Worksheet-1
Networking
1) Which of the following networking topology is displayed in this diagram?
A) Star
B) Bus
C) Mesh
D) Ring
2) ______ is a 32 bit binary number. It is used to uniquely identify computers
and other resources on a TCP/IP network.
A) IP Address
B) MAC Address
C) Protocol
D) URL
3) WPA is a wireless security option. WPA stands for ______.
A) Wi-Fi Protection Area
B) Wi-Fi Protected Address
C) Wi-Fi Protected Access
D) Wi-Fi Protected Area
4) Which of the following is not a basic networking component?
A) Network interface card
B) Device Driver
C) Networking cable
D) Hubs and Switches
5) A network spanning a physical area such as a city is called a _____.
A) LAN
B) PAN
C) WAN
D) MAN
6) Which of the following devices connects a LAN to a WAN?
A) NIC
B) Bluetooth
C) Hotspot
D) Router
7) Which of the following is NOT a type of computer network - categorized by
its scope or scale?
A) LAN
B) WAN
C) KAN
D) MAN
8) An Ethernet network is also known as a ______ network.
A) Wired
B) Connector
C) Extension
D) Both [A] and [B]
9) Which of the through is share the data of two computer?
a. Library
b. Network
c. Grouping
d. Integrated system
10) When the mail server sends mail to other mail servers it becomes ___ ?
a. SMTP client
b. SMTP server
c. Peer
d. Master
11) In specific, if the systems use separate protocols, which one of the
following devices is used to link two systems?
a. Repeater
b. Gateway
c. Bridge
d. Hub
12) Which one of the following is not a network topology?
a. Star
b. Ring
c. Bus
d. Peer to Peer
13) "Parity bits" are used for which of the following purposes?
a. Encryption of data
b. To transmit faster
c. To detect errors
d. To identify the use
14) What kind of transmission medium is most appropriate to carry data in a
computer network that is exposed to electrical interferences?
a. Unshielded twisted pair
b. Optical fiber
c. Coaxial cable
d. Microwave
15) A collection of hyperlinked documents on the internet forms the ?.?
a. World Wide Web (WWW)
b. E-mail system
c. Mailing list
d. Hypertext markup language
16) The location of a resource on the internet is given by its?
a. Protocol
b. URL
c. E-mail address
d. ICQ
17) The term HTTP stands for?
a. Hyper terminal tracing program
b. Hypertext tracing protocol
c. Hypertext transfer protocol
d. Hypertext transfer program
18) proxy server is used as the computer?
a. with external access
b. acting as a backup
c. performing file handling
d. accessing user permissions
19) Which software prevents the external access to a system?
a. Firewall
b. Gateway
c. Router
d. Virus checker
20) Which one of the following is a valid email address?
a. javat@[Link]
b. [Link]
c.
[email protected] d. javatpoint@books
Note: A proper email address is a combination of the email prefix and email
domain, both in appropriate formats. The domain appears to the right side of
the @ symbol and the prefix appears to the left side of the @ symbol.
For example, in this email address javat@[Link], "javat" is the prefix, and
"[Link]" is the domain.
21) Which one of the following is the most common internet protocol?
a. HTML
b. NetBEUI
c. TCP/IP
d. IPX/SPX
22) The term FTP stands for?
a. File transfer program
b. File transmission protocol
c. File transfer protocol
d. File transfer protection