Part B Unit 1 MCQ and Ques
Part B Unit 1 MCQ and Ques
1. ________ is a collection of
independent computers that communicate with one another over a
shared network medium.
a. Network
b. Connection
c. Computer
d. None of the above
14. _______ is an electronic device that amplifies the received signal and
then retransmits it on the network.
a. Modem
b. Hub
c. Repeater
d. Switch
15. _______ is a network device that connects two networks with different
protocols.
a. Modem
b. Router
c. Repeater
d. Switch
16. _______ is a network device that connects two dissimilar networks.
a. Modem
b. Gateway
c. Repeater
d. Switch
17. ________ is a small, portable card that allows your computer to
connect to the internet through a wireless network.
a. Wi-Fi card
b. Wi-Max card
c. Network card
d. None of the above
18. Protocol: A special set of rules that two or more machines on a network
follow to communicate with each other.
a. Device
b. Protocol
c. Method
d. None of the above
19. _________ protocol breaks the data into packets that the network can
handle efficiently.
a. File Transfer Protocol
b. Transmission Control Protocol
c. Circuit Protocol
d. None of the above
24. _________ protocol receives and holds email for an individual until they
pick it up.
a. SMPT
b. POP3
c. TCP
d. FTP
25. ________ is a protocol for creating a connection with a remote machine.
a. IRC
b. VOIP
c. Telnet
d. None of the above
27. VOIP stands for __________. It enables the transfer of voice using a
packet switched network rather than using a public switched telephone
network.
a. Voice over international protocol
b. Voice over internet protocol
c. Voice open internet protocol
d. None of the above
32. The term _________ refers to malicious programs designed with the
intention to affect the normal functionality by causing harm to the system,
or with the intention of getting unauthorized access to the system, or
denying access to legitimate users of computing resources.
a. Malware
b. Anti Virus
c. Both a) and b)
d. None of the above
34. _________ is also a malicious program like a virus. But unlike viruses, it
doesn’t need to attach itself to a host program.
a. Host
b. Worm
c. Trojan Horse
d. None of the above
37. Small text file which generally contains the name of the website that it
has come from and a unique ID tag is known as _______.
a. Inbox
b. Cookies
c. Spam
d. None of the above
40. _________ are the rights given to an individual over the invention of
their own. They usually give the creator an exclusive right over the use of
his/her creation for a certain period of time.
a. Copyright
b. Intellectual Property rights
c. Trade
d. None of the above
41. _________ is the term used for people who engaged themselves in
harmless technical experiments and fun learning activities.
a. Hacking
b. Cracking
c. Copyright
d. None of the above
12. List any two advantages and any two disadvantages of Star topology.
Answer –
Advantage of Star topology
a. if one cable or device fails then all the others will still work
b. Easy to detect fault
c. There are no network delays when adding or removing devices.
d. Each device just needs one port to connect to the hub.
Bus Topology – All of the devices in a bus topology network are connected to a
single cable, which is referred to as the network’s backbone.
15. Ms. Anjali discovered that the communication between her center and
the primary block of the school is extremely slow and signals drop quite
frequently. The distance between these two blocks is 140 meters.
a. Name the type of network.
b. Name the device which may be used for smooth communication.
Answer –
a. Local Area Network
b. Repeater
16. ABC International School is planning to connect all computers, each
spread over a distance of 50 meters. Suggest an economic cable type
having high speed data transfer to connect these computers.
Answer – Fiber Optical Cable
17. Sahil wants to transfer data across two continents at very high speed.
Write the name of the transmission medium that can be used to do the
same. Write the type of network also.
Answer – Transmission medium is Optical Fiber Cable and Network is WAN
18. Mayank wants to transfer data within a city at very high speed. Write the
name of the wired transmission medium that he should use. Write the type
of network also.
Answer – Transmission medium is Optical Fiber Cable and Network is MAN
19. Mr. Akash wants to send/receive email through the internet. Which
protocol will be used for this purpose?
Answer – SMTP (Simple Mail Transfer Protocol)
20. Answer the following questions in the context of a computer lab with
100 computers.
a. Which device is used to connect all computers inside the lab?
b. Which device is used to connect all computers to the internet using telephone
wire?
Answer –
a. Hub or Switch
b. Modem
24. Meha wants to upload hypertext documents on the internet. Write the
name of protocol, which will let her do the same.
Answer – HTTP or HTTPS helps to upload hypertext documents on the internet.
28. This protocol is used for chatting between two groups or between two
individuals. Write the name of the protocol.
Answer – IRC (Internet Relay Chat) protocol is used for chatting. It provides
chatting between a group or between two individuals.
29. This protocol is used to transfer voice using packet switched networks.
Write the name of the protocol.
Answer – VoIP (Voice Over Internet Protocol) It enables the transfer of voice
using a packet switched network rather than using a public switched telephone
network.
41. When the user browses a website, the web server sends a text file to
the web browser. What is the name of this?
Answer – As a user navigates a website, the web server transmits a text file to
the web browser in the form of cookies.
42. It is defined as a crime in which a computer and internet is used in an
illegitimate way to harm the user. What is the name of this crime?
Answer – Cybercrime
43. A person who gains unauthorized access to a computer with the
intention of causing damage. What is the name of this crime?
Answer – Hackers
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx