WEB APPLICATION : Network and Internet (Assignment-I) Class 11 MCQ
1. ________ is a collection of independent computers that communicate with one another over a shared network
medium.
a. Network b. Connection c. Computer d. None of the above
2. ________ is a computer that facilitates sharing of data, software and hardware resources on the network.
a. Computer b. Server c. Hub d. Router
3. _________ is a device that helps to establish communication between the server and workstations.
a. Network Interface Unit b. Network Interconnection Unit c. Network Medium Unit d. None of the above
4. ________ is a technique in which a dedicated and complete physical connection is established between two
nodes for communication.
a. Packet Switching b. Circuit Switching c. Both a) and b) d. None of the above
5. ________ is a switching technique in which packets are routed between nodes over data links shared with
other traffic.
a. Packet Switching b. Circuit Switching c. Both a) and b) d. None of the above
6. _________ is a medium that is used in the transmission of a message from one point to another.
a. Channel b. Bandwidth c. Method d. All of the above
7. __________ is a computer network organized around an individual person.
a. Personal Area Network b. Local Area Network c. Wide Area Network d. Metropolitan Area Network
8. ________ is a network in which the devices are connected over a relatively short distance.
a. Personal Area Network b. Local Area Network c. Wide Area Network d. Metropolitan Area Network
9. _________ is a network which spans a physical area ( in the range of 5 and 50 km diameter) that is larger than a
LAN but smaller than a WAN.
a. Personal Area Network b. Local Area Network c. Wide Area Network d. Metropolitan Area Network
10. ________ is a network which spans a large geographical area, often a country or a continent.
a. Personal Area Network b. Local Area Network c. Wide Area Network d. Metropolitan Area Network
11. _______ is a device that enables a computer to transmit data over telephone or cable lines. RJ-45: An eight
wired connector used to connect computers on a LAN.
a. Modem b. Hub c. Router d. Switch
12. _________ is a kind of network adapter.
a. Sound card b. Graphics card c. Ethernet card d. None of the above
13. ______ is a small hardware device that joins multiple computers together within a LAN.
a. Modem b. Hub c. Router d. Switch
14. _______ is an electronic device that amplifies the received signal and then retransmits it on the network.
a. Modem b. Hub c. Repeater d. Switch
15. _______ is a network device that connects two networks with different protocols.
a. Modem b. Router c. Repeater d. Switch
16. _______ is a network device that connects two dissimilar networks.
a. Modem b. Gateway c. Repeater d. Switch
17. ________ is a small, portable card that allows your computer to connect to the internet through a wireless
network.
a. Wi-Fi card b. Wi-Max card c. Network card d. None of the above
18. Protocol: A special set of rules that two or more machines on a network follow to communicate with each
other.
a. Device b. Protocol c. Method d. None of the above
19. _________ protocol breaks the data into packets that the network can handle efficiently.
a. File Transfer Protocol b. Transmission Control Protocol c. Circuit Protocol d. None of the above
20. ___________ is used for transferring (downloading or uploading) files from one system to another on the
internet.
a. File Transfer Protocol b. Transmission Control Protocol c. Circuit Protocol d. None of the above
21. _________ protocol is used for transferring hypertext files on the World Wide Web.
a. File Transfer Protocol b. Hypertext Transfer Protocol
c. Transmission Control Protocol d. None of the above
22. ________ protocol is used for communication between two computers using a serial interface.
a. Client Server Protocol b. Point Transfer Protocol c. Point-to-Point Protocol d. None of the above
23. ________ protocol allows transmission of email over the Internet.
a. SMTP b. POP3 c. TCP d. FTP
a. SMPT b. POP3 c. TCP d. FTP Show Answer ⟶
24. _________ protocol receives and holds email for an individual until they pick it up.
25. ________ is a protocol for creating a connection with a remote machine.
a. IRC b. VOIP c. Telnet d. None of the above
26. ______ protocol is used for chatting. It is based on a client/server model.
a. IRC b. VOIP c. Telnet d. None of the above
27. VOIP stands for __________. It enables the transfer of voice using a packet switched network rather than
using a public switched telephone network.
a. Voice over international protocol b. Voice over internet protocol
c. Voice open internet protocol d. None of the above
28. A ___________ address is a unique 12 digit (6 digits for manufacturer code and 6 digits for serial number)
hexadecimal number assigned to each NIC. The MAC address of an NIC never changes.
a. MAC (Media Access Control) b. IP (Internet Protocol) c. FTP (File Transfer Protocol) d. None of the above
29. An _________ address is a unique 4 digit hexadecimal number assigned to each node on a network.
a. MAC (Media Access Control) b. IP (Internet Protocol) c. FTP (File Transfer Protocol) d. None of the above
30. Domain Name is a name assigned to a server through _________. A domain name usually has more than one
part: top level domain name or primary domain name and sub-domain name(s).
a. Damian Next System b. Domain Nerve System c. Domain Name System d. None of the above
31. ___________ is the process of getting corresponding IP addresses from a domain name.
a. Damian Next System b. Domain Name Resolution c. Domain Name System d. None of the above
32. The term _________ refers to malicious programs designed with the intention to affect the normal
functionality by causing harm to the system, or with the intention of getting unauthorized access to the system, or
denying access to legitimate users of computing resources.
a. Malware b. Anti Virus c. Both a) and b) d. None of the above
33. __________ is a malicious program that attaches itself to the host program. It is designed to infect the host
program and gain control over the system without the owner’s knowledge.
a. Virus b. Anti Virus c. Trojan Horse d. None of the above
34. _________ is also a malicious program like a virus. But unlike viruses, it doesn’t need to attach itself to a host
program.
a. Host b. Worm c. Trojan Horse d. None of the above
35. _________ is a program that contains hidden malicious functions. Trojan Horses trick users into installing
them by appearing to be legitimate programs.
a. Host t b. Worm c. Trojan Horse d. None of the above
36. Unwanted messages or emails are known as _________.
a. Inbox b. Trash c. Spam d. None of the above
37. Small text file which generally contains the name of the website that it has come from and a unique ID tag is
known as _______.
a. Inbox b. Cookies c. Spam d. None of the above
38. A ________ is hardware or software based network security system. It prevents unauthorized access (hackers,
viruses, worms etc.) to or from a network.
a. Password b. Firewall c. Network Security d. None of the above
39. _______ is defined as a crime in which a computer and internet is used in an illegitimate way to harm the
user.
a. Password b. Cyber crime c. Network Security d. None of the above
40. _________ are the rights given to an individual over the invention of their own. They usually give the creator
an exclusive right over the use of his/her creation for a certain period of time.
a. Copyright b. Intellectual Property rights c. Trade d. None of the above
41. _________ is the term used for people who engaged themselves in harmless technical experiments and fun
learning activities.
a. Hacking b. Cracking c. Copyright d. None of the above
42. _________ can be defined as a method by which a person gains unauthorized access to a computer with the
intention of causing damage.
a. Hacking b. Cracking c. Copyright d. None of the above
WEB APPLICATION : Network and Internet Class 11 MCQ(Assignment-II)
1. In the year __________, all the military communications started using telephone networks setting up
dedicated connections between the two parties.
a. 1950s b. 1955s c. 1960s d. 1965s
2. The US Department of Defense realized the need to connect geographically separated research computers
together to form a network. This led to the development of ___________.
a. Internet b. Arpanet c. NSFNet d. None of the above
3. ARPANET Stands for ___________.
a. Apart Research Project Network b. Advanced Research Proper Network
c. Advanced Research Projects Agency Network d. None of the above
4. Several smaller networks interconnected with each other and create ______ in 1984.
a. Internet b. Arpanet c. NSFNet d. None of the above
5. NSFNET Stands for _____________.
a. National Science Foundation Network b. National Social Foundation Network
c. New Social Foundation Network d. None of the above
6. TCP/IP network develop in the year of _________.
a. 1965s b. 1970s c. 1975s d. 1980s
7. Maximum data transfer rate of a network is known as __________.
a. Channel b. Sender c. Receiver d. Bandwidth
8. __________ is the communication medium through which message is transmitted.
a. Channel b. Sender c. Receiver d. Bandwidth
9. Information can be transferred only in one direction. This mode is termed unidirectional. In computer
networks is known as _________.
a. Simplex Mode b. Half-duplex c. Full-duplex d. None of the above
10. __________ mode is a bidirectional communication between the two nodes, however, only one node at a
time can transmit the data.
a. Simplex Mode b. Half-duplex c. Full-duplex d. None of the above
11. __________ mode data can be send by both communicating parties and receive at the same time.
a. Simplex Mode b. Half-duplex c. Full-duplex d. None of the above
12. NIC Stands for __________.
a. Network Interface Card b. Network Interchange Card c. Network Interface Change d. None of the above
13. A ____________ refers to the channel of transmission through which data can be transmitted from one
node to another in the form of signal.
a. Transfer Medium b. Transmission medium c. Bandwidth d. None of the above
14. Example of the guided medium is ___________.
a. Coaxial cable b. Twisted Pair cable c. Optical Fiber cable d. All of the above
15. Example of unguided medium is ___________.
a. Microwave b. Radio wave c. Infrared d. All of the above
16. __________ helps to increase the signal when it become weak and distorted.
a. Repeater b. Router c. Hub d. Switch
17. ________ is just like repeater which connects two cables or several lines.
a. Switch b. Hub c. Repeater d. Router
18. _________ helps to connecting two or more local are networks (LAN).
a. Switch b. Repeater c. Bridge d. Router
19. _________ are used to connect individual nodes in the network with each other. Each node within network
is connected to a unique port.
a. Switch b. Repeater c. Bridge d. Router
20. A _______ maintains a routing table of various networks. Based on the destination address, this device
determines to which network the incoming packet should be transmitted.
a. Switch b. Repeater c. Bridge d. Router
21. A _________ connects networks based on different protocol technologies to communicate with each other.
a. Switch b. Repeater c. Bridge d. Gateway
22. PAN Stands for _________.
a. Potable Area Network b. Personal Area Network c. PAN Area Network d. None of the above
23. LAN Stands for _________.
a. Local Area Network b. Long Area Network c. Local And Network d. None of the above
24. MAN Stands for __________.
a. Main Area Network b. Metro Area Network c. Metropolitan Area Network d. None of the above
25. WAN Stands for ___________.
a. World Area Network b. Wide Area Network c. Widest Area Network d. None of the above
26. The arrangement (also called layout) of nodes in a network is called ________.
a. Router b. Topology c. Broadcast d. Point
28. Example of Broadcast topologies.
a. Bus Topologies b. Ring Topologies c. Both a) and b) d. None of the above
29. Example of Point to Point topologies.
a. Star Topologies b. Mesh Topologies c. Both a) and b) d. None of the above
30. In __________, there is a long cable, called backbone cable (or simply backbone), that connects various
nodes through a connector called tap.
a. Bus Topologies b. Ring Topologies c. Star Topologies d. Mesh Topologies
31. In __________, all the devices are attached through a cable in the form of ring.
a. Bus Topologies b. Ring Topologies c. Star Topologies d. Mesh Topologies
32. In __________, all the devices are connected to the central controller called hub.
a. Bus Topologies b. Ring Topologies c. Star Topologies d. Mesh Topologies
33. ________ is a hybrid topology using a combination of star and bus topology.
a. Bus Topologies b. Ring Topologies c. Tree Topologies d. Mesh Topologies
34. Each device on a network has a unique identity known as a ___________.
a. MCA Address b. IP Address c. MAN Address d. None of the above
35. MAC addresses are _________ hexadecimal (or 48 bit) numbers.
a. 12 digit b. 16 digit c. 32 digit d. 64 digit
36. Every machine in a network has another unique identifying number, called ________.
a. MCA Address b. IP Address c. Digit Address d. All of the above
37. Give the example of generic domain name ________.
a. .com b. .edu c. .gov d. All of the above
38. __________ is the process of getting the corresponding IP address from domain name.
a. Domain Name Resolution b. IP Address c. MAC Address d. None of the above
39. Digital literacy refers to raising knowledge and awareness about technology such as _________.
a. Desktop Computer b. Smartphones c. Tablets d. All of the above
40. WWW Stands for __________.
a. World Wide Web b. World Web Wide c. Web Wide World d. Wide Web World
41. Give a example of email protocols _________.
a. SMTP b. POP3 c. Both a) and b) d. None of the above
42. SMTP Stands for __________.
a. Simple Mail Transfer Protocol b. Single Mail Transfer Protocol
c. Some Mail Transfer Protocol d. Such Mail Transfer Protocol
43. POP Stands for _________.
a. Past Office Protocol b. Post Open Protocol c. Post Office Protocol d. None of the above
44. FTP Stands for __________.
a. File Translate Protocol b. File Transfer Protocol c. First file Transfer Protocol d. None of the above
45. TELNET helps to _________.
a. Computer login b. Remote login c. Application login d. All of the above
46. TELNET Stands for _________.
a. Terminal Network b. Team Network c. Technology Network d. Test Network
47. ________ is a client server based application that allows the user working on one system to access a remote
system.
a. Bridge b. TELNET c. Router d. Gateway
48. The Internet protocol suite is a set of communications protocols used in the Internet and computer
networks. It is commonly known as __________.
a. POP3 b. HTTPS c. TCP/IP d. SMPT
49. Give the example of TCP/IP model.
a. Application Layer b. Transport Layer c. Internet Layer d. All of the above
50. Data/message is created at the sender’s end and at the receiving end it is examined and processed. This
layer is also responsible for enveloping the message to be sent with the header.
a. Application Layer b. Transport Layer c. Internet Layer d. All of the above
51. Application layer passes the message to the __________ which appends the information about the source
and destination ports of the processes at two ends.
a. Application Layer
b. Transport Layer
c. Internet Layer
Show Answer ⟶
d. All of the above
52. Transport layer hands over the segments to the Internet layer which adds source and destination machine
network address (also termed IP address).
a. Application Layer
b. Transport Layer
c. Internet Layer
Show Answer ⟶
d. All of the above
53. ________ is also called Host to Internet layer. This layer is responsible for adding the header containing the
sender and receiver physical address to the packet received from the Internet layer.
a. Application Layer
b. Transport Layer
c. Link Layer
Show Answer ⟶
d. All of the above
54. A malware may be a __________.
a. Virus
b. Worm
c. Trojan horse
Show Answer ⟶
d. All of the above
55. A _________ is a software code that may harm your system by overwriting or corrupting the system files.
a. Virus
b. Worm
c. Trojan horse
Show Answer ⟶
d. All of the above
56. A _______ is often received via network, and it automatically keeps on creating several copies of itself on
the hard disk thereby flooding the hard disk.
a. Virus
b. Worm
c. Trojan horse
Show Answer ⟶
d. All of the above
57. A _________ Virus is a form of malware that installs itself on a computer by impersonating a trustworthy
application.
a. Virus
b. Worm
c. Trojan horse
Show Answer ⟶
d. All of the above
58. ___________ is the act of secretly or stealthily listening to the private conversation or communications of
others without their consent.
a. Denial of Service
b. Eavesdropping
c. Phishing
d. Cyber Crime
Show Answer ⟶
59. __________ cyber-attack in which the machine or network resource becomes unavailable to its users by
temporarily or indefinitely disrupting services.
a. Denial of Service
b. Eavesdropping
c. Phishing
Show Answer ⟶
d. Cyber Crime
60. ___________ refers to the act of stealing a user’s personal information through fraud mails.
a. Denial of Service
b. Eavesdropping
c. Phishing
Show Answer ⟶
d. Cyber Crime
61. Cybercrimes are the crimes related to the misuse of computers or the Internet such as ________.
a. Theft
b. Fraud
c. Forgery
Show Answer ⟶
d. All of the above
62. The ________ defines cybercrime as an unlawful act where in the computer is either a tool or a target or
both.
a. IT act
b. Cybercrime
c. Phishing
Show Answer ⟶
d. None of the above
63. ___________ inflicted through the use of electronic or communication devices such as computer, mobile
phone, laptop, etc.
a. Harassment
b. Bullying
c. Both a) and b)
Show Answer ⟶
d. None of the above
64. To seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV
etc. through a phone call.
a. Harassment
b. Bullying
c. Vishing
Show Answer ⟶
d. None of the above
65. Dishonestly making use of the electronic signature, password or any other unique identification feature of
any other person.
a. Identity theft
b. Bullying
c. Vishing
Show Answer ⟶
d. None of the above
66. Persuading a recipient to buy a product or service, or visit a website via email, SMS, MMS where he can
make purchases.
a. Identity theft
b. Spamming
c. Vishing
Show Answer ⟶
d. None of the above
67. The victim is asked to pay the demanded ransom to get his device decrypts.
a. Identity theft
b. Ransomware
c. Vishing
Show Answer ⟶
d. None of the above
68. TCP/IP protocols may be secured with cryptographic methods and security protocol like ________.
a. Secure Socket Layer (SSL)
b. Firewalls
c. Threads
Show Answer ⟶
d. None of the above
69. A _________ aims at protecting the internal network of an organization, home, or individual from malicious
traffic from external networks.
a. Secure Socket Layer (SSL)
b. Firewalls
c. Threads
Show Answer ⟶
d. None of the above
70. __________ is software that aims to protect your system against malicious and potentially unwanted
programs.
a. Secure Socket Layer (SSL)
b. Firewalls
c. Threads
Show Answer ⟶
d. Antivirus
71. A __________ is a software application that helps a user store and organize passwords.
a. Password cracker
b. Password manager
c. Password hider
Show Answer ⟶
d. None of the above
72. _________ are the laws for systematic use of e-resources, for example, e-business, and serve as a measure
against illegal cyber-crime.
a. Cyber crime
b. Cyber laws
c. Cyber digits
Show Answer ⟶
d. None of the above
73. Cyber police are responsible for detecting such crimes and taking the necessary measure against it
according to the ________.
a. Cyber act
b. Computer act
c. IT act
Show Answer ⟶
d. None of the above
74. What are the different protective measures while accessing internet.
a. Never click on a suspicious link
b. Make sure that passwords are strong and are change frequently.
c. Never disclose personal information
Show Answer ⟶
d. All of the above
75. Which protocol is best for surfing on the web.
a. HTTPS
b. HTTP
c. Both a) and b)
d. None of the above