You are on page 1of 3

WORK SHEET-1

SUBJECT : COMPUTER SCIENCE LESSON : COMPUTER NETWORKING


NAME :__________________________ CLASS:_______________________

I. Choose the correct answer from the given options

1. The maximum capacity of a transmission medium to transmit data over a


network connection in a given amount of time.

a. Speed c. Modulation
b. Bandwidth d. Demodulation

2. The network hardware that converts digital signals to analog and vice versa.

a. Gateway c. Hub
b. NIC d. Modem

3. Fiber optic cables use ----- signals to transfer data.

a. Electric c. Magnetic
b. Light d. Sound

4. ------ network device facilitates transfer of data by finding the best route for
data packets over the network.

a. Switch c. Hub
b. Router d. Gateway

5. ------ network device that allows data to flow between two networks that
may use different protocols.

a. Moden c. Switch
b. Router d. Gateway

6. The network architecture in which all other computers request service from
one/more powerful computer/s on the network.

a. Peer to Peer c. Client Server


b. Star Topology d. Local Area Network

Page 1 of 3
7. Email protocol that deletes the messages from the mail server after
downloading to your computer

a. SMTP c. IMAP
b. POP3 d. FTP

8. Email protocol that defines how information and messages are routed from
one device to another in a network.

a. SMTP c. TCP/IP
b. HTTP d. FTP

9. The wireless networking technology that enables wireless communication


between low-power communication devices within a short range.

a. Bluetooh c. Infrared
b. Wi-Fi d. Satellite

10. The company that provides internet access based on a monthly payment.

a. DNS c. URL
b. TCP/IP d. ISP

II. Give the Full Forms Of

1. HTTP
2. TCP/IP
3. Wi-Fi
4. PAN
5. WAN
6. MAN
7. LAN
8. CAN
9. NIC
10. POP3
11. IMAP
12. SMTP
13. ISP
14. DNS
15. URL
Page 2 of 3
III. Match the following

1. Transfer of data packets a. FTP

2. File uploading and downloading b. SMTP

3. Sending mails c. HTTP

4. Accessing Mails d. TCP/IP

5. Transfer of Webpages e. IMAP

IV. Identify the Topology Used

Network Topology

Page 3 of 3

You might also like