Class 10 Computer Science Chapter 1: Introduction to Computer Network

Class X Computer Science Chapter 1 Question Answer SEBA: Introduction to Computer Network: Welcome to our website! We are happy to provide you with Class 10th Notes for your academic journey. Class IX is an important year for learners as they prepare themselves for the upcoming board exams, which will determine their academic success.

Today, in this article I will discuss your Class 10th “ Introduction to Computer Network” Long and Short Questions| We provide solutions for almost all long and short questions.

Our goal is to meet your needs. We provide the Notes here for free. We wish you all the best for your upcoming exams. If you have any doubts, please contact us.

Textual Questions and Answers


1. Fill in the Blanks

1. The hostname command is used to display___________.

Ans: Name of the computer

2. The length of a IPv4 is________ and a IPv6 is___________.

Ans: 32-bit; 128 bit

3. An access point is used to connect____________

Ans: Wireless network

4. The ping command is used to verify__________________.

Ans: The connectivity between two computers.

5. HTTPS transfer__________data.

Ans: Encrypted


1. Which device is required to connect multiple heterogeneous networks?

(A) Hub

(B) Switch

(C) Router

(D) Access Point

Ans: (C) Router

2. Which is the largest type of computer network?





Ans: (D) WAN

3. Which protocol transfers encrypted data instead of plain data?





Ans. (B) HTTPS

4. How many bytes are reserved for OUI in a MAC address?

(A) 3

(B) 8

(C) 24

(D) 12

Ans: (C) 24

5. IP address can be automatically assigned if the network is connected with

(A) Access Point

(B) Mail Server

(C) Web Server

(D) DHPC Server

Ans: (D) DHPC Server


1. Mention the name of components required to set up a MAN network. Draw a block diagram of a MAN network labeling name of each component.

Ans: A MAN may use a local exchange carrier (LEC) to provide the connections between LANs and may connect to an internet exchange point for high-speed communication between the MAN and the public internet.

2. Why hostname should not be used to identify a computer in a computer network?

Ans: Hostname may not be unique always. There is a possibility that two or more computers in a computer network may have the same hostname. That is the reason, hostname should not be used to identify a computer in a computer network.

3. Give five examples of valid and five examples of invalid IPv4 addresses.

Ans: A valid IPv4 address must be in the form of A.B.C.D, where A,B,C and D are numbers from 0-255.

Examples of valid IPv4 addresses are:


Examples of invalid IPv4 addresses are:

▪ (Any address that begins with 0 is invalid)

▪ (Any address with a number above 255 in it is invalid)

▪ (Any address that has more than 3 dots is invalid)

▪ (The number 255 should not appear in any of the octets. The number 255 is reserved for broadcast addressing)

▪ 2001.162 (A valid IPv4 address must consists of 4 octets)

4. Can we compare HTTP and FTP protocols? Mention their functionality.

Ans: Comparison between HTTP and FTP:

Full – formThe term HTTP is a
short form for Hyper
Text Transfer Protocol.
The term FTP is a short
form for File Transfer
MeaningHTTP refers to a set of rules
that determines the process
of transfer of various web
pages over various computers
present on the internet.
FTP refers to the set of
rules that basically allows
the process of uploading
and downloading files
from a computer to the
UsesWe use HTTP for providing We use FTP for
various web pages from the
web browser to the web
We Use downloading as well as uploading files between a
server and a client over the
Number Of URLsThe URLs that use the FTP protocol begin with FTP.The URLs that use the
HTTP protocol begin
with HTTP.

5. How many 16 port switches are required to connect 31 computers in a network?

Ans: A 16 port switch can connect 16 computers together. To connect 31 computer in a network, we need either a larger switch or 2 numbers of 16 port switches.


1. What is computer network?

Ans: Computer networking refers to interconnected computing devices that can exchange data and share resources with each other.

2. What are the different types of networks?

Ans: The different types of networks are:

PAN- Personal Area Network

LAN- Local Area Network

MAN – Metropolitan Area Network

WAN- Wide Area Network

8. Define hostname.

Ans: A hostname is a label assigned to a device (a host) on a network. It distinguishes one device from another on a specific network or over the internet.

9. Define IP address. What is the use of IP address?

Ans: An Internet Protocol address (IP address) is a numerical label that is assigned to network devices to identify them uniquely. In other words, it is a series of numbers that identifies any device on a network. The purpose of an IP address is to handle the connection between devices that send and receive information across a network.

10. Can 2 devices have the same IP address?

Ans: An IP address conflict occurs when two or more devices on the same network are assigned the same IP address. Thus, no two devices can have the same IP address on one network.

11. What are the different types of IP address? Define them.

Ans: There are two types of IP address –

Internet Protocol Version 4 (IPv4)-They are used to identify machines connected to a network. IPv4 is a 32-bit binary number. IPv4 addresses are separated by (periods. Internet Protocol Version 6 (IPv6) They are used to identify machines connected to a network.IPv6 is a 128-bit binary number address. IPv6 addresses are separated by colons.

12. Write the full form of:



PAN – Personal Area Network

LAN- Local Area Network

MAN – Metropolitan Area Network

WAN-Wide Area Network

NIC-Network Interface Card

IP – Internet Protocol

GUI-Graphical User Interface

DHCP – Dynamic Host Configuration Protocol

MAC-Media Access Control Address

TCP-Transmission Control Protocol

POP – Post Office Protocol

(1) SMTP- Simple Mail Transfer Protocol

(m) HTTP-HyperText Control Protocol

(n) HTTPS – HyperText Control Protocol Secure

(0) HTML-HyperText Markup Language

SSID- Service Set Identifier

OUI – Organizational Unique Identifier

FTP-File Transfer Protocol

  1. Compare PAN, LAN, MAN and WAN.
PAN is defined as the network that describes two or more devices, that are connected to one another via Bluetooth.LAN is defined as a MAN is defined as a computer
network that links the local areas like schools, universities,
organizations, etc.
MAN is defined as a computer network
that links
the metropolitan
WAN is defined as the
network that, covers a large geographical area.
The full form of the PAN is Personal Area
The full form of the
LAN is Local Area
The Full form of MAN is
Metropolitan Area Network.
The full form of The full form of WAN
is a Wide Area Network
A perfect example of a PAN is a cell phone connecting to a Bluetooth headset or mobile computer connecting to a
portable Bluetooth thermal printer.
LAN is a wired network, i.e., all the computers and
printers are connected
through wires.
The connections
in MAN are connected
through or cables/ wires.
The network of WAN
is connected through
broadband services, 3G
or 4G or 5G internet
services, etc.

14. Mention some uses of MAN.

Ans: Some of the Uses of MAN are:

  • Digital cable television
  • Used in government agencies
  • Cable broadband
  • A network of fire stations
  • In airports

15. What is the function of SSID?

Ans: SSID stands for Service Set Identifier which is 32 characters consisting alphanumeric letters. It acts as password to allow mobile or other computing devices to connect with the Wi-Fi network.

16. Define MAC.

Ans: MAC stands for Media Access Control. It is a unique identifier for network interfaces, Distinguish between IP address and MAC.

Ans: The IP address of a device mainly helps in identifying the connection of a network (using which the device is connecting to the network). The MAC Address, on the other hand, ensures the computer device’s physical location. It helps us to identify a given device on the available network uniquely.

18. How do we write MAC address?

Ans: The MAC address is a 12-digit hexadecimal number that is most often displayed with a colon or hyphen separating every two digits (an octet), making it easier to read. An example of MAC Address: 2C:54:91:88:C9:E3

19. What are access point used for?

Ans: An access point is a device that creates a wireless local area network, usually in an office or large building.

20.What is another name of access point?

Ans: In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network.

21. What is router and switch?

Ans: Router and Switch are both networks connecting devices. A router is a type of network device which is used to interconnect two or more heterogeneous computer networks whereas Switch connects various devices in a network. Router connects devices across multiple networks.

22. What is hub and switch?

Ans: A switch transmits data from one device to another in form of frames whereas a hub transmits data from one device to another in form of binary bits.

23. What is the difference between TCP and IP?

Ans: TCP and IP are two separate computer network protocols. IP is the part that obtains the address to which data is sent. TCP is responsible for data delivery once that IP address has been found.

24. What is the difference between POP and SMTP?

Ans: The difference between POP and SMTP are:

SL.NOBasis of
(i)Full formPOP Stands for Post Office ProtocolSMTP Stands for Simple Mail Transfer Protocol
(ii)UsesIt is used for accessing messages.It is used for Sending messages
(iii)Architecture It is implied between receiverIt is implied between sender mail sender and receiver mail server.
(iv)ApplicationPOP is designed for SMTP is designed to send
outgoing e-mails.

25. What is the difference between HTTP and HTTPS?

SL No.Basis Of Difference HTTPHTTPS
(i)Full FormHTTP stands for HyperText Transfer Protocol.HTTPS for HyperText Transfer Protocol Secure.
(ii)StructureIn HTTP, URL begins with
In HTTPS, URL starts with
(iii)SecurityHTTP is considered to be unsecure.HTTPs is considered as
(iv)SecurityIn HTTP, Encryption is absent.Encryption is present in

26. What is FTP?

Ans: FTP servers are the solutions used to facilitate file transfers across the internet. If you send files using FTP, files are either uploaded or downloaded to the FTP server.

27. What is the difference between FTP and HTTP?

Ans: FTP is used to upload or download files between client and server whereas HTTP is used to provide the web pages to the web browser from the webserver.

28. What is the IP ping command used for?

Ans: The ping command sends packets of data to a specific IP address on a network, and then lets you know how long it took to transmit that data and get a response.

29. How is ipconfig command useful?

Ans: The ipconfig command is a fast way of determining your computer’s IP address and other information, such as the address of its default gateway.

30. What is an arp command?

Ans: The arp command corresponds to the Address Resolution Protocol (ARP). ARP is a protocol for mapping an IP address to a physical MAC address on a local area network.


We believe these notes will help learners develop a better understanding of the topics and boost their confidence for their exams.

We are confident that these notes will help learners achieve their goals and enhance their academic performance. If you like this article and find it helpful, please share it with your friends.

Leave a Comment

error: Content is protected !!