀀󺀁󺀂󺀃󺀄󺀅󺀆󺀇󺀏󺀐󺀈󺀑󺀒󺀉󺀓󺀊󺀋󺀌 Spyware
This software secretly collects your data and sends it to hackers.
󷷑󷷒󷷓󷷔 Example:
Tracking your browsing activity or stealing login details.
8. 󹺦󹺧󹺨 Zero-Day Attacks
Easy2Siksha.com
These attacks happen when hackers exploit unknown software weaknesses before they are
fixed.
9. 󹷂󹷃󹷄󹷅󹷆󹷇󹷈󹷋󹷉󹷊 Eavesdropping
Hackers listen to communication over networks.
󷷑󷷒󷷓󷷔 Example:
Using public Wi-Fi without security can allow attackers to steal your data.
10. 󼪈󼪉󼪊󼪋󼪌 Ransomware
This is a very dangerous threat.
󷷑󷷒󷷓󷷔 What happens:
Your files get locked
Hacker demands money to unlock them
󷘹󷘴󷘵󷘶󷘷󷘸 Conclusion
Network security is not just for big companiesit is important for everyone who uses the
internet.
In simple words:
It protects your data
Keeps your privacy safe
Prevents cyber attacks
Ensures smooth functioning of systems
At the same time, threats like malware, phishing, ransomware, and hacking are constantly
increasing. That’s why strong security measures such as firewalls, antivirus software, and
safe internet practices are necessary.
Easy2Siksha.com
8. What is rewall? Which are its components and benets ?
Ans: Introduction
Imagine your computer as a house. You lock the doors to keep intruders out, but you still
allow friends and family to enter. A firewall works in the same way for your computer or
networkit acts as a protective barrier between your system and the outside world (the
internet). It decides which data packets are allowed in and which are blocked, based on
security rules.
Firewalls are one of the most important tools in cybersecurity. Let’s explore what a firewall
is, its components, and its benefits in detail.
1. What is a Firewall?
Definition: A firewall is a network security system that monitors and controls
incoming and outgoing traffic based on predetermined rules.
Purpose: To prevent unauthorized access while allowing legitimate communication.
Analogy: Just like airport security checks passengers before they enter, a firewall
checks data packets before they enter or leave your network.
2. Components of a Firewall
A firewall is not just a single wall—it’s made up of several components that work together.
(a) Packet Filtering
Examines data packets (small units of information) traveling across the network.
Allows or blocks packets based on rules like IP address, port number, or protocol.
(b) Proxy Service
Acts as an intermediary between users and the internet.
Requests from users are sent to the proxy, which then fetches data from the
internet.
This hides the internal network from outsiders.
(c) Stateful Inspection
Tracks the state of active connections.
Ensures that packets are part of a valid, established connection before allowing
them.
(d) Network Address Translation (NAT)
Hides internal IP addresses by converting them into a single public IP.
Prevents outsiders from directly accessing internal systems.
Easy2Siksha.com
(e) Application Layer Filtering
Monitors traffic at the application level (e.g., HTTP, FTP).
Can block specific websites, applications, or content.
(f) Logging and Monitoring
Records all traffic activity.
Helps administrators detect suspicious behavior and analyze attacks.
3. Benefits of a Firewall
(a) Protection Against Unauthorized Access
Blocks hackers and malicious software from entering the network.
Ensures only trusted connections are allowed.
(b) Safeguards Sensitive Data
Prevents confidential information from being stolen or leaked.
Essential for businesses handling customer data.
(c) Controls Internet Usage
Organizations can block access to harmful or non-work-related websites.
Improves productivity and reduces risks.
(d) Prevents Malware and Viruses
Firewalls can block suspicious downloads or harmful traffic.
Acts as the first line of defense before antivirus software.
(e) Monitors Network Traffic
Provides insights into what data is entering and leaving the system.
Helps detect unusual patterns that may indicate an attack.
(f) Supports Virtual Private Networks (VPNs)
Firewalls can integrate with VPNs to secure remote connections.
Ensures safe communication for employees working from home.
(g) Peace of Mind
Users feel secure knowing their systems are protected.
Reduces anxiety about cyber threats.
4. Diagram Firewall Function
Easy2Siksha.com
Internet → Firewall → Internal Network
|
|-- Packet Filtering
|-- Proxy Service
|-- Stateful Inspection
|-- NAT
|-- Application Filtering
|-- Logging & Monitoring
5. Real-Life Example
Suppose you’re working in a company and receive an email with a suspicious attachment.
Without a firewall: The attachment could download malware, giving hackers access
to your system.
With a firewall: The suspicious traffic is blocked, and the malware never reaches
your computer.
6. Advantages of Firewalls
Strong protection against cyber threats.
Flexible rules tailored to organizational needs.
Essential for compliance with data protection laws.
Improves overall network performance by filtering unwanted traffic.
7. Limitations
Cannot protect against threats that bypass the network (like infected USB drives).
Needs regular updates to remain effective.
Advanced firewalls can be expensive for small businesses.
Conclusion
A firewall is like the security guard of your digital world. Its componentspacket filtering,
proxy services, stateful inspection, NAT, application filtering, and monitoringwork
together to keep intruders out while allowing safe communication.
The benefits are immense: protection against hackers, safeguarding sensitive data,
controlling internet usage, preventing malware, and ensuring peace of mind.
This paper has been carefully prepared for educaonal purposes. If you noce any
mistakes or have suggesons, feel free to share your feedback.