This quiz works best with JavaScript enabled. Home > Cbse > Class 11 > Science > Computer Science > Class 11 Computer Science Chapter 8 Introduction To Networking – Quiz 4 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 4 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. IP functions at what layer of the OSI Reference Model? A) Physical. B) Session. C) Transport. D) Network. Show Answer Correct Answer: D) Network. 2. What core function does a Virtual Private Network (VPN) provide? A) Physically merges distant office networks. B) Creates an encrypted tunnel over the internet. C) Eliminates the need for internet connectivity. D) Replaces routers with direct peer wireless links. Show Answer Correct Answer: B) Creates an encrypted tunnel over the internet. 3. Active hubs can ..... A) Transmit data through wireless medium. B) Send an acknowledgement once the packet is received. C) Route the signal using the most efficient path. D) Regenerate the signal like repeaters. Show Answer Correct Answer: D) Regenerate the signal like repeaters. 4. Which statement describes an advantage of networks? A) Networks require decentralized management. B) Isolating network devices decreases costs. C) Isolating network devices allows implementation of the sneakernet file sharing method. D) Networks enable multiple users to share resources. Show Answer Correct Answer: D) Networks enable multiple users to share resources. 5. This characteristic of a reliable network makes it so that the network can expand quickly and easily to support new users and applications without impacting the performance of services to existing users. A) Security. B) Fault Tolerance. C) Scalability. D) Quality of Service (QoS). Show Answer Correct Answer: C) Scalability. 6. Which OSI layer is responsible for the reliable transmission of data segments between points on a network, including error detection and flow control? A) Session layer. B) Data Link layer. C) Network layer. D) Transport layer. Show Answer Correct Answer: D) Transport layer. 7. Objective 1.2/Day 1-A small office wants to set up a simple and cost-effective network where all devices can share resources equally without the need for a central server. Which network type would be most appropriate for this scenario? A) Client-server. B) Wide area network (WAN). C) Metropolitan area network (MAN). D) Peer-to-peer. Show Answer Correct Answer: D) Peer-to-peer. 8. Jacoby arranged five computers and two network-capable Laserjet printers in his office and connected them to a switch. What is this physical topology called? A) Mesh topology. B) Star topology. C) Ring topology. D) Hybrid topology. Show Answer Correct Answer: B) Star topology. 9. The ..... model has 7 layers and is used to understand how networks communicate. A) TCP/IP. B) HTTP. C) Ethernet. D) OSI. Show Answer Correct Answer: D) OSI. 10. A set of high-speed networks that carry Internet traffic is known as A) Internet service provider. B) Internet Backbone. C) All the above. D) None of the above. Show Answer Correct Answer: B) Internet Backbone. 11. Physically and logically, network topologies are connected through ..... A) Internet. B) Topology. C) Nodes. D) ISP. Show Answer Correct Answer: C) Nodes. 12. What are the 3 main network topologies? A) BUS, RING & STAR. B) BUS, STAR & LAN. C) WAN, STAR & LAN. D) None of the above. Show Answer Correct Answer: A) BUS, RING & STAR. 13. This characteristic of a reliable network refers to any activity designed to protect the usability and integrity of your network, users and data A) Security. B) Scalability. C) Fault Tolerance. D) Quality of Service (QoS). Show Answer Correct Answer: A) Security. 14. Fill in the blank:Business growth from partnerships and referrals can lead to sustained ..... A) Uncertainty. B) Competition. C) Financial stability. D) Decline. Show Answer Correct Answer: C) Financial stability. 15. What is the purpose of a network diagram? A) To create software. B) To visualize existing networks. C) To connect devices. D) To send data. Show Answer Correct Answer: B) To visualize existing networks. 16. A computer network is ..... connected together. A) Two or more. B) Four or more. C) Three or more. D) One computer. Show Answer Correct Answer: A) Two or more. 17. What is a protocol? A) A network device. B) A way of connecting to a network. C) A way of accessing the internet. D) A set of rules used for communicating. Show Answer Correct Answer: D) A set of rules used for communicating. 18. The network security that is implemented must take into account the environment while securing the data, but still allowing for quality of service that is expected of the network A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 19. A WAN usually covers A) A persons personal devices. B) A small area like a home or office. C) An area spanning somewhere from multiple sites to the whole world. D) None of the above. Show Answer Correct Answer: C) An area spanning somewhere from multiple sites to the whole world. 20. The first page of a website is called A) Website. B) Home page. C) Webpage. D) None of the above. Show Answer Correct Answer: B) Home page. 21. Business growth from partnerships and referrals can lead to what kind of financial outcome? A) Sustained financial stability. B) Immediate bankruptcy. C) Sudden loss of all clients. D) Decreased brand recognition. Show Answer Correct Answer: A) Sustained financial stability. 22. What is a packet? A) A technique for wrapping items for shipping. B) A small box used for storage. C) A portion of a larger message that is sent across a network. D) The amount of data that could be stored on an early punched card. Show Answer Correct Answer: C) A portion of a larger message that is sent across a network. 23. Every computer has a unique IP address on the network A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 24. Jenney wants to connect all her devices to one another without a central device, creating a fully interconnected network. What is this physical topology called? A) Mesh topology. B) Hybrid topology. C) Star topology. D) Ring topology. Show Answer Correct Answer: A) Mesh topology. 25. A company that provides other companies or individuals with access to the Internet A) ISP-Internet service provider. B) Internet Backbone. C) All the above. D) None of the above. Show Answer Correct Answer: A) ISP-Internet service provider. 26. What is a bridge in networking? A) A type of protocol. B) A type of cable. C) A type of server. D) A device that connects two network segments. Show Answer Correct Answer: D) A device that connects two network segments. 27. Is the amount of data that can be transmitted within a fixed time period. A) Bandwidth. B) Latency. C) Full duplex. D) Half duplex. Show Answer Correct Answer: A) Bandwidth. 28. Short blocks of data transmitted in a packet-switching network A) File. B) Email. C) Packet. D) Ip address. Show Answer Correct Answer: C) Packet. 29. Which of the following describes a group of computer programs that handle packet formatting and controldata transmission? A) Gateway. B) MAC address. C) Topology. D) Protocol. Show Answer Correct Answer: D) Protocol. 30. An enterprise needs to securely connect remote employees to internal applications. What is the most appropriate solution? A) VPN providing secure remote access. B) LAN limited to a local floor. C) MAN linking nearby office buildings. D) PAN connecting personal peripherals. Show Answer Correct Answer: A) VPN providing secure remote access. 31. Often, separate LANs are interconnected and rely on several ..... running many different applications andmanaging resources other than data. A) Workstations. B) Servers. C) Clients. D) Stand-alone computers. Show Answer Correct Answer: B) Servers. 32. What is the purpose of the Time To Live (TTL) in an IP packet? A) To specify the priority of the packet. B) To indicate the source of the packet. C) To prevent packets from being trapped in routing loops. D) To determine the maximum size of the packet. Show Answer Correct Answer: C) To prevent packets from being trapped in routing loops. 33. The amount of data that can be transmitted in a fixed amount of time is called A) Bandwidth. B) Website. C) Speed. D) ISP. Show Answer Correct Answer: A) Bandwidth. 34. What is a firewall? A) A firewall is a type of computer virus. B) A firewall is a software used for data storage. C) A firewall is a network security device. D) A firewall is a device used for printing documents. Show Answer Correct Answer: C) A firewall is a network security device. 35. It has no hierarchy among computers, all are equal. No administrator responsible for the network. A) Client Server. B) Peer to Peer. C) Peer to Server. D) All of the above. Show Answer Correct Answer: B) Peer to Peer. 36. This network size allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources. A) Small home networks. B) Small office and home office networks. C) Medium to large networks. D) World wide networks. Show Answer Correct Answer: B) Small office and home office networks. 37. Which is not a basic characteristic of a reliable network architecture?I. Fault Tolerance II. ScalarabilityIII. Quality of Service (QoS) IV. Security A) I. B) II. C) III. D) IV. Show Answer Correct Answer: B) II. 38. If network downtime occurs during business hours, what is the most immediate effect? A) Lower exposure to malware and viruses. B) Disruption to communication and productivity. C) Greater need for additional printers companywide. D) Easier troubleshooting for new administrators. Show Answer Correct Answer: B) Disruption to communication and productivity. 39. A group of computers and computer resources connected to one another so that they can share data or resources. In an office, for example, computers are often interconnected so that they can exchange information locally and share peripherals such as a printer. A) Network. B) Office. C) Workstation. D) IP. Show Answer Correct Answer: A) Network. 40. What is a primary benefit of centralized management in networks? A) Makes hardware upgrades permanently unnecessary. B) Guarantees zero downtime for all applications. C) Eliminates the need for any local configurations. D) Easier to manage updates, security, and data centrally. Show Answer Correct Answer: D) Easier to manage updates, security, and data centrally. 41. What is the only form of PAN you need to know of at GCSE level? A) A phone network. B) A Bluetooth network. C) Wireless headphones. D) Wireless mouse and keyboard. Show Answer Correct Answer: B) A Bluetooth network. 42. A ..... procedure allows you to find out precisely how a data transmission (like a Google search) traveled from your computer to another. A) Tracert. B) Ip. C) Traceroute. D) Router. Show Answer Correct Answer: C) Traceroute. 43. What does Ethernet technology use? A) Carrier Sense Multi Access/Collision Detection. B) Wireless signals. C) Fiber optics only. D) Satellite connections. Show Answer Correct Answer: A) Carrier Sense Multi Access/Collision Detection. 44. Match each networking device to its function:Forwards data within a network. A) Modem. B) Router. C) Switch. D) Hub. Show Answer Correct Answer: C) Switch. 45. In the TCP/IP model, which layer corresponds to the OSI Data Link and Physical layers combined? A) Transport. B) Network Access. C) Application. D) Internet. Show Answer Correct Answer: B) Network Access. 46. "WWW" is the abbreviation for which of the following? A) World Without Websites. B) Workforce Wide Web. C) World Wide Web. D) World Wide Watch. Show Answer Correct Answer: C) World Wide Web. 47. Which layer of the OSI model is responsible for routing? A) Transport. B) Physical. C) Network. D) Data Link. Show Answer Correct Answer: C) Network. 48. Fill in the blank:Increased recognition from networking can lead to partnerships, job offers, and ..... A) Commissions. B) Penalties. C) Delays. D) Debts. Show Answer Correct Answer: A) Commissions. 49. Choose the best comparison of LAN, MAN, and WAN coverage scales. A) LAN smallest, MAN middle, WAN largest areas. B) WAN smallest, MAN middle, LAN largest areas. C) MAN smallest, WAN middle, LAN largest areas. D) LAN and WAN equal, MAN larger than both. Show Answer Correct Answer: A) LAN smallest, MAN middle, WAN largest areas. 50. POP3 and IMAP are the two most popular internet standard protocols for A) Sending emails. B) Data transmission. C) Retrieving emails. D) Exchanging files. Show Answer Correct Answer: C) Retrieving emails. 51. A company's devices across multiple buildings in one city are best connected using which network type? A) Wide Area Network (WAN). B) Local Area Network (LAN). C) Metropolitan Area Network (MAN). D) Personal Area Network (PAN). Show Answer Correct Answer: C) Metropolitan Area Network (MAN). 52. A common way of sharing resources on a peer-to-peer network is by modifying the ..... controls using thecomputer's operating system. A) Resource-sharing. B) File-serving. C) File-sharing. D) Resource-monitoring. Show Answer Correct Answer: C) File-sharing. 53. It is the way computers or network are arranged either physical or logical that is connected through nodes. A) Network Resources. B) Network Geography. C) Network Topology. D) Network Design. Show Answer Correct Answer: C) Network Topology. 54. What component allows multiple wireless devices like laptops and phones to connect to a local network without cables? A) A fiber patch panel that bridges devices. B) A wireless access point that bridges devices. C) A power supply unit that bridges devices. D) An Ethernet switch that bridges devices. Show Answer Correct Answer: B) A wireless access point that bridges devices. 55. Connections of multiple smaller networks such as LANs that are in geographically separated locations. The most common example of a WAN is the Internet. A) WLAN. B) LAN. C) PAN. D) WAN. Show Answer Correct Answer: D) WAN. 56. What is the primary characteristic of a wide area network (WAN)? A) Extends over large geographic areas connecting LANs. B) Uses no routing between network segments. C) Requires direct cabled links between all hosts. D) Operates only within one building floor. Show Answer Correct Answer: A) Extends over large geographic areas connecting LANs. 57. Identify the device used as a connectivity device that logically subdivides a network into smaller, individual collision domains? A) Repeater. B) Router. C) Modem. D) Switch. Show Answer Correct Answer: D) Switch. 58. Which type of copper cable is most commonly used in LANs? A) Fiber optic cable. B) Coaxial cable. C) Unshielded Twisted-Pair (UTP). D) Shielded Twisted-Pair (STP). Show Answer Correct Answer: C) Unshielded Twisted-Pair (UTP). 59. Objective 1.2/Day 1-Which of the following topologies allows for network expansion with the least amount of disruption for the current network users? A) Bus. B) Ring. C) LAN. D) Star/hub-and-spoke. Show Answer Correct Answer: D) Star/hub-and-spoke. 60. Used to interconnect two LANs working on the same protocol and it also reduces congestion. A) SWITCH. B) HUB. C) MODEM. D) BRIDGE. Show Answer Correct Answer: D) BRIDGE. ← PreviousNext →Related QuizzesScience QuizzesClass 11 QuizzesClass 11 Computer Science Chapter 8 Introduction To Networking Quiz 1Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 2Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 3Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 5Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 6Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 7Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 8Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books