Class 10 Computer Applications 165 Networking Internet Protocols and File Transfer Protocols 100+ Question and Answer

Class 10 Computer Applications [Code 165]

Unit 1 Networking Protocols Question Answers

Internet Protocols and File Transfer Protocols

1. What are Protocols?

Answer: A protocol is a system of rules that defines how something is to be done. A set of rules defined for communication is known as protocols. For example – HTTPS, HTTP, FTP, SMTP, etc.

2. What is HTTP?

Answer: HTTP stands for Hypertext Transfer Protocol. It is the set of rules for transferring hypertext ( i.e., text, graphic, image, sound, video, etc.) on WWW ( World Wide Web).

3. What is HTTPS?

Answer: HTTPS stands for Hypertext Transfer Protocol Secure. It is an enhanced version of HTTP working with an SSL ( Secure Socket Layer) certificate. SSL takes care of ensuring that the data goes securely over the internet.

4. What is the use of HTTPS?

Answer: HTTPS is used for sensitive information shared over the Internet, such as financial data/information, personal details or bank details, etc.

5. What is SSL?

Answer: SSL stands for secure socket layer. SSL certificate helps to create a secure and encrypted connection between the server and the browser. SSL ensures that the information is encrypted and the connection is safe so that hackers cannot steal your crucial/sensitive information. Such as login id, password, etc.

6. Differentiate between HTTP & HTTPS?

Answer: HTTP is a system for transferring information over the Internet without any security features. It is useful for sending non-sensitive information.

HTTPS is a system for transferring information with SSL that encrypts and sends information over a secure connection. It is useful for sending/transferring sensitive information such as bank details, user id passwords, etc.

7. What is TCP/IP?

Answer: TCP/IP stands for Transmission Control Protocol / Internet Protocol. It is used for communication over the internet or network. TCP is responsible for breaking and assembling of data. IP responsible for sending packets from sender to receiver.

8. What is POP /POP3?

Answer: POP stands for Post Office Protocol. POP3 is the latest version of POP. It is used for receiving incoming emails.

9. What is SMTP?

Answer: SMTP stands for Simple Mail Transfer Protocol. It is used for sending and distributing outgoing Emails.

10. What is VoIP?

Answer: VoIP stands for Voice Over Internet Protocol. It is used for making calls on the Internet. VoIP Protocol allows the transmission of voice and multimedia content over an internet connection.

11. What is FTP?

Answer: FTP stands for File Transfer Protocol. It is used for transferring files from one computer/machine to another computer/machine.

12. What is FTP protocol?

Answer: FTP or File Transfer Protocol, is a commonly used protocol for exchanging files over any network that supports the TCP/IP protocol. TCP/IP is the main protocol used for communication.

There are two computers involved in an FTP transfer:

(a) FTP Server and (b) FTP Client

13. What is FTP Server?

Answer: The FTP server is a computer that is running the FTP server software. An FTP server listens on the network for connection requests from other computers.

14. What is FTP Client?

Answer: The FTP client is a computer that is running the FTP client software. An FTP client computer initiates a connection to the server.

Once connected, the customer can do a number of file manipulation operations such as uploading files to the server, downloading files from the server, renaming or deleting files on the server, and so on.

15. Write the names of four FTP Clients and FTP server software for windows?

Answer: There are many FTP clients and server programs available. These are – WinSCP, FileZila, SmartFTP, Core FTP, AceFTP.

16. Write the names of four FTP Clients and FTP server software for Linux?

Answer: FileZila, gFTP, CrossFTP, FireFTP, Konoqueror, Nautilus

17. What is TELNET?

Answer: TELNET is an Internet utility program, that lets you log onto remote computer systems.

A telnet program gives a character-based terminal window on another system. By providing accurate credentials user id and password, you can access the remote computer.

18. How does TELNET work?

Answer: The computer through which you try to connect remote server is called the Client Computer. To connect to a remote server via Telnet, follow these steps –

(a) Use the Telnet client on your computer. Telnet Client program connects to Telnet server through TCP/IP. (

b) Once a connection is established, you can control the remote server.

(c) Now type the Telnet-based access commands to manipulate the telnet server.

19. What is SSH protocol?

Answer: SSH stands for Secure SHell. The SSH is same like the Telnet protocol in functionality but it is a secure protocol compared to Telnet. SSH is a remote logging protocol that logs into remote machine via a shell where all data between the client and server is encrypted.

The SSH protocol ensures security shell using SCP and SFTP protocol.

20. Differentiate between Telnet and SSH?

Answer: Telnet does not establish a secured connection while SSH establishes a secured connection.

21. What is the significance of SSH?

Answer: General Telnet protocol is not secured because data is unencrypted and hackers can steal your data. But SSH secures your data by creating a secure connection with encrypted data. This ensures that only the client and the server will have access to actual data.

22. What is SCP?

Answer: SCP stands for Secure CoPy. SCP protocols allow copying files between two servers or two connected machines over the Internet with the encryption benefits of SSH.

Most SSH clients include SCP capability. It offers its own set of command options for secure copying of files across two connected machines over the Internet.

23. What is SFTP?

Answer: SFTP stands for Secure FTP. SFTP is a secure file transfer protocol and it ensures the security of data based on the Secure Shell protocol.

24. How does SFTP ensure data safety?

Answer: SFTP ensures data safety by taking these measures:

  • (i) SFTP requires that the client user must be authenticated by the server and the data transfer must take place over a secure channel (SSH).
  • (ii) All data is encrypted before being sent across the network.
  • (iii) SFTP encrypts both commands and data providing effective protection against common network security risks.

25. Differentiate between FTP and SFTP?

Answer: FTP is not a secure File Transfer Protocol and data/files traveling over FTP are not protected during the session. Data traveling over FTP can easily be stolen.

SFTP is a Secure File Transfer Protocol and data/files traveling over SFTP are secured and encrypted. Not easy to steal the data traveling over SFTP.

You cannot copy content of this page

Scroll to Top