0% found this document useful (0 votes)
4 views

Note on computer for education

The document contains a series of review questions and answers related to computer networking concepts, including the functions of routers, switches, and firewalls, as well as network topologies and protocols. Key topics include the OSI model, secure web browsing protocols, and the purpose of VPNs. Each question is followed by an explanation to clarify the correct answer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Note on computer for education

The document contains a series of review questions and answers related to computer networking concepts, including the functions of routers, switches, and firewalls, as well as network topologies and protocols. Key topics include the OSI model, secure web browsing protocols, and the purpose of VPNs. Each question is followed by an explanation to clarify the correct answer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

REVIEW QUESTIONS

1. What is the primary function of a router in a computer network?

a) To connect devices within a local area network (LAN)

b) To forward data packets between different networks

c) To amplify signals over long distances

d) To manage network traffic within a single network

Answer: b) To forward data packets between different networks

Explanation: A router is a networking device that forwards data packets between computer
networks, directing traffic on the internet.

2. Which of the following is an example of a device that operates at the Data Link layer of
the OSI model?

a) Router

b) Switch

c) Hub

d) Modem

Answer: b) Switch

Explanation: A switch operates at the Data Link layer (Layer 2) of the OSI model, facilitating
communication between devices within the same network segment.

3. What does the acronym 'IP' stand for in networking?

a) Internet Protocol
b) Internal Protocol

c) Internet Process

d) Internal Process

Answer: a) Internet Protocol

Explanation: 'IP' stands for Internet Protocol, which is a set of rules governing the format of data
sent over the internet or local network.

4. Which of the following is a characteristic of a bus topology?

a) All devices are connected to a central hub

b) Devices are connected in a circular fashion

c) All devices share a single communication line

d) Devices are connected in a star configuration

Answer: c) All devices share a single communication line

Explanation: In a bus topology, all devices are connected to a single central cable, or bus, and
share the same communication line.

5. Which protocol is primarily used for secure web browsing?

a) HTTP

b) HTTPS

c) FTP

d) SMTP

Answer: b) HTTPS
Explanation: HTTPS (HyperText Transfer Protocol Secure) is the protocol used for secure web
browsing, encrypting data between the user's browser and the web server.

6. What is the purpose of the OSI model in networking?

a) To define the physical components of a network

b) To provide a framework for understanding network interactions

c) To specify the electrical properties of network cables

d) To determine the speed of data transmission

Answer: b) To provide a framework for understanding network interactions

Explanation: The OSI (Open Systems Interconnection) model provides a conceptual framework
for understanding network interactions in seven layers, from physical transmission to application.

7. Which device is used to connect different network segments in a computer network?

a) Repeater

b) Router

c) Bridge

d) Modem

Answer: c) Bridge

Explanation: A bridge is used to connect and filter traffic between two or more network
segments, operating at the Data Link layer.
8. What is the maximum data transfer rate of a standard Ethernet connection?

a) 10 Mbps

b) 100 Mbps

c) 1 Gbps

d) 10 Gbps

Answer: c) 1 Gbps

Explanation: A standard Ethernet connection typically supports data transfer rates up to 1 Gbps
(Gigabit per second).

9. Which of the following is a function of the transport layer in the OSI model?

a) Routing data packets

b) Error detection and correction

c) Establishing, maintaining, and terminating connections

d) Providing end-to-end communication services

Answer: d) Providing end-to-end communication services

Explanation: The transport layer (Layer 4) provides end-to-end communication services for
applications, including error detection and correction, and flow control.

10. What is the primary purpose of a firewall in a computer network?

a) To route data packets between networks

b) To filter incoming and outgoing network traffic

c) To amplify signals over long distances


d) To connect different network segments

Answer: b) To filter incoming and outgoing network traffic

Explanation: A firewall monitors and controls incoming and outgoing network traffic based on
predetermined security rules, acting as a barrier between a trusted internal network and untrusted
external networks.

1. Which network topology connects all devices to a central device, such as a hub or
switch?

a) Bus

b) Ring

c) Star

d) Mesh

Answer: c) Star

Explanation: In a star topology, all devices are connected to a central device, facilitating
easy management and isolation of network issues.

2. In which topology does each device connect to every other device, forming a mesh-
like structure?

a) Bus

b) Ring

c) Star

d) Mesh

Answer: d) Mesh
Explanation: A mesh topology involves each device connecting to every other device,
providing high redundancy and reliability.

3. Which protocol is commonly used to establish secure VPN connections over the
internet?

a) HTTP

b) FTP

c) IPsec

d) SMTP

Answer: c) IPsec

Explanation: IPsec (Internet Protocol Security) is widely used to secure VPN connections
by encrypting data and authenticating users.

4. What is the primary purpose of a VPN?

a) To increase internet speed

b) To provide secure remote access to a network

c) To monitor network traffic

d) To assign IP addresses to devices

Answer: b) To provide secure remote access to a network

Explanation: A VPN allows users to securely connect to a private network over the
internet, ensuring data confidentiality and integrity.

5. Which type of mobile application is developed specifically for a particular operating


system, such as iOS or Android?
a) Web app

b) Hybrid app

c) Native app

d) Progressive web app

Answer: c) Native app

Explanation: Native apps are developed for a specific operating system, providing
optimal performance and access to device-specific features.

6. Which of the following is an example of a native mobile application?

a) Facebook

b) Instagram

c) WhatsApp

d) All of the above

Answer: d) All of the above

Explanation: All these applications are developed as native apps for specific operating
systems, offering enhanced performance and user experience.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy