Teachers and Examiners (CBSESkillEduction) collaborated to create the Network and Internet Class 11 MCQ. All the important Information are taken from the NCERT Textbook Web Application (803) class 11.
Network and Internet Class 11 MCQ
1. ________ is a collection of independent computers that communicate with one another over a shared network medium.
a. Network
b. Connection
c. Computer
d. None of the above
2. ________ is a computer that facilitates sharing of data, software and hardware resources on the network.
a. Computer
b. Server
c. Hub
d. Router
3. _________ is a device that helps to establish communication between the server and workstations.
a. Network Interface Unit
b. Network Interconnection Unit
c. Network Medium Unit
d. None of the above
4. ________ is a technique in which a dedicated and complete physical connection is established between two nodes for communication.
a. Packet Switching
b. Circuit Switching
c. Both a) and b)
d. None of the above
Network and Internet Class 11 MCQ
5. ________ is a switching technique in which packets are routed between nodes over data links shared with other traffic.
a. Packet Switching
b. Circuit Switching
c. Both a) and b)
d. None of the above
6. _________ is a medium that is used in the transmission of a message from one point to another.
a. Channel
b. Bandwidth
c. Method
d. All of the above
7. __________ is a computer network organized around an individual person.
a. Personal Area Network
b. Local Area Network
c. Wide Area Network
d. Metropolitan Area Network
8. ________ is a network in which the devices are connected over a relatively short distance.
a. Personal Area Network
b. Local Area Network
c. Wide Area Network
d. Metropolitan Area Network
9. _________ is a network which spans a physical area ( in the range of 5 and 50 km diameter) that is larger than a LAN but smaller than a WAN.
a. Personal Area Network
b. Local Area Network
c. Wide Area Network
d. Metropolitan Area Network
Network and Internet Class 11 MCQ
10. ________ is a network which spans a large geographical area, often a country or a continent.
a. Personal Area Network
b. Local Area Network
c. Wide Area Network
d. Metropolitan Area Network
11. _______ is a device that enables a computer to transmit data over telephone or cable lines. RJ-45: An eight wired connector used to connect computers on a LAN.
a. Modem
b. Hub
c. Router
d. Switch
12. _________ is a kind of network adapter.
a. Sound card
b. Graphics card
c. Ethernet card
d. None of the above
13. ______ is a small hardware device that joins multiple computers together within a LAN.
a. Modem
b. Hub
c. Router
d. Switch
14. _______ is an electronic device that amplifies the received signal and then retransmits it on the network.
a. Modem
b. Hub
c. Repeater
d. Switch
Network and Internet Class 11 MCQ
15. _______ is a network device that connects two networks with different protocols.
a. Modem
b. Router
c. Repeater
d. Switch
16. _______ is a network device that connects two dissimilar networks.
a. Modem
b. Gateway
c. Repeater
d. Switch
17. ________ is a small, portable card that allows your computer to connect to the internet through a wireless network.
a. Wi-Fi card
b. Wi-Max card
c. Network card
d. None of the above
18. Protocol: A special set of rules that two or more machines on a network follow to communicate with each other.
a. Device
b. Protocol
c. Method
d. None of the above
19. _________ protocol breaks the data into packets that the network can handle efficiently.
a. File Transfer Protocol
b. Transmission Control Protocol
c. Circuit Protocol
d. None of the above
Network and Internet Class 11 MCQ
20. ___________ is used for transferring (downloading or uploading) files from one system to another on the internet.
a. File Transfer Protocol
b. Transmission Control Protocol
c. Circuit Protocol
d. None of the above
21. _________ protocol is used for transferring hypertext files on the World Wide Web.
a. File Transfer Protocol
b. Hypertext Transfer Protocol
c. Transmission Control Protocol
d. None of the above
22. ________ protocol is used for communication between two computers using a serial interface.
a. Client Server Protocol
b. Point Transfer Protocol
c. Point-to-Point Protocol
d. None of the above
23. ________ protocol allows transmission of email over the Internet.
a. SMTP
b. POP3
c. TCP
d. FTP
24. _________ protocol receives and holds email for an individual until they pick it up.
a. SMPT
b. POP3
c. TCP
d. FTP
Network and Internet Class 11 MCQ
25. ________ is a protocol for creating a connection with a remote machine.
a. IRC
b. VOIP
c. Telnet
d. None of the above
26. ______ protocol is used for chatting. It is based on a client/server model.
a. IRC
b. VOIP
c. Telnet
d. None of the above
27. VOIP stands for __________. It enables the transfer of voice using a packet switched network rather than using a public switched telephone network.
a. Voice over international protocol
b. Voice over internet protocol
c. Voice open internet protocol
d. None of the above
28. A ___________ address is a unique 12 digit (6 digits for manufacturer code and 6 digits for serial number) hexadecimal number assigned to each NIC. The MAC address of an NIC never changes.
a. MAC (Media Access Control)
b. IP (Internet Protocol)
c. FTP (File Transfer Protocol)
d. None of the above
29. An _________ address is a unique 4 digit hexadecimal number assigned to each node on a network.
a. MAC (Media Access Control)
b. IP (Internet Protocol)
c. FTP (File Transfer Protocol)
d. None of the above
Network and Internet Class 11 MCQ
30. Domain Name is a name assigned to a server through _________. A domain name usually has more than one part: top level domain name or primary domain name and sub-domain name(s).
a. Damian Next System
b. Domain Nerve System
c. Domain Name System
d. None of the above
31. ___________ is the process of getting corresponding IP addresses from a domain name.
a. Damian Next System
b. Domain Name Resolution
c. Domain Name System
d. None of the above
32. The term _________ refers to malicious programs designed with the intention to affect the normal functionality by causing harm to the system, or with the intention of getting unauthorized access to the system, or denying access to legitimate users of computing resources.
a. Malware
b. Anti Virus
c. Both a) and b)
d. None of the above
33. __________ is a malicious program that attaches itself to the host program. It is designed to infect the host program and gain control over the system without the owner’s knowledge.
a. Virus
b. Anti Virus
c. Trojan Horse
d. None of the above
34. _________ is also a malicious program like a virus. But unlike viruses, it doesn’t need to attach itself to a host program.
a. Host
b. Worm
c. Trojan Horse
d. None of the above
Network and Internet Class 11 MCQ
35. _________ is a program that contains hidden malicious functions. Trojan Horses trick users into installing them by appearing to be legitimate programs.
a. Host t
b. Worm
c. Trojan Horse
d. None of the above
36. Unwanted messages or emails are known as _________.
a. Inbox
b. Trash
c. Spam
d. None of the above
37. Small text file which generally contains the name of the website that it has come from and a unique ID tag is known as _______.
a. Inbox
b. Cookies
c. Spam
d. None of the above
38. A ________ is hardware or software based network security system. It prevents unauthorized access (hackers, viruses, worms etc.) to or from a network.
a. Password
b. Firewall
c. Network Security
d. None of the above
39. _______ is defined as a crime in which a computer and internet is used in an illegitimate way to harm the user.
a. Password
b. Cyber crime
c. Network Security
d. None of the above
Network and Internet Class 11 MCQ
40. _________ are the rights given to an individual over the invention of their own. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time.
a. Copyright
b. Intellectual Property rights
c. Trade
d. None of the above
41. _________ is the term used for people who engaged themselves in harmless technical experiments and fun learning activities.
a. Hacking
b. Cracking
c. Copyright
d. None of the above
42. _________ can be defined as a method by which a person gains unauthorized access to a computer with the intention of causing damage.
a. Hacking
b. Cracking
c. Copyright
d. None of the above
Employability Skills Class 11 Notes
- Communication Skills Class 11 Notes
- Self Management Skills Class 11 Notes
- ICT Skills Class 11 Notes
- Entrepreneurial Skills Class 11 Notes
- Green Skills Class 11 Notes
Employability Skills Class 11 MCQ
Employability Skills Class 11 Questions and Answer
- Communication Skills Class 11 Questions and Answers
- Self Management Skills Class 11 Questions and Answers
- ICT Skills Class 11 Questions and Answers
- Entrepreneurship Skills Class 11 MCQ & QA
- Green Skills Class 11 MCQ & QA
Web Application Class 11 Notes
- Networking and Internet Class 11 Notes
- Website Development using HTML and CSS Class 11 Notes
- Multimedia Class 11 Notes
- JavaScript Class 11 Notes
Web Application Class 11 MCQ
- Network and Internet Class 11 MCQ
- Web Designing with HTML and CSS MCQ Questions
- GIMP Class 11 MCQ Questions
- JavaScript Class 11 MCQ
Web Application Class 11 Questions and Answers