Computer Network Class 12 Quiz - Quizizz QP & MS
Computer Network Class 12 Quiz - Quizizz QP & MS
1. 1. A Computer Network:
a) Satellite b) Microwave
c) Radio wave d) Wi-Fi
a) WAN b) MAN
c) PAN d) LAN
9. 10. A device that forwards data packet from one network to another is called a
a) Bridge b) Router
c) Hub d) Gateway
a) Switch b) Bridge
c) Router d) Gateway
a) modulation b) demodulation
c) conversion d) transformation
a) 32 bit b) 64 bit
c) 128 bit d) 256 bit
a) Gateways b) Linux
c) Routers d) Firewalls
a) Protocol b) URL
c) E-mail address d) ICQ
20. 22. The term HTTP stands for?
a) Firewall b) Gateway
c) Router d) Virus checker
22. 24. Which one of the following is the most common internet protocol?
a) HTML b) NetBEUI
c) TCP/IP d) IPX/SPX
a) Star b) Ring
c) Bus d) Peer to Peer
25. 27. Which of the following is not an unit for data transfer rate?
a) MBPS b) KBPS
c) SBPS d) GBPS
a) CSNET b) NSFNET
c) ANSNET d) ARPANET
a) MAN b) LAN
c) WAN d) None of the above
28. 30._________________ is a collection of many separate networks
a) A MAN b) An internet
c) A LAN d) None of the above
a) forum b) protocol
c) standard d) None of the above
32. 34. A device which can be connected to a network without using cable is
called
33. 35. The vast network of computers that connects millions of people all over
the world is called
a) Internet b) Hypertext
c) LAN d) Web
a) 24 bits b) 36 bits
c) 42 bits d) 48 bits
35. 37. Which of the following appears harmless but actually performs malicious
functions such as deleting or damaging files.
a) WORM b) Virus
c) Trojan Horse d) Malware
a) FTP b) SMTP
c) HTTP d) TCP
a) POP b) VOIP
c) DHCP d) FTP
38. 40. Rajesh has purchased a new Smart TV and wants to cast a video from
his mobile to his new Smart TV. Identify the type of network he is using:
a) LAN b) MAN
c) WAN d) PAN
39. 41. The topology in which all nodes are individually connected to a central
connection point:
a) Ring b) Bus
c) Star d) Tree
a) Repeater b) Gateway
c) Bridge d) Hub
46. 49. The loss in signal power as light travels down the fiber is called)…………
a) Attenuation b) Propagation
c) Scattering d) Interruption
47. 50. Which of the following TCP/IP protocols is used for transferring files form
one machine to another.
a) FTP b) SNMP
c) SMTP d) RPC
48. 51. Which of the following protocol is used for remote terminal connection
service?
a) RARP b) UDP
c) FTP d) TELNET
49. 52. Which of the following is considered as the unsolicited commercial email?
M
a) Virus b) Malware
c) Spam d) All of the above
50. 53. It can be a software program or a hardware device that filters all data
packets coming through the internet, a network, etc) it is known as
the_______:
a) Antivirus b) Firewall
c) Cookies d) Malware
52. 55. Which of the following is a type of independent malicious program that
never required any host program?
53. 56. In order to ensure the security of the data/ information, we need to
____________ the data:
a) Encrypt b) Decrypt
c) Delete d) None of the above
a) Spam b) cookies
c) Malware d) Adware
56. 59. In which of the following switching methods, the message is divided into
small packets?
57. 60. Which of the following switch methods creates a point-to-point physical
connection between two or more computers?
58.
a) School b) College
c) Netflix d) Single Web Site