0% found this document useful (0 votes)
62 views11 pages

Computer Network Class 12 Quiz - Quizizz QP & MS

This document is a quiz for a Class 12 Computer Network course, consisting of 60 questions covering various topics related to computer networks, including definitions, protocols, and types of networks. It includes multiple-choice questions with answer keys provided at the end. The quiz is designed to assess students' understanding of computer networking concepts.

Uploaded by

anshika.almal003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views11 pages

Computer Network Class 12 Quiz - Quizizz QP & MS

This document is a quiz for a Class 12 Computer Network course, consisting of 60 questions covering various topics related to computer networks, including definitions, protocols, and types of networks. It includes multiple-choice questions with answer keys provided at the end. The quiz is designed to assess students' understanding of computer networking concepts.

Uploaded by

anshika.almal003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Worksheets Name

Computer Network Class 12 Quiz


Class
Total questions: 60
Worksheet time: 30mins
Date
Instructor name: SHOBHIT DAGA

1. 1. A Computer Network:

a) Is a collection of hardware b) Is interconnected by


components and computers? communication channels
c) Allows sharing of resources and d) All of the above
information

2. 2. What is a Firewall in computer network?

a) The physical boundary of network b) An operating system of computer


network
c) A system designed to prevent d) A web browsing software
unauthorized access

3. 4. Each IP packet must contain:

a) Only Source address b) Only Destination address


c) Source and Destination address d) Source or Destination address

4. 5. Which of these is not a communication channel?

a) Satellite b) Microwave
c) Radio wave d) Wi-Fi

5. 6. MAN Stands for _____.

a) Metropolitan Area Network b) Main Area Network


c) Metropolitan Access Network d) Metro Access Network
6. 7. Which of the following is the smallest network?

a) WAN b) MAN
c) PAN d) LAN

7. 8. Which transmission media is capable of having a much higher bandwidth


(data capacity)?

a) Coaxial b) Twisted pair cable


c) Untwisted cable d) Fiber optic

8. 9. Which type of transmission media is the least expensive to manufacture?

a) Coaxial b) Twisted pair cable


c) CAT cable d) Fiber optic

9. 10. A device that forwards data packet from one network to another is called a

a) Bridge b) Router
c) Hub d) Gateway

10. 11. What is a standalone computer?

a) A computer that is not connected b) A computer that is being used as a


to a network server
c) A computer that does not have any d) A computer that is used by only
peripherals attached to it one person

11. 13. Hub is a

a) Broadcast device b) Unicast device


c) Multicast device d) None of the above

12. 14. Switch is a

a) Broadcast device b) Unicast device


c) Multicast device d) None of the above
13. 15. The device that can operate in place of a hub is a:

a) Switch b) Bridge
c) Router d) Gateway

14. 16. In computer, converting a digital signal in to an analog signal is called

a) modulation b) demodulation
c) conversion d) transformation

15. 17. What is the address size of IPv6?

a) 32 bit b) 64 bit
c) 128 bit d) 256 bit

16. 18. Which of these is not an example of unguided media?

a) Optical Fibre Cable b) Radio wave


c) Bluetooth d) Satellite

17. 19. Two devices are in network if

a) A process in one device is able to b) A process is running on both


exchange information with a devices
process in another device
c) The processes running of different d) None of the above.
devices are of same type

18. 20. Which of the following is not the Networking Devices?

a) Gateways b) Linux
c) Routers d) Firewalls

19. 21. The location of a resource on the internet is given by its?

a) Protocol b) URL
c) E-mail address d) ICQ
20. 22. The term HTTP stands for?

a) Hyper terminal tracing program b) Hypertext tracing protocol


c) Hypertext transfer protocol d) Hypertext transfer program

21. 23. Which software prevents the external access to a system?

a) Firewall b) Gateway
c) Router d) Virus checker

22. 24. Which one of the following is the most common internet protocol?

a) HTML b) NetBEUI
c) TCP/IP d) IPX/SPX

23. 25. The term FTP stands for?

a) File transfer program b) File transmission protocol


c) File transfer protocol d) File transfer protection

24. 26. Which one of the following is not a network topology?

a) Star b) Ring
c) Bus d) Peer to Peer

25. 27. Which of the following is not an unit for data transfer rate?

a) MBPS b) KBPS
c) SBPS d) GBPS

26. 28. This was the first network.

a) CSNET b) NSFNET
c) ANSNET d) ARPANET

27. 29. A_______is a data communication system within a building, plant,


orcampus, or between near by buildings.

a) MAN b) LAN
c) WAN d) None of the above
28. 30._________________ is a collection of many separate networks

a) A MAN b) An internet
c) A LAN d) None of the above

29. 31. A________is a set of rules that governs data communication.

a) forum b) protocol
c) standard d) None of the above

30. 32. Which of the following is required to communication between two


computers?

a) Communication hardware b) Communications software


c) Protocol d) All of above including access to
transmission medium

31. 33. Bluetooth is an example of

a) Wide area network b) Virtual private network


c) Local area network d) Personal area network

32. 34. A device which can be connected to a network without using cable is
called

a) Distributed device b) Centralized device


c) Open-source device d) Wireless device

33. 35. The vast network of computers that connects millions of people all over
the world is called

a) Internet b) Hypertext
c) LAN d) Web

34. 36. MAC address is of ___________

a) 24 bits b) 36 bits
c) 42 bits d) 48 bits
35. 37. Which of the following appears harmless but actually performs malicious
functions such as deleting or damaging files.

a) WORM b) Virus
c) Trojan Horse d) Malware

36. 38. Name the protocol that is used to send emails

a) FTP b) SMTP
c) HTTP d) TCP

37. 39. Name the protocol that is used to receive emails

a) POP b) VOIP
c) DHCP d) FTP

38. 40. Rajesh has purchased a new Smart TV and wants to cast a video from
his mobile to his new Smart TV. Identify the type of network he is using:

a) LAN b) MAN
c) WAN d) PAN

39. 41. The topology in which all nodes are individually connected to a central
connection point:

a) Ring b) Bus
c) Star d) Tree

40. 42. Which of the following best describes uploading information?

a) Sorting data on a disk drive b) Sending information to a host


computer
c) Receiving information from a host d) Sorting data on a hard drive
computer

41. 43. The term IPv4 stands for?

a) Internet Protocol Version 4 b) Internet Programming Version 4


c) International Programming Version d) None of these
4
42. 44. In specific, if the networks use separate protocols, which one of the
following devices is used to link two systems?

a) Repeater b) Gateway
c) Bridge d) Hub

43. 45. DNS is the abbreviation of

a) Dynamic Name System b) Dynamic Network System


c) Domain Name System d) Domain Network Service

44. 46. What is the meaning of Bandwidth in Network?

a) Transmission capacity of a b) Connected Computers in the


communication channels Network
c) Class of IP used in Network d) None of Above

45. 47. What does protocol defines?

a) Protocol defines what data is b) Protocol defines how data is


communicated) communicated)
c) Protocol defines when data is d) All of above
communicated)

46. 49. The loss in signal power as light travels down the fiber is called)…………

a) Attenuation b) Propagation
c) Scattering d) Interruption

47. 50. Which of the following TCP/IP protocols is used for transferring files form
one machine to another.

a) FTP b) SNMP
c) SMTP d) RPC

48. 51. Which of the following protocol is used for remote terminal connection
service?

a) RARP b) UDP
c) FTP d) TELNET
49. 52. Which of the following is considered as the unsolicited commercial email?
M

a) Virus b) Malware
c) Spam d) All of the above

50. 53. It can be a software program or a hardware device that filters all data
packets coming through the internet, a network, etc) it is known as
the_______:

a) Antivirus b) Firewall
c) Cookies d) Malware

51. 54. The term “TCP/IP” stands for_____

a) Transmission Contribution b) Transmission Control Protocol/


protocol/ internet protocol internet protocol
c) Transaction Control protocol/ d) Transmission Control Protocol/
internet protocol internet protocol

52. 55. Which of the following is a type of independent malicious program that
never required any host program?

a) Trojan Horse b) Worm


c) Trap Door d) Virus

53. 56. In order to ensure the security of the data/ information, we need to
____________ the data:

a) Encrypt b) Decrypt
c) Delete d) None of the above

54. 57. Firewall is the type of ………..

a) Virus b) Security threats


c) Worm d) None of the above.
55. 58. It allows a visited website to store its own information about a user on the
user’s computer:

a) Spam b) cookies
c) Malware d) Adware

56. 59. In which of the following switching methods, the message is divided into
small packets?

a) Message switching b) Packet switching


c) Circuit switching d) None of these

57. 60. Which of the following switch methods creates a point-to-point physical
connection between two or more computers?

a) Message switching b) Packet switching


c) Circuit switching d) None of these

58.

What is this an image of?

a) Star Topology b) Bus Topology


c) Tree Topology d) Ring Topology

59. Choose an example of a WAN

a) School b) College
c) Netflix d) Single Web Site

60. Each device connected to the network is called a...

a) Hub b) Standalone Computer


c) Node d) All of the above
Answer Keys

1. d) All of the above 2. c) A system designed 3. c) Source and


to prevent Destination
unauthorized address
access

4. a) Satellite 5. a) Metropolitan Area 6. c) PAN


Network

7. d) Fiber optic 8. b) Twisted pair cable 9. b) Router

10. a) A computer that 11. a) Broadcast device 12. b) Unicast device


is not connected
to a network

13. a) Switch 14. a) modulation 15. c) 128 bit

16. a) Optical Fibre 17. a) A process in one 18. b) Linux


Cable device is able to
exchange
information with a
process in
another device

19. b) URL 20. c) Hypertext transfer 21. a) Firewall


protocol

22. c) TCP/IP 23. c) File transfer 24. d) Peer to Peer


protocol

25. c) SBPS 26. d) ARPANET 27. b) LAN

28. b) An internet 29. b) protocol 30. d) All of above


including access
to transmission
medium

31. d) Personal area 32. d) Wireless device 33. a) Internet


network

34. d) 48 bits 35. c) Trojan Horse 36. b) SMTP

37. a) POP 38. d) PAN 39. c) Star


40. b) Sending 41. a) Internet Protocol 42. b) Gateway
information to a Version 4
host computer

43. c) Domain Name 44. a) Transmission 45. b) Protocol defines


System capacity of a how data is
communication communicated)
channels

46. a) Attenuation 47. a) FTP 48. d) TELNET

49. c) Spam 50. b) Firewall 51. b) Transmission


Control Protocol/
internet protocol

52. b) Worm 53. a) Encrypt 54. d) None of the


above.

55. b) cookies 56. b) Packet switching 57. c) Circuit switching

58. d) Ring Topology 59. c) Netflix 60. c) Node

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy