This quiz works best with JavaScript enabled. Home > Cbse > Class 11 > Science > Computer Science > Class 11 Computer Science Chapter 8 Introduction To Networking – Quiz 6 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 6 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What is cloud computing? A) Using only paper files. B) Storing files on servers over the Internet. C) Storing files on local devices. D) Using only physical storage. Show Answer Correct Answer: B) Storing files on servers over the Internet. 2. The internet is an example of A) CAN. B) WAN. C) LAN. D) MAN. Show Answer Correct Answer: B) WAN. 3. The internet works by sending data through ..... What do we call the shredded data being sent? A) Packets. B) Binary. C) Radio waves. D) Network. Show Answer Correct Answer: A) Packets. 4. Communication channel is shared by all the machines on the network in A) Unicast network. B) Multicast network. C) Broadcast network. D) None of the mentioned. Show Answer Correct Answer: C) Broadcast network. 5. The topology that is probably obsolete nowadays is: A) Star topology. B) Ring topology. C) Hybrid topology. D) Bus topology. Show Answer Correct Answer: D) Bus topology. 6. Which of the following is a function of the Transport Layer in the OSI model? A) Routing. B) Flow control. C) Encryption. D) Framing. Show Answer Correct Answer: B) Flow control. 7. A networking device which is used to regenerate signals is A) Modem. B) Repeater. C) Bridge. D) Switch. Show Answer Correct Answer: B) Repeater. 8. Why is networking crucial in creative industries? Fill in the blank: A) Success often depends on relationships and exposure. Many opportunities, collaborations, and jobs arise from connections rather than formal applications. B) It is the only way to learn technical skills in the industry. C) Networking guarantees instant fame and wealth. D) Creative industries do not value formal education at all. Show Answer Correct Answer: A) Success often depends on relationships and exposure. Many opportunities, collaborations, and jobs arise from connections rather than formal applications. 9. Which of the following statements is NOT true?I. Networking supports the way we learnII. Network is not meant to support communicationIII. Networking supports the way we workIV. Network is simply for connecting to the internet A) I and II. B) I and III. C) II and IV. D) III and IV. Show Answer Correct Answer: C) II and IV. 10. Which the best response as to why is a smoke signal considered to be a network? A) Smoke signals enable people to communicate over a distance. B) Someke signal is considered to be very dangerous. C) Smoke signals prevents people from communicating over a distance. D) Smoke signals is medium of dismissing concern. Show Answer Correct Answer: A) Smoke signals enable people to communicate over a distance. 11. If no message acknowledgment is required, the delivery option is referred to as ..... A) Void. B) Unacknowledged. C) Incomplete. D) Null. Show Answer Correct Answer: B) Unacknowledged. 12. When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address? A) Default gateway. B) Subnet mask. C) DHCP server address. D) DNS server address. Show Answer Correct Answer: B) Subnet mask. 13. The Internet sends information in packets and travels through routers to the receiver. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 14. Network that connects devices, such as mice, keyboards, printers, smartphones, and tablets within the range of an individual person. They are most often connected with Bluetooth technology. A) WAN. B) LAN. C) MAN. D) PAN. Show Answer Correct Answer: D) PAN. 15. Dependability is a characteristic of ..... A) Network communications. B) Soft skills. C) Network servers. D) Technical skills. Show Answer Correct Answer: B) Soft skills. 16. Which layer of the OSI model is responsible for establishing, managing, and terminating sessions? A) Presentation Layer. B) Transport Layer. C) Session Layer. D) Application Layer. Show Answer Correct Answer: C) Session Layer. 17. Brute force attack A) A method of gaining access by guessing many passwords. B) A technique to encrypt data securely. C) A way to bypass firewalls using malware. D) A strategy for optimizing network performance. Show Answer Correct Answer: A) A method of gaining access by guessing many passwords. 18. Which layer of the OSI model is responsible for data encryption? A) Application Layer. B) Session Layer. C) Presentation Layer. D) Transport Layer. Show Answer Correct Answer: C) Presentation Layer. 19. Without a DNS server the user would have to type in IP addresses to access a webpage. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 20. Fill in the blank:Expanding your circle opens doors to new opportunities, collaborations, and ..... A) Expenses. B) Delays. C) Referrals. D) Obstacles. Show Answer Correct Answer: C) Referrals. 21. An ISP provides access to the ..... infrastructure for the users. A) Router. B) Layers. C) Protocols. D) Internet. Show Answer Correct Answer: D) Internet. 22. Order the following network types from smallest to largest:PAN, LAN, MAN, WAN. A) PAN, LAN, MAN, WAN. B) MAN, WAN, LAN, PAN. C) LAN, PAN, WAN, MAN. D) WAN, MAN, LAN, PAN. Show Answer Correct Answer: A) PAN, LAN, MAN, WAN. 23. A mode that allow data to flow in both directions at the same time: A) Full duplex. B) Latency. C) Simplex. D) Half duplex. Show Answer Correct Answer: A) Full duplex. 24. Are computers that provide information to end devices on the network A) Server. B) End devices. C) Host. D) Client. Show Answer Correct Answer: A) Server. 25. List the layers of the OSI model. A) Application, Transport, Network, Data Link, Internet. B) Session, Transport, Network, Application, Data Link. C) Physical, Data Link, Network, Application, Session. D) Application, Presentation, Session, Transport, Network, Data Link, Physical. Show Answer Correct Answer: D) Application, Presentation, Session, Transport, Network, Data Link, Physical. 26. In wired networking, which medium typically offers higher speeds and lower latency over long distances? A) Powerline adapters over long campus links. B) Fiber optic cabling over long campus links. C) Coaxial copper over long campus links. D) Unshielded Ethernet over long campus links. Show Answer Correct Answer: B) Fiber optic cabling over long campus links. 27. Routers operate at the ..... layer. A) Presentation. B) Network. C) Session. D) Physical. Show Answer Correct Answer: B) Network. 28. Objective 1.2/Day 1-A telecommunications company provides high-speed internet access to its customers using an infrastructure that allows multiple signals to travel simultaneously over the same medium. Which provider link technology is being used? A) Leased line. B) Digital subscriber line (DSL). C) Satellite. D) Cable. Show Answer Correct Answer: D) Cable. 29. Why is a star topology considered easy to manage? A) Adding or removing devices does not disrupt others. B) All devices must be reconfigured simultaneously. C) Changes require replacing the central backbone. D) Any cable change halts entire data transmission. Show Answer Correct Answer: A) Adding or removing devices does not disrupt others. 30. Match topology with description:Data travels in a loop. A) Ring. B) Star. C) Bus. D) Mesh. Show Answer Correct Answer: A) Ring. 31. Fill in the blank:Networking allows professionals to learn from others, gain mentorship, and ..... skills. A) Hide. B) Forget. C) Ignore. D) Refine. Show Answer Correct Answer: D) Refine. 32. Which of the following is NOT a type of network topology? A) Ring. B) Mesh. C) Circled. D) Bus. Show Answer Correct Answer: C) Circled. 33. What's the primary purpose of a router? A) Deliver packets to PC's on local segments. B) It provides Layer 2 address data segmentation. C) Deliver packets to different networks using the best available path. D) It controls the data flow of Layer 2 addresses. Show Answer Correct Answer: C) Deliver packets to different networks using the best available path. 34. A physical address is embedded on every network adapter on the globe. This is called a MAC (Media Access Control) address. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 35. A WAN is usually controlled or managed by A) No one. B) A single person or organisation. C) A collective of people or distributed ownership. D) None of the above. Show Answer Correct Answer: C) A collective of people or distributed ownership. 36. What is an example of a connection using copper? A) Twisted-pair cable usually used as LAN media. B) Glass or plastic fibers in a vinyl coating usually used for long runs in a LAN and as a trunk. C) Connects local users through the air. D) None of the above. Show Answer Correct Answer: A) Twisted-pair cable usually used as LAN media. 37. Which of the following statements are true?I. The internet is not owned by any individual or groupII. The internet is a worldwide collection of interconnected networks III. Through telephone wires, fiber-optic cables, wireless transmissions, and satellite links, internet users can exchange information in a variety of formsIV. Only internet makes up the network A) I, II, and III. B) I, II, and IV. C) II, III, and IV. D) I, III, and IV. Show Answer Correct Answer: A) I, II, and III. 38. The phenomenon of offering multiple types of communications services on the same network is known as ..... A) Divergence. B) Convergence. C) Unified communications. D) Multi-communications. Show Answer Correct Answer: B) Convergence. 39. Which connection type is best described as a reliable wired link for local networks? A) Mobile Hotspot:phone-shared internet. B) Bluetooth:short-range device pairing. C) Wi-Fi:fast radio-based networking. D) Ethernet:dependable physical cabling. Show Answer Correct Answer: D) Ethernet:dependable physical cabling. 40. What was the name given to early network routers? A) Interfaith Message Processors. B) Internet Motion Perceptrons. C) Instant Message Programs. D) Interface Message Processors. Show Answer Correct Answer: D) Interface Message Processors. 41. A ..... is a collection of interconnected high-capacity data routes and core routers that carry data across countries, continents, and oceans. A) Internet service provider (ISP). B) Data pathway. C) Internet backbone. D) Hop. Show Answer Correct Answer: C) Internet backbone. 42. Data is transmitted across a network in the form of digital signals represented in binary as ..... A) Xs and Os. B) 1s and 0s. C) Is and Os. D) Fs and Ls. Show Answer Correct Answer: B) 1s and 0s. 43. What is a non-routable IP address? A) An address that is assigned to mobile devices. B) An address that is used for dynamic IP allocation. C) An address that is only used within a local network. D) An address that can be used globally on the Internet. Show Answer Correct Answer: C) An address that is only used within a local network. 44. The aim of the computer network is the sharing of resources among various devices. A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: A) Yes. 45. What is the purpose of a DNS server? A) Encrypt data transmission. B) Provide email services. C) Translate domain names into IP addresses. D) Manage network traffic. Show Answer Correct Answer: C) Translate domain names into IP addresses. 46. Which statement is probably explaining about hybrid topology? A) A failure in the central devices will make the whole network collapse. B) More computers in the network cause slower network performance. C) Easily moved. D) Can cover longer distances. Show Answer Correct Answer: D) Can cover longer distances. 47. Security auditing is handled by ..... A) Access services. B) Internet services. C) Network management services. D) Communication services. Show Answer Correct Answer: C) Network management services. 48. This network size are such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts A) Small home networks. B) Small office and home office networks. C) Medium to large networks. D) World wide networks. Show Answer Correct Answer: C) Medium to large networks. 49. A ..... is any device that can be attached to a network, and computers on a network are called ..... A) Host, nodes. B) Node, hosts. C) Server, peers. D) Client, peers. Show Answer Correct Answer: B) Node, hosts. 50. This is where a message originates from or where it is received A) End devices. B) Server. C) Client. D) Host. Show Answer Correct Answer: A) End devices. 51. Which type of fiber optic cable is used for long-distance communication? A) Single-Mode Fiber (SMF). B) Multi-Mode Fiber (MMF). C) Coaxial Fiber. D) Twisted-Pair Fiber. Show Answer Correct Answer: A) Single-Mode Fiber (SMF). 52. L in LAN Stands for A) Lower. B) Local. C) Less. D) Loyal. Show Answer Correct Answer: B) Local. 53. A device that is used to transmit a message from the source computer to the destination computer in a network by using its physical address A) SWITCH. B) MODEM. C) HUB. D) BRIDGE. Show Answer Correct Answer: A) SWITCH. 54. What is one way that word-of-mouth referrals from trusted connections can benefit your career? A) They ensure you never have to interview. B) They eliminate the need for a resume. C) They always guarantee a promotion. D) They often lead to paid work. Show Answer Correct Answer: D) They often lead to paid work. 55. A ..... is a device that forwards packets between networks by processing the routing information included in the packet. A) Bridge. B) Firewall. C) Router. D) All of the mentioned. Show Answer Correct Answer: C) Router. 56. How long might a message be stored in an intermediate computer for a store-and-forward network? A) Less than a minute. B) Less than a second. C) No more than four seconds. D) Possibly as long as several hours. Show Answer Correct Answer: D) Possibly as long as several hours. 57. Define LAN and WAN. A) LAN connects multiple cities; WAN connects devices in a single room. B) LAN is used for global communication; WAN is used for local communication. C) LAN is a network for a small area; WAN is a network for a large area. D) LAN is a network for a large area; WAN is a network for a small area. Show Answer Correct Answer: C) LAN is a network for a small area; WAN is a network for a large area. 58. What is an example of a connection that is wireless? A) Twisted-pair cable usually used as LAN media. B) Glass or plastic fibers in a vinyl coating usually used for long runs in a LAN and as a trunk. C) Connects local users through the air. D) None of the above. Show Answer Correct Answer: C) Connects local users through the air. 59. A kind of network topology inferred as the way you physically lay out the network. A) Logical Topology. B) Spiral Topology. C) Physical Topology. D) Orbital Topology. Show Answer Correct Answer: C) Physical Topology. 60. Which network model ensures that no computer on the network has more authority than another? A) Client/server. B) Peer-to-peer. C) Stand alone. D) Distributed. Show Answer Correct Answer: B) Peer-to-peer. ← PreviousNext →Related QuizzesScience QuizzesClass 11 QuizzesClass 11 Computer Science Chapter 8 Introduction To Networking Quiz 1Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 2Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 3Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 4Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 5Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 7Class 11 Computer Science Chapter 8 Introduction To Networking Quiz 8Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books