The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Explanation The correct answer is "wide area network." A wide area network (WAN) is a telecommunications network that covers a large geographical area, such as a city, country, or even multiple countries. It connects multiple local area networks (LANs) together, allowing computers and devices in different locations to communicate with each other. WANs are commonly used by businesses and organizations to connect their offices or branches spread across different regions. They provide a wide range of services, including data sharing, email, video conferencing, and internet access.
Rate this question:
2.
A computer network that spans a relatively large geographical area is called ________
Explanation A computer network that spans a relatively large geographical area is called a WAN (Wide Area Network). A WAN is designed to connect multiple local area networks (LANs) across a wide geographic area, such as cities, countries, or continents. It allows for the transmission of data, voice, and video over long distances, often using public or private telecommunications infrastructure. WANs are commonly used by businesses and organizations to connect their branch offices or remote locations, enabling efficient communication and resource sharing between different sites.
Rate this question:
3.
Wired networks use an access method called ________
Explanation CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is an access method used in wired networks. In CSMA/CD, devices on the network listen to the carrier (the medium) before transmitting data. If the carrier is busy, they wait for it to become idle. If two devices transmit data at the same time and a collision occurs, they detect the collision and stop transmitting. They then wait for a random amount of time before retransmitting. CSMA/CD helps to avoid data collisions and ensures fair access to the network for all devices.
Rate this question:
4.
Wireless networks use an access method called ________
Explanation Wireless networks use an access method called CSMA/CA, which stands for Carrier Sense Multiple Access with Collision Avoidance. This method allows multiple devices to share the same wireless medium by preventing collisions between data transmissions. Before transmitting data, devices listen for any ongoing transmissions to avoid interference. If the medium is clear, the device can transmit its data. However, if another device is transmitting, the device waits for a random period of time before trying again. This collision avoidance mechanism helps to reduce collisions and improve the efficiency of wireless network communication.
Rate this question:
5.
________ is a protocol which allows users to download E Mail messages from mail server to a local computer
Explanation IMAP (Internet Message Access Protocol) is a protocol that enables users to download email messages from a mail server to their local computer. Unlike POP (Post Office Protocol), which simply downloads messages to the local computer and removes them from the server, IMAP allows users to access and manage their email messages on the server, while still being able to download them to their local computer when needed. This ensures that users can access their email from multiple devices and keep their messages synchronized across different platforms.
Rate this question:
6.
________ is a protocol that allows to send / upload email message from local computer to an email server.
Explanation SMTP (Simple Mail Transfer Protocol) is a protocol that enables the sending or uploading of email messages from a local computer to an email server. It is the standard protocol used for email transmission over the internet. SMTP works by establishing a connection between the sender's computer and the recipient's email server, allowing the transfer of email messages. It is responsible for handling the routing and delivery of emails, ensuring they reach the intended recipients. SMTP is widely supported by email clients and servers, making it essential for the functioning of email communication.
Rate this question:
7.
A network of networks is known as ________
Explanation A network of networks is known as the Internet. The Internet is a global system of interconnected computer networks that use the Internet Protocol Suite (TCP/IP) to communicate with each other. It consists of millions of private, public, academic, business, and government networks, all linked together to share information and resources. The Internet allows for the exchange of data, communication, and access to various services and websites worldwide.
Rate this question:
8.
In a network, a machine is identified by unique address called ________
Explanation In a network, a machine is identified by a unique address called an IP address. An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves as a unique identifier for devices, allowing them to send and receive data over the network. IP addresses are essential for routing data packets to the correct destination and ensuring successful communication between devices on the network.
Rate this question:
9.
IP stands for ________
Explanation IP stands for Internet Protocol. This is a standard set of rules that governs the format of data packets transmitted over the internet. It provides the guidelines for addressing, routing, and fragmenting data packets to ensure that they are delivered correctly to their intended destinations. The Internet Protocol is a fundamental protocol in computer networking and is responsible for the reliable and efficient transmission of data across the internet.
Rate this question:
10.
HTML stands for ________
Explanation HTML stands for Hypertext Markup Language. This is the standard markup language used for creating web pages and applications. It is the foundation of the World Wide Web and defines the structure and presentation of content on a webpage. HTML uses tags to mark elements such as headings, paragraphs, images, links, and more, allowing browsers to interpret and display the content correctly.
Rate this question:
11.
The unique address of web page on the web is called ________
Explanation A URL (Uniform Resource Locator) is a unique address that identifies the location of a web page on the internet. It specifies the protocol to be used (such as HTTP or HTTPS), the domain name or IP address of the server, and the specific path to the webpage. This allows users to access and view the webpage by entering the URL into a web browser.
Rate this question:
12.
TCP/IP stands for ________
Explanation TCP/IP stands for Transmission Control Protocol / Internet Protocol. This is a set of rules that governs the transfer of data over the internet. The Transmission Control Protocol (TCP) ensures reliable and ordered delivery of data packets, while the Internet Protocol (IP) is responsible for addressing and routing the packets across different networks. TCP/IP is the foundation of the internet and allows different devices and networks to communicate with each other effectively.
Rate this question:
13.
The ________ is the protocol used to make hypertext document readable on WWW
Explanation HTTP (Hypertext Transfer Protocol) is the correct answer because it is the protocol used to make hypertext documents readable on the World Wide Web (WWW). HTTP allows for the communication and transfer of data between a web server and a web browser, enabling the retrieval and display of hypertext documents, such as web pages, on the internet. It is the foundation of any web-based communication and is responsible for the seamless delivery of web content to users.
Rate this question:
14.
HTTP stands for ________
Explanation HTTP stands for Hyper Text Transfer Protocol. This is the underlying protocol used for communication between web browsers and web servers. It allows for the transfer of hypertext, which includes links, text, images, and other multimedia content, over the internet. By using HTTP, web browsers are able to request and receive web pages from servers, enabling users to navigate the World Wide Web.
Rate this question:
15.
FTP stands for ________
Explanation FTP stands for File Transfer Protocol. This is a standard network protocol used to transfer files between a client and a server on a computer network. It provides a simple and reliable way to transfer files, allowing users to upload, download, and manage files on remote servers. FTP is commonly used for website maintenance, software updates, and file sharing.
Rate this question:
16.
________ is a high level communication protocol of Internet that manages the data
Explanation TCP (Transmission Control Protocol) is a high-level communication protocol of the Internet that manages the data. It provides reliable, ordered, and error-checked delivery of data packets between applications on different devices. TCP ensures that all packets are received in the correct order and without errors, by using acknowledgments and retransmission of lost packets. It also handles congestion control to prevent network congestion and ensures efficient data transmission. TCP is widely used in applications such as web browsing, email, file transfer, and streaming media.
Rate this question:
17.
Every computer on the internet has a unique ________
Explanation Every computer on the internet has a unique address, known as an IP address. This address is used to identify and locate devices on the network. It consists of a series of numbers separated by periods, such as 192.168.0.1. This address allows computers to communicate with each other and ensures that data is sent to the correct destination. Without a unique address, it would be impossible for computers to connect and interact with each other on the internet.
Rate this question:
18.
A ________ is a computer that performs actions for another computer in a network
Explanation A server is a computer that performs actions for another computer in a network. Servers are designed to handle specific tasks, such as storing and sharing files, hosting websites, or managing network resources. They provide services and resources to other computers, known as clients, allowing them to access and utilize these resources over the network. Servers play a crucial role in enabling communication and collaboration within a network by handling requests and providing necessary data or services to clients.
Rate this question:
19.
A ________ is the computer that asks for the action in a network
Explanation A client is a computer that asks for the action in a network. In a client-server model, the client sends requests to the server and the server responds to those requests by providing the requested information or performing the requested action. The client is typically a user's device, such as a laptop, smartphone, or tablet, that interacts with the server to access resources or services over the network.
Rate this question:
20.
SMTP stands for ________
Explanation SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used for sending and receiving email messages over a network. SMTP is responsible for the transmission of email between mail servers. It provides a set of rules and guidelines for the proper handling and delivery of emails. SMTP is widely used in the internet and is essential for the functioning of email services.
Rate this question:
21.
All computers connected to the internet and wanting to use it for sending/receiving data must follow a common set of rules for communication called ________
Explanation In order for computers to communicate with each other over the internet, they must adhere to a set of rules or guidelines known as a protocol. This protocol ensures that data is transmitted and received correctly, allowing for seamless communication between devices. Without a common protocol, computers would not be able to understand each other's messages, resulting in a breakdown of communication. Therefore, the use of a protocol is essential for computers to effectively utilize the internet for data transmission.
Rate this question:
22.
E mail denotes ________
Explanation The term "E mail" is an abbreviation for "electronic mail." It refers to the process of sending and receiving messages electronically over a computer network. This method of communication has become widely popular and is commonly used for both personal and professional purposes.
Rate this question:
23.
CSMA/CA stands for ________
Explanation CSMA/CA stands for carrier sense multiple access with collision avoidance. This is a protocol used in network communication to prevent collisions between data packets. It works by requiring devices to first listen to the network and check if it is clear before transmitting data. If the network is busy, the device waits for a random amount of time before attempting to transmit again. This helps to reduce the chances of collisions and improves the overall efficiency of the network.
Rate this question:
24.
________ protocol tells each system how to form mail messages and transfer them between computers
Explanation SMTP (Simple Mail Transfer Protocol) is a protocol used for sending and receiving email messages over the internet. It provides a set of rules that govern how email messages are formatted and transmitted between computers. SMTP ensures that each system knows how to create a mail message and how to transfer it to the recipient's computer. By following the SMTP protocol, email systems can communicate effectively and reliably exchange messages across different networks and platforms.
Rate this question:
25.
DNS denotes ________
Explanation DNS stands for Domain Name Server. A Domain Name Server is a computer server that translates domain names into IP addresses. When a user enters a domain name into a web browser, the DNS server retrieves the corresponding IP address associated with that domain name, allowing the user to access the desired website. DNS plays a crucial role in the functioning of the internet by facilitating the translation of human-readable domain names into machine-readable IP addresses.
Rate this question:
26.
________ network-type comprises of multiple LANs /MANs
Explanation The correct answer is WAN because a WAN (Wide Area Network) is a network type that connects multiple LANs (Local Area Networks) or MANs (Metropolitan Area Networks). WANs are used to connect geographically dispersed locations and can span across large distances, such as connecting different offices or branches of a company in different cities or countries. This allows for communication and data sharing between the LANs/MANs, enabling users to access resources and information from different locations.
Rate this question:
27.
A network card attached to a host so as to establish network connections is called ________
Explanation A network card, also known as a NIC (Network Interface Card), is a hardware component that is attached to a host computer to establish network connections. It allows the host to connect to a network and communicate with other devices on that network. The NIC is responsible for transmitting and receiving data packets over the network, converting them into a format that can be understood by the host.
Rate this question:
28.
A computer that facilitates data sharing, resource sharing etc on a network is known as ________
Explanation A computer that facilitates data sharing, resource sharing, and other functions on a network is known as a server. Servers are designed to handle multiple requests from client computers and provide them with the necessary resources or services. They store and manage data, host websites, run applications, and perform other tasks to support network operations. By centralizing resources and providing access to them, servers enable efficient communication and collaboration among network users.
Rate this question:
29.
A ________ is a computer on network, dedicated to processing client requests
Explanation A server is a computer on a network that is specifically designed to handle and process client requests. It acts as a central hub, providing resources, services, and data to other computers or devices connected to the network. Servers are responsible for managing and distributing network resources, such as files, applications, and databases, and ensuring smooth communication between clients and other devices. They play a crucial role in facilitating efficient and reliable network operations by handling and processing client requests effectively.
Rate this question:
30.
A physical address assigned by NIC manufacturer is called ________ address
Explanation A physical address assigned by NIC manufacturer is called a MAC address.
Rate this question:
31.
A Mac address consumes ________ bytes or ________ bits
Explanation A Mac address consumes 6 bytes or 48 bits. A Mac address is a unique identifier assigned to network interfaces for communications on a network. It is made up of 6 groups of 2 hexadecimal digits, totaling 12 characters. Each hexadecimal digit represents 4 bits, so 2 digits equal 8 bits. Therefore, 6 groups of 2 digits equal 48 bits.
Rate this question:
32.
For access control ________ is used for collision handling in wireless networks while ________ is used for collision handling in wired networks
Explanation CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is used for collision handling in wireless networks. In this method, devices listen to the wireless medium before transmitting to avoid collisions. They use a random backoff mechanism to wait for a clear channel before transmitting. On the other hand, CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is used for collision handling in wired networks. In this method, devices listen to the wired medium while transmitting and if a collision is detected, they stop transmitting and wait for a random amount of time before retransmitting.
Rate this question:
33.
________ is the technique of changing the characteristics of the signal being transmitted so that it carriers data on it
Explanation Modulation is the process of altering the characteristics of a signal in order to carry data. It involves modifying one or more properties of the signal, such as amplitude, frequency, or phase, to encode the information to be transmitted. By changing these characteristics, the original signal is transformed into a new signal that can effectively transmit data over a communication channel. Modulation is widely used in various communication systems, including radio, television, and telecommunications, to enable the efficient transmission and reception of information.
Rate this question:
34.
________ is the process of extracting data from the received modulated signal
Explanation Demodulation refers to the process of extracting data from a received modulated signal. In modulation, the original data is combined with a carrier signal to transmit it over a communication channel. Demodulation reverses this process by separating the modulated signal back into its original form. This is typically done by extracting the carrier signal and using it to recover the original data. Demodulation is an essential step in various communication systems, such as radio, television, and wireless networks, where it allows the receiver to interpret the transmitted information accurately.
Rate this question:
35.
Sum of the data bits calculated from digital data so as to ensure data integrity is called ________
Explanation The sum of the data bits calculated from digital data to ensure data integrity is called a checksum. A checksum is a value that is computed from a data packet and is used to detect errors in transmission or storage. It allows the receiver to verify if the data has been corrupted during transmission by comparing the checksum value received with the calculated checksum value. If the two values match, it indicates that the data is intact.
Rate this question:
36.
________ is the process of efficiently selecting a path in a network along which data packets will travel to their destination
Explanation Routing is the process of efficiently selecting a path in a network along which data packets will travel to their destination. It involves determining the best route for data packets to take based on factors such as network congestion, available bandwidth, and the shortest distance. By efficiently directing the flow of data, routing ensures that packets reach their intended destination in a timely and reliable manner.
Rate this question:
37.
The table maintained by routers for routing purposes is called ________ table
Explanation The table maintained by routers for routing purposes is called a routing table. This table contains information about the available paths and destinations in a network, allowing routers to determine the best path for forwarding data packets. By consulting the routing table, routers can make informed decisions on how to efficiently route traffic to its intended destination.
Rate this question:
38.
Special condition in a network where more data packets are coming to network devices than they can handle, is called ________
Explanation Network congestion refers to a situation where the amount of data packets being transmitted through a network exceeds the capacity of the network devices to handle them. This can lead to delays, packet loss, and decreased network performance. Network congestion can occur due to various factors such as high network traffic, limited bandwidth, or inadequate network infrastructure. It is a common problem in heavily utilized networks and can be mitigated through techniques like traffic shaping, prioritization, and increasing network capacity.
Rate this question:
39.
Please select the logo of Visa in the given image.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.