Chapter 11: Networking Fundamentals and Devices (Set-6)
A “computer network” is mainly created to allow devices to
A Increase brightness
B Run slower
C Change wallpaper
D Share resources
A network connects computers and devices so they can share files, printers, and internet access. It also enables communication like email and messaging, making work faster and more efficient.
A LAN is commonly used in
A Home or office
B Whole world
C Many countries
D Space station
LAN covers a small area like a home, school, or office building. It provides fast communication, easy sharing of resources, and usually has low delay compared to long-distance networks.
WAN is typically used to connect
A Two earbuds
B Distant networks
C One keyboard
D One room only
WAN connects networks over large distances such as cities or countries. The internet is a global WAN. WAN links may be slower and have higher latency compared to LAN connections.
MAN usually covers a
A Desk area
B Single room
C City area
D Personal devices
MAN connects multiple LANs across a city or metropolitan region. It is larger than a LAN but smaller than a WAN, often used by universities, government networks, or service providers.
PAN usually connects devices within
A Few meters
B Many cities
C Whole country
D Whole world
PAN connects personal devices like phone, laptop, smartwatch, and earbuds at short range. Bluetooth is a common PAN technology, designed for low power and quick device-to-device connectivity.
In a client-server network, clients mainly
A Provide internet
B Replace router
C Stop broadcasts
D Request services
Clients request services like files, printing, or login from a server. The server manages resources centrally, which improves security, backups, and user control in office and institutional networks.
Peer-to-peer networks are best for
A Large enterprises
B City networks
C Small setups
D Country networks
Peer-to-peer is easy to set up and low cost, suitable for a few computers. As the network grows, managing security, permissions, and backups becomes difficult without a central server.
Intranet is a network used within
A An organization
B Whole internet
C Public Wi-Fi
D Mobile hotspot
An intranet is private and used by employees for internal portals, notices, and files. It is protected by access controls and is not meant for the general public like the internet.
Extranet provides limited access to
A Only employees
B Only printers
C Trusted outsiders
D Only routers
Extranet extends selected internal resources to partners, vendors, or clients securely. It uses authentication and permissions so outsiders can access only the allowed services without entering the full intranet.
Bandwidth is the
A Cable color
B Screen size
C Printer speed
D Data capacity
Bandwidth is the maximum data a link can carry per second, often measured in Mbps or Gbps. Higher bandwidth supports faster downloads and more users sharing the same connection smoothly.
Latency is the
A File size
B Cable length
C Time delay
D Router model
Latency is the time taken for data to travel from source to destination and back. Low latency is important for gaming and calls, while high latency causes lag and delayed responses.
Bus topology uses a
A Central switch
B Single backbone
C Circular loop
D No cables
Bus topology connects all devices to one main cable. It is inexpensive but can suffer collisions and failure of the backbone can stop the whole network, making it less reliable than star.
Star topology connects devices to
A Central device
B Single backbone
C Random chain
D Two neighbors
In star topology, each device connects to a central hub or switch. It is easy to manage and troubleshoot because a single cable failure affects only one device, not the entire network.
Ring topology forms a
A Straight line
B Central hub
C Closed loop
D Tree structure
Ring topology connects devices in a loop, so data travels around the ring. A single break can disrupt communication unless redundancy exists, which is why ring is less common today.
Mesh topology provides
A One backbone
B One router only
C No redundancy
D Multiple paths
Mesh topology connects nodes with many links, providing alternative paths if one link fails. It improves reliability but needs more cables and ports, so it is costlier than other topologies.
Twisted pair cable is common in
A Ethernet LAN
B Satellite links
C Power lines
D TV remote
Twisted pair cables like Cat5e/Cat6 are widely used for Ethernet. Twisting reduces interference, helping provide stable communication for computers, switches, and routers in homes and offices.
Coaxial cable is widely used in
A Keyboard wiring
B USB charging
C Cable TV
D Printer ink
Coaxial cable has shielding that reduces interference. It is commonly used in cable television and some broadband systems. Modern Ethernet LANs mostly use twisted pair or fiber.
Fiber optic carries data using
A Electric current
B Sound waves
C Heat waves
D Light signals
Fiber optic transmits data as pulses of light through glass or plastic fibers. It supports high speed, long distance, and resists electromagnetic interference, making it ideal for network backbones.
Wireless media mainly uses
A Copper wires
B Radio waves
C Plastic pipes
D Paper sheets
Wireless networks use radio waves to transmit data through air. Performance depends on distance, obstacles, interference, and device quality. Wi-Fi and mobile networks are common examples.
Attenuation means
A Signal boosting
B Faster routing
C Signal weakening
D More bandwidth
Attenuation is the loss of signal strength as it travels. Longer cables and poor quality media increase attenuation, causing errors and reduced speed. Repeaters or better media help overcome it.
Interference in networks causes
A Noise/errors
B More storage
C Better speed
D Larger IP pool
Interference adds unwanted signals that distort data transmission. It can cause packet loss and retransmissions, reducing speed and reliability. Proper shielding, cable quality, and channel selection reduce interference.
A repeater is used to
A Assign IPs
B Translate DNS
C Extend signal
D Block traffic
A repeater regenerates weak signals so they can travel further. It helps increase network coverage in long cable runs or weak Wi-Fi areas, but it does not increase internet plan speed.
Hub works by sending data to
A One port
B All ports
C Only router
D Only server
A hub repeats received signals to every port, so all devices see the same traffic. This creates collisions and reduces performance, which is why switches are preferred in modern LAN networks.
Switch forwards data using
A DNS cache
B Subnet mask
C Wi-Fi channel
D MAC table
A switch learns device MAC addresses and stores them in a MAC table. It then forwards frames only to the correct port, reducing unnecessary traffic and improving speed over hubs.
Router is used to connect
A Two printers
B Two monitors
C Different networks
D Two keyboards
Routers connect different networks and forward packets using IP addresses. They are essential for connecting a LAN to the internet and for routing traffic between multiple subnets.
Modem is used for
A Signal conversion
B File backup
C Virus scan
D Screen sharing
A modem converts digital data into signals suitable for the ISP medium and converts them back. This is needed for DSL or cable connections, enabling communication between home networks and the ISP.
Bridge connects
A Two keyboards
B Two printers
C Two monitors
D LAN segments
A bridge connects two LAN segments and filters traffic using MAC addresses. It reduces congestion by forwarding only needed frames, improving performance in networks that are divided into segments.
Gateway is used to connect
A Same switch ports
B Same LAN only
C Different systems
D Same USB devices
A gateway can translate between different protocols or networks. It is often used as the entry point to other networks, enabling communication between dissimilar systems in larger network setups.
Access point provides
A Wi-Fi access
B Cable testing
C MAC spoofing
D IP conflict
An access point connects wireless devices to a wired network. It broadcasts an SSID and supports security like WPA2/WPA3. It is used to expand wireless coverage in homes and offices.
NIC stands for
A Node Internet Cable
B Network Interface Card
C New Input Chip
D Network Ink Cartridge
NIC is the hardware that connects a device to a network. It has a unique MAC address and can be wired or wireless, enabling the device to send and receive data on the network.
IPv4 address size is
A 64-bit
B 96-bit
C 32-bit
D 128-bit
IPv4 uses 32 bits and is written as four decimal numbers separated by dots. Because IPv4 addresses are limited, NAT and IPv6 are used to handle growing device numbers.
IPv6 address size is
A 128-bit
B 32-bit
C 48-bit
D 64-bit
IPv6 uses 128 bits and is written in hexadecimal groups. It provides a huge number of addresses, improving scalability and reducing address shortage issues found in IPv4 networks.
Subnet mask helps identify
A Keyboard type
B File extension
C SSID name
D Network portion
Subnet mask separates the network and host parts of an IP address. It helps a device decide whether a destination is local or must be sent to the default gateway for external routing.
Default gateway is usually the
A Printer IP
B DNS name
C Router IP
D MAC address
The default gateway is typically the router’s local IP address. Devices send traffic to it when the destination is outside the local subnet, such as websites or external servers.
DNS converts
A IP to MAC
B Names to IP
C Cable to Wi-Fi
D Text to image
DNS translates domain names like websites into IP addresses. Without DNS, users must type IPs directly. Correct DNS settings are essential for smooth browsing and access to online services.
Private IP is used inside
A Public internet
B Satellite only
C TV networks
D Local networks
Private IP addresses are used within homes and offices and are not routable on the internet. NAT translates private IPs to a public IP for internet access through a router.
Public IP is used for
A Internet identity
B Local printing only
C Offline storage
D Keyboard mapping
A public IP address is reachable on the internet and identifies a network externally. It is assigned by an ISP, enabling internet services to communicate with your network.
DHCP provides
A Manual IPs
B File sharing
C Automatic IPs
D Cable shielding
DHCP automatically assigns IP address, subnet mask, gateway, and DNS settings to devices. It reduces manual errors and prevents conflicts when many devices join or leave the network.
Static IP means
A Always changing IP
B Manually fixed IP
C No IP address
D Only Wi-Fi IP
A static IP is set manually and stays constant until changed. It is useful for printers and servers needing stable addresses, so users can access them without the IP changing over time.
MAC address is a
A Hardware address
B Website address
C Router password
D Speed value
MAC address uniquely identifies a network interface at the data link layer. Switches use MAC addresses to forward frames inside a LAN, while routers use IP addresses across networks.
Ping is used to test
A Cable color
B Folder size
C Printer ink
D Connectivity
Ping checks whether a device can reach another device and measures response time. It is a basic troubleshooting tool to detect unreachable hosts, high latency, or packet loss on a network.
Traceroute shows
A File path
B RAM speed
C Packet path
D Screen size
Traceroute displays the route taken by packets across network hops. It helps identify where delays or failures occur between your device and a destination, useful for troubleshooting routing issues.
SSID is the
A Wi-Fi name
B Router CPU
C IP range
D Cable type
SSID is the name of a Wi-Fi network shown when selecting networks. Security depends on encryption like WPA2/WPA3 and strong passwords, not only on SSID visibility.
A hotspot allows
A File formatting
B Internet sharing
C MAC learning
D VLAN tagging
A hotspot shares internet from a phone or device to others using Wi-Fi. It creates a temporary wireless network, so using a strong password and secure settings is important.
WPA2/WPA3 are used for
A Cable testing
B IP routing
C Wi-Fi encryption
D File backup
WPA2 and WPA3 protect Wi-Fi data using encryption. They prevent unauthorized users from easily reading wireless traffic. WPA3 offers stronger protection than WPA2 against certain attacks.
WPS is risky because it can
A Increase latency
B Change IP class
C Boost bandwidth
D Allow easy entry
WPS simplifies connecting to Wi-Fi but can be attacked, especially via PIN methods. Disabling WPS and using WPA2/WPA3 with strong passwords provides safer wireless security.
NAT helps by
A Sharing public IP
B Reducing RAM use
C Changing SSID
D Printing faster
NAT allows multiple devices with private IPs to use one public IP for internet access. The router translates addresses, conserving IPv4 space and adding basic protection for internal devices.
VLAN helps by
A Boosting Wi-Fi power
B Separating groups
C Changing cable type
D Increasing collisions
VLAN separates devices into logical groups on the same switch. It improves security and reduces broadcast traffic by limiting which devices can communicate at Layer 2 within each VLAN.
Proxy server can help by
A Increasing RAM
B Changing MAC
C Filtering web access
D Cleaning cables
A proxy server acts between users and the internet. It can filter websites, log activity, improve privacy, and sometimes cache content to reduce bandwidth usage and speed up repeated access.
Load balancing means
A Distributing traffic
B Changing topology
C Stopping routing
D Removing NAT
Load balancing spreads requests across multiple servers or links. It improves performance and reliability by preventing overload. If one server fails, traffic can be directed to other working servers.