100% found this document useful (2 votes)
3K views4 pages

Satish Chandra Memorial School: Case Study Based Questions

This document contains a homework assignment on computer networking concepts for Class 8 students. It includes 46 multiple choice questions covering topics like network types (LAN, MAN, WAN), network devices (switch, router, modem), transmission media (twisted pair cable, optical fiber, wireless), network topologies (bus, star, ring), and network security (viruses, firewalls, hackers). The questions are intended to test the students' understanding of fundamental networking concepts.

Uploaded by

Oitri Baidya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
3K views4 pages

Satish Chandra Memorial School: Case Study Based Questions

This document contains a homework assignment on computer networking concepts for Class 8 students. It includes 46 multiple choice questions covering topics like network types (LAN, MAN, WAN), network devices (switch, router, modem), transmission media (twisted pair cable, optical fiber, wireless), network topologies (bus, star, ring), and network security (viruses, firewalls, hackers). The questions are intended to test the students' understanding of fundamental networking concepts.

Uploaded by

Oitri Baidya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

SATISH CHANDRA MEMORIAL SCHOOL

SUB : COMPUTER
CLASS : VIII (SESSION:2020-2021)
HOME ASSIGNMENT (CHP-1:NETWORKING CONCEPT)
CASE STUDY BASED QUESTIONS
Q.1.Amitav Biswas is a Network Administrator in a IT Company. He wants to install a network in a building.
Which type of Network he can build in the building?
(a)LAN (b)MAN (c)WAN
Q.2.Dipa is a Class 8 student. She wants to connect computer with internet. Which network device is required?
(a)Switch (b)Router (c)Modem (d)Repeater
Q.3.Jayantika is using broadband connection in home for online study purpose. What can be data transfer speed of her
broad band connection?
(a)1-2.5 mbps (b)10-40 mbps (c)20-5-gbps (d)10-50 kbps
Q.4.Aliance Broadband connection company wants to install broadband connection in a big city. Which kind of
Transmission Channel the company can use?
(a)Twisted Pair Cable (b)Co-axial Cable (c)Optical Fibre (d)None
Q.5.You want to connect 10 computers in a room by a network device which will know MAC address of every
connected computers.
(a)Hub (b)Switch (c)Router (d)None
Q.6.IBM wants to set up a big network in West Bengal. IBM wants to provide very fast internet and network speed
to each of its office. Which communication channel IBM can use?
(a)Twisted Pair Cable (b)Co-axial Cable (c)Optical Fibre (d)None
Q.7.Anirban is a class 8 students. He wants to install a broadband connection for online study. Which network device
is required to which will provide wi-fi network and internet connection in his home?
(a)Hub (b)Switch (c)Router (d)None
Q.8.TATA Telecom Service Company wants to install a broadband connection in a hilly area. Which type of Transmission
Media TATA Telecom Service Company can use?
(a)Optical Fibres (b)Microwave (c)Radiowave (d)None
Q.9.You want to install a LAN where all connected Computers will be controlled by a central machine. Which Network
Topology will you use?
(a)BUS TOPOLOGY (b)RING TOPOLOGY (c)STAR TOPOLOGY (d)None
Q.10.You are sitting inside a railway station. You want a free internet connection. Indian Railway is providing the free
internet connection. Which Technology is applied here?
(a)Wi-Max (b)Wi-Fi (c) Hots Spot (d)None
WORKSHEET BASED QUESTION
Q.1. A Computer Network is required for which of the following advantages?
(a) Resource sharing (b)File & Folder sharing (c)Ease of Communication (d)All of these
Q.2. A Computer Network is categorised in which of the following types?
(a) LAN (b)MAN (c)WAN (d)All of these
Q.3. A network between two mobile devices via Bluetooth is an example of____________.
(a) PAN (b)LAN (c)MAN (d)WAN
Q.4. A network between connected computers within a building is an example of____________.
(a) PAN (b)LAN (c)MAN (d)WAN
Q.5. A network between connected computers within a University Campus is an example of____________.
(a) LAN (b)CAN (c)MAN (d)WAN
Q.6. A network between connected computers and network devices within city is an example of____________.
(a) LAN (b)CAN (c)MAN (d)WAN
Q.7. A network between unlimited connected computers and network devices across the globe is an example
of____________.
(a) LAN (b)CAN (c)MAN (d)WAN
Q.8. ____________ is a layout pattern in which all computers are connected in a network.
(a) Topology (b) Protocol (c)Network Connectivity (d)None
Q.9.In which topology all computers are connected with a single backbone cable?
(a) BUS (b)TREE (c)RING (d)STAR
Q.10.In which topology all computers are connected with a central machine called HUB?
(a) BUS (b)TREE (c)RING (d)STAR
Q.11. In which topology all computers are connected with each-other and a physical ring of communication cable is
formed?
(a) BUS (b)TREE (c)RING (d)STAR
Q.12. Which computer topology provides us the most connected network?
(a) BUS (b)STAR (c)MESH (d)TREE
Q.13. Which computer topology network is totally controlled by a Root Computer (that is also considered as server
compute)?
(a) BUS (b)STAR (c)MESH (d)TREE
Q.14.Twisted pair cable is categorised into which of the following types?
(a) STP (b)UTP (c)both (a) & (b) (d)None
Q.15. Which category of STP cable is used in LAN?
(a) CAT 5 (b)CAT 6 (c)both (a) & (b) (d)None
Q.16.Which transmission channel is used to transmit signal at a higher data rate for both baseband and broadband
communication in MAN?
(a) Optical Fibre (b)Co-axial Cable (c)Twisted Pair Cable (d)None
Q.17.Which Transmission medium is used to send data signal in form of light through networks in WAN?
(a) Optical Fibre (b)Co-axial Cable (c)Twisted Pair Cable (d)None
Q.18.Infrared wave, microwave, radio wave, Wi-Fi or Wi-MAX these all are examples of____________.
(a) Wired Transmission Media (b)Wireless Transmission Media (c)both (a) & (b) (d)None

Q.19. Which of the following Wireless Transmission Media is used to connect a wireless mouse with computer?
(a) Infrared wave (b)radiowave (c)microwave (d)None
Q.20. Which of the following Wireless Transmission Media provides unidirectional line of sight communication?
(a) Infrared wave (b)radio wave (c)microwave (d)None
Q.21. Which of the following Wireless Transmission Media provides omni-directional communication where sender and
receiver antenna may not be aligned ?
(a) Infrared wave (b)radio wave (c)microwave (d)None
Q.22. Which of the following Wireless Transmission technology uses radio wave to connect two mobile devices in a short
distance(30 feet approx.)?
(a) Wi-Fi (b)WiMAX (c)Bluetooth (d)None
Q.23. Which of the following Wireless Transmission technology uses radio wave to connect any digital devices in a short
area called hotspot (300 feet approx.)?
(a) Wi-Fi (b)WiMAX(c)Bluetooth (d)None
Q.24.____________technology is similar to WiFi, but it operates at higher speeds and can cover greater distances and
greater number of users as compared to WiFi.
(a) Wi-Fi (b)WiMAX(c)Bluetooth (d)None
Q.25. Some Rules and Regulation those are maintained to connect and communicate computers within networks are
called ___________.
(a)Topology (b) Protocol (c)Anti-virus (d)None.
Q.26. Which protocol is used to send web pages from web servers to multiple connected computers across internet?
(a) HTTP (b) TCP (c)IP (d)None.
Q.27. Which protocol is used to established a dedicated route between two communicating computers and to divide
a message into data packets and to send data packets through that route?
(a)HTTP (b) TCP (c)IP (d)None.
Q.28. Which protocol is responsible to add sender and receiver computer address to each data packet so that they
can be transmitted from specific sender to receiver computer?
(a)HTTP (b) TCP (c)IP (d)None.
Q.29. __________ is a network device that is fabricated with computer mother board and is used to connect the
computer to internet/network via network or LAN cable with RJ45 jack.
(a)Switch (b)Hub (c)NIC (d)Router
Q.30. NIC of a computer that has a ROM chip which contains a 48 bit address is called ____________.
(a)IP Address (b)MAC Address (c)Computer Address (d)None
Q.31. __________ is a Network device which is a non-intelligent device and which is used as a central machine
in STAR topology network to connect multiple device.
(a)Switch (b)Hub (c)NIC (d)Router
Q.32. ___________ is a network device which is an intelligent device and connects multiple computers to form a LAN
and can remember connected computers’ address.
(a)Switch (b)Hub (c)NIC (d)Router
Q.33. ___________ is a network device which is the most intelligent network device and which is used to connects
multiple LANs together.
(a)Switch (b)Hub (c)NIC (d)Router
Q.34. ___________ is a network device which is used in MAN after every 100 meters to re-boots, amplify and
Regenerate weak signal and to pass the signal forward.
(a)Switch (b)Hub (c) Repeater (d)Router

Q.35. ___________ is a network device which is used to connect a computer/laptop to Internet and performs
modulation & de-modulation.
(a)Hub (b)Modem (c) Repeater (d)Router
Q.36. A _________ is a malicious program that spreads itself from one computer to another and interferes with the
normal operations of a computer.
(a)Worm (b)Trojan Horse (c) Virus (d)None
Q.37 A ________is a computer program that uses computer networks to send copies of itself to other computers
on a network and thus creates a easy access for others to access system.
(a)Worm (b)Trojan Horse (c) Virus (d)None
Q.38. A computer program that appears to be a useful software but actually causes damage once installed or executed
onto your computer system is known as a ____________.
(a)Worm (b)Trojan Horse (c) Virus (d)None
Q.39. __________ is an unsolicited and unwanted mail that is sent over Internet typically to a large no. Of users, for the
purpose of advertising, phising and spreading malware.
(a)Worm (b)Trojan Horse (c) Virus (d)Spam
Q.40. ___________ is an activity performed by hacker or cracker to steal information from one’s computer.
(a)Unauthorised Access (b)System Invading (c) Data Theft (d)None.
Q.41. __________ is a person who invades a system in intension of finding out the loop holes of the system and to
rectify the loop holes on behalf of the organisation.
(a)Hacker (b)Cracker (c)both (a) and (b) (d)None
Q.42. __________ is a person who invades a system in purpose of criminal intension to gain own profit by harming the
system.
(a)Hacker (b)Cracker (c)both (a) and (b) (d)None
Q.43.____________ software can be used to protect the computer from various types of malwares.
(a)Anti-spam (b)Anti-virus (c)Firewall (b) (d)None
Q.44. __________ is a software or hardware or combination of hardware & software that prevents all sorts of
unauthorised access to a system.
(a)Anti-spam (b)Anti-virus (c)Firewall (b) (d)None
Q.45. Which out of the following is/are address(s) of a computer connected with a network?
(a)IP Address (b)MAC Address (C)Both (a) and (b) (d)None

You might also like