Chapter 11: Networking Fundamentals and Devices (Set-2)
A school connecting 30 computers in one lab is best called
A WAN network
B LAN network
C MAN network
D PAN network
A single computer lab covers a small geographic area, so it is a LAN. LANs are designed for high speed sharing of files, printers, and internet within a building.
A network that connects offices across different countries is usually
A PAN network
B LAN network
C WAN network
D MAN network
When networks span very large distances like multiple countries, it is a WAN. WAN links often use leased lines, fiber backbones, or satellite connections to carry data.
A city-wide cable network linking many buildings is typically a
A MAN network
B LAN network
C PAN network
D Ring network
A MAN covers a metropolitan area like a city. It connects multiple LANs in the same city using high-speed links, often managed by an organization or service provider.
Bluetooth connecting phone and earbuds is an example of
A WAN network
B MAN network
C Mesh network
D PAN network
Bluetooth works at short range and connects personal devices around one person. Such short-range networks are called PANs and are useful for quick, low-power connections.
A network designed mainly for internal employee use is called
A Extranet access
B Intranet network
C Public internet
D Guest network
An intranet is a private network used within an organization. It provides internal web portals, documents, and tools with controlled access, improving communication and productivity.
A supplier portal given limited company access is an example of
A Intranet network
B LAN network
C Extranet access
D PAN network
An extranet allows trusted outsiders like suppliers or partners to access selected internal resources securely. It is not open to everyone, and permissions are controlled.
When many users share a single internet link, the best term is
A Screen scaling
B File formatting
C Memory swapping
D Bandwidth sharing
Bandwidth is the capacity of a link. When many users share one connection, available bandwidth per user can drop, causing slower downloads, buffering, and reduced network performance.
Delay felt in online gaming is mostly affected by
A Disk space
B Latency time
C Screen size
D Printer queue
Latency is the time delay for data to travel and return. Online games need low latency for quick actions. High latency causes lag even if your download speed is high.
A network metric that shows “data per second” is
A Latency time
B Screen refresh
C Bandwidth rate
D CPU speed
Bandwidth measures how much data can be transmitted per second. It is often shown as Mbps or Gbps and affects how fast large files download or videos stream.
Video calling is an example of a
A Network application
B Power supply
C Storage device
D Output driver
Video calling relies on networks to send audio and video in real time. It requires stable bandwidth and low latency so voices and images stay smooth without frequent delays.
A bus topology usually fails if the main cable
A Changes SSID
B Updates firmware
C Adds a router
D Gets disconnected
In bus topology, all devices share one backbone cable. If that main cable breaks, communication stops for the whole network, which is a major disadvantage of bus design.
Star topology becomes unusable if the central device
A Is renamed
B Stops working
C Uses IPv6
D Has static IP
In star topology, all devices connect to a central hub or switch. If that central device fails, connected devices cannot communicate, even if their individual cables are fine.
In ring topology, each device is connected to
A One server only
B Four switches
C Two neighbors
D One backbone
A ring forms a circular path where each device connects to two nearby devices. Data travels around the ring. A break can disrupt communication unless redundancy exists.
Full mesh topology mainly improves
A Monitor brightness
B File size
C Password length
D Reliability paths
Mesh provides multiple paths between nodes. If one link fails, another route can be used. This improves reliability but requires more cables and ports, increasing cost and complexity.
Hybrid topology means a network that uses
A Mixed designs
B Only wireless
C Only coaxial
D Only fiber
Hybrid topology combines two or more topologies to meet real needs. For example, several star networks can be connected using a bus backbone, balancing cost and performance.
Twisted pair cables reduce noise mainly by
A Using magnets
B Twisting wires
C Using batteries
D Using fans
Twisting the wire pairs reduces electromagnetic interference and crosstalk. This makes signals cleaner in Ethernet networks, improving reliability especially in offices with many cables and devices.
Coaxial cable has better shielding than
A Fiber optic
B Wireless radio
C Basic twisted pair
D Infrared link
Coaxial cable has a central conductor and a shielding layer that reduces interference. It generally protects signals better than unshielded twisted pair, though modern Ethernet uses improved UTP categories.
Fiber optic is preferred for long distance because it has
A High interference
B Low security
C Low bandwidth
D Low signal loss
Fiber optic carries light signals with very low attenuation over long distances. It supports high speeds and resists electromagnetic interference, making it ideal for backbones and internet connections.
Wireless networks mainly face performance issues due to
A Paper shortage
B Signal interference
C File naming
D RAM size
Wi-Fi signals can be affected by walls, distance, other routers, and devices like microwaves. Interference causes packet loss and slower speed, so channel selection and placement matter.
A device that connects a computer to a network is
A UPS unit
B Heat sink
C NIC card
D RAM chip
A Network Interface Card provides the hardware connection to a network. It has a unique MAC address and can be Ethernet or Wi-Fi, enabling the device to send and receive network data.
A hub sends incoming data to
A One target port
B DNS server
C Only gateway
D All ports
A hub broadcasts data to every port, even if only one device needs it. This increases unnecessary traffic and collisions, making hubs slower and less efficient than switches.
A switch sends data mainly to
A All connected ports
B Correct destination port
C Any random device
D Only to router
A switch uses MAC addresses to forward frames only to the correct port. This reduces collisions and improves performance, especially when multiple devices communicate at the same time.
A router forwards packets using
A IP addresses
B MAC addresses
C File names
D Screen pixels
Routers work at the network layer and forward packets based on IP addresses. They connect different networks and choose routes so data reaches the correct destination network.
The modem’s main job is
A Virus scanning
B File backup
C Signal conversion
D DNS caching
A modem converts digital data to signals suitable for transmission over ISP lines and converts them back again. This enables internet access through cable, DSL, or similar connections.
A bridge mainly operates using
A IP routing
B DNS mapping
C DHCP leasing
D MAC filtering
A bridge connects LAN segments and filters traffic using MAC addresses. It forwards frames only when needed, reducing congestion and improving performance across segmented local networks.
A gateway is often needed when connecting
A Same LAN only
B Different protocols
C Same switch ports
D Same keyboard types
Gateways connect dissimilar networks by translating protocols or formats. They allow communication between different systems, such as connecting a company network to external services securely.
An access point is commonly used to
A Fix IP conflicts
B Change subnet mask
C Add Wi-Fi coverage
D Encrypt hard disk
An access point provides wireless connectivity to a wired network. It broadcasts an SSID and supports security settings. Extra access points are used to expand Wi-Fi range in large areas.
The default gateway in home networks is usually the
A Printer address
B DNS name
C Laptop MAC
D Router address
The default gateway is the router’s IP address on the local network. Devices send traffic to it when the destination is outside the local subnet, such as websites on the internet.
DNS is required mainly to open websites using
A MAC tables
B Domain names
C Cable types
D File extensions
DNS converts domain names into IP addresses. Without DNS, users must type numeric IPs to reach websites. DNS makes browsing easier and supports services like email and cloud platforms.
DHCP helps by automatically giving a device
A New keyboard
B Extra storage
C IP configuration
D Screen drivers
DHCP assigns IP address, subnet mask, gateway, and DNS automatically. This reduces manual errors and prevents IP conflicts when many devices connect to the same network.
A private IP address example range is
A 192.168.x.x
B 8.8.8.8
C 1.1.1.1
D 142.250.x.x
Private IP ranges like 192.168.0.0/16 are used inside homes and offices. They are not directly routable on the internet, so NAT is used to access online services.
Public IP addresses are usually assigned by
A Keyboard driver
B Printer spooler
C Text editor
D Internet service provider
ISPs provide public IPs to customers so their network can communicate on the internet. Public IPs can be static or dynamic depending on the service plan and network setup.
A MAC address is mainly used for communication within a
A Whole internet
B Satellite only
C Local LAN
D Power network
MAC addresses are used at the data link layer for local network delivery. Switches forward frames using MAC addresses. IP addresses handle routing across different networks like the internet.
IPv4 is written commonly in
A Hex pairs only
B Dotted decimal
C Binary blocks
D Roman numerals
IPv4 uses four decimal numbers separated by dots, such as 10.0.0.5. This format represents a 32-bit address and is widely used in basic networking setups.
IPv6 is commonly written using
A Dotted decimal
B Only alphabets
C Only integers
D Hexadecimal groups
IPv6 addresses use hexadecimal groups separated by colons, like 2001:db8::1. This format supports a much larger address space than IPv4, reducing address shortage problems.
Ping mainly checks
A Cable thickness
B Router password
C Reachability and delay
D File permissions
Ping sends ICMP echo requests to test if a destination is reachable and measures round-trip time. It is a quick tool to detect connectivity issues and high latency.
Traceroute is useful to identify
A DNS password
B Routing path hops
C RAM errors
D USB speed
Traceroute shows the sequence of routers (hops) a packet travels through. It helps locate where delays or failures happen on the network path, useful for troubleshooting internet issues.
A common sign of IP conflict is
A Loud fan noise
B Dark screen color
C Slow mouse clicks
D Network disconnect errors
When two devices use the same IP address, the network may show conflict warnings, drop connections, or fail to access resources. Fixing DHCP issues or setting unique IPs resolves it.
NAT is mainly used to
A Increase RAM size
B Change SSID name
C Share one public IP
D Print faster pages
NAT allows many private devices to access the internet using one public IP. The router translates private IPs to the public address, helping conserve IPv4 addresses and improve internal security.
A VLAN is used mainly to
A Separate network groups
B Upgrade fiber speed
C Replace modem device
D Boost Wi-Fi signal
A VLAN logically separates devices into different groups on the same physical switch. It improves security and reduces broadcast traffic by limiting which devices share the same broadcast domain.
A broadcast domain is a group that receives
A Only encrypted files
B Broadcast messages
C Only DNS replies
D Only printer data
Broadcast domain includes devices that receive broadcast frames. Routers separate broadcast domains, while switches usually forward broadcasts inside the same VLAN, affecting traffic load and performance.
Collision domain size is reduced mainly by using a
A Hub device
B Coax cable
C Open hotspot
D Switch device
Switches create separate collision domains per port, reducing collisions and improving speed. Hubs place all devices in one collision domain, increasing collisions and lowering performance.
A proxy server is mainly used to
A Assign MAC address
B Repair Ethernet cable
C Filter web access
D Reduce RAM usage
A proxy acts as an intermediary between users and the internet. It can filter content, log browsing, improve privacy, and sometimes cache pages for faster access in organizations.
Load balancing mainly helps by
A Changing file formats
B Distributing traffic
C Updating BIOS
D Creating IP conflicts
Load balancing spreads network or server requests across multiple servers/links. This improves performance, prevents overload, and increases availability, especially for websites and services with many users.
A common Wi-Fi security best practice is
A Change admin password
B Enable WEP only
C Use open Wi-Fi
D Share WPS PIN
Routers often ship with default admin logins that attackers can guess. Changing the admin username/password, disabling remote admin, and keeping firmware updated greatly improves Wi-Fi security.
WPA3 is better mainly because it offers
A Faster printing
B Stronger encryption
C Larger monitor
D More USB ports
WPA3 improves Wi-Fi security using stronger encryption and better protection against password guessing. Using WPA2/WPA3 with a strong password is safer than older options like WEP.
WPS can be risky because it may allow
A Faster cable testing
B Better DNS speed
C Less router heat
D Easier unauthorized access
WPS is designed for quick connection, but PIN-based WPS can be attacked. Disabling WPS and using WPA2/WPA3 with a strong password is generally safer for home and office Wi-Fi.
A safe step on public Wi-Fi is to
A Share bank passwords
B Turn off firewall
C Avoid sensitive logins
D Disable phone lock
Public Wi-Fi can be monitored by attackers. Avoid banking or sensitive logins unless using secure HTTPS and preferably a VPN. Turning off sharing and auto-connect also improves safety.
A cable tester is used to check
A CPU speed
B Cable continuity
C Screen resolution
D DNS caching
Cable testers detect breaks, wrong wiring, and weak connections in network cables. They help troubleshoot slow or disconnected Ethernet links and ensure correct pin arrangement in connectors.
A speed test tool mainly measures
A Keyboard response
B Printer ink level
C Monitor contrast
D Download and upload
Speed test tools measure internet performance like download speed, upload speed, and sometimes latency. Results help identify slow connections, ISP issues, weak Wi-Fi signals, or network congestion.