Note on computer for education
Note on computer for education
Explanation: A router is a networking device that forwards data packets between computer
networks, directing traffic on the internet.
2. Which of the following is an example of a device that operates at the Data Link layer of
the OSI model?
a) Router
b) Switch
c) Hub
d) Modem
Answer: b) Switch
Explanation: A switch operates at the Data Link layer (Layer 2) of the OSI model, facilitating
communication between devices within the same network segment.
a) Internet Protocol
b) Internal Protocol
c) Internet Process
d) Internal Process
Explanation: 'IP' stands for Internet Protocol, which is a set of rules governing the format of data
sent over the internet or local network.
Explanation: In a bus topology, all devices are connected to a single central cable, or bus, and
share the same communication line.
a) HTTP
b) HTTPS
c) FTP
d) SMTP
Answer: b) HTTPS
Explanation: HTTPS (HyperText Transfer Protocol Secure) is the protocol used for secure web
browsing, encrypting data between the user's browser and the web server.
Explanation: The OSI (Open Systems Interconnection) model provides a conceptual framework
for understanding network interactions in seven layers, from physical transmission to application.
a) Repeater
b) Router
c) Bridge
d) Modem
Answer: c) Bridge
Explanation: A bridge is used to connect and filter traffic between two or more network
segments, operating at the Data Link layer.
8. What is the maximum data transfer rate of a standard Ethernet connection?
a) 10 Mbps
b) 100 Mbps
c) 1 Gbps
d) 10 Gbps
Answer: c) 1 Gbps
Explanation: A standard Ethernet connection typically supports data transfer rates up to 1 Gbps
(Gigabit per second).
9. Which of the following is a function of the transport layer in the OSI model?
Explanation: The transport layer (Layer 4) provides end-to-end communication services for
applications, including error detection and correction, and flow control.
Explanation: A firewall monitors and controls incoming and outgoing network traffic based on
predetermined security rules, acting as a barrier between a trusted internal network and untrusted
external networks.
1. Which network topology connects all devices to a central device, such as a hub or
switch?
a) Bus
b) Ring
c) Star
d) Mesh
Answer: c) Star
Explanation: In a star topology, all devices are connected to a central device, facilitating
easy management and isolation of network issues.
2. In which topology does each device connect to every other device, forming a mesh-
like structure?
a) Bus
b) Ring
c) Star
d) Mesh
Answer: d) Mesh
Explanation: A mesh topology involves each device connecting to every other device,
providing high redundancy and reliability.
3. Which protocol is commonly used to establish secure VPN connections over the
internet?
a) HTTP
b) FTP
c) IPsec
d) SMTP
Answer: c) IPsec
Explanation: IPsec (Internet Protocol Security) is widely used to secure VPN connections
by encrypting data and authenticating users.
Explanation: A VPN allows users to securely connect to a private network over the
internet, ensuring data confidentiality and integrity.
b) Hybrid app
c) Native app
Explanation: Native apps are developed for a specific operating system, providing
optimal performance and access to device-specific features.
a) Facebook
b) Instagram
c) WhatsApp
Explanation: All these applications are developed as native apps for specific operating
systems, offering enhanced performance and user experience.