0% found this document useful (0 votes)
57 views4 pages

Class 8 Worksheet - Networking

Uploaded by

Aaryan Agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views4 pages

Class 8 Worksheet - Networking

Uploaded by

Aaryan Agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Worksheet-1

Networking
1) Which of the following networking topology is displayed in this diagram?

A) Star
B) Bus
C) Mesh
D) Ring

2) ______ is a 32 bit binary number. It is used to uniquely identify computers


and other resources on a TCP/IP network.
A) IP Address
B) MAC Address
C) Protocol
D) URL

3) WPA is a wireless security option. WPA stands for ______.


A) Wi-Fi Protection Area
B) Wi-Fi Protected Address
C) Wi-Fi Protected Access
D) Wi-Fi Protected Area

4) Which of the following is not a basic networking component?


A) Network interface card
B) Device Driver
C) Networking cable
D) Hubs and Switches

5) A network spanning a physical area such as a city is called a _____.


A) LAN
B) PAN
C) WAN
D) MAN

6) Which of the following devices connects a LAN to a WAN?


A) NIC
B) Bluetooth
C) Hotspot
D) Router

7) Which of the following is NOT a type of computer network - categorized by


its scope or scale?
A) LAN
B) WAN
C) KAN
D) MAN

8) An Ethernet network is also known as a ______ network.


A) Wired
B) Connector
C) Extension
D) Both [A] and [B]

9) Which of the through is share the data of two computer?


a. Library
b. Network
c. Grouping
d. Integrated system

10) When the mail server sends mail to other mail servers it becomes ___ ?
a. SMTP client
b. SMTP server
c. Peer
d. Master

11) In specific, if the systems use separate protocols, which one of the
following devices is used to link two systems?
a. Repeater
b. Gateway
c. Bridge
d. Hub

12) Which one of the following is not a network topology?


a. Star
b. Ring
c. Bus
d. Peer to Peer

13) "Parity bits" are used for which of the following purposes?
a. Encryption of data
b. To transmit faster
c. To detect errors
d. To identify the use

14) What kind of transmission medium is most appropriate to carry data in a


computer network that is exposed to electrical interferences?
a. Unshielded twisted pair
b. Optical fiber
c. Coaxial cable
d. Microwave

15) A collection of hyperlinked documents on the internet forms the ?.?


a. World Wide Web (WWW)
b. E-mail system
c. Mailing list
d. Hypertext markup language

16) The location of a resource on the internet is given by its?


a. Protocol
b. URL
c. E-mail address
d. ICQ
17) The term HTTP stands for?
a. Hyper terminal tracing program
b. Hypertext tracing protocol
c. Hypertext transfer protocol
d. Hypertext transfer program

18) proxy server is used as the computer?


a. with external access
b. acting as a backup
c. performing file handling
d. accessing user permissions

19) Which software prevents the external access to a system?


a. Firewall
b. Gateway
c. Router
d. Virus checker

20) Which one of the following is a valid email address?


a. javat@[Link]
b. [Link]
c. [email protected]
d. javatpoint@books
Note: A proper email address is a combination of the email prefix and email
domain, both in appropriate formats. The domain appears to the right side of
the @ symbol and the prefix appears to the left side of the @ symbol.
For example, in this email address javat@[Link], "javat" is the prefix, and
"[Link]" is the domain.

21) Which one of the following is the most common internet protocol?
a. HTML
b. NetBEUI
c. TCP/IP
d. IPX/SPX

22) The term FTP stands for?


a. File transfer program
b. File transmission protocol
c. File transfer protocol
d. File transfer protection

You might also like