Networking and Internet Class 11 MCQ

Teachers and Examiners (CBSESkillEduction) collaborated to create the Networking and Internet Class 11 MCQ. All the important Information are taken from the NCERT Textbook Information Technology (802) class 11.

Networking and Internet Class 11 MCQ

1. In the year __________, all the military communications started using telephone networks setting up dedicated connections between the two parties.
a. 1950s 
b. 1955s
c. 1960s
d. 1965s

Show Answer ⟶
a. 1950s

2. The US Department of Defense realized the need to connect geographically separated research computers together to form a network. This led to the development of ___________.
a. Internet
b. Arpanet 
c. NSFNet
d. None of the above

Show Answer ⟶
b. Arpanet

3. ARPANET Stands for ___________.
a. Apart Research Project Network
b. Advanced Research Proper Network
c. Advanced Research Projects Agency Network 
d. None of the above

Show Answer ⟶
c. Advanced Research Projects Agency Network

4. Several smaller networks interconnected with each other and create ______ in 1984.
a. Internet
b. Arpanet
c. NSFNet 
d. None of the above

Show Answer ⟶
c. NSFNet

5. NSFNET Stands for _____________.
a. National Science Foundation Network 
b. National Social Foundation Network
c. New Social Foundation Network
d. None of the above

Show Answer ⟶
a. National Science Foundation Network

6. TCP/IP network develop in the year of _________.
a. 1965s
b. 1970s 
c. 1975s
d. 1980s

Show Answer ⟶
b. 1970s

7. Maximum data transfer rate of a network is known as __________.
a. Channel
b. Sender
c. Receiver
d. Bandwidth 

Show Answer ⟶
d. Bandwidth

8. __________ is the communication medium through which message is transmitted.
a. Channel 
b. Sender
c. Receiver
d. Bandwidth

Show Answer ⟶
a. Channel

9. Information can be transferred only in one direction. This mode is termed unidirectional. In computer networks is known as _________.
a. Simplex Mode 
b. Half-duplex
c. Full-duplex
d. None of the above

Show Answer ⟶
a. Simplex Mode

10. __________ mode is a bidirectional communication between the two nodes, however, only one node at a time can transmit the data.
a. Simplex Mode
b. Half-duplex 
c. Full-duplex
d. None of the above

Show Answer ⟶
b. Half-duplex

11. __________ mode data can be send by both communicating parties and receive at the same time.
a. Simplex Mode
b. Half-duplex
c. Full-duplex 
d. None of the above

Show Answer ⟶
c. Full-duplex

12. NIC Stands for __________.
a. Network Interface Card 
b. Network Interchange Card
c. Network Interface Change
d. None of the above

Show Answer ⟶
a. Network Interface Card

13. A ____________ refers to the channel of transmission through which data can be transmitted from one node to another in the form of signal.
a. Transfer Medium
b. Transmission medium 
c. Bandwidth
d. None of the above

Show Answer ⟶
b. Transmission medium

14. Example of the guided medium is ___________.
a. Coaxial cable
b. Twisted Pair cable
c. Optical Fiber cable
d. All of the above 

Show Answer ⟶
d. All of the above

15. Example of unguided medium is ___________.
a. Microwave
b. Radio wave
c. Infrared
d. All of the above 

Show Answer ⟶
d. All of the above

16. __________ helps to increase the signal when it become weak and distorted.
a. Repeater 
b. Router
c. Hub
d. Switch

Show Answer ⟶
a. Repeater

17. ________ is just like repeater which connects two cables or several lines.
a. Switch
b. Hub 
c. Repeater
d. Router

Show Answer ⟶
b. Hub

18. _________ helps to connecting two or more local are networks (LAN).
a. Switch
b. Repeater
c. Bridge 
d. Router

Show Answer ⟶
c. Bridge

19. _________ are used to connect individual nodes in the network with each other. Each node within network is connected to a unique port.
a. Switch 
b. Repeater
c. Bridge
d. Router

Show Answer ⟶
a. Switch

20. A _______ maintains a routing table of various networks. Based on the destination address, this device determines to which network the incoming packet should be transmitted.
a. Switch
b. Repeater
c. Bridge
d. Router 

Show Answer ⟶
d. Router

21. A _________ connects networks based on different protocol technologies to communicate with each other.
a. Switch
b. Repeater
c. Bridge
d. Gateway 

Show Answer ⟶
d. Gateway

22. PAN Stands for _________.
a. Potable Area Network
b. Personal Area Network 
c. PAN Area Network
d. None of the above

Show Answer ⟶
b. Personal Area Network

23. LAN Stands for _________.
a. Local Area Network 
b. Long Area Network
c. Local And Network
d. None of the above

Show Answer ⟶
a. Local Area Network

24. MAN Stands for __________.
a. Main Area Network
b. Metro Area Network
c. Metropolitan Area Network 
d. None of the above

Show Answer ⟶
c. Metropolitan Area Network

25. WAN Stands for ___________.
a. World Area Network
b. Wide Area Network 
c. Widest Area Network
d. None of the above

Show Answer ⟶
b. Wide Area Network

26. The arrangement (also called layout) of nodes in a network is called ________.
a. Router
b. Topology 
c. Broadcast
d. Point

Show Answer ⟶
b. Topology

28. Example of Broadcast topologies.
a. Bus Topologies
b. Ring Topologies
c. Both a) and b) 
d. None of the above

Show Answer ⟶
c. Both a) and b)

29. Example of Point to Point topologies.
a. Star Topologies
b. Mesh Topologies
c. Both a) and b) 
d. None of the above

Show Answer ⟶
c. Both a) and b)

30. In __________, there is a long cable, called backbone cable (or simply backbone), that connects various nodes through a connector called tap.
a. Bus Topologies 
b. Ring Topologies
c. Star Topologies
d. Mesh Topologies

Show Answer ⟶
a. Bus Topologies

31. In __________, all the devices are attached through a cable in the form of ring.
a. Bus Topologies
b. Ring Topologies 
c. Star Topologies
d. Mesh Topologies

Show Answer ⟶
b. Ring Topologies

32. In __________, all the devices are connected to the central controller called hub.
a. Bus Topologies
b. Ring Topologies
c. Star Topologies 
d. Mesh Topologies

Show Answer ⟶
c. Star Topologies

33. ________ is a hybrid topology using a combination of star and bus topology.
a. Bus Topologies
b. Ring Topologies
c. Tree Topologies 
d. Mesh Topologies

Show Answer ⟶
c. Tree Topologies

34. Each device on a network has a unique identity known as a ___________.
a. MCA Address 
b. IP Address
c. MAN Address
d. None of the above

Show Answer ⟶
a. MCA Address

35. MAC addresses are _________ hexadecimal (or 48 bit) numbers.
a. 12 digit 
b. 16 digit
c. 32 digit
d. 64 digit

Show Answer ⟶
a. 12 digit

36. Every machine in a network has another unique identifying number, called ________.
a. MCA Address
b. IP Address 
c. Digit Address
d. All of the above

Show Answer ⟶
b. IP Address

37. Give the example of generic domain name ________.
a. .com
b. .edu
c. .gov
d. All of the above 

Show Answer ⟶
d. All of the above

38. __________ is the process of getting the corresponding IP address from domain name.
a. Domain Name Resolution 
b. IP Address
c. MAC Address
d. None of the above

Show Answer ⟶
a. Domain Name Resolution

39. Digital literacy refers to raising knowledge and awareness about technology such as _________.
a. Desktop Computer
b. Smartphones
c. Tablets
d. All of the above 

Show Answer ⟶
d. All of the above

40. WWW Stands for __________.
a. World Wide Web 
b. World Web Wide
c. Web Wide World
d. Wide Web World

Show Answer ⟶
a. World Wide Web

41. Give a example of email protocols _________.
a. SMTP
b. POP3
c. Both a) and b) 
d. None of the above

Show Answer ⟶
c. Both a) and b)

42. SMTP Stands for __________.
a. Simple Mail Transfer Protocol 
b. Single Mail Transfer Protocol
c. Some Mail Transfer Protocol
d. Such Mail Transfer Protocol

Show Answer ⟶
a. Simple Mail Transfer Protocol

43. POP Stands for _________.
a. Past Office Protocol
b. Post Open Protocol
c. Post Office Protocol 
d. None of the above

Show Answer ⟶
c. Post Office Protocol

44. FTP Stands for __________.
a. File Translate Protocol
b. File Transfer Protocol 
c. First file Transfer Protocol
d. None of the above

Show Answer ⟶
b. File Transfer Protocol

45. TELNET helps to _________.
a. Computer login
b. Remote login 
c. Application login
d. All of the above

Show Answer ⟶
b. Remote login

46. TELNET Stands for _________.
a. Terminal Network 
b. Team Network
c. Technology Network
d. Test Network

Show Answer ⟶
a. Terminal Network

47. ________ is a client server based application that allows the user working on one system to access a remote system.
a. Bridge
b. TELNET 
c. Router
d. Gateway

Show Answer ⟶
b. TELNET

48. The Internet protocol suite is a set of communications protocols used in the Internet and computer networks. It is commonly known as __________.
a. POP3
b. HTTPS
c. TCP/IP 
d. SMPT

Show Answer ⟶
c. TCP/IP

49. Give the example of TCP/IP model.
a. Application Layer
b. Transport Layer
c. Internet Layer
d. All of the above 

Show Answer ⟶
d. All of the above

50. Data/message is created at the sender’s end and at the receiving end it is examined and processed. This layer is also responsible for enveloping the message to be sent with the header.
a. Application Layer 
b. Transport Layer
c. Internet Layer
d. All of the above

Show Answer ⟶
a. Application Layer

51. Application layer passes the message to the __________ which appends the information about the source and destination ports of the processes at two ends.
a. Application Layer
b. Transport Layer 
c. Internet Layer
d. All of the above

Show Answer ⟶
b. Transport Layer

52. Transport layer hands over the segments to the Internet layer which adds source and destination machine network address (also termed IP address).
a. Application Layer
b. Transport Layer
c. Internet Layer 
d. All of the above

Show Answer ⟶
c. Internet Layer

53. ________ is also called Host to Internet layer. This layer is responsible for adding the header containing the sender and receiver physical address to the packet received from the Internet layer.
a. Application Layer
b. Transport Layer
c. Link Layer 
d. All of the above

Show Answer ⟶
c. Link Layer

54. A malware may be a __________.
a. Virus
b. Worm
c. Trojan horse
d. All of the above 

Show Answer ⟶
d. All of the above

55. A _________ is a software code that may harm your system by overwriting or corrupting the system files.
a. Virus 
b. Worm
c. Trojan horse
d. All of the above

Show Answer ⟶
a. Virus

56. A _______ is often received via network, and it automatically keeps on creating several copies of itself on the hard disk thereby flooding the hard disk.
a. Virus
b. Worm 
c. Trojan horse
d. All of the above

Show Answer ⟶
b. Worm

57. A _________ Virus is a form of malware that installs itself on a computer by impersonating a trustworthy application.
a. Virus
b. Worm
c. Trojan horse 
d. All of the above

Show Answer ⟶
c. Trojan horse

58. ___________ is the act of secretly or stealthily listening to the private conversation or communications of others without their consent.
a. Denial of Service
b. Eavesdropping 
c. Phishing
d. Cyber Crime

Show Answer ⟶
b. Eavesdropping

59. __________ cyber-attack in which the machine or network resource becomes unavailable to its users by temporarily or indefinitely disrupting services.
a. Denial of Service 
b. Eavesdropping
c. Phishing
d. Cyber Crime

Show Answer ⟶
a. Denial of Service

60. ___________ refers to the act of stealing a user’s personal information through fraud mails.
a. Denial of Service
b. Eavesdropping
c. Phishing 
d. Cyber Crime

Show Answer ⟶
c. Phishing

61. Cybercrimes are the crimes related to the misuse of computers or the Internet such as ________.
a. Theft
b. Fraud
c. Forgery
d. All of the above 

Show Answer ⟶
d. All of the above

62. The ________ defines cybercrime as an unlawful act where in the computer is either a tool or a target or both.
a. IT act 
b. Cybercrime
c. Phishing
d. None of the above

Show Answer ⟶
a. IT act

63. ___________ inflicted through the use of electronic or communication devices such as computer, mobile phone, laptop, etc.
a. Harassment
b. Bullying
c. Both a) and b) 
d. None of the above

Show Answer ⟶
c. Both a) and b)

64. To seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
a. Harassment
b. Bullying
c. Vishing 
d. None of the above

Show Answer ⟶
c. Vishing

65. Dishonestly making use of the electronic signature, password or any other unique identification feature of any other person.
a. Identity theft 
b. Bullying
c. Vishing
d. None of the above

Show Answer ⟶
a. Identity theft

66. Persuading a recipient to buy a product or service, or visit a website via email, SMS, MMS where he can make purchases.
a. Identity theft
b. Spamming 
c. Vishing
d. None of the above

Show Answer ⟶
b. Spamming

67. The victim is asked to pay the demanded ransom to get his device decrypts.
a. Identity theft
b. Ransomware 
c. Vishing
d. None of the above

Show Answer ⟶
d. All of the above

68. TCP/IP protocols may be secured with cryptographic methods and security protocol like ________.
a. Secure Socket Layer (SSL) 
b. Firewalls
c. Threads
d. None of the above

Show Answer ⟶
a. Secure Socket Layer (SSL)

69. A _________ aims at protecting the internal network of an organization, home, or individual from malicious traffic from external networks.
a. Secure Socket Layer (SSL)
b. Firewalls 
c. Threads
d. None of the above

Show Answer ⟶
b. Firewalls

70. __________ is software that aims to protect your system against malicious and potentially unwanted programs.
a. Secure Socket Layer (SSL)
b. Firewalls
c. Threads
d. Antivirus 

Show Answer ⟶
d. Antivirus

71. A __________ is a software application that helps a user store and organize passwords.
a. Password cracker
b. Password manager  
c. Password hider
d. None of the above

Show Answer ⟶
b. Password manager

72. _________ are the laws for systematic use of e-resources, for example, e-business, and serve as a measure against illegal cyber-crime.
a. Cyber crime
b. Cyber laws 
c. Cyber digits
d. None of the above

Show Answer ⟶
b. Cyber laws

73. Cyber police are responsible for detecting such crimes and taking the necessary measure against it according to the ________.
a. Cyber act
b. Computer act
c. IT act 
d. None of the above

Show Answer ⟶
c. IT act

74. What are the different protective measures while accessing internet.
a. Never click on a suspicious link
b. Make sure that passwords are strong and are change frequently.
c. Never disclose personal information
d. All of the above 

Show Answer ⟶
d. All of the above

75. Which protocol is best for surfing on the web.
a. HTTPS 
b. HTTP
c. Both a) and b)
d. None of the above

Show Answer ⟶
a. HTTPS

Employability Skills Class 11 Notes

Employability Skills Class 11 MCQ

Employability Skills Class 11 Questions and Answers

Information Technology Class 11 Notes

Information Technology Class 11 MCQ

Information Technology Class 11 Questions and Answers

error: Content is protected !!