Chapter 11: Networking Fundamentals and Devices (Set-7)
When multiple devices share one printer over a network, the benefit is
A Screen scaling
B Resource sharing
C File deletion
D Battery charging
Networks allow shared use of resources like printers and storage. Instead of buying separate printers for each computer, multiple users can print through the network, saving cost and improving efficiency.
A typical example of a LAN is networking inside a
A Whole nation
B Many countries
C School building
D Ocean cable
A LAN covers a small area such as a school building. It supports fast local communication and sharing. LANs usually have low latency compared to WAN links across long distances.
A WAN is most suitable for connecting branches across
A Different cities
B Same room
C Same desk
D Same laptop
WAN connects networks over long distances like cities or countries. It enables organizations to link branches. WAN performance depends on service provider links and often has higher latency than LAN.
A PAN commonly uses technology like
A Fiber optics
B Coax backbone
C Bluetooth links
D DSL lines
PAN connects personal devices at short range. Bluetooth is widely used to connect earphones, smartwatches, and phones. It is low power and designed for a few meters of coverage.
Intranet access is usually limited to
A Public visitors
B Any internet user
C Unknown devices
D Company employees
An intranet is private and meant for internal use. It hosts internal portals, policies, and documents. Access control and authentication keep it secure from public internet users.
Extranet is used when a company must share data with
A Partners/vendors
B Any strangers
C Only employees
D Only gamers
An extranet provides controlled access to selected outside users like vendors or partners. They can access limited resources like purchase portals without having full access to internal systems.
Bandwidth is best measured in
A Seconds only
B Inches only
C Mbps or Gbps
D Volts only
Bandwidth is the data-carrying capacity per second. It is measured in bits per second like Mbps or Gbps. Higher bandwidth helps downloads, streaming, and supporting multiple users.
Latency is usually measured in
A Milliseconds time
B Gigabytes size
C Volts power
D Inches length
Latency is network delay, commonly measured in milliseconds (ms). Lower latency gives faster response in gaming and calls. High latency causes lag even if bandwidth is good.
A bus topology has a major risk because
A Central switch fails
B Backbone failure stops
C Needs many cables
D Needs Wi-Fi only
All devices rely on one backbone cable in bus topology. If it breaks or disconnects, the network can fail. Also, collisions can increase as more devices share the same line.
Star topology mainly depends on the
A Single backbone
B Two neighbors
C No central device
D Central hub/switch
All devices connect to one central device. If a device cable fails, only that device is affected. But if the central hub or switch fails, the whole star network stops working.
Ring topology connects devices in a
A Circular loop
B Central star
C Single line
D Random mesh
Ring topology forms a closed loop. Data passes from one device to the next. A single break can disrupt the ring unless redundancy exists, which is why ring is less common today.
Mesh topology is known for
A Lowest cost
B Least wiring
C High reliability
D No devices
Mesh provides multiple routes between nodes. If one link fails, others can carry traffic. This makes it reliable for critical links but expensive due to many cables and ports required.
Twisted pair cable reduces noise by
A Adding water
B Twisting wire pairs
C Using paper cover
D Removing insulation
Twisting cancels electromagnetic interference and reduces crosstalk between pairs. This improves signal quality in Ethernet cables, giving more stable speed and fewer errors in typical LAN setups.
Coaxial cable has an advantage of
A No conductor
B No insulation
C No signal loss
D Better shielding
Coax has a shield layer that protects signals from external noise. It is commonly used in cable TV and broadband. Modern LANs mostly use twisted pair or fiber due to flexibility.
Fiber optic is best known for
A High interference
B Low security
C High speed links
D Short distance only
Fiber optic supports high bandwidth and long distance with low attenuation. It is immune to electromagnetic interference, making it ideal for backbones, data centers, and inter-building connections.
Wireless networks usually face issues from
A Interference obstacles
B Ink shortage
C File format
D CPU cache
Wi-Fi signals can be blocked by walls and weakened by distance. Nearby networks and devices can cause interference, reducing speed and stability. Proper placement and channel choice improves performance.
A repeater helps mainly to
A Create VLAN tags
B Extend network range
C Assign DNS names
D Store web pages
Repeaters regenerate weak signals to travel further. In Wi-Fi, repeaters extend coverage to dead zones. They do not increase ISP speed; they only help deliver signal to farther areas.
A hub is considered inefficient because it
A Filters traffic smartly
B Uses routing table
C Broadcasts all traffic
D Uses VLAN tagging
A hub sends incoming data to all ports. This increases collisions and wastes bandwidth. Switches are preferred because they forward frames only where needed using MAC address learning.
A switch improves performance mainly by
A Sending to target
B Using analog signals
C Removing MAC addresses
D Increasing collisions
A switch learns MAC addresses and forwards frames only to the correct port. This reduces unnecessary traffic and collisions, allowing multiple conversations at once and improving overall LAN speed.
A router is needed mainly for
A Connecting two mice
B Connecting different networks
C Increasing storage
D Printing pages
Routers forward packets between networks using IP addresses. They connect a LAN to the internet and also connect multiple subnets inside an organization, separating broadcast domains.
A modem is mainly required to
A Learn MAC address
B Split VLAN traffic
C Block Wi-Fi
D Convert signal types
A modem modulates and demodulates signals to match the ISP medium, such as DSL or cable. It converts between digital data and line signals so internet communication can work properly.
A bridge is used to
A Replace router always
B Encrypt Wi-Fi data
C Connect LAN segments
D Increase RAM size
A bridge connects two LAN segments and filters traffic using MAC addresses. It forwards only needed frames, reducing congestion. It operates at data link layer, unlike routers.
An access point is used to
A Provide Wi-Fi
B Provide printing
C Provide cooling
D Provide storage
Access points connect wireless users to a wired LAN. They broadcast an SSID and enforce security settings. Adding access points helps extend Wi-Fi coverage in large buildings.
NIC is important because it
A Expands monitor
B Runs antivirus
C Connects to network
D Formats hard drive
The NIC provides the hardware interface for network communication. It has a unique MAC address and handles sending and receiving frames, enabling a device to connect via Ethernet or Wi-Fi.
IPv4 uses address length of
A 64-bit
B 32-bit
C 96-bit
D 128-bit
IPv4 addresses are 32-bit and written in dotted decimal form. The limited IPv4 space led to NAT and the development of IPv6, which provides a much larger address space.
IPv6 is written using
A Decimal dots
B Roman letters
C Binary only
D Hex groups
IPv6 uses hexadecimal groups separated by colons, such as 2001:db8::1. It provides many more addresses than IPv4 and supports modern network growth needs.
Subnet mask is used to
A Separate network/host
B Hide SSID
C Boost Wi-Fi
D Reduce RAM
Subnet mask divides an IP address into network and host parts. This helps the device decide whether a destination is in the same local network or should be sent to the default gateway.
Default gateway is required to reach
A Local printer
B Same switch
C Outside subnet
D Same MAC
The default gateway forwards traffic to other networks. Without it, a device can communicate only within its local subnet, but cannot reach the internet or other external networks.
DNS is needed to resolve
A MAC tables
B Cable faults
C VLAN tags
D Website names
DNS converts domain names into IP addresses. Without DNS, websites may not open by name even if the internet works. Correct DNS settings are essential for web browsing.
DHCP helps by giving devices
A Automatic IP settings
B Manual IP list
C Extra storage
D More bandwidth
DHCP assigns IP address, subnet mask, gateway, and DNS automatically. This reduces configuration errors and prevents IP conflicts when many devices connect to the same network.
A private IP is mainly used for
A Public websites
B Internal networks
C Satellite links
D TV channels
Private IP addresses are used within LANs and are not routed on the public internet. NAT translates private addresses to a public IP when devices access external internet resources.
A public IP is used for
A Printer sharing only
B Offline documents
C Internet access identity
D Cable testing
Public IP addresses are reachable from the internet and are assigned by the ISP. They identify a network externally, allowing communication with web servers and online services across the internet.
A MAC address is best described as
A Unique hardware address
B Website URL address
C File location path
D Router bandwidth
MAC address is assigned to a network interface and used for local frame delivery on LANs. Switches learn MAC addresses to forward traffic properly within the local network.
Ping command is used to
A Encrypt traffic
B Change DNS
C Create VLAN
D Test connectivity
Ping sends ICMP echo requests to check if a device is reachable and measures response time. It is a quick basic tool to diagnose connectivity, latency, and packet loss problems.
Traceroute helps identify
A Monitor refresh
B Keyboard errors
C Route path hops
D SSD health
Traceroute shows the network hops between source and destination. It helps locate where delays or failures occur along the path, useful for troubleshooting slow internet and routing issues.
SSID refers to the
A Wi-Fi network name
B Router power level
C IP address class
D Cable connector type
SSID is the name broadcast by a wireless network. Users select SSID to connect. Security depends on encryption like WPA2/WPA3 and strong passwords, not just SSID visibility.
WPA2/WPA3 provide
A File compression
B Wireless encryption
C Routing protocol
D DHCP service
WPA2 and WPA3 encrypt Wi-Fi traffic, protecting data from eavesdropping. WPA3 offers stronger protections. Using strong passwords and updated router firmware makes Wi-Fi much safer.
WPS is not recommended because it
A Improves security
B Blocks hackers fully
C Can be exploited
D Increases bandwidth
WPS makes connecting easier but may allow attacks, especially via PIN-based methods. Disabling WPS and using WPA2/WPA3 with strong passwords reduces unauthorized access risk.
Guest network is useful to
A Isolate visitors
B Share admin login
C Remove encryption
D Disable firewall
Guest Wi-Fi keeps visitor devices separate from your main network. Visitors can access internet but not your internal devices, improving security and privacy for your personal computers and smart devices.
NAT is used mainly to
A Change MAC address
B Increase jitter
C Reduce bandwidth
D Share one public
NAT allows multiple private devices to use one public IP for internet access. The router translates addresses, conserving IPv4 space and helping protect internal devices from direct inbound connections.
VLAN is used to
A Remove DHCP
B Hide router SSID
C Separate network groups
D Increase collisions
VLAN logically divides a switch into separate groups, reducing broadcast traffic and improving security. Devices in different VLANs are isolated unless routing is configured between VLANs.
Proxy server can be used for
A Web filtering
B Cable repair
C NIC replacement
D Wi-Fi boosting
Proxy servers can filter content, log usage, and sometimes cache websites. They act as intermediaries, helping organizations control access, improve security, and manage bandwidth.
Load balancing helps by
A Changing topology
B Spreading requests
C Removing routers
D Stopping internet
Load balancing distributes user requests across multiple servers or links. It prevents overload, improves performance, and increases availability. If one server fails, traffic can be shifted to others.
A collision domain is mostly related to
A DNS name lookup
B IPv6 address format
C Fiber optic light
D Shared Ethernet traffic
Collisions occur when devices share the same network medium, like hubs or half-duplex networks. Switches reduce collisions by isolating ports. Routers separate broadcast domains, not collision domains.
A broadcast domain is mainly controlled by
A Hubs only
B Repeaters only
C Routers and VLANs
D Coax cables
Routers separate broadcast domains, and VLANs create separate broadcast domains within switches. This reduces unnecessary broadcast traffic and improves network performance and security.
If a device gets 169.254.x.x, it usually means
A DNS succeeded
B DHCP failed
C NAT enabled
D WPA3 active
169.254.x.x is an APIPA address assigned when DHCP server is not reachable. The device cannot get a valid IP, so internet access often fails until DHCP or network link is fixed.
A speed test mainly shows
A Download/upload rates
B IP address type
C MAC table size
D VLAN tag value
Speed tests measure internet performance including download and upload speed, and often latency. Results help identify ISP issues, congestion, or Wi-Fi interference by comparing wired vs wireless results.
Basic network troubleshooting starts with
A Changing wallpaper
B Removing RAM
C Checking cables/lights
D Updating fonts
Physical checks like cable connections, power, and link lights solve many problems quickly. After confirming physical layer, you can check IP settings, gateway, DNS, and other network configuration.
Network documentation should include
A IP plan map
B Keyboard shortcuts
C Monitor brands
D Mouse DPI
Documentation records IP ranges, device names, VLANs, port maps, and configurations. It helps troubleshooting, upgrades, and maintenance by giving clear understanding of how the network is designed.
Safe public Wi-Fi practice is to
A Share bank PIN
B Disable screen lock
C Turn off updates
D Avoid sensitive logins
Public Wi-Fi can be risky due to eavesdropping. Avoid sensitive banking logins unless using secure HTTPS and preferably a VPN. Disable auto-connect and sharing to reduce exposure.