Ch. 1 Basics of Networking
CBSE Study Material Solution Class XI Web Application 803

Multiple Choice Questions
1. A number of devices connected with each other through some transmission medium is:
a) Group
b) Network
c) Nodes
d) System
2. The information or data to be communicated through text, numbers, pictures, audio, and video is:
a) Sender
b) Channel
c) Message
d) Receiver
3. The physical path by which a message travels from sender to receiver is:
a) Transmission medium
b) Bandwidth
c) Connection
d) Switch
4. A set of rules that govern data communications and represent an agreement between the communicating devices is called:
a) Data Rules
b) Transmission Laws
c) Data Instructions
d) Protocols
5. Which of these devices cannot be a sender:
a) Computer
b) Stylus
c) Mobile Phone
d) Tablet
6. Which of the following statements are true about communication channels:
a) It is used to send data or signal from one or several senders to one or several receivers.
b) A channel has a certain capacity for transmitting information.
c) It can be either a physical transmission medium or a logical connection, such as a radio channel.
d) All of the above
7. The term for the amount of data that can be transferred from one point to another within a network in a specific amount of time is:
a) Data transfer
b) Baud
c) Bandwidth
d) Network Capacity
8. The speed of travel of a given amount of data from one place to another is called:
a) Data transfer Rate
b) Baud
c) Network Capacity
d) Bandwidth
9. One terabit per second (Tbps) is not equal to:
a) 103 Gigabit per second
b) 108 Megabit per second
c) 109 Kilobit per second
d) 1012 bits per second
10. Which of the following statements is incorrect?
a) The data transfer rate of a network connection is measured in units of bits per second
b) Network equipment manufacturers rate the bandwidth of products in Kbps/Mbps/Gbps.
c) 1 GBps = 1 Gbps
d) Bits per second is the smallest unit measurement for data rate
11. A numerical representation that uniquely identifies an interface or device on the network:
a) Address
b) Token
c) Protocol
d) IP Address
12. Which of the following statements are true for IP Address:
a) IP address is represented as 4 octets of numbers from 0-255.
b) IP address is unique for a device.
c) The full form of IP is Internet Protocol.
d) All of the above
13. What is the full form of Wi-Fi?
a) Wired Fidelity
b) Wireless Fidelity
c) Wireless Filter
d) It has no full form
14. A device that converts analog signals to digital and vice versa:
a) Router
b) Switch
c) Modem
d) Hub
15. Routers connect:
a) LAN
b) WAN
c) LANs and WANs together
d) None of these
16. Which of the following is not true about Gateways?
a) Not as complex as switch or router
b) Work upon different networking models
c) Are also called protocol converters
d) Take data from one system, interpret it, and transfer it to another system
17. Which network device has a buffer and performs error checking before forwarding data?
a) Hub
b) Repeater
c) Switch
d) Router
18. LAN or Local Area Network is about
a) 10m radius
b) 10 km radius
c) 50 km radius
d) No distance limitation
19. If you are sharing songs with your friend through Bluetooth, it is a
a) LAN
b) WAN
c) PAN
d) MAN
20. The Internet is an example of :
a) LAN
b) WAN
c) PAN
d) MAN
21. Various devices connected at home without a server is an example of :
a) Peer to Peer Architecture
b) Client Server Architecture
c) Wi Fi Architecture
d) None of these
22. Which of the following is not a Malware?
a) Ransomware
b) Viruses
c) Trojan horses
d) Instagram
23. _____ in the form of a router prevents malicious software from entering your network from outside the network:
a) Hardware firewall
b) Anti-Virus
c) Malware
d) Gateway
24. The ______ software operates by maintaining a database of malware definitions, which are automatically updated:
a) Operating System
b) Application
c) Anti-Virus
d) Firewall
25. _____ is typically accomplished by flooding the targeted network or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
a) Phishing
b) DOS attack
c) Adware
d) Ransomware
II. Differentiate between
a) Modem and Router
Answer: Modem vs Router
| Modem | Router |
|---|---|
| Modems are commonly used to connect your home network to the internet. A modem converts analog to digital signals and vice versa. A modem does not inspect the data packets before forwarding. | Router can connect Multiple devices and routes the network traffic. Routers create and maintain a local area network. A router inspects all data packets before forwarding them. |
b) Hub and Switch
Answer: Hub vs Switch
| Hub | Switch |
|---|---|
| A hub is a repeater with multiple ports. It cannot filter data. It sends the packets received to all connected devices. Does not find the best path for the packets and is relatively inefficient | This is a smart version of a Hub. It can perform error checking before forwarding data. It has a buffer and forwards good packet selectively to correct port only. It boosts efficiency and performance. |
c) PAN, LAN, MAN and WAN
Answer:
| PAN | LAN | MAN | WAN |
|---|---|---|---|
| PAN stands for Personal Area Network. | LAN stands for Local Area Network. | MAN stands for Metropolitan Area Network. | WAN stands for Wide Area Network. |
| PAN is a computer network formed in small area such as room or a house in up to 10m. | This network is a group of computers and peripheral devices which are connected withina radius of 10km. It could be used in a small campus or blocks of an organization. It is used for sharing resources such as files, printers, software and applications. It is usually a private network belonging to an institution or organization. | This network can be categorized as a large LAN which could spread over a city or region. This allows you to configure the network of up to 50 km radius using mostly optical fiber. Broadband networks provided by various companies such as Airtel, Jio, BSNL etc. within the city are examples of MAN. | WAN (Wide Area Network) is another network that which is spread across a large geographical area such as cities, countries and continents. The internet or mobile phone network is an example of WAN. |
III. Short answer questions
Q1. What is a computer network?
Ans: A computer network is a group of devices such as computers, printers, and mobile phones connected through transmission media to share data and resources.
Q2. What is the Internet?
Ans: The Internet is a globally connected network system that allows devices to exchange information in real time.
Q3. What are some of the applications of the Internet?
Ans: Applications of Internet
- Email and instant messaging
- Online shopping
- Video conferencing
- Social networking
- Online banking
- Movies, music and gaming
Q4. What does the term data communication mean?
Ans: Data communication is the transmission of digital data between two or more devices through a communication channel.
Q5. What are the five components of data sharing over a network?
Ans: Five components of Data Communication
- Message
- Sender
- Receiver
- Transmission medium
- Protocol
Q6. What is a data communication channel?
Ans: A communication channel is the path used to transmit data from sender to receiver. It may be physical (cables) or wireless (radio waves, satellites).
Q 7. What does the term Bandwidth signify?
Ans: Bandwidth refers to the amount of data that can be transferred over a network in a specific period of time. It is measured in bits per second (bps).
Q 8. Explain maximum and actual Bandwidth with the help of an example.
Ans: Maximum and Actual Bandwidth
- Maximum Bandwidth: Maximum data capacity promised by the service provider.
- Actual Bandwidth: The real speed available to the user.
Example:
If many users are using the same Wi-Fi network simultaneously, the available speed for each device decreases.
Q 9. Why is actual Bandwidth usually less than the maximum bandwidth?
Ans: Actual bandwidth is usually less because many users share the same network and network traffic reduces the available speed.
Q 10. What is Data Transfer Rate?
Ans: Data Transfer Rate is the speed at which data moves from one device to another in a network. It is measured in bits per second (bps).
Q11. What is a Protocol?
Ans: A protocol is a set of rules that governs communication between devices in a network.
Example: TCP/IP, HTTPS.
Q12. What is the significance of IP Addresses?
Ans: An IP address uniquely identifies a device on a network so that it can communicate with other devices.
Q13. What are the different types of Computer Networks?
Ans: Types of Computer Networks
- PAN (Personal Area Network)
- LAN (Local Area Network)
- MAN (Metropolitan Area Network)
- WAN (Wide Area Network)
Q 14. What is PAN (Personal Area Network)?
Ans: PAN (Personal Area Network) is a network used within a small area such as a room (about 10 meters) to connect personal devices like mobile phones, laptops, and tablets.
Example: Bluetooth file transfer.
Q15. Describe the following Network devices briefly:
a) Repeater
b) Hub
c) Switch
d) Router
e) Gateway
Ans: Network Devices
a) Repeater
A repeater regenerates weak signals in a network to extend the transmission distance.
b) Hub
A hub connects multiple devices and sends data to all connected devices.
c) Switch
A switch forwards data only to the correct device and performs error checking.
d) Router
A router connects different networks and routes data packets between them.
e) Gateway
A gateway connects networks that use different communication protocols.
Q16. What is Virus and how does it spread?
Ans: A virus is a malicious software program that damages files and system data.
It spreads through:
- Email attachments
- Infected websites
- USB devices
- Downloaded programs
Q 17. How does a firewall protect a network?
Ans: A firewall monitors network traffic and blocks unauthorized or malicious access to protect the internal network.
Q 19. Discuss Phishing and different types of Phishing Scams.
Ans: Phishing is a cybercrime where attackers trick users into revealing sensitive information like passwords or bank details.
Types of Phishing Scams:
- Fake prize offers
- Limited time deals
- Misspelled websites
- Suspicious attachments
- Unusual sender emails
Q 20. What is spamming?
Ans: Spamming is sending large numbers of unwanted messages or emails for advertising or fraudulent purposes.
IV. Answer the following Competency based / Application based Questions
Q 1. A small organization in your neighbourhood has received a donation of 10 computers and a printer. They want to be able to offer internet and printing facilities in their newly built computer room, what suggestions can you give them. They will also need help with choosing the right network devices.
Ans: Suggestion for small organization
They should create a LAN network to connect all computers.
Required devices:
- Router – connect network to internet
- Switch – connect multiple computers
- Modem – connect to ISP
- Ethernet cables – physical connection
- Printer sharing through network
This will allow internet access and shared printing.
Q 2. The internet in the computers in the school library is very slow, how can you help them identify the problem.
Ans: Slow internet in school library
Possible reasons:
- Many users sharing bandwidth
- Low bandwidth plan
- Weak Wi-Fi signal
- Network device problems
- Malware or viruses
Solutions:
- Upgrade bandwidth plan
- Use repeaters or better routers
- Scan systems for viruses
Q 3. Your uncle is using online banking on his laptop, he does not have anti-virus installed, how will you convince him to have one installed.
Ans: Convincing uncle to install antivirus
Explain that antivirus:
- Protects the system from malware and viruses
- Secures online banking data
- Prevents hacking and identity theft
- Keeps the system safe by scanning harmful programs
Therefore installing antivirus is essential for safe online banking.