0% found this document useful (0 votes)
176 views17 pages

Part B Unit 1 MCQ and Ques

Part B unit 1 mcq and question answers of class 11 web application

Uploaded by

shivaninja2257
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
176 views17 pages

Part B Unit 1 MCQ and Ques

Part B unit 1 mcq and question answers of class 11 web application

Uploaded by

shivaninja2257
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

CLASS 11 WEB APPLICATION CODE :803

MCQ AND QUES ANS

1. ________ is a collection of
independent computers that communicate with one another over a
shared network medium.
a. Network
b. Connection
c. Computer
d. None of the above

2. ________ is a computer that facilitates sharing of data, software and


hardware resources on the network.
a. Computer
b. Server
c. Hub
d. Router

3. _________ is a device that helps to establish communication between


the server and workstations.
a. Network Interface Unit
b. Network Interconnection Unit
c. Network Medium Unit
d. None of the above

4. ________ is a technique in which a dedicated and complete physical


connection is established between two nodes for communication.
a. Packet Switching
b. Circuit Switching
c. Both a) and b)
d. None of the above

5. ________ is a switching technique in which packets are routed


between nodes over data links shared with other traffic.
a. Packet Switching
b. Circuit Switching
c. Both a) and b)
d. None of the above

6. _________ is a medium that is used in the transmission of a message


from one point to another.
a. Channel
b. Bandwidth
c. Method
d. All of the above

7. __________ is a computer network organized around an individual


person.
a. Personal Area Network
b. Local Area Network
c. Wide Area Network
d. Metropolitan Area Network

8. ________ is a network in which the devices are connected over a


relatively short distance.
a. Personal Area Network
b. Local Area Network
c. Wide Area Network
d. Metropolitan Area Network

9. _________ is a network which spans a physical area ( in the range of


5 and 50 km diameter) that is larger than a LAN but smaller than a
WAN.
a. Personal Area Network
b. Local Area Network
c. Wide Area Network
d. Metropolitan Area Network

10. ________ is a network which spans a large geographical area, often a


country or a continent.
a. Personal Area Network
b. Local Area Network
c. Wide Area Network
d. Metropolitan Area Network
11. _______ is a device that enables a computer to transmit data over
telephone or cable lines. RJ-45: An eight wired connector used to
connect computers on a LAN.
a. Modem
b. Hub
c. Router
d. Switch

12. _________ is a kind of network adapter.


a. Sound card
b. Graphics card
c. Ethernet card
d. None of the above

13. ______ is a small hardware device that joins


multiple computers together within a LAN.
a. Modem
b. Hub
c. Router
d. Switch

14. _______ is an electronic device that amplifies the received signal and
then retransmits it on the network.
a. Modem
b. Hub
c. Repeater
d. Switch

15. _______ is a network device that connects two networks with different
protocols.
a. Modem
b. Router
c. Repeater
d. Switch
16. _______ is a network device that connects two dissimilar networks.
a. Modem
b. Gateway
c. Repeater
d. Switch
17. ________ is a small, portable card that allows your computer to
connect to the internet through a wireless network.
a. Wi-Fi card
b. Wi-Max card
c. Network card
d. None of the above

18. Protocol: A special set of rules that two or more machines on a network
follow to communicate with each other.
a. Device
b. Protocol
c. Method
d. None of the above

19. _________ protocol breaks the data into packets that the network can
handle efficiently.
a. File Transfer Protocol
b. Transmission Control Protocol
c. Circuit Protocol
d. None of the above

20. ___________ is used for transferring (downloading or uploading) files


from one system to another on the internet.
a. File Transfer Protocol
b. Transmission Control Protocol
c. Circuit Protocol
d. None of the above
21. _________ protocol is used for transferring hypertext files on the World
Wide Web.
a. File Transfer Protocol
b. Hypertext Transfer Protocol
c. Transmission Control Protocol
d. None of the above

22. ________ protocol is used for communication between


two computers using a serial interface.
a. Client Server Protocol
b. Point Transfer Protocol
c. Point-to-Point Protocol
d. None of the above

23. ________ protocol allows transmission of email over the Internet.


a. SMTP
b. POP3
c. TCP
d. FTP

24. _________ protocol receives and holds email for an individual until they
pick it up.
a. SMPT
b. POP3
c. TCP
d. FTP
25. ________ is a protocol for creating a connection with a remote machine.
a. IRC
b. VOIP
c. Telnet
d. None of the above

26. ______ protocol is used for chatting. It is based on a client/server


model.
a. IRC
b. VOIP
c. Telnet
d. None of the above

27. VOIP stands for __________. It enables the transfer of voice using a
packet switched network rather than using a public switched telephone
network.
a. Voice over international protocol
b. Voice over internet protocol
c. Voice open internet protocol
d. None of the above

28. A ___________ address is a unique 12 digit (6 digits for manufacturer


code and 6 digits for serial number) hexadecimal number assigned to each
NIC. The MAC address of an NIC never changes.
a. MAC (Media Access Control)
b. IP (Internet Protocol)
c. FTP (File Transfer Protocol)
d. None of the above

29. An _________ address is a unique 4 digit hexadecimal number assigned


to each node on a network.
a. MAC (Media Access Control)
b. IP (Internet Protocol)
c. FTP (File Transfer Protocol)
d. None of the above

30. Domain Name is a name assigned to a server through _________. A


domain name usually has more than one part: top level domain name or
primary domain name and sub-domain name(s).
a. Damian Next System
b. Domain Nerve System
c. Domain Name System
d. None of the above
31. ___________ is the process of getting corresponding IP addresses from
a domain name.
a. Damian Next System
b. Domain Name Resolution
c. Domain Name System
d. None of the above

32. The term _________ refers to malicious programs designed with the
intention to affect the normal functionality by causing harm to the system,
or with the intention of getting unauthorized access to the system, or
denying access to legitimate users of computing resources.
a. Malware
b. Anti Virus
c. Both a) and b)
d. None of the above

33. __________ is a malicious program that attaches itself to the host


program. It is designed to infect the host program and gain control over the
system without the owner’s knowledge.
a. Virus
b. Anti Virus
c. Trojan Horse
d. None of the above

34. _________ is also a malicious program like a virus. But unlike viruses, it
doesn’t need to attach itself to a host program.
a. Host
b. Worm
c. Trojan Horse
d. None of the above

35. _________ is a program that contains hidden malicious functions.


Trojan Horses trick users into installing them by appearing to be legitimate
programs.
a. Host t
b. Worm
c. Trojan Horse
d. None of the above

36. Unwanted messages or emails are known as _________.


a. Inbox
b. Trash
c. Spam
d. None of the above

37. Small text file which generally contains the name of the website that it
has come from and a unique ID tag is known as _______.
a. Inbox
b. Cookies
c. Spam
d. None of the above

38. A ________ is hardware or software based network security system. It


prevents unauthorized access (hackers, viruses, worms etc.) to or from a
network.
a. Password
b. Firewall
c. Network Security
d. None of the above

39. _______ is defined as a crime in which a computer and internet is used


in an illegitimate way to harm the user.
a. Password
b. Cyber crime
c. Network Security
d. None of the above

40. _________ are the rights given to an individual over the invention of
their own. They usually give the creator an exclusive right over the use of
his/her creation for a certain period of time.
a. Copyright
b. Intellectual Property rights
c. Trade
d. None of the above

41. _________ is the term used for people who engaged themselves in
harmless technical experiments and fun learning activities.
a. Hacking
b. Cracking
c. Copyright
d. None of the above

42. _________ can be defined as a method by which a person gains


unauthorized access to a computer with the intention of causing damage.
a. Hacking
b. Cracking
c. Copyright
d. None of the above

1. What is a network? Give any two uses of having a network in your


school computer lab.
Answer – Computer networking is the term for a network of
connected computers that may communicate and share resources. These
networked devices transmit data through wireless or physical technologies using
a set of guidelines known as communications protocols.
The two uses of having a network in school computer lab are –
a. Instead of using floppy discs or Zip drives, network file sharing across PCs
gives you greater flexibility. You can exchange documents, music, and images
over a network to save copies of your important material on different computers.
b. Students can access the internet simultaneously over a computer network by
sharing internet access.

2. Mention any two disadvantages of a network.


Answer –
a. It can be expensive to buy the file servers and network cabling.
b. Managing a large network is complicated
3. What are the requirements for setting up a network?
Answer – The requirements for setting up a network are –
a. At least two computer – Server or Client workstation
b. Communication medium like Twisted Pair Wire, Fiber Optical Cable or any
wireless signal etc.
c. Operating System which support Network

4. How is a dedicated server different from a non dedicated server?


Answer –
a. Dedicated Servers – These are generally used on big network installations
where one computer is reserved for the server’s job. It helps all nodes access
data, software and hardware resources.
b. Non dedicated servers – In small networks, a workstation can double up as
a server. These servers are known as non dedicated servers. The small networks
using such a server are known as Peer to Peer networks.

5. Define a channel. Name the three categories


of communication channels.
Answer – A communication channel is a medium that is used in the
transmission of a message from one point to another. In simple terms we can say
that it is a pathway over which data is transferred between remote devices.
Examples of three categories of communication channels are optical fiber,
coaxial cable or twisted pair wire.
6. What do you mean by bandwidth and DTR?
Answer –
a. Bandwidth – The frequency range that is available for data transmission in
electronic communication is referred to as the bandwidth. It is measured as the
difference between the highest and lowest frequencies in Hertz (Hz).

b. DTR – The amount of digital data transferred through a network in a


predetermined amount of time is known as the data transfer rate (DTR). As
previously studied, the data transfer rate increases with the bandwidth of a
particular medium.

7. Two companies in different states wanted to transfer information. Which


type of network will be used to implement the same?
Answer – They have to use Wide Area Network
8. Two schools in the same city wanted to transfer e-learning information.
Which type of network will be used to implement the same?
Answer – Wide Area Netware

9. Two teachers in the same school sitting in different labs wanted to


transfer information. Which type of network will be used to implement the
same?
Answer – Local Area Network

10. What do you mean by a transmission medium? Differentiate between


guided and unguided transmission media.
Answer – A transmission medium refers to the channel of transmission through
which data transmitted from one node to another in the form of signal.
a. Guided medium – Physical conductors like twisted pairs, coaxial cable, and
fiber optics are referred to by this phrase. The signal travels as voltage and
current in coaxial and twisted pair cable, but it travels as light in optical fiber.

b. Unguided medium – Electromagnetic waves, which are used by the unguided


medium, don’t need a physical conductor to work. Microwave, radio wave, and
infrared are a few examples of unguided media.

11. Define the term topology.


Answer – The network’s topology describes how all of the components are
connected to one another. There are two types of topology – Broadcast and
point-to-point topology.

12. List any two advantages and any two disadvantages of Star topology.
Answer –
Advantage of Star topology
a. if one cable or device fails then all the others will still work
b. Easy to detect fault
c. There are no network delays when adding or removing devices.
d. Each device just needs one port to connect to the hub.

Disadvantage of Star topology


a. Requires more cable than a bus or ring topology
b. More expensive than the bus or ring topology
c. If Switch will not work than network will not work
d. Extra hardware is required like hubs or switch
13. How is Tree Topology different from Bus topology?
Answer –
Tree Topology – It is a hierarchical topology in which each branch may have
one or more fundamental topologies, such as the star, ring, and bus.

Bus Topology – All of the devices in a bus topology network are connected to a
single cable, which is referred to as the network’s backbone.

14. Identify the type of topology from the following.


a. Each node is connected with the help of a single cable.
b. Each node is connected with the help of independent cable with central
switching.
Answer –
a. Bus Topology
b. Star Topology

15. Ms. Anjali discovered that the communication between her center and
the primary block of the school is extremely slow and signals drop quite
frequently. The distance between these two blocks is 140 meters.
a. Name the type of network.
b. Name the device which may be used for smooth communication.
Answer –
a. Local Area Network
b. Repeater
16. ABC International School is planning to connect all computers, each
spread over a distance of 50 meters. Suggest an economic cable type
having high speed data transfer to connect these computers.
Answer – Fiber Optical Cable
17. Sahil wants to transfer data across two continents at very high speed.
Write the name of the transmission medium that can be used to do the
same. Write the type of network also.
Answer – Transmission medium is Optical Fiber Cable and Network is WAN

18. Mayank wants to transfer data within a city at very high speed. Write the
name of the wired transmission medium that he should use. Write the type
of network also.
Answer – Transmission medium is Optical Fiber Cable and Network is MAN
19. Mr. Akash wants to send/receive email through the internet. Which
protocol will be used for this purpose?
Answer – SMTP (Simple Mail Transfer Protocol)

20. Answer the following questions in the context of a computer lab with
100 computers.
a. Which device is used to connect all computers inside the lab?
b. Which device is used to connect all computers to the internet using telephone
wire?
Answer –
a. Hub or Switch
b. Modem

21. Name the device that establishes an intelligent connection between a


local network and external network with completely different structures.
Answer – A Bridge is a device that creates an intelligent link between a local
network and an external network with totally unrelated structures.
2. Name the network device that works like a bridge to establish connection
between two networks but it can also handle networks with different
protocols.
Answer – Gateway is just like a bridge and capable of handling networks with
different protocols.
23.Neha wants to upload and download files from/to a remote
internal server. Write the name of the relevant communication protocol,
which will let her do the same.
Answer – File Transfer Protocols are used to download files from remote
internal servers.

24. Meha wants to upload hypertext documents on the internet. Write the
name of protocol, which will let her do the same.
Answer – HTTP or HTTPS helps to upload hypertext documents on the internet.

25. This protocol is used for communication between two


personal computers using a serial interface and connected by a phone
line. Write the name of the protocol.
Answer – PPP (Point-to-Point Protocol) is a protocol for serial
interface communication between two computers.
26. This protocol is used to transfer email over the internet. What is the
name of the protocol?
Answer – Email messages are transmitted over the Internet using the Simple
Mail Transfer Protocol (SMTP). Most email clients utilize this protocol to send
messages to the server, and servers also use it to transfer messages to their
intended recipients.
27. This protocol is used to implement remote login. What is the name of
the protocol?
Answer – Telnet is the main internet protocol for creating a connection with a
remote machine. It allows you to connect to remote computers (called remote
hosts) over a TCP/IP network (such as the Internet).

28. This protocol is used for chatting between two groups or between two
individuals. Write the name of the protocol.
Answer – IRC (Internet Relay Chat) protocol is used for chatting. It provides
chatting between a group or between two individuals.

29. This protocol is used to transfer voice using packet switched networks.
Write the name of the protocol.
Answer – VoIP (Voice Over Internet Protocol) It enables the transfer of voice
using a packet switched network rather than using a public switched telephone
network.

30. Explain Remote Access Protocol.


Answer – Telnet is the main internet protocol for creating a connection with a
remote machine. It allows you to connect to remote computers (called remote
hosts) over a TCP/IP network (such as the Internet).

31. Why do we need VoIP protocol?


Answer – VoIP (Voice Over Internet Protocol) helps to make voice calls using a
broadband Internet Connection. This method of making phone calls is much
cheaper than the conventional way because the service of Telecommunication
Company is not used.

32. Differentiate between FTP and HTTP.


Answer – HTTP is designed for transferring a hypertext among two or more
systems. HTML tags are used for creating links. These links may be in any form
like text or images. FTP allows users to transfer files from one machine to
another. Types of files may include program files, multimedia files, text files, and
documents, etc.
33. Differentiate between VoIP and IRC.
Answer – By using VOIP , phone calls can be done using standard internet
connection. This method of making phone calls is much cheaper. IRC protocol is
used for chatting. It provides chatting between a group or between two
individuals.

34. Explain the three types of web architecture


Answer – Web Architecture can be defined as the conceptual structure of the
internet. The WWW or internet is a constantly changing medium that
enables communication between different users and the technical interaction
between different systems and subsystems.
a. Client-server model – Web consisted of a two-tiered architecture: clients
and servers. Clients and
servers shared the tasks and services that the system was supposed to perform.
Example – Web server
b. Three-tier model – Three-tier models include an application logic between the
client and the server, which
handles the data processing and allows a certain degree of interaction. Example
– Data servers storing and retrieving data logically.
c. Service-oriented architectures (SOA) – With SOAs, business processes can
be automated by the involved systems communicating with one another – partly
without human intervention – and performing certain tasks. Example – e-
commerce, online banking, e-learning etc.

35. Differentiate between IP address and MAC address.


Answer – The IP address of a device is important for determining a network’s
connection (using which the device is connecting to the network). On the other
hand, the MAC Address guarantees the computer device’s exact location. It
enables us to uniquely identify a certain device on the accessible network.
36. Differentiate between Worm and Virus
Answer – The main distinction between a worm and a virus is that worms are
standalone hostile programmes that may self-replicate and spread after they
have infiltrated the system, whereas viruses must be activated by their host.

37. Explain the significance of the IT Act.


Answer – IT Act 2000 named Information Technology Amendment Act,2008 was
introduced. The act also defines offenses and penalties for cyber-crime. Cyber
police are responsible for detecting such crimes and taking the necessary
measures against it according to the IT Act.
a. Tampering with computer source documents – Section 65
b. Hacking -Section 66
c. Publishing of information which is obscene in electronic form -Section 67

38. Explain the following terms: Patent Copyright Trademark


Answer –
a. Patent – The word “patent” refers to a particular product created by an
individual. For a set amount of time, the designer is granted sole ownership of
the patent. The owner can prevent others from creating, using, or selling the
product design with the use of the patent right.

b. Trademark – Any word, phrase, symbol, design, or combination of these that


distinguishes your products or services might be considered a trademark.
Customers use it to recognize you in the marketplace and set you apart from
your rivals. Both trademarks and service marks are included under the umbrella
term “trademark.”

c. Copyright – A written document is referred to as having copyright. The


violation of copyrights may result in legal action. The following type of work is
eligible for copyright protection. written works any accompanying words for
musical works

39. Differentiate between hacking and cracking


Answer – Hackers utilize their own legitimate tools to assess network stability,
create security, and defend a business from online dangers. The tools used by
Crackers are not their own. They utilize other people’s tools to commit crimes,
damage systems, and compromise privacy.

40. Rohan wants to prevent unauthorized access to/from his company’s


local area network. Write the name of the system, which he should install to
do the same.
Answer – To prevent from unauthorized access rohan should install Firewall

41. When the user browses a website, the web server sends a text file to
the web browser. What is the name of this?
Answer – As a user navigates a website, the web server transmits a text file to
the web browser in the form of cookies.
42. It is defined as a crime in which a computer and internet is used in an
illegitimate way to harm the user. What is the name of this crime?
Answer – Cybercrime
43. A person who gains unauthorized access to a computer with the
intention of causing damage. What is the name of this crime?
Answer – Hackers

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

You might also like