0% found this document useful (0 votes)
31 views11 pages

XI IT Part B Practice Set 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views11 pages

XI IT Part B Practice Set 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Questions

I. Multiple Choice Questions


1. What does LAN stand for?
a) Local Area Network
b) Large Area Network
c) Long Area Network
d) Limited Area Network

2. Which device connects different networks together?


a) Hub
b) Switch
c) Router
d) Repeater

3. What is the full form of HTML?


a) Hyper Text Markup Language
b) High Tech Markup Language
c) Hyperlinks and Text Markup Language
d) Home Tool Markup Language

4. Which tag is used to define the main content of an HTML document?


a) <head>
b) <body>
c) <main>
d) <content>

5. What is the correct HTML tag for the largest heading?


a) <heading>
b) <h6>
c) <head>
d) <h1>

6. What is the purpose of the <title> tag in HTML?


a) To define a title for the HTML document
b) To create a title for a table
c) To specify a title for an image
d) To set a title for a paragraph
7. Which of the following is NOT a component of data communication?
a) Message
b) Sender
c) Receiver
d) Protocol
e) Database

8. What is the term for the amount of data that can be transferred over a network in a specific
amount of time?
a) Data transfer rate
b) Bandwidth
c) Latency
d) Throughput

9. Which network type typically covers a radius of up to 10 meters?


a) LAN
b) MAN
c) WAN
d) PAN

10. What device connects two networks that may be working with different networking
models?
a) Router
b) Switch
c) Hub
d) Gateway

11. Which of the following is NOT a type of malware?


a) Virus
b) Worm
c) Trojan horse
d) Firewall

12. What technique involves attempting to acquire sensitive information by posing as a


trustworthy entity?
a) Spamming
b) Phishing
c) Denial of Service
d) Malware

II. True or False Questions


1. A router is used to connect different networks.
2. HTTP is a secure protocol for data transfer.
3. The <table> tag is used to create tables in HTML.
4. The <img> tag requires a closing tag.
5. CSS stands for Cascading Style Sheets.
6. HTML comments are visible on the webpage.
7. A computer network is a group of devices connected with each other through different
transmission mediums such as cables, radio waves, satellites etc.
8. Bandwidth and data transfer rate mean the same thing.
9. IP addresses are represented as 4 octets of numbers from 0-255.
10. A hub is more efficient than a switch because it sends data packets to all connected
devices.
11. The internet is an example of a Local Area Network (LAN).
12. A firewall aims at protecting the internal network of an organization, home, or individual
from malicious traffic from external networks.

III. Fill in the Blanks


1. The device that connects different networks together is called a _______.
2. The full form of IP is _______.
3. In HTML, the _______ tag is used to define a paragraph.
4. _______ tag is used to define the title of a webpage.
5. A ________ is a group of devices connected with each other through some transmission
medium.
6. The physical path by which a message travels from sender to receiver is called the
________ medium.
7. The amount of data that can be transferred over a network in a specific amount of time is
termed as ________.
8. A ________ is a hardware device that allows a computer or another device to connect to
the Internet by converting analog signals to digital and vice versa.

IV. Short Answer Questions


1. Explain the concept of networking and describe the five main components of data
communication. How do these components work together to enable information sharing over
a network?
2. Compare and contrast LAN, MAN, and WAN networks. Provide examples of each type of
network and discuss their key characteristics, advantages, and limitations.

3. Discuss the various network devices like modems, routers, hubs, and switches. Explain
their functions and how they differ from each other in terms of data handling and network
management.

4. What are some common network security threats? Describe at least three types of threats
in detail and explain the security measures that can be implemented to protect against them.

5. Differentiate between:
a) Modem and Router
b) Hub and Switch

6. Write code for a basic HTML document.

7. Describe the purpose of the <head> and <body> sections in an HTML document.
Solutions:
I. Multiple Choice Questions

1. What does LAN stand for?


a) LOCAL AREA NETWORK

Explanation: LAN stands for LOCAL AREA NETWORK. It is a computer network that interconnects
computers within a limited area such as a residence, school, laboratory, university campus or office
building.

2. Which device connects different networks together?


c) ROUTER

Explanation: A ROUTER is a networking device that forwards data packets between computer
networks. It is designed to connect different networks together, allowing communication between
them.

3. What is the full form of HTML?


a) HYPER TEXT MARKUP LANGUAGE

Explanation: HTML stands for HYPER TEXT MARKUP LANGUAGE. It is the standard markup
language for creating web pages and web applications.

4. Which tag is used to define the main content of an HTML document?


b) <BODY>

Explanation: The <BODY> tag defines the document's body, which contains all the visible contents,
such as headings, paragraphs, images, hyperlinks, tables, lists, etc.

5. What is the correct HTML tag for the largest heading?


d) <H1>

Explanation: The <H1> tag is used to define the largest and most important heading in HTML.
Heading tags range from <H1> to <H6>, with <H1> being the largest.

6. What is the purpose of the <title> tag in HTML?


a) To DEFINE A TITLE FOR THE HTML DOCUMENT

Explanation: The <TITLE> tag is used to specify a title for the HTML page. This title is shown in the
browser's title bar or page's tab.

7. Which of the following is NOT a component of data communication?


e) DATABASE

Explanation: The five main components of data communication are MESSAGE, SENDER,
RECEIVER, TRANSMISSION MEDIUM, and PROTOCOL. A database is not a fundamental
component of data communication.

8. What is the term for the amount of data that can be transferred over a network in a specific
amount of time?
b) BANDWIDTH

Explanation: BANDWIDTH refers to the maximum rate of data transfer across a given path. It
represents the capacity of the communication channel.

9. Which network type typically covers a radius of up to 10 meters?


d) PAN

Explanation: A PERSONAL AREA NETWORK (PAN) typically covers a very short range, usually up
to 10 meters. It's used for connecting personal devices like smartphones, laptops, and wearables.

10. What device connects two networks that may be working with different networking models?
d) GATEWAY

Explanation: A GATEWAY is a networking device that connects two different networks that may use
different protocols. It acts as a "gate" between the two networks, translating data between them.

11. Which of the following is NOT a type of malware?


d) FIREWALL

Explanation: A FIREWALL is a network security device that monitors and filters incoming and
outgoing network traffic. It is not a type of malware, but rather a protection against malware.

12. What technique involves attempting to acquire sensitive information by posing as a trustworthy
entity?
b) PHISHING

Explanation: PHISHING is a cybercrime where attackers pose as legitimate institutions to trick


individuals into providing sensitive data such as banking details, passwords, or credit card numbers.

II. True or False Questions

1. A router is used to connect different networks.


TRUE

Explanation: Routers are designed to connect different networks and route data between them.

2. HTTP is a secure protocol for data transfer.


FALSE

Explanation: HTTP (Hypertext Transfer Protocol) is not secure. HTTPS (HTTP Secure) is the secure
version.

3. The <table> tag is used to create tables in HTML.


TRUE

Explanation: The <TABLE> tag is indeed used to create tables in HTML documents.

4. The <img> tag requires a closing tag.


FALSE

Explanation: The <IMG> tag is a self-closing tag in HTML and does not require a closing tag.

5. CSS stands for Cascading Style Sheets.


TRUE

Explanation: CSS is an acronym for CASCADING STYLE SHEETS, a style sheet language used for
describing the presentation of a document written in HTML or XML.

6. HTML comments are visible on the webpage.


FALSE

Explanation: HTML comments are not visible on the rendered webpage. They are only visible in the
source code.
7. A computer network is a group of devices connected with each other through different
transmission mediums such as cables, radio waves, satellites etc.
TRUE

Explanation: This accurately describes what a computer network is.

8. Bandwidth and data transfer rate mean the same thing.


FALSE

Explanation: While related, BANDWIDTH refers to the maximum theoretical data transfer capacity,
while DATA TRANSFER RATE is the actual speed at which data is transferred.

9. IP addresses are represented as 4 octets of numbers from 0-255.


TRUE

Explanation: This describes the format of IPv4 addresses, which consist of four octets separated by
dots.

10. A hub is more efficient than a switch because it sends data packets to all connected devices.
FALSE

Explanation: A SWITCH is more efficient than a HUB because it sends data only to the intended
recipient, while a hub broadcasts to all connected devices.

11. The internet is an example of a Local Area Network (LAN).


FALSE

Explanation: The INTERNET is a global WIDE AREA NETWORK (WAN), not a Local Area Network.

12. A firewall aims at protecting the internal network of an organization, home, or individual from
malicious traffic from external networks.
TRUE

Explanation: This accurately describes the primary purpose of a FIREWALL.

III. Fill in the Blanks

1. The device that connects different networks together is called a ROUTER.


2. The full form of IP is INTERNET PROTOCOL.

3. In HTML, the <P> tag is used to define a paragraph.

4. <TITLE> tag is used to define the title of a webpage.

5. A NETWORK is a group of devices connected with each other through some transmission
medium.

6. The physical path by which a message travels from sender to receiver is called the
TRANSMISSION medium.

7. The amount of data that can be transferred over a network in a specific amount of time is termed
as BANDWIDTH.

8. A MODEM is a hardware device that allows a computer or another device to connect to the
Internet by converting analog signals to digital and vice versa.

IV. Short Answer Questions

1. Networking concept and components of data communication:

NETWORKING refers to the interconnection of computing devices to share resources and


information. The FIVE MAIN COMPONENTS of data communication are:

- MESSAGE: The information to be communicated


- SENDER: The device sending the message
- RECEIVER: The device receiving the message
- TRANSMISSION MEDIUM: The physical path of the message
- PROTOCOL: Rules governing the data transmission

These components work together by allowing the SENDER to encode a MESSAGE, transmit it
through a TRANSMISSION MEDIUM using agreed-upon PROTOCOLS, and enabling the
RECEIVER to decode and interpret the message.

2. Comparison of LAN, MAN, and WAN:


- LOCAL AREA NETWORK (LAN): Covers a small area (building/campus), high-speed, privately
owned.
Example: Office network
Advantage: Fast data transfer
Limitation: Limited geographical area

- METROPOLITAN AREA NETWORK (MAN): Covers a city, medium speed, can be publicly or
privately owned.
Example: City-wide government network
Advantage: Connects multiple LANs
Limitation: More complex than LAN

- WIDE AREA NETWORK (WAN): Covers large geographical areas, lower speed, often uses public
networks.
Example: Internet
Advantage: Global connectivity
Limitation: Can be slower and less secure than LAN/MAN

3. Network devices and their functions:

- MODEM: Converts digital signals to analog and vice versa for transmission over telephone lines.
- ROUTER: Forwards data packets between computer networks, deciding the best path.
- HUB: Connects multiple devices in a network, broadcasting data to all connected devices.
- SWITCH: Similar to a hub but more intelligent, sending data only to the intended recipient.

These devices differ in their data handling:


- Modems handle signal conversion
- Routers handle packet routing
- Hubs broadcast indiscriminately
- Switches direct traffic efficiently

4. Common network security threats:

- VIRUSES: Malicious programs that replicate and spread


- PHISHING: Fraudulent attempts to obtain sensitive information
- DENIAL OF SERVICE (DoS): Overwhelming a system to make it unavailable

Security measures:
- Antivirus software
- Firewalls
- Regular software updates
- User education on security practices

5. Differentiation:

a) Modem vs Router:
- MODEM: Converts digital to analog signals and vice versa
- ROUTER: Directs network traffic between different networks

b) Hub vs Switch:
- HUB: Broadcasts data to all connected devices
- SWITCH: Intelligently directs data only to intended recipients

6. Basic HTML document code:

<html>
<!DOCTYPE html>
<head>
<title>Basic HTML Document</title>
</head>
<body>
<h1>Hello, World!</h1>
<p>This is a basic HTML document.</p>
</body>
</html>

7. Purpose of <head> and <body> sections in HTML:

The <HEAD> section contains meta-information about the HTML page, such as the title, character
encoding, and links to external resources. It is not displayed in the browser window.

The <BODY> section contains the visible content of the HTML page, including text, images, and
other elements that are rendered by the browser.

You might also like