CSCY
1 What is an operating system? Give two examples
An Operating System (OS) is system software that manages computer hardware and
software resources and provides services for computer programs. It acts as an interface
between the user and the computer hardware.
Examples:
1. Windows – Developed by Microsoft, commonly used in personal computers.
2. Linux – An open-source operating system used in servers, desktops, and
embedded systems
What are the functions of an operating system?
Process Management – Handles the execution of multiple processes and allocates
CPU time.
Memory Management – Manages RAM allocation for different programs and ensures
efficient memory usage.
File System Management – Controls file storage, retrieval, and organization.
Device Management – Manages input/output (I/O) devices like printers, keyboards, and
USB drives.
Security & Access Control – Provides user authentication, access control, and data
protection.
What is the role of a bootloader in the boot process?
The bootloader is a small program responsible for loading the operating system into
memory during the boot process.
Role of the Bootloader:
1. Initial Hardware Checks – Performs basic hardware initialization and diagnostics.
2. Loads the Kernel – Finds and loads the OS kernel into RAM.
3. Transfers Control to the OS – Hands over control to the kernel, which continues
the boot process.
CSCY
2 What is the purpose of the ls command in Linux? Mention any two options used with it.
The ls command in Linux is used to list files and directories in the current directory.
Two options used with ls:
1. -l (long listing format) – Displays detailed information about files, including
permissions, owner, size, and modification date.
2. -a (all files) – Shows all files, including hidden ones (files starting with .).
Explain the difference between cp and mv with examples.
Difference between cp and mv:
1. cp (Copy) – Creates a duplicate of a file or directory while keeping the original
intact.
2. mv (Move/Rename) – Moves a file to a new location or renames it without keeping
the original copy.
Examples:
Copy a file:
Move/Rename a file:
CSCY
Explain the difference between rmdir and rm -r commands.
rmdir (Remove Directory) – Deletes only empty directories.
Example:
rm -r (Remove Recursively) – Deletes directories along with their contents (files and
subdirectories).
Example
3 Define a shell in Linux and explain its role in system interaction.
A shell in Linux is a command-line interpreter that allows users to interact with the
operating system by executing commands.
Role of a Shell in System Interaction:
1. Command Execution – Accepts user commands and executes them.
2. Script Processing – Runs shell scripts to automate tasks.
3. User Interface – Acts as a bridge between the user and the OS kernel.
4. Process Management – Starts and controls processes.
CSCY
Develop a shell script to accept two numbers as input from the user and print the sum.
Differentiate between a Command Line Shell and a Graphical Shell.
4 What is a Local Area Network (LAN)? List two advantages of LAN.
A Local Area Network (LAN) is a network that connects computers and devices within a
small geographical area, such as a home, office, or school, using wired (Ethernet) or wireless
(Wi-Fi) connections.
CSCY
Two Advantages of LAN:
1. High Speed – Provides fast data transfer rates compared to wide-area networks
(WANs).
2. Resource Sharing – Enables sharing of files, printers, and internet connections
among connected devices.
What are the key components of a Client-Server network?
A Client-Server Network is a network architecture where clients request services, and a
central server provides them.
Key Components:
1. Client – A computer or device that requests services (e.g., a web browser accessing
a website).
2. Server – A powerful computer that processes client requests and provides
resources like files, databases, or applications.
3. Network Medium – The communication channel (e.g., Ethernet cables, Wi-Fi) that
connects clients and servers.
4. Protocols – Rules that govern communication (e.g., HTTP, FTP, TCP/IP).
5. Network Devices – Routers, switches, and hubs that help transmit data between
clients and servers.
List any two advantages and two disadvantages of Peer-to-Peer networks.
Advantages of Peer-to-Peer (P2P) Networks:
1. Easy to Set Up – No need for a central server; devices connect directly.
2. Cost-Effective – Reduces costs as no dedicated server or specialized hardware is
required.
3. Better Resource Utilization – Each device shares its own resources, reducing
dependency on a single machine.
4. No Single Point of Failure – Since data is distributed, failure of one device does
not affect the entire network.
CSCY
Disadvantages of Peer-to-Peer (P2P) Networks:
1. Security Risks – Each device manages its own security, making the network
vulnerable to unauthorized access.
2. Limited Scalability – Performance decreases as the number of devices increases.
3. Data Management Issues – No centralized control, making it harder to manage and
back up data efficiently.
4. Uneven Resource Distribution – Some devices may be overloaded while others
remain idle.
5 What is network topology? Name any three types of network topologies.
Network topology refers to the arrangement of computers, devices, and connections in a
network. It defines how data flows between nodes.
Three Types of Network Topologies:
1. Bus Topology – All devices are connected to a single central cable.
2. Star Topology – All devices are connected to a central hub or switch.
3. Ring Topology – Devices are connected in a circular loop, with data traveling in
one or both directions.
Differentiate between Class A and Class C IP addresses.
CSCY
What is a subnet mask, and how does it help in networking?
A subnet mask is a 32-bit number used in IP addressing to divide an IP network into
smaller subnetworks (subnets). It helps determine which part of an IP address represents the
network and which part represents the host.
How It Helps in Networking:
1. Efficient IP Allocation – Divides large networks into smaller, manageable subnets.
2. Improves Security – Restricts network access by isolating subnets.
3. Enhances Performance – Reduces network congestion by limiting broadcast
traffic.
4. Facilitates Routing – Helps routers determine the best path for data transmission.
Example:
For IP 192.168.1.10 with subnet mask 255.255.255.0:
Network part: 192.168.1
Host part: 10
This means all devices in 192.168.1.X belong to the same subnet
6 What is DHCP, and why is it important in networking?
Dynamic Host Configuration Protocol (DHCP) is a network protocol used to
automatically assign IP addresses and other network configuration settings (such as subnet
mask, gateway, and DNS) to devices on a network.
Importance of DHCP in Networking:
1. Automates IP Address Assignment – Eliminates the need for manual IP
configuration, reducing errors.
2. Prevents IP Conflicts – Ensures each device gets a unique IP address.
3. Simplifies Network Management – Centralized control makes it easier to manage
large networks.
4. Supports Dynamic Changes – Devices can join and leave the network without
manual reconfiguration.
Example: A laptop connecting to a Wi-Fi network automatically gets an IP address from a
DHCP server.
CSCY
What is a firewall, and how does it enhance network security?
A firewall is a security system that monitors and controls incoming and outgoing network
traffic based on predefined security rules. It acts as a barrier between trusted internal
networks and untrusted external networks (like the internet).
How a Firewall Enhances Network Security:
1. Blocks Unauthorized Access – Prevents hackers and malware from accessing the
network.
2. Filters Traffic – Allows or denies data packets based on security policies.
3. Prevents Cyber Attacks – Protects against threats like viruses, worms, and denial-
of-service (DoS) attacks.
4. Monitors Network Activity – Logs and analyzes traffic to detect suspicious
behavior.
Example: A firewall can block access to malicious websites or restrict certain applications
from connecting to the internet.
Define Static NAT and Dynamic NAT.
CSCY
7 What is the function of DNS in networking?
The Domain Name System (DNS) is responsible for translating human-readable domain
names (e.g., www.google.com) into IP addresses (e.g., 142.250.190.14) that computers use
to communicate over the internet.
Key Functions of DNS:
1. Hostname to IP Address Resolution – Converts domain names into IP addresses.
2. Simplifies Web Access – Users can type website names instead of remembering
numerical IPs.
3. Load Balancing – Distributes traffic across multiple servers for better performance.
4. Email Routing – Helps direct emails to the correct mail servers using MX (Mail
Exchange) records.
Example: When you type www.google.com, DNS translates it into its corresponding IP
address, allowing your browser to load the website.
Explain how a VPN enhances online privacy.
A Virtual Private Network (VPN) encrypts internet traffic and routes it through a secure
server, protecting user data and identity.
Key Ways a VPN Enhances Privacy:
1. Encrypts Data – Prevents hackers, ISPs, and governments from monitoring online
activities.
2. Hides IP Address – Masks the user's real IP, making their location and identity
anonymous.
3. Prevents Tracking – Blocks websites and advertisers from tracking browsing
habits.
4. Secures Public Wi-Fi – Protects against cyber threats when using unsecured
networks in cafes, airports, etc.
Example: Using a VPN, a user in India can appear to be browsing from the US, improving
privacy and bypassing geo-restrictions.
CSCY
How does a router differ from a switch in terms of function and network communication?
8 Define the Internet and mention two of its key components.
The Internet is a global network of interconnected computers that communicate using
standardized protocols (such as TCP/IP) to share information and resources.
Two Key Components of the Internet:
1. Servers – Powerful computers that store and deliver web pages, emails, and other
online services.
2. Routers – Network devices that direct data packets between different networks,
ensuring efficient communication.
CSCY
Explain the purpose of HTTP and HTTPS in web communication.
HTTP (Hypertext Transfer Protocol)
Used for transmitting data between a web browser and a web server.
Sends and receives web pages, images, and other content.
Lacks encryption, making it vulnerable to cyberattacks.
Example: http://www.example.com
HTTPS (Hypertext Transfer Protocol Secure)
A secure version of HTTP that encrypts data using SSL/TLS.
Protects sensitive information like passwords and credit card details.
Ensures data integrity and authentication.
Example: https://www.example.com (used for banking, e-commerce, etc.)
What is a Web Server, and what role does it play in delivering web pages?
A web server is a software or hardware system that stores, processes, and delivers web
pages to users over the internet using protocols like HTTP and HTTPS.
Role of a Web Server in Delivering Web Pages:
1. Handles Requests – Receives HTTP/HTTPS requests from web browsers.
2. Processes Data – Retrieves requested web pages (HTML, CSS, JavaScript,
images, etc.) from storage.
3. Delivers Content – Sends the requested files to the user's browser for display.
4. Manages Security – Implements authentication, encryption, and access controls.
Example: When a user visits www.example.com, the web server fetches and serves the
homepage to their browser.
CSCY
9 1) Explain the key functions of an Operating System (OS) and discuss its
importance in computer systems. (9 marks)
Answer:
An Operating System (OS) is system software that acts as an interface between
hardware and users. Its key functions include:
1. Process Management: Handles creation, scheduling, and termination of
processes.
2. Memory Management: Allocates and deallocates memory space to
processes efficiently.
3. File System Management: Controls file storage, access, organization, and
security.
4. Device Management: Manages input/output (I/O) devices through drivers.
5. Security & Access Control: Provides authentication, authorization, and
protection from malware.
6. User Interface: Offers Command-Line Interface (CLI) and Graphical User
Interface (GUI) for interaction.
7. Error Detection & Handling: Detects and responds to hardware and software
errors.
8. Networking: Supports communication between devices in a network.
Importance of OS in Computer Systems:
Provides a stable and efficient computing environment.
Enables multi-tasking and resource management.
Enhances security and user convenience.
Supports hardware abstraction and software compatibility.
2 a) Briefly describe the major services provided by a file management
system. (4 marks)
Answer:
A file management system provides the following services:
1. File Creation & Deletion: Allows users and programs to create and remove
files.
2. Directory Management: Organizes files into directories and subdirectories.
3. File Access Control: Manages permissions for reading, writing, and
CSCY
execution.
4. File Storage & Retrieval: Efficiently stores and retrieves data from storage
devices.
5. Backup & Recovery: Ensures data safety by providing backup and restore
options.
6. File Sharing: Allows multiple users to access files in a networked
environment.
2 b) Describe the process management function of an operating system.
(5 marks)
Answer:
Process management is a core function of an OS that handles processes efficiently. It
includes:
1. Process Scheduling: Uses scheduling algorithms (FCFS, SJF, Round Robin)
to allocate CPU time.
2. Process Creation & Termination: Manages the lifecycle of processes (new,
ready, running, waiting, terminated).
3. Inter-Process Communication (IPC): Enables processes to communicate
and synchronize using pipes, message queues, and shared memory.
4. Process Synchronization & Deadlock Handling: Prevents multiple
processes from interfering with each other using semaphores and monitors.
5. Resource Allocation: Allocates CPU, memory, and I/O resources efficiently.
3) Explain in detail the entire boot process, including hardware
initialization, BIOS/UEFI, and kernel loading. (9 marks)
Answer:
The boot process is the sequence of steps a computer follows to start an operating
system:
Power-On Self-Test (POST):
o When the system is powered on, the BIOS/UEFI performs hardware
checks (CPU, RAM, storage, etc.).
o If a critical hardware failure is detected, an error is displayed.
CSCY
BIOS/UEFI Execution:
o BIOS (Basic Input/Output System) or UEFI (Unified Extensible
Firmware Interface) initializes hardware components.
o It locates the bootable storage device and loads the bootloader.
Bootloader Execution:
o The bootloader (e.g., GRUB, Windows Boot Manager) loads the OS
kernel into memory.
o It may provide a menu for selecting different OS versions.
Kernel Loading:
o The kernel initializes system resources, including CPU scheduling,
memory management, and I/O devices.
o Essential services such as device drivers and system processes (like
init/systemd) are started.
User Login & Shell Initialization:
o The system reaches the login screen or GUI interface, allowing user
interaction.
10 1) Explain in detail the various file and directory management commands
in Linux with examples. (9 marks)
Answer:
Linux provides several commands for file and directory management:
Creating a File:
1. touch filename → Creates an empty file.
2. Example: touch file1.txt
Displaying File Content:
1. cat filename → Displays file contents.
2. Example: cat file1.txt
CSCY
Copying Files:
1. cp source destination → Copies a file.
2. Example: cp file1.txt file2.txt
Moving/Renaming Files:
1. mv oldname newname → Renames or moves a file.
2. Example: mv file1.txt newfile.txt
Removing Files:
1. rm filename → Deletes a file.
2. Example: rm file1.txt
Creating Directories:
1. mkdir dirname → Creates a new directory.
2. Example: mkdir myfolder
Removing Directories:
1. rmdir dirname → Deletes an empty directory.
2. Example: rmdir myfolder
3. rm -r dirname → Deletes a non-empty directory.
4. Example: rm -r myfolder
Listing Directory Contents:
1. ls → Lists files and directories.
2. Example: ls -l (detailed view)
Changing Directory:
1. cd dirname → Moves to a specified directory.
2. Example: cd Documents
Finding Files:
1. find /path -name filename → Searches for a file.
2. Example: find /home -name file1.txt
CSCY
2 a) Explain how Linux file permissions work. Discuss the types of
permissions, user categories, and how permissions are modified using
chmod. (6 marks)
Answer:
Linux file permissions define who can read, write, and execute files or directories.
Types of Permissions:
Read (r) → Allows viewing the file content.
Write (w) → Allows modifying the file.
Execute (x) → Allows executing the file (for scripts/programs).
User Categories:
1. Owner (u) → The creator of the file.
2. Group (g) → Users belonging to the same group.
3. Others (o) → All other users.
Changing Permissions with chmod:
Symbolic Method:
o Example: chmod u+x file.sh (adds execute permission to the
owner).
o chmod g-w file.txt (removes write permission for the group).
Numeric Method:
o Each permission has a value: Read (4), Write (2), Execute (1).
o Example: chmod 755 file.sh
Owner: 7 (4+2+1) → Full permissions
Group: 5 (4+0+1) → Read & Execute
Others: 5 (4+0+1) → Read & Execute
CSCY
2 b)How can you create multiple directories at once using the mkdir command?
Creating multiple directories at the same level:
mkdir dir1 dir2 dir3
This command creates three directories named dir1, dir2, and dir3 in the
current location.
Creating nested directories:
mkdir -p parent/child/grandchild
The -p option creates the entire directory structure, ensuring that parent and
child directories exist before grandchild is created.
3 a) Explain the difference between mkdir and rmdir commands in Linux. Provide
examples for each.
CSCY
3 b) Describe the various options available with the ls command and their
functionalities.
1a) Explain how shell scripting can be utilized for data extraction, sorting, and
11 filtering. Provide an example to illustrate its functionality.
CSCY
1b) Explain the importance of shell scripting in Linux.
Shell scripting in Linux is important for automation, system administration, and
task scheduling. It helps in automating repetitive tasks, managing system resources,
and processing data efficiently. System administrators use it for monitoring, backups,
and security enforcement, making Linux management more efficient and reliable
CSCY
2a) Describe the process of writing and executing a shell script in Linux.
Create a Shell Script File
Use a text editor like nano, vim, or gedit to create a script file.
Example - nano myscript.sh
Write the Shell Script
Start the script with a shebang (#!) to specify the shell (e.g., Bash).
Add commands inside the script.
Example (myscript.sh):
Make the Script Executable
Use the chmod command to give execute permission
Execute the Shell Script
Run the script using: ./myscript.sh
Verify the Output
If the script runs successfully, it will display
Hello, this is my first shell script!
CSCY
2b) What is a terminal, and how does it relate to the shell?
A terminal is a command-line interface (CLI) that allows users to interact with the
operating system by entering text commands. It acts as a bridge between the user and
the system.
A shell is a program that runs inside the terminal and interprets user commands,
communicating with the operating system to execute them. The shell processes inputs,
runs commands, and displays outputs in the terminal.
Relation:
The terminal provides the interface, while the shell processes and executes commands
within it. Common shells include Bash, Zsh, and Fish
3a) Construct a shell script to check if a given number is even or odd.
CSCY
3b) Write a shell script to find the largest of two numbers entered by the user.
1a) List and explain two key protocols used in WAN communication.
12
MPLS (Multiprotocol Label Switching)
A high-performance protocol that routes data using labels instead of traditional
IP-based routing.
Provides faster packet forwarding, improved QoS (Quality of Service), and
better traffic management in WANs.
Frame Relay
A packet-switching protocol that enables efficient data transmission by
establishing virtual circuits.
It reduces latency and enhances bandwidth usage, making it suitable for
business WANs.
ATM (Asynchronous Transfer Mode)
A WAN protocol that transmits data in fixed-size cells (53 bytes) to ensure
CSCY
predictable performance.
Supports voice, video, and data transmission with low latency, making it ideal
for real-time applications.
1 b) Explain the working of a Client-Server network with an example.
A Client-Server Network is a model where multiple clients (users or devices) request
services, and a central server provides those services. This network structure is widely
used for data sharing, communication, and resource management.
Example: Web Browsing (HTTP Server)
A user enters a website URL (e.g., www.google.com) in a web browser
(client).
The browser sends a request to the web server using the HTTP/HTTPS
protocol.
The server processes the request and sends back the webpage data (HTML,
CSS, images).
The browser displays the received webpage to the user.
Advantages:
Centralized control and security
Efficient resource management
Easy to scale and maintain
CSCY
2a) Compare Client-Server and Peer-to-Peer networks. What are the advantages and
disadvantages of each?
CSCY
2b) What are the hardware components required for setting up a MAN?
Routers – Directs data between different networks and manages traffic flow in the
MAN.
Switches – Connects multiple devices within the network, ensuring efficient
CSCY
communication between nodes.
Optical Fiber Cables – Used for high-speed data transmission over long distances
with minimal loss.
Modems – Converts digital signals into analog for transmission over telephone
lines and vice versa.
Wireless Access Points (WAPs) – Enables wireless connectivity for users across
different locations.
Servers – Stores and manages data, applications, and network resources for users
within the MAN.
Base Stations & Antennas – Used for wireless MANs, like WiMAX, to provide
long-range communication.
3) Compare LAN, MAN, and WAN in detail. Explain their features, advantages, and
limitations with examples.
1. LAN (Local Area Network)
Features:
o Covers a small area like homes, offices, or schools.
o Uses Ethernet cables and Wi-Fi for connectivity.
o Provides high-speed data transfer.
CSCY
Advantages:
o High-speed communication.
o Low cost and easy maintenance.
o Secure and controlled access.
Limitations:
o Limited range.
o Cannot be used for long-distance communication.
Example:
o A company's internal office network where employees share files and
printers.
2. MAN (Metropolitan Area Network)
Features:
o Covers a city or metropolitan area.
o Uses fiber optics, coaxial cables, and wireless technologies.
o Can connect multiple LANs within a city.
Advantages:
o Faster than WAN but slower than LAN.
o Cost-effective for connecting multiple buildings.
o Efficient communication within a city.
Limitations:
o More expensive than LAN.
o Limited to a metropolitan area.
Example:
o A city-wide public Wi-Fi system or a cable TV network.
CSCY
3. WAN (Wide Area Network)
Features:
o Covers large areas, such as countries or continents.
o Uses long-distance communication technologies like fiber optics,
satellites, and leased lines.
o Can connect multiple LANs and MANs worldwide.
Advantages:
o Enables global connectivity.
o Supports remote access and cloud services.
o Used for large-scale applications like the Internet and international
banking.
Limitations:
o Expensive infrastructure and maintenance.
o Slower speed compared to LAN and MAN.
o Security risks due to large coverage.
Example:
o The Internet, which connects users across the globe
1a) Explain any three types of network topologies with their advantages and
13 disadvantages.
CSCY
CSCY
1b) Explain Hybrid Topology with an example.
CSCY
2a) Explain rules for assigning host IDs and network IDs in an IP address.
CSCY
2b) Describe Class A, B, and C IP addressing with their ranges and use cases.
CSCY
3) Describe the advantages and disadvantages of different network topologies with
real-world applications.
Repeat
1a) Describe desktop security measures to protect individual devices in a network.
14
Use Strong Passwords
Set complex passwords with a mix of letters, numbers, and symbols.
Enable multi-factor authentication (MFA) for added security.
Install and Update Antivirus Software
Use reliable antivirus software to detect and remove malware.
Regularly update the antivirus database to protect against new threats.
Enable Firewall Protection
Activate the system firewall to filter incoming and outgoing network traffic.
Configure firewall rules to block unauthorized access.
CSCY
Regular Software and OS Updates
Keep the operating system and software updated to patch security
vulnerabilities.
Enable automatic updates for critical security patches.
Use Data Encryption and Backup
Encrypt sensitive data to prevent unauthorized access.
Regularly back up important files to an external drive or cloud storage.
1 b) Describe the role of Intrusion Detection and Prevention Systems (IDS/IPS) in
network security.
Intrusion Detection System (IDS)
Monitors network traffic for suspicious activities or security breaches.
Alerts administrators when potential threats are detected.
Does not block traffic, only reports threats for further action.
Intrusion Prevention System (IPS)
Detects and blocks malicious activities in real time.
Automatically prevents attacks by stopping malicious packets.
Can terminate suspicious connections, reconfigure firewalls, or restrict access
CSCY
2a) Explain the DORA (Discovery, Offer, Request, Acknowledge) process in DHCP
with an example.
EXAMPLES
Discovery-A new laptop connects to a Wi-Fi network and broadcasts a request for an
IP address.
Offer- The router (acting as a DHCP server) offers the laptop an IP address like
192.168.1.10.
Request - The laptop accepts the 192.168.1.10 IP address and requests confirmation
from the server
Acknowledge - The router finalizes the IP lease, and the laptop can now browse the
internet
2 b) What are three common DHCP issues, and how can they be resolved?
IP Address Exhaustion
Issue: The DHCP server runs out of available IP addresses due to too many
connected devices.
Solution: Increase the DHCP address pool or configure IP address
reservation for critical devices.
IP Address Conflict
Issue: Two devices receive the same IP address, causing network
CSCY
connectivity problems.
Solution: Release and renew the IP address using ipconfig /release and
ipconfig /renew (Windows) or dhclient -r (Linux). Ensure static IP
addresses do not overlap with DHCP-assigned addresses.
DHCP Server Not Responding
Issue: Devices fail to obtain an IP address, often due to DHCP server failure
or misconfiguration.
Solution: Check if the DHCP service is running (systemctl restart dhcpd
on Linux or restart the DHCP service in Windows Server). Verify network
connections and firewall settings.
3) Explain Network Address Translation (NAT) comprehensively, including its
different types, advantages, and drawbacks.
CSCY
CSCY
15 1 a) Explain the four steps involved in resolving a DNS query.
1 b) Explain the role of DNS in converting domain names into IP addresses. Describe
the process with a suitable example.
Repeat
Example of DNS Resolution
User enters: www.google.com
DNS translates to: 142.250.183.14
Browser requests the webpage from: 142.250.183.14
Google’s server responds with the webpage content
2 a) What are the two main types of VPNs? Explain their usage.
CSCY
2 b) Explain advantages and disadvantages of using a Virtual Private Network (VPN)
for network security.
Disadvantages of VPN:
Reduced Internet Speed
1. Encryption and rerouting traffic through VPN servers can slow down
the connection.
Possible Security Risks
1. Some free VPN services may log user activity or sell data to third
parties.
High Cost for Premium VPNs
1. Reliable VPN services require a paid subscription, which can be
expensive.
Blocked by Some Services
1. Streaming platforms and governments may block VPN traffic to
prevent circumvention of restrictions.
Complex Configuration
1. Setting up a VPN on multiple devices and networks may require
technical knowledge
CSCY
3 a) Explain the different types of routers and their use cases.
CSCY
3 b) Explain the different types of switches and their applications in networking.
16 1 a) Describe the key functions of a web server in handling client requests.
A web server is responsible for processing and responding to client requests over the
internet. Its main functions include:
Receiving Client Requests
1. The web server listens for HTTP/HTTPS requests from browsers or
applications.
2. Example: A user types www.example.com, and the request is sent to
CSCY
the server.
Processing and Retrieving Data
1. The server processes the request and fetches the requested web page
or resource from storage.
2. If dynamic content is required (e.g., login authentication), it interacts
with a database.
Sending Responses to Clients
1. The server sends the requested web page, image, or file back to the
client using HTTP/HTTPS.
2. Example: The server returns an HTML page that is displayed in the
browser.
Handling Security and Access Control
1. Implements SSL/TLS encryption for secure communication.
2. Uses authentication and access controls to protect sensitive data
1 b) Explain the architecture of a Client-Server Network with a real-world example.
Repeat
CSCY
2 a) Compare Static Web Pages vs. Dynamic Web Pages, explaining how web servers
handle each.
CSCY
2 b) Describe the role of web browsers, web servers, and URLs in retrieving web
pages.
3) List and explain the key components of the World Wide Web (WWW) and their
functions.
CSCY