0% found this document useful (0 votes)
12 views27 pages

Human learing in هراء عالي النقاء

Uploaded by

Hassan Shaheen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views27 pages

Human learing in هراء عالي النقاء

Uploaded by

Hassan Shaheen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Chapter 1: Introduction to Computer Networks

True/False Questions

1. Computer networks are essential for sharing information among connected devices. (True)
2. Packet switching ensures a dedicated path is maintained for communication between devices. (False)
3. The primary purpose of a network protocol is to define the rules for data transmission. (True)
4. LAN stands for Local Area Network and spans an unlimited geographical area. (False)
5. The OSI model has five layers. (False)

Multiple-Choice Questions

1. Which of the following is NOT an example of a computer network?


○ a) The Internet
○ b) LAN
○ c) Cloud computing (Correct)
○ d) WAN
2. What does WAN stand for?
○ a) Wide Access Network
○ b) Wide Area Network (Correct)
○ c) Web Area Network
○ d) Wireless Access Node
3. A network protocol:
○ a) Defines the rules for communication (Correct)
○ b) Maintains hardware configuration
○ c) Provides data encryption only
○ d) Eliminates latency
4. The most widely used computer network is:
○ a) MAN
○ b) LAN
○ c) Internet (Correct)
○ d) Intranet
5. What is the main advantage of packet switching?
○ a) Guaranteed delivery
○ b) Reduced cost and efficient use of resources (Correct)
○ c) Dedicated connection
○ d) Simplified protocols

Fill in the Gap Questions

1. ________ refers to the sharing of information and resources between multiple connected devices.
Answer: Networking
2. A protocol is a set of ________ that governs communication between devices.
Answer: Rules
3. The Internet is an example of a ________.
Answer: Wide Area Network
4. The OSI model provides a ________ approach to standardizing communication.
Answer: Layered
5. ________ networks span a limited geographical area, like a building or campus.
Answer: Local Area
Matching Questions

Column A Column B

1. Packet Switching a) Efficient use of resource

2. Protocol b)Rules for data transmission

3. OSI Model c) Layers of network communication

4. LAN d) Small geographical area

5. WAN e) Large geographical area

Chapter 2: Network Architecture and Protocols


True/False Questions

1. The OSI model has seven layers, each with specific functions. (True)
2. TCP/IP uses only three layers of the OSI model. (False)
3. The physical layer is responsible for data encryption. (False)
4. The application layer in the TCP/IP model corresponds to three layers in the OSI model. (True)
5. A protocol stack refers to the set of protocols used in a network. (True)

Multiple-Choice Questions

1. Which of the following is the lowest layer in the OSI model?


○ a) Data Link
○ b) Physical (Correct)
○ c) Transport
○ d) Network
2. What does TCP/IP stand for?
○ a) Transmission Communication Protocol/Internet Protocol
○ b) Transmission Control Protocol/Internet Protocol (Correct)
○ c) Transfer Control Protocol/International Protocol
○ d) Telecommunication Control Protocol/Internet Protocol
3. The transport layer in the OSI model is responsible for:
○ a) Physical connections
○ b) End-to-end communication (Correct)
○ c) Data presentation
○ d) Network routing
4. Which protocol is used to transfer files between computers?
○ a) FTP (Correct)
○ b) HTTP
○ c) DNS
○ d) ARP
5. The TCP/IP model combines which layers of the OSI model into its application layer?
○ a) Physical and Data Link
○ b) Session, Presentation, and Application (Correct)
○ c) Network and Transport
○ d) Transport and Session

Fill in the Gap Questions

1. The OSI model consists of ________ layers.


Answer: Seven
2. The ________ layer in the OSI model handles logical addressing and routing.
Answer: Network
3. TCP is responsible for ensuring ________ delivery of data.
Answer: Reliable
4. ________ is a protocol used for accessing and transferring files over the internet.
Answer: FTP
5. The ________ layer is the topmost layer in the OSI model.
6.
Answer: Application

Matching Questions:

Column A Column B

1. Physical Layer a) Transmission of raw bits

2. Network Layer b) Logical addressing and routing

3. Transport Layer c) End-to-end communication

4. Application Layer d) User interface for network services

5. Data Link Layer e) Error detection and correction


Chapter 3: Data Transmission Basics
True/False Questions

1. Analog signals are continuous, while digital signals are discrete. (True)
2. Bandwidth refers to the range of frequencies a channel can carry. (True)
3. Attenuation causes signals to become stronger over long distances. (False)
4. Fiber optic cables use light for data transmission. (True)
5. Electromagnetic interference does not affect wireless signals. (False)

Multiple-Choice Questions

1. What is the primary unit for measuring bandwidth?


○ a) Hertz (Hz) (Correct)
○ b) Bytes (B)
○ c) Bits per second (bps)
○ d) Decibels (dB)
2. Which factor does NOT affect data transmission quality?
○ a) Noise
○ b) Bandwidth
○ c) Signal-to-noise ratio
○ d) Packet size (Correct)
3. Which medium is the most immune to electromagnetic interference?
○ a) Twisted pair cables
○ b) Coaxial cables
○ c) Fiber optic cables (Correct)
○ d) Wireless signals

4. The Nyquist theorem defines the relationship between:


○ a) Signal power and noise
○ b) Bandwidth and data rate (Correct)
○ c) Transmission time and distance
○ d) Signal attenuation and amplification
5. Which type of transmission sends signals in both directions but only one at a time?
○ a) Simplex
○ b) Full-duplex
○ c) Half-duplex (Correct)
○ d) Multiplex

Fill in the Gap Questions

1. ________ signals vary continuously over time.


Answer: Analog
2. A twisted pair cable reduces ________ interference.
Answer: Electromagnetic
3. ________ refers to the weakening of a signal over distance.
Answer: Attenuation
4. The ________ theorem relates bandwidth and maximum data rate.
Answer: Nyquist
5. ________ cables use light to transmit data.
Answer: Fiber optic
Matching Questions:

Column A Column B

1. Attenuation a) Weakening of signal over distance

2. Bandwidth b) Range of frequencies

3. Nyquist Theorem c) Data rate and bandwidth relationship

4. Fiber Optic Cable d) Immune to electromagnetic


interference

5. Twisted Pair e) Reduces electromagnetic interference


Cable

Chapter 4: Data Communications Basics

True/False:
Digital signals are always more reliable than analog signals. (False)

Asynchronous communication uses start and stop bits to synchronize data. (True)

Bandwidth is the amount of data that can be transmitted per second over a communication channel. (True)

Noise can distort a transmitted signal, but it does not lead to communication errors. (False)

Full-duplex communication allows simultaneous two-way data transmission. (True)


Multiple Choice Questions (MCQs)
1_Which of the following is a key advantage of digital transmission over analog transmission?

(a) Requires less bandwidth

(b) More resistant to noise (Correct)

(c) Faster transmission speed

(d) None of the above

2_Propagation delay is defined as:

(a) The time taken for a signal to propagate from sender to receiver (Correct)

(b) The time taken for packets to be processed at the destination

(c) The speed of the signal over a medium

(d) None of the above

3_What is the unit of measuring bandwidth?

(a) Seconds

(b) Hertz (Hz) (Correct)

(c) Decibels

(d) Bits per second

4_Which of the following devices converts digital signals to analog signals?

(a) Router

(b) Modem (Correct)

(c) Switch

(d) Hub

5_The signal-to-noise ratio (SNR) measures:

(a) The strength of the noise

(b) The delay caused by noise

(c) The strength of the signal relative to noise (Correct)

(d) The interference caused by nearby devices


Fill in the Blanks:
The ________ of a signal is measured in Hertz (Hz). (Frequency)

________ communication allows data flow in both directions, but not at the same time. (Half-duplex)

A ________ is used to convert digital signals into analog signals. (Modem)

The ________ ratio measures the strength of a signal relative to noise. (Signal-to-Noise)

________ refers to the time delay experienced by a signal as it travels from sender to receiver. (Latency)

Table Match: A with B

A B

Bandwidth Measured in Hertz

Full-duplex communication Simultaneous two-way communication

Noise Causes signal distortion

Analog-to-digital Sampling
conversion

Signal-to-noise ratio Measure of signal quality


Chapter 5: Packet Switching and Network Technologies
True/False

Circuit switching is more efficient than packet switching when bandwidth is limited. (False)

Datagram networks do not establish a dedicated path before data transmission. (True)

Ethernet is an example of a packet-switched network. (True)

Virtual circuit packet switching combines features of both circuit switching and datagram networks. (True)

In packet switching, packets always take the same path to their destination. (False)

Multiple Choice Questions (MCQs)

1_What is the primary benefit of packet switching?

(a) Reduced latency

(b) Better bandwidth utilization (Correct)

(c) Guaranteed delivery

(d) Simplified network design

2_How are packets routed in a datagram network?

(a) Through a fixed path

(b) Independently, based on their destination address (Correct)

(c) By labels assigned to each packet

(d) Using a global time stamp

3_Which of the following is NOT a characteristic of circuit-switched networks?

(a) Dedicated communication path

(b) Low latency for established paths

(c) Efficient bandwidth usage (Correct)

(d) Fixed setup time before communication

4_Which layer is responsible for routing packets in a network?

(a) Application layer

(b) Transport layer

(c) Network layer (Correct)

(d) Data link layer


5_Virtual circuit switching relies on:

(a) IP address

(b) Virtual circuit identifier (VCI) (Correct)

(c) MAC address

(d) Routing table

Fill in the Blanks

________ switching divides data into small packets for transmission. (Packet)

A ________ network establishes a dedicated communication path before transmission. (Circuit-switched)

In a ________ network, packets may arrive at the destination out of order. (Datagram)

________ is an example of a datagram-based protocol. (IP)

Packet switching is used primarily in ________ networks. (Data)

Table Match: A with B:

A B

Packet switching Divides data into packets

Circuit switching Requires a dedicated path

Datagram network Packets take independent


paths

Virtual circuit switching Combines circuit and packet


switching

Network layer Responsible for routing


Chapter 6: Local Area Networks (LANs):
(Sample questions for Chapter 6; additional chapters follow the same format as above.)

True/False:
1_Ethernet uses the CSMA/CD protocol for collision detection. (True)

2_A hub operates at the data link layer of the OSI model. (False)

3_Switches improve LAN performance by reducing collisions. (True)

4_VLANs allow logical segmentation of a LAN. (True)

5_Wi-Fi operates using the 802.3 standard. (False)

Multiple Choice Questions (MCQs):


1_What is the primary purpose of a VLAN?

(a) To reduce bandwidth

(b) To create logical segmentation (Correct)

(c) To enable wireless connectivity

(d) To increase collision domains

2_Which device operates at the data link layer?

(a) Router

(b) Switch (Correct)

(c) Hub

(d) Modem

3_CSMA/CD is used in Ethernet to:

(a) Detect collisions (Correct)

(b) Encrypt data

(c) Reduce packet loss

(d) Establish communication paths

4_The maximum transmission speed of standard Ethernet is:

(a) 10 Mbps

(b) 100 Mbps

(c) 1 Gbps

(d) All of the above, depending on the type (Correct)


5_The 802.11 standard is commonly used for:

(a) Ethernet

(b) Wi-Fi (Correct)

(c) Token Ring

(d) Fiber-optic networks

Fill in the Blanks


________ is the protocol used in Ethernet to detect and avoid collisions. (CSMA/CD)

A ________ operates at the data link layer and forwards packets based on MAC addresses. (Switch)

________ is a logical segmentation of a LAN to separate devices into groups. (VLAN)

A hub operates at the ________ layer of the OSI model. (Physical)

The ________ standard is associated with Wi-Fi. (802.11)

Table Match: A with B:

A B

VLAN Logical segmentation

Switch Operates at data link layer

CSMA/CD Collision detection protocol

802.3 Ethernet standard

802.11 Wi-Fi standard


Chapter 7: Internetworking and Addressing:

True/False:
1_An IP address uniquely identifies a device on a TCP/IP network. (True)

2_IPv4 uses 128-bit addresses, whereas IPv6 uses 32-bit addresses. (False)

3_Subnetting allows a large network to be divided into smaller, more manageable segments. (True)

4_The subnet mask determines which part of an IP address represents the network. (True)

5_ARP (Address Resolution Protocol) resolves IP addresses to MAC addresses. (True)

Multiple Choice Questions (MCQs):


1_What is the primary purpose of subnetting?

(a) To increase the number of IP addresses available

(b) To divide a network into smaller, manageable segments (Correct)

(c) To encrypt data on a network

(d) To eliminate the need for routers

2_Which protocol is used to convert an IP address to a MAC address?

(a) DNS

(b) ARP (Correct)

(c) ICMP

(d) DHCP

3_What is the default subnet mask for a Class C IP address?

(a) 255.0.0.0

(b) 255.255.0.0

(c) 255.255.255.0 (Correct)

(d) 255.255.255.255

4_IPv6 addresses are written in:

(a) Decimal notation

(b) Hexadecimal notation (Correct)

(c) Binary notation

(d) Octal notation


5_Which protocol assigns IP addresses dynamically to hosts in a network?

(a) DNS

(b) DHCP (Correct)

(c) NAT

(d) ARP

Fill in the Blanks:


________ is the protocol responsible for dynamically assigning IP addresses to devices on a network. (DHCP)

________ allows a single public IP address to be used by multiple devices on a private network. (NAT)

The ________ portion of an IP address identifies the specific device on a network. (Host)

IPv6 addresses are ________ bits long. (128)

The process of dividing a network into smaller segments is called ________. (Subnetting)

Table Match: A with B:

A B

IPv4 32-bit address

IPv6 128-bit address

Subnet mask Defines network and host portions

ARP Resolves IP to MAC address

DHCP Assigns IP addresses dynamically

Chapter 8: Routing and Forwarding


True/False:
1_A router operates at the network layer of the OSI model. (True)

2_RIP (Routing Information Protocol) uses hop count as its primary metric. (True)

3_Static routing automatically adjusts to changes in the network topology. (False)

4_OSPF is a distance-vector routing protocol. (False)

5_A routing table contains information about available routes and their costs. (True)

Multiple Choice Questions (MCQs):


1_What is the primary function of a router?

(a) To transmit signals over a physical medium

(b) To forward packets between networks (Correct)

(c) To assign IP addresses

(d) To encrypt network traffic

2_Which routing protocol is based on link-state information?

(a) RIP

(b) OSPF (Correct)

(c) BGP

(d) Static routing

3_What metric does RIP use to determine the best route?

(a) Bandwidth

(b) Delay

(c) Hop count (Correct)

(d) Cost

4_Which protocol is commonly used for routing on the Internet?

(a) RIP

(b) OSPF

(c) BGP (Correct)

(d) EIGRP

5_A routing table entry includes:

(a) IP address, MAC address, and TTL

(b) Network, next hop, and metric (Correct)

(c) Port number, protocol, and bandwidth


(d) Subnet mask, ARP cache, and gateway

Fill in the Blanks:


________ is a distance-vector routing protocol that uses hop count as its metric. (RIP)

________ is a link-state routing protocol that builds a complete map of the network topology. (OSPF)

A ________ router has manually configured routes that do not change automatically. (Static)

The ________ protocol is used to exchange routing information between autonomous systems. (BGP)

The process of selecting a path for traffic in a network is called ________. (Routing

Table Match: A with B:

A B

RIP Distance-vector protocol

OSPF Link-state protocol

BGP Used for Internet routing

Routing table Contains routes and metrics

Hop count Metric used by RIP

Chapter 9: Transport Protocols:


True/False:
1_TCP is a connection-oriented protocol that provides reliable data transmission. (True)

2_UDP provides error detection and retransmission mechanisms. (False)

3_A port number identifies the application or service on a host. (True)

4_TCP’s three-way handshake is used to establish a reliable connection. (True)

5_Sequence numbers in TCP are used to detect and prevent data loss. (True)

Multiple Choice Questions (MCQs)


1_Which protocol provides connection-oriented communication?

(a) UDP

(b) TCP (Correct)

(c) IP

(d) ARP

2_What is the purpose of the three-way handshake in TCP?

(a) To establish a reliable connection (Correct)

(b) To encrypt data

(c) To close a connection

(d) To verify the destination MAC address

3_UDP is commonly used for:

(a) Streaming media (Correct)

(b) File transfers

(c) Web browsing

(d) Email

4_Which field in a TCP header ensures data is delivered in the correct order?

(a) Sequence number (Correct)

(b) Source port

(c) Acknowledgment number

(d) Checksum

5_What is the default port number for HTTP?

(a) 21

(b) 25

(c) 80 (Correct)
(d) 443

Fill in the Blanks


________ is a connection-oriented transport protocol. (TCP)

________ is a connectionless protocol that is faster but less reliable. (UDP)

The ________ field in a TCP header ensures data is received without errors. (Checksum)

Port ________ is used for HTTPS communication. (443)

TCP uses ________ numbers to order packets for reliable delivery. (Sequence)

Table Match: A with B:

A B

TCP Connection-oriented protocol

UDP Connectionless protocol

Port number Identifies applications

Three-way handshake Establishes TCP connection

Sequence number Ensures data ordering

Chapter 10: Applications and Network Services:


True/False
1_DNS resolves human-readable domain names to IP addresses. (True)

2_The HTTP protocol is used for secure web communication. (False)

3_SMTP is the protocol for sending emails. (True)

4_FTP is used for file transfers over a network. (True)

5_HTTPS uses SSL/TLS for encrypting web traffic. (True)

Multiple Choice Questions (MCQs):


1_What does DNS stand for?

(a) Dynamic Name System

(b) Domain Name System (Correct)

(c) Data Network Service

(d) Digital Network System

2_Which protocol is used for secure communication over the web?

(a) HTTP

(b) FTP

(c) SMTP

(d) HTTPS (Correct)

3_What is the default port for DNS?

(a) 53 (Correct)

(b) 80

(c) 25

(d) 110

4_SMTP is used for:

(a) Sending emails (Correct)

(b) Receiving emails

(c) Resolving domain names

(d) Transferring files

5_hich protocol is used for downloading files from a web server?

(a) FTP (Correct)

(b) SMTP
(c) DNS

(d) SNMP

Fill in the Blanks:


________ resolves domain names to IP addresses. (DNS)

________ is the secure version of HTTP. (HTTPS)

The ________ protocol is used for sending email messages. (SMTP)

The default port for FTP is ________. (21)

________ is a protocol used to transfer files over a network. (FTP)

Table Match: A with B:

A B

DNS Resolves domain names

HTTP Web communication

FTP File transfer

SMTP Sending email

HTTPS Secure web communication


Chapter 11: The Internet Protocol (IP)
A. True/False Questions

1. IP is an unreliable, connectionless protocol. (True)


2. The Time-to-Live (TTL) field in an IP header prevents packets from circulating indefinitely in the network. (True)
3. An IP address includes both a network ID and a host ID. (True)
4. IPv6 headers are larger and more complex than IPv4 headers. (False)
5. Fragmentation occurs when a packet is too large to fit in the maximum transmission unit (MTU) of the
transmission medium. (True)

B. Multiple Choice Questions

1. The primary purpose of the Time-to-Live (TTL) field in an IP header is:


○ a) To measure the total propagation delay
○ b) To avoid packets looping indefinitely ✓
○ c) To indicate the priority of a packet
○ d) To identify packet fragments
2. What is the typical size of an IPv4 address?
○ a) 32 bits ✓
○ b) 64 bits
○ c) 128 bits
○ d) 16 bits
3. Fragmentation in IP packets is handled by which device?
○ a) Router ✓
○ b) Switch
○ c) Hub
○ d) Host
4. Which of the following fields is NOT present in an IPv4 header?
○ a) Source Address
○ b) Destination Address
○ c) Flow Label ✓
○ d) Protocol
5. Which protocol is used to report errors and provide operational information for IP?
○ a) ARP
○ b) ICMP ✓
○ c) RIP
○ d) DNS

C. Fill in the Blanks

1. The ________ protocol is used to deliver datagrams between hosts over an internetwork. (IP)
2. ________ contains the address of the packet's sender in an IP header. (Source Address)
3. IPv4 addresses are ________ bits long, while IPv6 addresses are ________ bits long. (32, 128)
4. The ________ field in an IP header specifies the upper-layer protocol being used. (Protocol)
5. ________ is the process of splitting a large IP packet into smaller fragments to fit the MTU. (Fragmentation)

D. Matching
Concept Description

IPv4 32-bit address

IPv6 128-bit address

TTL Prevents infinite packet loops

Fragmentation Splitting large packets

ICMP Reports errors in IP communication


Chapter 12: UDP and TCP
A. True/False Questions

1. UDP is a connectionless protocol and does not guarantee reliable delivery of data. (True)
2. TCP provides error detection but not error correction. (False)
3. UDP is faster than TCP because it has less overhead. (True)
4. TCP uses flow control to prevent a sender from overwhelming a receiver. (True)
5. UDP is preferred for applications that require real-time data transmission. (True)

B. Multiple Choice Questions

1. Which of the following is a connection-oriented protocol?


○ a) UDP
○ b) TCP ✓
○ c) IP
○ d) ICMP
2. What mechanism does TCP use to establish a connection?
○ a) Handshake Protocol
○ b) Three-way handshake ✓
○ c) Routing Table
○ d) Flow Control
3. Which field in a TCP header ensures data is delivered in sequence?
○ a) Source Port
○ b) Destination Port
○ c) Sequence Number ✓
○ d) Checksum
4. Which of the following applications is most likely to use UDP?
○ a) File transfer
○ b) Video streaming ✓
○ c) Email
○ d) Web browsing
5. What mechanism does TCP use to regulate data transmission?
○ a) Window size ✓
○ b) Sequence number
○ c) Port number
○ d) Checksum

C. Fill in the Blanks

1. ________ is a connectionless transport protocol. (UDP)


2. TCP uses ________ to establish a reliable connection between two hosts. (Three-way handshake)
3. The ________ field in a TCP header is used for error detection. (Checksum)
4. Real-time applications like VoIP often use ________. (UDP)
5. TCP uses ________ control to prevent a sender from overwhelming a receiver. (Flow)
D. Matching

Protocol/Feature Characteristic

TCP Connection-oriented

UDP Connectionless

Sequence Number Ensures data order

Three-way handshake Establishes a TCP connection

Video streaming Uses UDP


Chapter 13: Network Security
A. True/False Questions

1. Encryption ensures that data is protected from unauthorized access. (True)


2. Firewalls can prevent all types of cyberattacks. (False)
3. Symmetric encryption uses two keys: one for encryption and another for decryption. (False)
4. HTTPS uses SSL/TLS to secure web communication. (True)
5. A denial-of-service attack aims to disrupt the availability of a network or service. (True)

B. Multiple Choice Questions

1. Which protocol is used for secure web communication?


○ a) HTTP
○ b) HTTPS ✓
○ c) FTP
○ d) SMTP
2. What is the primary purpose of a firewall?
○ a) To encrypt data
○ b) To block unauthorized access to a network ✓
○ c) To monitor network performance
○ d) To provide DNS resolution
3. Which is an example of symmetric encryption?
○ a) RSA
○ b) AES ✓
○ c) SSL
○ d) TLS
4. A man-in-the-middle attack involves:
○ a) Intercepting communication between two parties ✓
○ b) Encrypting data during transmission
○ c) Overloading a server to disrupt services
○ d) Guessing a user's password
5. Which is NOT a common network attack?
○ a) Phishing
○ b) Denial-of-Service
○ c) Subnetting ✓
○ d) Man-in-the-Middle

C. Fill in the Blanks

1. ________ is the process of encoding data to protect it from unauthorized access. (Encryption)
2. A ________ is a device or software that blocks unauthorized access to a network. (Firewall)
3. HTTPS uses ________ to secure communication over the web. (SSL/TLS)
4. ________ encryption uses the same key for both encryption and decryption. (Symmetric)
5. A ________ attack attempts to disrupt the availability of a network or service. (Denial-of-Service)

D. Matching
Security Feature Function

Firewall Blocks unauthorized access

HTTPS Secures web communication

Symmetric encryption Uses one key for encryption/decryption

Denial-of-Service Disrupts network availability

Man-in-the-Middle Intercepts communication


Chapter 14: Network Performance
A. True/False Questions

1. Latency refers to the delay experienced in transmitting data over a network. (True)
2. Throughput is the maximum amount of data that can be transmitted over a network. (False)
3. Jitter refers to the variation in delay for packet delivery. (True)
4. Bandwidth is always equal to the throughput of a network. (False)
5. Congestion occurs when the demand for network resources exceeds the available capacity. (True)

B. Multiple Choice Questions

1. What does latency measure?


○ a) Bandwidth
○ b) Delay in data transmission ✓
○ c) Data loss
○ d) Jitter
2. What does jitter refer to in networking?
○ a) Packet loss
○ b) Variation in delay ✓
○ c) Latency
○ d) Throughput
3. Throughput is defined as:
○ a) The theoretical maximum bandwidth of a network
○ b) The actual amount of data transmitted successfully ✓
○ c) The delay in data transmission
○ d) The retransmission rate
4. Network congestion can be alleviated by:
○ a) Increasing packet size
○ b) Reducing network load ✓
○ c) Increasing latency
○ d) Disabling error checking
5. Which factors affect network performance?
○ a) Latency
○ b) Bandwidth
○ c) Packet loss
○ d) All of the above ✓

C. Fill in the Blanks

1. ________ refers to the delay in transmitting data across a network. (Latency)


2. ________ is the measure of successful data delivery over a network. (Throughput)
3. ________ is the variation in packet delay in a network. (Jitter)
4. Congestion occurs when network ________ exceeds available capacity. (Traffic)
5. ________ is the theoretical maximum data capacity of a network. (Bandwidth)

D. Matching:
Performance Metric Definition

Latency Delay in transmission

Throughput Actual data transmitted successfully

Jitter Variation in packet delay

Bandwidth Maximum network capacity

Congestion Excessive network traffic

You might also like