CBSE CS

Computer Networks

Part – 4

MCQ , 1 marks and 2 marks questions 

 

Multiple Choice Questions (MCQs)  

Choose the correct answer from the given below: 
1. A Computer Network: 
A. Is a collection of hardware components and computers? 
B. Is interconnected by communication channels 
C. Allows sharing of resources and information 
D. All of the above 

  

2. What is a Firewall in computer network? 
A. The physical boundary of network 
B. An operating system of computer network 
C. A system designed to prevent unauthorized access 
D. A web browsing software 

 

3. What is the use of Bridge in the Network? 
A. To connect LANs 
B. To separate LANs 
C. To control network speed 
D. All of the above 

 

4. Each IP packet must contain: 
A. Only Source address 
B. Only Destination address 
C. Source and Destination address 
D. Source or Destination address 

 

5. Which of these is not a communication channel? 
A. Satellite 
B. Microwave 
C. Radio wave 
D. Wi-Fi 

 

6. MAN Stands for _____. 
A. Metropolitan Area Network 
B. Main Area Network 
C. Metropolitan Access Network 
D. Metro Access Network 

 

7. Which of the following is the smallest network? 
A. WAN 
B. MAN 
C. PAN 
D. LAN 

 

8. Which transmission media is capable of having a much higher bandwidth (data capacity)? 
A. Coaxial 
B. Twisted pair cable 
C. Untwisted cable 
D. Fiber optic 

 

9. Which type of transmission media is the least expensive to manufacture? 
A. Coaxial 
B. Twisted pair cable 
C. CAT cable 
D. Fiber optic 

 

10. A device that forwards data packet from one network to another is called a 
A. Bridge 
B. Router 
C. Hub 
D. Gateway 
 
 
 

  

 

11. What is a standalone computer? 
A. A computer that is not connected to a network 
B. A computer that is being used as a server 
C. A computer that does not have any peripherals attached to it 
D. A computer that is used by only one person 

 

12. Which of the following is the fastest media of data transfer? 
A. Co-axial Cable 
B. Untwisted Wire 
C. Telephone Lines 
D. Fiber Optic 

13. Hub is a 
A. Broadcast device 
B. Unicast device 
C. Multicast device 
D. None of the above 

14. Switch is a 
A. Broadcast device 
B. Unicast device 
C. Multicast device 
D. None of the above 

15. The device that can operate in place of a hub is a: 
A. Switch 
B. Bridge 
C. Router 
D. Gateway 

16. In computer, converting a digital signal in to an analog signal is called 
A. modulation 
B. demodulation 
C. conversion 
D. transformation 

17. What is the address size of IPv6? 
A. 32 bit 
B. 64 bit 
C. 128 bit 
D. 256 bit 

18. Which of these is not an example of unguided media? 
A. Optical Fibre Cable 
B. Radio wave 
C. Bluetooth 
D. Satellite 

19. Two devices are in network if 
A. A process in one device is able to exchange information with a process in another device 
B. A process is running on both devices 
C. The processes running of different devices are of same type 
D. None of the above. 
 
 
 

  

 

20. Which of the following is not the Networking Devices? 
A. Gateways 
B. Linux 
C. Routers 
D. Firewalls 

21. The location of a resource on the internet is given by its? 
A. Protocol 
B. URL 
C. E-mail address 
D. ICQ 

22. The term HTTP stands for? 
A. Hyper terminal tracing program 
B. Hypertext tracing protocol 
C. Hypertext transfer protocol 
D. Hypertext transfer program 

23. Which software prevents the external access to a system? 
A. Firewall 
B. Gateway 
C. Router 
D.Virus checker 

24. Which one of the following is the most common internet protocol? 
A.HTML 
B.NetBEUI 
C.TCP/IP 
D.IPX/SPX 

25. The term FTP stands for? 
A.File transfer program 
B.File transmission protocol 
C.File transfer protocol 
D.File transfer protection 

26. Which one of the following is not a network topology? 
A.Star 
B.Ring 
C.Bus 
D.Peer to Peer 

27. Which of the following is not an unit for data transfer rate? 
A.MBPS 
B.KBPS 
C.SBPS 
D.GBPS 

28. This was the first network. 
A.CSNET 
B.NSFNET 
C.ANSNET 
D.ARPANET 

29. A_______is a data communication system within a building, plant, orcampus, or between near by 
buildings. 
A.MAN 
B.LAN 
C.WAN 
D. None of the above 

30. _________________ is a collection of many separate networks 
A. A MAN 
B. An internet 
C. A LAN 
D. None of the above 
 
 
 

  

 

31. A________is a set of rules that governs data communication. 
A. forum 
B. protocol 
C. standard 
D. None of the above 

32. Which of the following is required to communication between two computers? 
A. Communication hardware 
B. Communications software 
C. Protocol 
D. All of above including access to transmission medium 

33. Bluetooth is an example of 
A. Wide area network 
B. Virtual private network 
C. Local area network 
D. Personal area network 

34. A device which can be connected to a network without using cable is called 
A. Distributed device 
B. Centralized device 
C. Open-source device 
D. Wireless device 

35. The vast network of computers that connects millions of people all over the world is called 
A. Internet 
B. Hypertext 
C. LAN 
D. Web 

36. MAC address is of ___________ 
A. 24 bits 
B. 36 bits 
C. 42 bits 
D. 48 bits 

37. Which of the following appears harmless but actually performs malicious functions such as 
deleting or damaging files. 
A.WORM 
B.Virus 
C.Trojan Horse 
D. Malware 

38. Name the protocol that is used to send emails 
A.FTP 
B.SMTP 
C.HTTP 
D.TCP 

39. Name the protocol that is used to receive emails 
A.POP 
B.VOIP 
C.DHCP 
D.FTP 

40. Rajesh has purchased a new Smart TV and wants to cast a video from his mobile to his new 
Smart TV. Identify the type of network he is using: 
A.LAN 
B.MAN 
C.WAN 
D.PAN 
 
 
 

  

 

41. The topology in which all nodes are individually connected to a central connection point: 
A.Ring 
B.Bus 
C.Star 
D.Tree 

42. Which of the following best describes uploading information? 
A.Sorting data on a disk drive 
B.Sending information to a host computer 
C.Receiving information from a host computer 
D.Sorting data on a hard drive 

43. The term IPv4 stands for? 
A.Internet Protocol Version 4 
B.Internet Programming Version 4 
C.International Programming Version 4 
D.None of these 

44. In specific, if the systems use separate protocols, which one of the following devices is used 
to link two systems? 
A.Repeater 
B.Gateway 
C.Bridge 
D.Hub 

45. DNS is the abbreviation of 
A. Dynamic Name System 
B. Dynamic Network System 
C. Domain Name System 
D. Domain Network Service 

46. What is the meaning of Bandwidth in Network? 
A. Transmission capacity of a communication channels 
B. Connected Computers in the Network 
C. Class of IP used in Network 
D. None of Above 

47. What does protocol defines? 
A. Protocol defines what data is communicated. 
B. Protocol defines how data is communicated. 
C. Protocol defines when data is communicated. 
D. All of above 

48. Which of the following can be Software? 
A. Routers 
B. Firewalls 
C. Gateway 
D. Modems 

49. The loss in signal power as light travels down the fiber is called…………. 
A. Attenuation 
B.Propagation 
C. Scattering 
D.Interruption 

50. Which of the following TCP/IP protocols is used for transferring files form one machine to 
another. 
A. FTP 
B. SNMP 
C. SMTP 
D. RPC 
 
 
 

  

 

51. Which of the following protocol is used for remote terminal connection service? 
A. RARP 
B. UDP 
C. FTP 
D. TELNET 

52. Which of the following is considered as the unsolicited commercial email?M 
A.Virus 
B.Malware 
C.Spam 
D.All of the above 

53. It can be a software program or a hardware device that filters all data packets coming 
through the internet, a network, etc. it is known as the_______: 
A.Antivirus 
B.Firewall 
C.Cookies 
D.Malware 

54. The term “TCP/IP” stands for_____ 
A.Transmission Contribution protocol/ internet protocol 
B.Transmission Control Protocol/ internet protocol 
C.Transaction Control protocol/ internet protocol 
D.Transmission Control Protocol/ internet protocol 

55. Which of the following is a type of independent malicious program that never required any 
host program? 
A. Trojan Horse 
B. Worm 
C.Trap Door 
D.Virus 

56. In order to ensure the security of the data/ information, we need to ____________ the data: 
A.Encrypt 
B.Decrypt 
C.Delete 
D.None of the above 

57. Firewall is the type of ……….. 
A. Virus 
B. Security threats 
C. Worm 
D. None of the above. 

58. It allow a visited website to store its own information about a user on the user’s computer: 
A.Spam 
B.cookies 
C.Malware 
D.Adware 

59. In which of the following switching methods, the message is divided into small packets? 
A. Message switching 
B. Packet switching 
C. Circuit switching 
D. None of these 

60. Which of the following switch methods creates a point-to-point physical connection 
between two or more computers? 
A. Message switching 
B. Packet switching 
C. Circuit switching 
D. None of these 
 
 
 

  

 

61. MAC address is also called ______. 
A.Physical address 
B.Logical address 
C.Source address 
D.Destination address 

62. ARPANET stands for _______. 
A.Advanced Recheck Projects Agency Internet 
B.Advanced Recheck Projects Agency Network 
C.Advanced Research Projects Agency Network 
D.Advanced Research Projects Agency Internet 

63. Which of the following devices is not a networking device? 
A.Hub 
B.Switch 
C.Bridge 
D.None of these 

64. How many pins does RJ-45 contain? 
A.Two 
B.Four 
C.Eight 
D.Ten 

65. NIC Stands for – 
A.Network identity card 
B.Network interface code. 
C.National interface card 
D.Network interface card 

66. Which of the following is not a type of guided or wired communication channel? 
A.Twisted Pair 
B.Coaxial 
C.Fibre Optic 
D.WiMax 

67. Which of the following is not a type of unguided or wireless communications channel? 
A. Microwave 
B. Radiowave 
C. Ethernet 
D. Sattelite 

68. Which of the following wireless medium consists of a parabolic antena mounted on towers? 
A.Sattelite 
B.Radiowave 
C.Microwave 
D.Infrared 

69. Which of the following cable consist of a solid wire core surrounded by one or more foil or 
wire shields? 
A.Ethernet Cables 
B.Coaxial Cables 
C.Fibre Optic Cables 
D.Power Cable 

70. A collection of hyperlinked documents on the internet forms the ? 
A.World Wide Web (WWW) 
B.E-mail system 
C.Mailing list 
D.Hypertext 
 
 
 

  

 

71. Protocols are set of rules to govern _________ 
A. Communication 
B. Standard 
C. Metropolitan communication 
D. Bandwidth 

72. An internet is a __________ 
A. Collection of WANS 
B. Network of networks 
C. Collection of LANS 
D. Collection of identical LANS and WANS 

73. Which protocol is commonly used to retrieve email from a mail server? 
A. FTP 
B. IMAP 
C. HTML 
D. TELNET 

74. Which of the following allows user to view a webpage? 
A. Operating System 
B. Website 
C. Interpreter 
D. Internet Browser 

75. A network router joins two _________ together? 
A. Computers 
B. Switches 
C. Networks 
D. Gateway 

76. A network point that provides entrance into another network is called as ___________ 
A. Node 
B. Gateway 
C. Switch 
D. Router 

77. TELNET used _________ protocol for data connection 
A. TCP 
B. UDP 
C. IP 
D. DHCP 

78. Google Chrome is example of : 
A.Programming Language 
B.Web Server 
C.Protocol 
D. Web Browser 

79. Name the transmission media best suitable for connecting to hilly areas. 
A.Co-axial Cable 
B.Twisted pair 
C. Microwave 
D.Optical fiber. 

80. Rahul wants to establish computer network in his cyber café, which of the following device will 
be suggested by you to connect each computer in the cafe? 
A.Switch 
B.Modem 
C.Gateway 
D.Repeater 

 

Very Short Answer Type Questions (1 mark) 

Q1. Give one example of each – Guided media and unguided media. 
Ans: Guided – Twisted pair, Coaxial Cable, Optical Fiber (any one). Unguided – Radio waves, Satellite, Microwaves (any one). 

 

Q2. Name the protocol that is used to transfer files from one computer to another. 
Ans: FTP 

 

Q3. Name the transmission media best suitable for connecting to desert areas. 
Ans: Microwave 

 

Q4. Rearrange the following terms in increasing order of speedy medium of data transfer: Telephone line, Fiber Optics, Coaxial Cable, Twisted Pair Cable. 
Ans: Telephone line, Twisted Pair Cable, Coaxial Cable, Fiber Optics. 

 

Q5. Which of the following appears harmless but actually performs malicious functions such as deleting or damaging files? 
(a) WORM (b) Virus (c) Trojan Horse (d) Malware 
Ans: (c) Trojan Horse 

 

Q6. Name the transmission media suitable to establish PAN. 
Ans: Bluetooth, Infrared 

 

Q7. Name the protocol that is used to upload and download files on the internet. 
Ans: FTP or HTTP 

 

Q8. Name the protocol that is used to send emails. 
Ans: SMTP 

 

Q9. Name the protocol that is used to receive emails. 
Ans: POP 

 

Q10. Name the transmission media best suitable for connecting to hilly areas. 
Ans: Microwave / Radio wave 

 

Q11. Name the fastest available transmission media. 
Ans: OFC (Optical Fiber Cable) 

 

Q12. Sunil has purchased a new Smart TV and wants to cast a video from his mobile to his new Smart TV. Identify the type of network he is using and explain it. 
Ans: Sunil is using PAN – Personal Area Network. It is a private network set up by an individual to transfer data among personal devices at home. 

 

Short Answer Type Questions (2 marks) 

 

Q1. Expand the following terms: 
IPR – Intellectual Property Rights 
SIM – Subscriber’s Identity Module 
IMAP – Internet Message Access Protocol 
HTTP – Hypertext Transfer Protocol 
URL – Uniform Resource Locator 
POP3 – Post Office Protocol ver. III 
SMTP – Simple Mail Transfer Protocol 
VOIP – Voice over Internet Protocol 
TCP – Transmission Control Protocol 
Wi-Fi – Wireless Fidelity 
GPRS – General Packet Radio Service 
IRC – Internet Relay Chat 
CDMA – Code Division Multiple Access 
TDMA – Time Division Multiple Access 
VPN – Virtual Private Network 
FLOSS – Free Libre Open Source Software 
XML – Extensible Markup Language 
SMS – Short Messaging Service 
GSM – Global System for Mobile Communication 
PHP – Hypertext Preprocessor 
FTP – File Transfer Protocol 
DHCP – Dynamic Host Configuration Protocol 

 

Q2. What is the difference between star topology and bus topology of a network? 
Answer: 
In star topology, nodes are connected to the server individually, whereas in bus topology all nodes are connected to the server along a single length of cable. 

 

Q3. Write two advantages of using an optical fiber cable over an Ethernet cable to connect two service stations, which are 190 m away from each other. 
Answer: 
1. Low Power: Because signals in optical fibers degrade less, lower power transmitters can be used. 
2. Higher Data Rate: Due to higher bandwidth, the data rate of optical fiber is more than the data rate of Ethernet cable (up to 1 Gbps). 

 

Q4. Differentiate between packet switching and message switching techniques in network communication. 
Answer: 
Message Switching: In message switching, data is stored in buffer form. The message is sent to the nearest directly connected switching node. This process continues until data is delivered to the destination computer. 
Packet Switching: In packet switching, data is transferred in packet form. A fixed size of packets that can be transmitted across the network is specified. All packets are stored in the main memory instead of disks. 

 

Q5. Which type of network (out of LAN, PAN, and MAN) is formed when you connect two mobiles using Bluetooth to transfer a picture file? 
Answer: 
When two mobiles are connected using Bluetooth to transfer a picture file, a PAN (Personal Area Network) is created. 

 

Q6. What is the difference between HTTP and FTP? 
Answer: 
FTP is a protocol used to upload files from a workstation to an FTP server or download files from an FTP server to a workstation. 
HTTP is a protocol used to transfer files from a web server onto a browser to view a web page on the Internet. 

 

Q7. What is the advantage of using a switch over a hub? 
Answer: 
A switch provides a dedicated line at full bandwidth between two devices, but a hub does not. A hub shares the bandwidth. 

 

Q8. What is the difference between star topology and bus topology of a network? 
Answer: 
In star topology, nodes are connected to the server individually, whereas in bus topology all nodes are connected to the server along a single length of cable. 

 

Q9. Define the term firewall. 
Answer: 
A firewall is a feature used for network security. In a network, there is always a danger of information leaking out or in. A firewall forces all information entering or leaving the network to pass through a check to ensure no unauthorized usage. 

 

Q10. What is the importance of URL in networking? 
Answer: 
URL stands for Uniform Resource Locator. Each page created for web browsing is assigned a URL, which serves as the page’s worldwide name or address. URLs have three parts: the protocol, the DNS name of the machine on which the page is located, and a local name uniquely indicating the specific page (generally the filename). 

 

error: Content is protected !!