Human learing in هراء عالي النقاء
Human learing in هراء عالي النقاء
True/False Questions
1. Computer networks are essential for sharing information among connected devices. (True)
2. Packet switching ensures a dedicated path is maintained for communication between devices. (False)
3. The primary purpose of a network protocol is to define the rules for data transmission. (True)
4. LAN stands for Local Area Network and spans an unlimited geographical area. (False)
5. The OSI model has five layers. (False)
Multiple-Choice Questions
1. ________ refers to the sharing of information and resources between multiple connected devices.
Answer: Networking
2. A protocol is a set of ________ that governs communication between devices.
Answer: Rules
3. The Internet is an example of a ________.
Answer: Wide Area Network
4. The OSI model provides a ________ approach to standardizing communication.
Answer: Layered
5. ________ networks span a limited geographical area, like a building or campus.
Answer: Local Area
Matching Questions
Column A Column B
1. The OSI model has seven layers, each with specific functions. (True)
2. TCP/IP uses only three layers of the OSI model. (False)
3. The physical layer is responsible for data encryption. (False)
4. The application layer in the TCP/IP model corresponds to three layers in the OSI model. (True)
5. A protocol stack refers to the set of protocols used in a network. (True)
Multiple-Choice Questions
Matching Questions:
Column A Column B
1. Analog signals are continuous, while digital signals are discrete. (True)
2. Bandwidth refers to the range of frequencies a channel can carry. (True)
3. Attenuation causes signals to become stronger over long distances. (False)
4. Fiber optic cables use light for data transmission. (True)
5. Electromagnetic interference does not affect wireless signals. (False)
Multiple-Choice Questions
Column A Column B
True/False:
Digital signals are always more reliable than analog signals. (False)
Asynchronous communication uses start and stop bits to synchronize data. (True)
Bandwidth is the amount of data that can be transmitted per second over a communication channel. (True)
Noise can distort a transmitted signal, but it does not lead to communication errors. (False)
(a) The time taken for a signal to propagate from sender to receiver (Correct)
(a) Seconds
(c) Decibels
(a) Router
(c) Switch
(d) Hub
________ communication allows data flow in both directions, but not at the same time. (Half-duplex)
The ________ ratio measures the strength of a signal relative to noise. (Signal-to-Noise)
________ refers to the time delay experienced by a signal as it travels from sender to receiver. (Latency)
A B
Analog-to-digital Sampling
conversion
Circuit switching is more efficient than packet switching when bandwidth is limited. (False)
Datagram networks do not establish a dedicated path before data transmission. (True)
Virtual circuit packet switching combines features of both circuit switching and datagram networks. (True)
In packet switching, packets always take the same path to their destination. (False)
(a) IP address
________ switching divides data into small packets for transmission. (Packet)
In a ________ network, packets may arrive at the destination out of order. (Datagram)
A B
True/False:
1_Ethernet uses the CSMA/CD protocol for collision detection. (True)
2_A hub operates at the data link layer of the OSI model. (False)
(a) Router
(c) Hub
(d) Modem
(a) 10 Mbps
(c) 1 Gbps
(a) Ethernet
A ________ operates at the data link layer and forwards packets based on MAC addresses. (Switch)
A B
True/False:
1_An IP address uniquely identifies a device on a TCP/IP network. (True)
2_IPv4 uses 128-bit addresses, whereas IPv6 uses 32-bit addresses. (False)
3_Subnetting allows a large network to be divided into smaller, more manageable segments. (True)
4_The subnet mask determines which part of an IP address represents the network. (True)
(a) DNS
(c) ICMP
(d) DHCP
(a) 255.0.0.0
(b) 255.255.0.0
(d) 255.255.255.255
(a) DNS
(c) NAT
(d) ARP
________ allows a single public IP address to be used by multiple devices on a private network. (NAT)
The ________ portion of an IP address identifies the specific device on a network. (Host)
The process of dividing a network into smaller segments is called ________. (Subnetting)
A B
2_RIP (Routing Information Protocol) uses hop count as its primary metric. (True)
5_A routing table contains information about available routes and their costs. (True)
(a) RIP
(c) BGP
(a) Bandwidth
(b) Delay
(d) Cost
(a) RIP
(b) OSPF
(d) EIGRP
________ is a link-state routing protocol that builds a complete map of the network topology. (OSPF)
A ________ router has manually configured routes that do not change automatically. (Static)
The ________ protocol is used to exchange routing information between autonomous systems. (BGP)
The process of selecting a path for traffic in a network is called ________. (Routing
A B
5_Sequence numbers in TCP are used to detect and prevent data loss. (True)
(a) UDP
(c) IP
(d) ARP
(d) Email
4_Which field in a TCP header ensures data is delivered in the correct order?
(d) Checksum
(a) 21
(b) 25
(c) 80 (Correct)
(d) 443
The ________ field in a TCP header ensures data is received without errors. (Checksum)
TCP uses ________ numbers to order packets for reliable delivery. (Sequence)
A B
(a) HTTP
(b) FTP
(c) SMTP
(a) 53 (Correct)
(b) 80
(c) 25
(d) 110
(b) SMTP
(c) DNS
(d) SNMP
A B
1. The ________ protocol is used to deliver datagrams between hosts over an internetwork. (IP)
2. ________ contains the address of the packet's sender in an IP header. (Source Address)
3. IPv4 addresses are ________ bits long, while IPv6 addresses are ________ bits long. (32, 128)
4. The ________ field in an IP header specifies the upper-layer protocol being used. (Protocol)
5. ________ is the process of splitting a large IP packet into smaller fragments to fit the MTU. (Fragmentation)
D. Matching
Concept Description
1. UDP is a connectionless protocol and does not guarantee reliable delivery of data. (True)
2. TCP provides error detection but not error correction. (False)
3. UDP is faster than TCP because it has less overhead. (True)
4. TCP uses flow control to prevent a sender from overwhelming a receiver. (True)
5. UDP is preferred for applications that require real-time data transmission. (True)
Protocol/Feature Characteristic
TCP Connection-oriented
UDP Connectionless
1. ________ is the process of encoding data to protect it from unauthorized access. (Encryption)
2. A ________ is a device or software that blocks unauthorized access to a network. (Firewall)
3. HTTPS uses ________ to secure communication over the web. (SSL/TLS)
4. ________ encryption uses the same key for both encryption and decryption. (Symmetric)
5. A ________ attack attempts to disrupt the availability of a network or service. (Denial-of-Service)
D. Matching
Security Feature Function
1. Latency refers to the delay experienced in transmitting data over a network. (True)
2. Throughput is the maximum amount of data that can be transmitted over a network. (False)
3. Jitter refers to the variation in delay for packet delivery. (True)
4. Bandwidth is always equal to the throughput of a network. (False)
5. Congestion occurs when the demand for network resources exceeds the available capacity. (True)
D. Matching:
Performance Metric Definition