All Exams  >   Class 10  >   Computer Application: Class 10  >   All Questions

All questions of Internet Protocol for Class 10 Exam

Telnet is used for _______
  • a)
    Television on net
  • b)
    Network of Telephones
  • c)
    Remote Login
  • d)
    Teleshopping site
Correct answer is option 'C'. Can you explain this answer?

Gaurav Kumar answered
Telnet is an application layer protocol that provides access to the command line interface of a remote computer that can be used to perform remote login.

The data field cannot carry which of the following?
  • a)
    TCP segment
  • b)
    UDP segment
  • c)
    ICMP messages
  • d)
    SMTP messages
Correct answer is option 'C'. Can you explain this answer?

Abhinav dube answered
The correct answer is option 'C': ICMP messages.

ICMP stands for Internet Control Message Protocol, which is a network protocol used for diagnostic and error reporting purposes. It is primarily used by network devices to communicate network status and error messages.

Here's an explanation of why ICMP messages cannot be carried in the data field:

- TCP and UDP segments: Both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are transport layer protocols that provide communication services between applications running on different devices. They use segments to encapsulate the application data and provide reliable or unreliable data delivery respectively. These segments are carried in the data field of the IP (Internet Protocol) packets.

- SMTP messages: SMTP (Simple Mail Transfer Protocol) is an application layer protocol used for sending email messages. When an email is sent, the content and other relevant information are encapsulated in SMTP messages. These messages are then encapsulated in TCP segments, which in turn are carried in IP packets. Therefore, SMTP messages can be carried in the data field.

- ICMP messages: ICMP, on the other hand, operates at the network layer and is used for various network-related functions such as error reporting, network congestion control, and troubleshooting. ICMP messages are encapsulated in IP packets, but they are not carried in the data field. Instead, ICMP messages are typically encapsulated in the payload of IP packets, which is separate from the data field.

In summary, while TCP segments, UDP segments, and SMTP messages can be carried in the data field of IP packets, ICMP messages are not carried in the data field. ICMP messages have their own encapsulation within the payload of IP packets.

Which of the following is not applicable for IP?
  • a)
    Error reporting
  • b)
    Handle addressing conventions
  • c)
    Datagram format
  • d)
    Packet handling conventions
Correct answer is option 'A'. Can you explain this answer?

The Internet Protocol is the networking protocol which establishes the internet by relaying datagrams across network boundaries. ICMP is a supporting protocol for IP which handles the Error Reporting functionality.

_______ allows you to connect and login to a remote computer
  • a)
    Telnet
  • b)
    FTP
  • c)
    HTTP
  • d)
    SMTP
Correct answer is option 'A'. Can you explain this answer?

Naina Sharma answered
Telnet provides access to the command-line interface on a remote computer. One can login to the computer from the command-line interface.

If 5 files are transferred from server A to client B in the same session. The number of TCP connections between A and B is _______
  • a)
    5
  • b)
    10
  • c)
    2
  • d)
    6
Correct answer is option 'D'. Can you explain this answer?

Kiran Mehta answered
The client would first initiate the TCP control connection through port 21. Then for every file transfer, a separate connection would be made through port 20. Now, since we have five files to be transferred, 1 control connection + 5 data connections = 6 total TCP connections.

In TCP, sending and receiving data is done as _______
  • a)
    Stream of bytes
  • b)
    Sequence of characters
  • c)
    Lines of data
  • d)
    Packets
Correct answer is option 'A'. Can you explain this answer?

Deepa nambiar answered
Answer:

Introduction
TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol used for transmitting data over networks. It provides a reliable and ordered delivery of a stream of bytes between two devices.

Stream of Bytes
The correct answer is option A, "Stream of bytes." In TCP, data is sent and received as a stream of bytes. This means that the data is divided into small units called bytes and transmitted as a continuous stream without any specific boundaries between them. Each byte is assigned a sequence number to maintain the order of transmission and ensure reliable delivery.

Characteristics of a Stream of Bytes
- No specific boundaries: Unlike other protocols such as UDP (User Datagram Protocol), TCP does not have specific boundaries between the data units. It treats the data as a continuous stream without any predefined packet or message boundaries.
- Sequential order: The bytes are transmitted and received in sequential order. Each byte is assigned a sequence number to ensure that the receiver can reconstruct the original data in the correct order.
- Variable length: The stream of bytes can have a variable length depending on the amount of data being transmitted. TCP allows for both small and large data transfers.

Advantages of Using a Stream of Bytes
- Flexibility: The stream of bytes allows for flexible data transmission, as the length of the data can vary. This makes TCP suitable for transmitting both small and large amounts of data.
- Efficient use of network resources: By transmitting data as a stream of bytes, TCP can optimize the use of network resources. It can dynamically adjust the size of the data segments based on network conditions to ensure efficient transmission.

Conclusion
In TCP, data is sent and received as a stream of bytes. This approach provides flexibility, efficient use of network resources, and reliable delivery of data in sequential order. By using sequence numbers, TCP ensures that the receiver can reconstruct the original data in the correct order.

A 4 byte IP address consists of __________
  • a)
    only network address
  • b)
    only host address
  • c)
    network address & host address
  • d)
    network address & MAC address
Correct answer is option 'C'. Can you explain this answer?

Meera Rana answered
An ip address which is 32 bits long, that means it is of 4 bytes and is composed of a network and host portion and it depends on address class. The size of the host address and network address depends upon the class of the address in classful IP addressing.

All telnet operations are sent as ________
  • a)
    4 bits
  • b)
    8 bits
  • c)
    16 bits
  • d)
    32 bits
Correct answer is option 'B'. Can you explain this answer?

Rohit Sharma answered
Telnet provides a bi-directional, 8-bit byte oriented communications facility through which operations are sent as 8-bit bytes for the server to interpret.

FTP server _____________
  • a)
    Maintains state information
  • b)
    Is stateless
  • c)
    Has single TCP connection for a file transfer
  • d)
    Has UDP connection for file transfer
Correct answer is option 'A'. Can you explain this answer?

Rohit Sharma answered
FTP server maintains state information of every control connection to keep track of the active and inactive connections in the session. This helps the server decide which connection to terminate, in case the connection is inactive for too long.

Which of the following is false with respect to TCP?
  • a)
    Connection-oriented
  • b)
    Process-to-process
  • c)
    Transport layer protocol
  • d)
    Unreliable
Correct answer is option 'D'. Can you explain this answer?

Meera Rana answered
TCP is a transport layer protocol that provides reliable and ordered delivery of a stream of bytes between hosts communicating via an IP network.

The size of an IP address in IPv6 is _________
  • a)
    4 bytes
  • b)
    128 bits
  • c)
    8 bytes
  • d)
    100 bits
Correct answer is option 'B'. Can you explain this answer?

Kiran Mehta answered
An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant alternative in case IPv4 runs out of possible new addresses.

The application layer protocol used by a Telnet application is ________
  • a)
    Telnet
  • b)
    FTP
  • c)
    HTTP
  • d)
    SMTP
Correct answer is option 'A'. Can you explain this answer?

Radha Iyer answered
Telnet is an application layer protocol that provides access to the command-line interface on a remote host. Telnet stands for teletype network.

When the mail server sends mail to other mail servers it becomes ____________
  • a)
    SMTP server
  • b)
    SMTP client
  • c)
    Peer
  • d)
    Master
Correct answer is option 'B'. Can you explain this answer?

Rajni kumar answered
SMTP Client vs SMTP Server

SMTP, or Simple Mail Transfer Protocol, is the standard protocol used for sending and receiving email messages over the internet. When the mail server sends mail to other mail servers, it becomes an SMTP client.

SMTP Client

An SMTP client is a software application that initiates an SMTP session with a mail server. It is responsible for sending outgoing emails to the destination email server. The SMTP client sends the email message to the SMTP server of the recipient, following a set of protocols.

SMTP Server

An SMTP server is a software application that receives, processes, and delivers incoming emails. It accepts the incoming email messages and forwards them to the appropriate recipient's mailbox. The SMTP server listens for incoming email requests and replies with the appropriate response codes.

Conclusion

In summary, when a mail server sends mail to other mail servers, it becomes an SMTP client. The SMTP client initiates an SMTP session with the recipient's SMTP server to send the email. The recipient's SMTP server, in turn, acts as an SMTP server by receiving, processing, and delivering the incoming email.

Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______
  • a)
    96 to 127
  • b)
    0 to 63
  • c)
    80 to 95
  • d)
    64 to 79
Correct answer is option 'A'. Can you explain this answer?

Gaurav Kumar answered
Teredo is a technique through which gives the possibility for full IPv6 network connectivity to IPv6 capable hosts which are currently on an IPv4 network. Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address of the IPv4 network.

If the value in protocol field is 17, the transport layer protocol used is _____________
  • a)
    TCP
  • b)
    UDP
  • c)
    ICMP
  • d)
    IGMP
Correct answer is option 'B'. Can you explain this answer?

Shubham Sharma answered
The protocol field enables the demultiplexing feature so that the IP protocol can be used to carry payloads of more than one protocol type. Its most used values are 17 and 6 for UDP and TCP respectively. ICMP and IGMP are network layer protocols.

The password is sent to the server using ________ command
  • a)
    PASSWD
  • b)
    PASS
  • c)
    PASSWORD
  • d)
    PWORD
Correct answer is option 'B'. Can you explain this answer?

Harsh Menon answered
Understanding Password Transmission
When discussing how passwords are sent to a server, it’s essential to know the correct command used in network protocols, particularly FTP (File Transfer Protocol). Among the options provided, the correct command is:
Option B: PASS
Why "PASS" is Correct
- The command "PASS" is a standard FTP command used to transmit a user's password to the server.
- It is part of the authentication process, where a user must provide both a username and a password to gain access to the server.
Comparison with Other Options
- Option A: PASSWD
- This is not a recognized command in standard FTP protocols.
- Option C: PASSWORD
- Similar to "PASSWD," it is not a valid FTP command.
- Option D: PWORD
- This abbreviation does not exist in the standard command list for FTP.
Importance of the "PASS" Command
- The use of the "PASS" command ensures that the password is securely transmitted after the "USER" command has been issued, maintaining the integrity of the authentication process.
- Understanding this command is crucial for anyone studying computer networks, as it highlights the importance of secure password handling in online communications.
By grasping these concepts, students can better appreciate the mechanisms behind secure password transmission and the role of standard commands in network protocols.

The network layer protocol for internet is __________
  • a)
    ethernet
  • b)
    internet protocol
  • c)
    hypertext transfer protocol
  • d)
    file transfer protocol
Correct answer is option 'B'. Can you explain this answer?

Shubham Sharma answered
There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer.

HTTP is ________ protocol.
  • a)
    application layer
  • b)
    transport layer
  • c)
    network layer
  • d)
    data link layer
Correct answer is option 'A'. Can you explain this answer?

Aditya Shah answered
HTTP is an Application layer protocol used to define how messages are formatted and transmitted through the World Wide Web.

In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
  • a)
    Fragmentation field
  • b)
    Fast-switching
  • c)
    ToS field
  • d)
    Option field
Correct answer is option 'C'. Can you explain this answer?

Radha Iyer answered
The traffic class field is used to specify the priority of the IP packet which is a similar functionality to the Type of Service field in the IPv4 header. It’s an 8-bit field and its values are not defined in the RFC 2460.

A second technique to reduce routing table and simplify searching process is called _________
  • a)
    Network-Specific Method
  • b)
    Network-Specific Motion
  • c)
    Network-Specific Maintaining
  • d)
    Network-Specific Membership
Correct answer is option 'A'. Can you explain this answer?

Naina Sharma answered
In the network specific forwarding method, there is only one record, the destination of the packet, in the routing table and not the other hosts of the network. The other two forwarding methods are the default method and the next-hop method.

Expansion of FTP is __________
  • a)
    Fine Transfer Protocol
  • b)
    File Transfer Protocol
  • c)
    First Transfer Protocol
  • d)
    Fast Transfer Protocol
Correct answer is option 'B'. Can you explain this answer?

Kiran Mehta answered
File Transfer Protocol is an application layer protocol used to share “files” between a server and a client. The protocol uses two separate ports for data and control connections: port 20 for data and port 21 for control.

The term that is used to place packet in its route to its destination is called __________
  • a)
    Delayed
  • b)
    Urgent
  • c)
    Forwarding
  • d)
    Delivering
Correct answer is option 'C'. Can you explain this answer?

Anita Menon answered
Forwarding is done by the nodes in the path from source to destination, that are not the intended destination for the packet in order to pass the packet to the next node in the path. The destination machine does not forward the packet to any other node.

TCP process may not write and read data at the same speed. So we need __________ for storage.
  • a)
    Packets
  • b)
    Buffers
  • c)
    Segments
  • d)
    Stacks
Correct answer is option 'B'. Can you explain this answer?

A TCP receiver has a receive buffer that is used to store the unprocessed incoming packets in case the sender is sending packets faster than the processing rate of the received packets.

Chapter doubts & questions for Internet Protocol - Computer Application: Class 10 2025 is part of Class 10 exam preparation. The chapters have been prepared according to the Class 10 exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for Class 10 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of Internet Protocol - Computer Application: Class 10 in English & Hindi are available as part of Class 10 exam. Download more important topics, notes, lectures and mock test series for Class 10 Exam by signing up for free.

Top Courses Class 10

Related Class 10 Content