Teachers and Examiners (CBSESkillEduction) collaborated to create the Networking and Internet Class 11 MCQ. All the important Information are taken from the NCERT Textbook Information Technology (802) class 11.
Networking and Internet Class 11 MCQ
1. In the year __________, all the military communications started using telephone networks setting up dedicated connections between the two parties.
a. 1950s
b. 1955s
c. 1960s
d. 1965s
2. The US Department of Defense realized the need to connect geographically separated research computers together to form a network. This led to the development of ___________.
a. Internet
b. Arpanet
c. NSFNet
d. None of the above
3. ARPANET Stands for ___________.
a. Apart Research Project Network
b. Advanced Research Proper Network
c. Advanced Research Projects Agency Network
d. None of the above
4. Several smaller networks interconnected with each other and create ______ in 1984.
a. Internet
b. Arpanet
c. NSFNet
d. None of the above
5. NSFNET Stands for _____________.
a. National Science Foundation Network
b. National Social Foundation Network
c. New Social Foundation Network
d. None of the above
6. TCP/IP network develop in the year of _________.
a. 1965s
b. 1970s
c. 1975s
d. 1980s
7. Maximum data transfer rate of a network is known as __________.
a. Channel
b. Sender
c. Receiver
d. Bandwidth
8. __________ is the communication medium through which message is transmitted.
a. Channel
b. Sender
c. Receiver
d. Bandwidth
9. Information can be transferred only in one direction. This mode is termed unidirectional. In computer networks is known as _________.
a. Simplex Mode
b. Half-duplex
c. Full-duplex
d. None of the above
10. __________ mode is a bidirectional communication between the two nodes, however, only one node at a time can transmit the data.
a. Simplex Mode
b. Half-duplex
c. Full-duplex
d. None of the above
11. __________ mode data can be send by both communicating parties and receive at the same time.
a. Simplex Mode
b. Half-duplex
c. Full-duplex
d. None of the above
12. NIC Stands for __________.
a. Network Interface Card
b. Network Interchange Card
c. Network Interface Change
d. None of the above
13. A ____________ refers to the channel of transmission through which data can be transmitted from one node to another in the form of signal.
a. Transfer Medium
b. Transmission medium
c. Bandwidth
d. None of the above
14. Example of the guided medium is ___________.
a. Coaxial cable
b. Twisted Pair cable
c. Optical Fiber cable
d. All of the above
15. Example of unguided medium is ___________.
a. Microwave
b. Radio wave
c. Infrared
d. All of the above
16. __________ helps to increase the signal when it become weak and distorted.
a. Repeater
b. Router
c. Hub
d. Switch
17. ________ is just like repeater which connects two cables or several lines.
a. Switch
b. Hub
c. Repeater
d. Router
18. _________ helps to connecting two or more local are networks (LAN).
a. Switch
b. Repeater
c. Bridge
d. Router
19. _________ are used to connect individual nodes in the network with each other. Each node within network is connected to a unique port.
a. Switch
b. Repeater
c. Bridge
d. Router
20. A _______ maintains a routing table of various networks. Based on the destination address, this device determines to which network the incoming packet should be transmitted.
a. Switch
b. Repeater
c. Bridge
d. Router
21. A _________ connects networks based on different protocol technologies to communicate with each other.
a. Switch
b. Repeater
c. Bridge
d. Gateway
22. PAN Stands for _________.
a. Potable Area Network
b. Personal Area Network
c. PAN Area Network
d. None of the above
23. LAN Stands for _________.
a. Local Area Network
b. Long Area Network
c. Local And Network
d. None of the above
24. MAN Stands for __________.
a. Main Area Network
b. Metro Area Network
c. Metropolitan Area Network
d. None of the above
25. WAN Stands for ___________.
a. World Area Network
b. Wide Area Network
c. Widest Area Network
d. None of the above
26. The arrangement (also called layout) of nodes in a network is called ________.
a. Router
b. Topology
c. Broadcast
d. Point
28. Example of Broadcast topologies.
a. Bus Topologies
b. Ring Topologies
c. Both a) and b)
d. None of the above
29. Example of Point to Point topologies.
a. Star Topologies
b. Mesh Topologies
c. Both a) and b)
d. None of the above
30. In __________, there is a long cable, called backbone cable (or simply backbone), that connects various nodes through a connector called tap.
a. Bus Topologies
b. Ring Topologies
c. Star Topologies
d. Mesh Topologies
31. In __________, all the devices are attached through a cable in the form of ring.
a. Bus Topologies
b. Ring Topologies
c. Star Topologies
d. Mesh Topologies
32. In __________, all the devices are connected to the central controller called hub.
a. Bus Topologies
b. Ring Topologies
c. Star Topologies
d. Mesh Topologies
33. ________ is a hybrid topology using a combination of star and bus topology.
a. Bus Topologies
b. Ring Topologies
c. Tree Topologies
d. Mesh Topologies
34. Each device on a network has a unique identity known as a ___________.
a. MCA Address
b. IP Address
c. MAN Address
d. None of the above
35. MAC addresses are _________ hexadecimal (or 48 bit) numbers.
a. 12 digit
b. 16 digit
c. 32 digit
d. 64 digit
36. Every machine in a network has another unique identifying number, called ________.
a. MCA Address
b. IP Address
c. Digit Address
d. All of the above
37. Give the example of generic domain name ________.
a. .com
b. .edu
c. .gov
d. All of the above
38. __________ is the process of getting the corresponding IP address from domain name.
a. Domain Name Resolution
b. IP Address
c. MAC Address
d. None of the above
39. Digital literacy refers to raising knowledge and awareness about technology such as _________.
a. Desktop Computer
b. Smartphones
c. Tablets
d. All of the above
40. WWW Stands for __________.
a. World Wide Web
b. World Web Wide
c. Web Wide World
d. Wide Web World
41. Give a example of email protocols _________.
a. SMTP
b. POP3
c. Both a) and b)
d. None of the above
42. SMTP Stands for __________.
a. Simple Mail Transfer Protocol
b. Single Mail Transfer Protocol
c. Some Mail Transfer Protocol
d. Such Mail Transfer Protocol
43. POP Stands for _________.
a. Past Office Protocol
b. Post Open Protocol
c. Post Office Protocol
d. None of the above
44. FTP Stands for __________.
a. File Translate Protocol
b. File Transfer Protocol
c. First file Transfer Protocol
d. None of the above
45. TELNET helps to _________.
a. Computer login
b. Remote login
c. Application login
d. All of the above
46. TELNET Stands for _________.
a. Terminal Network
b. Team Network
c. Technology Network
d. Test Network
47. ________ is a client server based application that allows the user working on one system to access a remote system.
a. Bridge
b. TELNET
c. Router
d. Gateway
48. The Internet protocol suite is a set of communications protocols used in the Internet and computer networks. It is commonly known as __________.
a. POP3
b. HTTPS
c. TCP/IP
d. SMPT
49. Give the example of TCP/IP model.
a. Application Layer
b. Transport Layer
c. Internet Layer
d. All of the above
50. Data/message is created at the sender’s end and at the receiving end it is examined and processed. This layer is also responsible for enveloping the message to be sent with the header.
a. Application Layer
b. Transport Layer
c. Internet Layer
d. All of the above
51. Application layer passes the message to the __________ which appends the information about the source and destination ports of the processes at two ends.
a. Application Layer
b. Transport Layer
c. Internet Layer
d. All of the above
52. Transport layer hands over the segments to the Internet layer which adds source and destination machine network address (also termed IP address).
a. Application Layer
b. Transport Layer
c. Internet Layer
d. All of the above
53. ________ is also called Host to Internet layer. This layer is responsible for adding the header containing the sender and receiver physical address to the packet received from the Internet layer.
a. Application Layer
b. Transport Layer
c. Link Layer
d. All of the above
54. A malware may be a __________.
a. Virus
b. Worm
c. Trojan horse
d. All of the above
55. A _________ is a software code that may harm your system by overwriting or corrupting the system files.
a. Virus
b. Worm
c. Trojan horse
d. All of the above
56. A _______ is often received via network, and it automatically keeps on creating several copies of itself on the hard disk thereby flooding the hard disk.
a. Virus
b. Worm
c. Trojan horse
d. All of the above
57. A _________ Virus is a form of malware that installs itself on a computer by impersonating a trustworthy application.
a. Virus
b. Worm
c. Trojan horse
d. All of the above
58. ___________ is the act of secretly or stealthily listening to the private conversation or communications of others without their consent.
a. Denial of Service
b. Eavesdropping
c. Phishing
d. Cyber Crime
59. __________ cyber-attack in which the machine or network resource becomes unavailable to its users by temporarily or indefinitely disrupting services.
a. Denial of Service
b. Eavesdropping
c. Phishing
d. Cyber Crime
60. ___________ refers to the act of stealing a user’s personal information through fraud mails.
a. Denial of Service
b. Eavesdropping
c. Phishing
d. Cyber Crime
61. Cybercrimes are the crimes related to the misuse of computers or the Internet such as ________.
a. Theft
b. Fraud
c. Forgery
d. All of the above
62. The ________ defines cybercrime as an unlawful act where in the computer is either a tool or a target or both.
a. IT act
b. Cybercrime
c. Phishing
d. None of the above
63. ___________ inflicted through the use of electronic or communication devices such as computer, mobile phone, laptop, etc.
a. Harassment
b. Bullying
c. Both a) and b)
d. None of the above
64. To seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
a. Harassment
b. Bullying
c. Vishing
d. None of the above
65. Dishonestly making use of the electronic signature, password or any other unique identification feature of any other person.
a. Identity theft
b. Bullying
c. Vishing
d. None of the above
66. Persuading a recipient to buy a product or service, or visit a website via email, SMS, MMS where he can make purchases.
a. Identity theft
b. Spamming
c. Vishing
d. None of the above
67. The victim is asked to pay the demanded ransom to get his device decrypts.
a. Identity theft
b. Ransomware
c. Vishing
d. None of the above
68. TCP/IP protocols may be secured with cryptographic methods and security protocol like ________.
a. Secure Socket Layer (SSL)
b. Firewalls
c. Threads
d. None of the above
69. A _________ aims at protecting the internal network of an organization, home, or individual from malicious traffic from external networks.
a. Secure Socket Layer (SSL)
b. Firewalls
c. Threads
d. None of the above
70. __________ is software that aims to protect your system against malicious and potentially unwanted programs.
a. Secure Socket Layer (SSL)
b. Firewalls
c. Threads
d. Antivirus
71. A __________ is a software application that helps a user store and organize passwords.
a. Password cracker
b. Password manager
c. Password hider
d. None of the above
72. _________ are the laws for systematic use of e-resources, for example, e-business, and serve as a measure against illegal cyber-crime.
a. Cyber crime
b. Cyber laws
c. Cyber digits
d. None of the above
73. Cyber police are responsible for detecting such crimes and taking the necessary measure against it according to the ________.
a. Cyber act
b. Computer act
c. IT act
d. None of the above
74. What are the different protective measures while accessing internet.
a. Never click on a suspicious link
b. Make sure that passwords are strong and are change frequently.
c. Never disclose personal information
d. All of the above
75. Which protocol is best for surfing on the web.
a. HTTPS
b. HTTP
c. Both a) and b)
d. None of the above
Employability Skills Class 11 Notes
- Unit 1 : Communication Skills Class 11 Notes
- Unit 2 : Self-Management Skills Class 11 Notes
- Unit 3 : Information and Communication Technology Skills Class 11 Notes
- Unit 4 : Entrepreneurial Skills Class 11 Notes
- Unit 5 : Green Skills Class 11 Notes
Employability Skills Class 11 MCQ
- Unit 1 : Communication Skills Class 11 MCQ
- Unit 2 : Self-Management Skills Class 11 MCQ
- Unit 3 : Information and Communication Technology Skills Class 11 MCQ
- Unit 4 : Entrepreneurial Skills Class 11 MCQ
- Unit 5 : Green Skills Class 11 MCQ
Employability Skills Class 11 Questions and Answers
- Unit 1 : Communication Skills Class 11 Questions and Answers
- Unit 2 : Self-Management Skills – III
- Unit 3 : Information and Communication Technology Skills Class 11 Questions and Answers
- Unit 4 : Entrepreneurial Skills Class 11 Questions and Answers
- Unit 5 : Green Skills Class 11 Questions and Answers
Information Technology Class 11 Notes
- Unit -1 : Computer Organization Class 11 Notes
- Unit -2 : Networking And Internet Class 11 Notes
- Unit-3 : Office Automation Tools Class 11 Notes
- Unit-4: RDBMS Class 11 Notes
- Unit-5: Fundamentals of Java Class 11 Notes
Information Technology Class 11 MCQ
- Unit -1 : Computer Organization Class 11 MCQ
- Unit -2 : Networking And Internet Class 11 MCQ
- Unit-3 : Office Automation Tools Class 11 MCQ
- Unit-4: RDBMS Class 11 MCQ
- Unit-5: Fundamentals of Java Class 11 MCQ