This quiz works best with JavaScript enabled. Home > Cbse > Class 11 > Science > Computer Science > Class 11 Computer Science Chapter 8 Introduction To Networking – Quiz 3 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 3 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. ..... is a popular career development tool for job seekers and a measure of an employee's qualifications foremployers. A) Certification. B) Evaluation. C) Apprenticeship. D) Degree auditing. Show Answer Correct Answer: A) Certification. 2. What is the name of the Networking Topology where each communicating device is connected to a central node? A) Mesh Topology. B) Ring Topology. C) Star Topology. D) Bus Topology. Show Answer Correct Answer: C) Star Topology. 3. A LAN is usually managed or controlled by A) No one as a LAN doesn't require a manager. B) A single person or organisation. C) Multiple people or organisations. D) None of the above. Show Answer Correct Answer: B) A single person or organisation. 4. W in WAN Stands for A) Wide. B) Wierd. C) World. D) None of the above. Show Answer Correct Answer: A) Wide. 5. The medium provides the channel over which the message travels from source to destination. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 6. A ..... is a a network or a connection of several LANs connected over a wide geographical area A) World Area Network. B) Wide Area Network. C) Metropolitan Area Network. D) Local Area Network. Show Answer Correct Answer: B) Wide Area Network. 7. When prioritizing redundancy for critical servers, which topology generally fits better? A) Mesh due to multiple alternative paths. B) Star due to one central connection. C) Bus due to a single simple backbone. D) Ring due to token-based access control. Show Answer Correct Answer: A) Mesh due to multiple alternative paths. 8. An area network that connects devices around the world. A) CAN. B) MAN. C) WAN. D) LAN. Show Answer Correct Answer: C) WAN. 9. What do you call the Internet's equivalent of a phone book? A) DNS. B) Binary. C) ISP. D) Nodes. Show Answer Correct Answer: A) DNS. 10. What is networking? Fill in the blank:Networking is the process of building and maintaining ..... with other professionals in the industry. A) Documents. B) Computers. C) Relationships. D) Databases. Show Answer Correct Answer: C) Relationships. 11. How can industry events and social media platforms help individuals in their professional life? A) They can decrease professional opportunities. B) They can connect individuals with potential clients. C) They can limit access to industry knowledge. D) They can make individuals less visible to employers. Show Answer Correct Answer: B) They can connect individuals with potential clients. 12. A machine for transmitting and receiving messages over long distances without physical transportation of the messages. A) Email. B) Radiotelegraphy. C) Tracert. D) Telegraph. Show Answer Correct Answer: D) Telegraph. 13. Taxonomy describes a A) Group computers connected together to share resources. B) A categorized list of words that are related to a particular topic. C) The human body. D) None of the above. Show Answer Correct Answer: B) A categorized list of words that are related to a particular topic. 14. What is a VPN and how does it work? A) A VPN is a hardware device that boosts internet speed. B) A VPN is a service that encrypts your internet connection and routes it through a remote server to enhance privacy and security. C) A VPN is a type of antivirus software that scans for malware. D) A VPN is a social media platform for connecting with friends. Show Answer Correct Answer: B) A VPN is a service that encrypts your internet connection and routes it through a remote server to enhance privacy and security. 15. Which message delivery option is used when all devices need to receive the same message simultaneously? A) Broadcast. B) Uni cast. C) Multicast. D) Duplex. Show Answer Correct Answer: A) Broadcast. 16. What does DHCP stand for? A) Dynamic Host Communication Protocol. B) Dynamic Host Connection Protocol. C) Dynamic Host Control Protocol. D) Dynamic Host Configuration Protocol. Show Answer Correct Answer: D) Dynamic Host Configuration Protocol. 17. Which type of computer network consists of a series of small LANs over a small geographical area? A) LAN. B) MAN. C) PAN. D) CAN. Show Answer Correct Answer: D) CAN. 18. Below are the advantages of peer to peer network EXCEPT: A) Every computer can communicate directly with each other. B) Shared resources at each computer can be configured. C) Cheaper to be deployed. D) Central management. Show Answer Correct Answer: D) Central management. 19. Which statement about VPN encryption is most accurate? A) It replaces firewalls in all deployments. B) It only hides device MAC addresses locally. C) It prevents any need for user authorization. D) It protects privacy by securing traffic in transit. Show Answer Correct Answer: D) It protects privacy by securing traffic in transit. 20. This is the name of a popular wireless networking technology that provides users with wireless high-speed Internet and network connections A) Infrared. B) Wi-Fi. C) Airdrop. D) Bluetooth. Show Answer Correct Answer: B) Wi-Fi. 21. What is the primary function of a router? A) To connect devices within a LAN. B) To monitor network traffic. C) To provide wireless access. D) To forward data packets between networks. Show Answer Correct Answer: D) To forward data packets between networks. 22. What do you call this network resources where there is an administrator that controls the entire network? A) Client Server. B) Peer to Peer. C) Peer to Server. D) All of the above. Show Answer Correct Answer: A) Client Server. 23. Is a device that connects the LAN to the internet. The ..... is mainly used to connect thedistinct networks or connect the internet to multiple computers. A) Cables. B) Virus. C) Router. D) Computer. Show Answer Correct Answer: C) Router. 24. Which scenario best justifies choosing a hybrid topology for an enterprise network? A) Combining star and ring segments to scale departments. B) Using only a ring to simplify a small office. C) Replacing switches with hubs for lower equipment costs. D) Connecting all hosts to one coaxial backbone bus. Show Answer Correct Answer: A) Combining star and ring segments to scale departments. 25. Networks in a small geographic area, such as a home or small business. A) LAN. B) MAN. C) WAN. D) None of the above. Show Answer Correct Answer: A) LAN. 26. Wireless network advantage A) Flexible, no cables needed. B) Requires extensive wiring. C) Limited mobility. D) High installation costs. Show Answer Correct Answer: A) Flexible, no cables needed. 27. What is the term for the data communication system within a building or campus? A) LAN. B) WAN. C) PAN. D) MAN. Show Answer Correct Answer: A) LAN. 28. What is DNS and why is it important? A) DNS is important because it enables the use of user-friendly domain names, facilitates internet navigation, and is essential for the functionality of web services. B) DNS is a type of web browser. C) DNS is only used for email services. D) DNS is a programming language for web development. Show Answer Correct Answer: A) DNS is important because it enables the use of user-friendly domain names, facilitates internet navigation, and is essential for the functionality of web services. 29. A mode that allow data to flow in one direction at a time: A) Simplex. B) Full duplex. C) Half duplex. D) Latency. Show Answer Correct Answer: C) Half duplex. 30. In peer-to-peer network, each computer in a network is referred as A) SENDER. B) SERVER. C) CLIENT. D) PEER. Show Answer Correct Answer: D) PEER. 31. A group of wireless devices that connect to access points within a specified area. Access points are typically connected to the network using copper cabling. A) MAN. B) LAN. C) WLAN. D) PAN. Show Answer Correct Answer: C) WLAN. 32. Which protocol is used for secure remote login? A) FTP. B) HTTP. C) SMTP. D) SSH. Show Answer Correct Answer: D) SSH. 33. Which advantage is commonly associated with a star topology? A) Highest redundancy through many links. B) Peer devices communicate without a hub. C) Fault isolation for individual cable failures. D) Cheapest cabling due to one backbone. Show Answer Correct Answer: C) Fault isolation for individual cable failures. 34. A ..... network is confined to a relatively small space. A) WAN. B) MAN. C) NAN. D) LAN. Show Answer Correct Answer: D) LAN. 35. The most common protocol for sending emails A) FTP. B) SMTP. C) POP3 and IMAP. D) TCP/IP. Show Answer Correct Answer: B) SMTP. 36. Which of the following address belongs class A? A) 130.12.12.248. B) 128.12.12.248. C) 121.12.12.248. D) 129.12.12.248. Show Answer Correct Answer: C) 121.12.12.248. 37. When data is passed from the Application layer to the lower layers in the OSI model, what process is used to add headers and trailers at each layer? A) Encapsulation. B) De-encapsulation. C) Multiplexing. D) Segmentation. Show Answer Correct Answer: A) Encapsulation. 38. DNS (Domain Name System) helps clients find web servers over a network such as the Internet. It translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers use to communicate with each other over a network. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 39. Explain the function of a switch. A) The function of a switch is to connect devices in a network and manage data traffic between them. B) A switch connects devices only through wireless signals. C) A switch is used to store data permanently. D) A switch amplifies signals in a network. Show Answer Correct Answer: A) The function of a switch is to connect devices in a network and manage data traffic between them. 40. In this type of network topology, all devices are connected to each other, they also have additional links to improve performance and to lower the risk of damage to the network. A) BUS Topology. B) MESH Topology. C) RING Topology. D) STAR Topology. Show Answer Correct Answer: B) MESH Topology. 41. A startup plans to grow from 10 to 100 employees next year. Which network design priority most directly supports this plan? A) Limit shared resources to prevent expansion. B) Prioritize scalability for easy device additions. C) Focus on isolated devices to avoid dependencies. D) Use local accounts on each computer only. Show Answer Correct Answer: B) Prioritize scalability for easy device additions. 42. The TCP/IP model has how many layers? A) 5. B) 7. C) 4. D) 6. Show Answer Correct Answer: C) 4. 43. Which risk is most specific to tree topology compared to mesh? A) Inability to support hierarchical addressing. B) Increased broadcast storms across segments. C) Failure of an upper branch isolates subtrees. D) Complex path selection looping traffic. Show Answer Correct Answer: C) Failure of an upper branch isolates subtrees. 44. The ..... layer is divided into two sublayers:the logical link control and the media access control. A) Data link. B) Network. C) Transport. D) Session. Show Answer Correct Answer: A) Data link. 45. Which one is part of uses of a Computer Network A) Resource sharing. B) Server-Client model:. C) Communication medium. D) E-commerce. E) All of them. Show Answer Correct Answer: E) All of them. 46. What is the purpose of the Time To Live (TTL) field in a packet? A) To indicate the priority of the packet. B) To determine the maximum number of hops a packet can take. C) To specify the size of the packet. D) To track the time taken for packet delivery. Show Answer Correct Answer: B) To determine the maximum number of hops a packet can take. 47. The speed with which data is moved from one place on a network to another A) Data transfer rate. B) Data analysis. C) Data distribution. D) None of the above. Show Answer Correct Answer: A) Data transfer rate. 48. What does NIC stand for? A) Network Interface Controller. B) Network Interface Computer. C) Network Interface Card. D) Network Intercom Controller. Show Answer Correct Answer: A) Network Interface Controller. 49. An IT manager must plan for network complexity as the organization grows. Which approach is most appropriate? A) Disable redundancy to simplify topology. B) Rely solely on peer-to-peer file sharing. C) Add ad-hoc devices without documentation. D) Implement structured management and monitoring. Show Answer Correct Answer: D) Implement structured management and monitoring. 50. Which capability is a defining feature of a VPN rather than a PAN, LAN, MAN, or WAN? A) Short-range Bluetooth device discovery. B) Physical cabling across a small building. C) Metropolitan fiber ring aggregation. D) Encrypted tunnels over untrusted networks. Show Answer Correct Answer: D) Encrypted tunnels over untrusted networks. 51. Which outcome is most likely when the hub fails in a star topology? A) Some redundant paths reroute critical traffic. B) Only the device with a bad cable loses connectivity. C) Entire network stops because all traffic depends on it. D) Performance drops slightly but communication continues. Show Answer Correct Answer: C) Entire network stops because all traffic depends on it. 52. Separate or distinct. Used to describe digital signals, which have two distinct states (on and off), as compared with the continuous sine waves that form an analog signal. A) Major. B) Discrete. C) Continuous. D) Disjointed. Show Answer Correct Answer: B) Discrete. 53. What does a network number identify in an IP address? A) The type of service the device provides. B) The local network to which the device is connected. C) The specific device on a local network. D) The geographical location of the device. Show Answer Correct Answer: B) The local network to which the device is connected. 54. You must connect a desktop to a router for the most stable throughput. Which should you choose? A) Ethernet:physical RJ-45 connection. B) Wi-Fi:dual-band radio access. C) Bluetooth:peripheral pairing link. D) Mobile Hotspot:cellular data bridge. Show Answer Correct Answer: A) Ethernet:physical RJ-45 connection. 55. It Converts computer data into an analog audio signal for transfer over a telephone line, and then a modem at the destination converts it back again into data A) Phone modem. B) DSL. C) All the above. D) None of the above. Show Answer Correct Answer: A) Phone modem. 56. Which statement best describes a LAN? A) Devices spanning continents over public links. B) Devices communicating only a few centimeters. C) Devices linked across several nearby cities. D) Devices connected within one physical location. Show Answer Correct Answer: D) Devices connected within one physical location. 57. A school wants better collaboration across campuses without increasing per-device software costs. Which network feature addresses both needs? A) Segmented VLANs for guest device isolation. B) Air-gapped labs for high-assurance research. C) Centralized applications with shared licensing. D) Dedicated dark fiber between two buildings. Show Answer Correct Answer: C) Centralized applications with shared licensing. 58. Convert 24 to binay A) 11110000. B) 00011000. C) 00000110. D) 00010100. Show Answer Correct Answer: B) 00011000. 59. Identify the device used to boost up a weak signal? A) Modem. B) Repeater. C) Router. D) Switch. Show Answer Correct Answer: B) Repeater. 60. Fill in the blank:Understanding trends, consumer preferences, and competitor strategies is known as ..... A) Market intelligence. B) Product placement. C) Brand loyalty. D) Supply chain management. Show Answer Correct Answer: A) Market intelligence. ← PreviousNext →Related QuizzesScience QuizzesClass 11 QuizzesClass 11 Computer Science Chapter 8 Introduction To Networking Quiz 1Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 2Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 4Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 5Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 6Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 7Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 8Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books