You are on page 1of 7

I.

Fill in the blanks:

1. Communication channel media is a communication path through which the data is


transmitted from the sender device to the receiver device.

2.The number of changes in a signal per second is known as Band/bps

3.The amount of data that can be passed along a communication channel in a given period of
time (1 second) is termed as Data transfer rate

4.Communication media is the way of transmitting the signal from one place to another.
Communication media is also known as Transmission media

5. Data transfer rate is the amount of data transferred in one direction over a link divided by the
time taken to transfer it in bits per second (bps).

6.128 bits(16 byte) the size of IPv6 address.

7. Cookies are small text files contain some browsing information.

8. Media Access Control (MAC) _address refers physical address assigned to NIC.

9.Your friend complaints that somebody has created a feck profile on Facebook and defaming
her character with abusive comments and pictures. the type of cybercrime for these situations is
cyber bullying .

10. e-commerce is the buying and selling of goods and services, or the transmitting of funds or
data over an electronic network, primarily the internet.

11.A server that provides its services to other workstations on a network is a Network server

12. Fiber optic cable cables transmits light signals rather than electrical signals.

13. The cable TV uses Coaxial cable type of cables

14.Through network or internet you can establish contact with anyone in the world.

15.The main function of TCP is to divide the message or data into packets of a definite size on
the source computer.

16. Wi-Fi refers to wireless fidelity which enables us to connect to the ISP without any cable.

17. WWW is a software that enables us to access the internet and explore websites.
18.Web page constitutes the website
19. A hacker is someone with a strong interest in how things work, who likes to create and
modify things for their own enjoyment.

20. A computer virus is a small software program that spreads from one computer to another
and interferes with the normal functioning of computer.

21. Electronic junk mail or junk newsgroup postings are known as Spamming

22. Digital signature meets the need for security and integrity.

23. The first network that planted the seed of internet was ARPANET.

24. The protocol used for internet is TCP/IP

25. A device used to connect dissimilar networks is called Gateway

26. IP is responsible for handling the address of the destination computer so that each packet is
delivered to its proper destination.

27. Tricking people through authentic-looking emails or websites is called Phishing.

28. A program designed to replicate and eat up a computer’s storage is called worms .

29. A digital document issued to a site by a certification authority of the internet is called a
Digital signature .

30. To connect computers located in a specific building or campus is known as Local area
network (LAN)

31. Wi-Fi, infrared and Bluetooth are examples of Wireless /unguided medium.

32. Interspace is a software

33. A server that provides its services to other workstations on a network is a Network server .

34. The techniques of switching in which data is fragmented into smaller techniques is called
Packet switching

35. circuit switching is a dedicated line between the caller and the sender.

36. Bits per second is the measuring unit of speed at which the data transfer takes place.

37. All the computers are connected with each other in an unorganized manner in topology
MESH
38. In Peer-to-peer networking all computers share equivalent responsibility for processing
data

39. Expand UDP…USER DATAGRAM PROTOCOL

40. The cable TV uses Coaxial cable type of cables

II. State whether the following statements are True or False.

1. A set of rules that governs internet is called protocol. T

2.A repeater handles different protocols. F

3. A hub is known as an intelligent device on the network. F

4. A location on a net server is called a website. T

5. A document that uses HTTP is called a web page. T

6. A switch is a device used to segment networks into sub-networks or subnets. T

7. Email is sending and receiving messages through videoconferencing. F

8. The degeneration of a signal over a distance on a network is called attenuation. T

9. Coaxial cable possesses higher tensile strength than optical fibre. T

10. When two entities are communicating and do not want a third party to listen, this situation is
defined as secure communication. T

III. Multiple Choice Questions (MCQs)

1. A computer network:
(i) Is a collection of hardware components and computers
(ii) Is interconnected by communication channels
(iii) Allows sharing of resources and information
(iv) All of the above

2. What is a firewall in computer network?


(i) The physical boundary of network
(ii) An operating system of computer network
(iii) A system designed to prevent unauthorized access
(iv) A web browsing software

3. What is the use of Bridge in the network?


(i) To connect LANs
(ii) To separate LANs
(iii) To control network speed
(iv) All of the above

4. Each IP packet must contain:


(i) Only Source address
(ii) Only Destination address
(iii) Source and Destination address
(iv) Source or Destination address

5. Which of these is not a communication channel?


(i) Satellite (ii) Microwave (iii) Radio wave (iv) Wi-Fi

6. MAN Stands for .................... .


(i) Metropolitan Area Network (ii) Main Area Network
(iii) Metropolitan Access Network (iv) Metro Access Network

7. Which of these is not an example of unguided media?


(i) Optical Fibre Cable (ii) Radio wave (iii) Bluetooth (iv) Satellite

8. In which topology are all the nodes connected through a single Coaxial cable? (i) Star (ii)
Tree (iii) Bus (iv) Ring

9. Which of the following is the smallest network?


(i) WAN (ii) MAN (iii) LAN (iv) Wi-Fi

10. Which protocol is used for the transfer of hypertext content over the web? (i) HTML (ii)
HTTP (iii) TCP/IP (iv) FTP

IV. Identify the following network device:

1. It is an electronic device that enables a computer to transmit data over telephone lines.
MODEM

2. It is a standard type of connector for network cables. They are the plug-in devices used in
networking and telecommunication applications. They are used primarily for connecting
LANs, particularly Ethernet. RJ45

3. It is a hardware device that helps in the connection of nodes within a network. It is also
known as a network card, network adapter or NIC NIU/TAD/ETHERNET
4. It is a device that operates only on the physical layer of the OSI model. As a signal
travels a fixed distance, before attenuation of the signal it is used which amplifies and
restores signals for long-distance transmission. Repeaters

5. It is used in a desktop computer that enable a user to establish an internet connection.


WIFICARD

V. Identify the type of network based on the technology or media used

1. Microwave Satellite WAN


2. Infrared, Bluetooth PAN
3. Ethernet, Wi-Fi LAN
4. Optical fiber, Radio Wave, Microwave WAN/MAN
5. It is also called campus network LAN

VI. Identify the type of topology

1. In this topology, all or some of the devices are connected to the central hub, called an
active hub, and some of the devices are connected to the secondary hub, which may be an
active hub or passive hub. TREE topology

2. In this topology, each computer is connected with the other computer. There is a point-to-
point link between each dedicated node (workstation).MESH Topology.

3. In this topology is a multipoint configuration, i.e., several devices are connected to a main
long cable which acts as a backbone Bus topology

4. In this topology, each communicating device is connected to a central controller called


hub. Star topology

5. In this topology, each node is connected to two other nodes on either side of it.
RING topology

VII. Identify the type of unguided media

1. They are used to transmit data without the use of cable. It is a line-of-sight transmission
as signal travels in a straight line. Microwave signals

2. They are not line-of-sight transmission and, hence, can penetrate buildings easily.
RADIOWAVE
3. It is very expensive as compared to other transmission mediums. Installation is
extremely complex. SATELLITE MICROWAVE

4. It cannot penetrate walls and is affected by distance, noise and heat. INFRARED

5. It is susceptible to weather effects like rain, thunderstorm, etc.


MICROWAVE/RADIOWAVE

VIII. Identify the type of protocols

1. It enables two hosts to establish a connection and exchange streams of


data PPP

2. It is the simplest and most secure way to exchange files over the
internet FTP

3. It is responsible for delivering packets from the source host to the


destination host based on the IP addresses mentioned in the packet
headers. IP

4. It is a protocol used to establish a direct connection between two


nodes. It can provide connection authentication, transmission
encryption and compression. Point-to-Point Protocol (PPP)

5. It is used for sending email messages to other networks or computers.


Simple Mail Transfer Protocol (SMTP)

6. It is a simple and standard method to access mailbox and download


messages to the local computers. IMAP

7. It is used for remote login that helps a user to log on to another user’s
terminal without being its original user. Telnet

8. It is used for chatting by sending and receiving text messages IRC

9. Expand: IPCP Internet Protocol Control Protocol

10.Expand: SLIP Serial Line Internet Protocol

You might also like