Grade 12 Network & HCI Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Sherraine2012
S
Sherraine2012
Community Contributor
Quizzes Created: 1 | Total Attempts: 365
| Attempts: 365 | Questions: 40
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. TCP/ IP is used for what type of network?

Explanation

TCP/IP is used for the Internet because it is the standard protocol suite that enables communication and data transfer between devices on the internet. It provides a set of rules and protocols for reliable and secure transmission of data over networks. TCP/IP allows devices to connect and communicate with each other, forming the backbone of the internet infrastructure. It is used for various internet services such as web browsing, email, file transfer, and more.

Submit
Please wait...
About This Quiz
Grade 12 Network & HCI Quiz - Quiz

The 'Grade 12 NETWORK & HCI QUIZ' assesses knowledge on basic networking concepts including communication requirements, signal types, network structures, and key devices. It helps students understand digital... see morecommunications and network configurations relevant for academic and professional growth. see less

2. The method of putting messages into secret codes to safeguard the privacy  of data  during transmission is known as 

Explanation

The method of putting messages into secret codes to safeguard the privacy of data during transmission is known as encrypting. This process involves converting plain text into a coded form using encryption algorithms, making it unreadable to anyone who does not have the decryption key. Encrypting helps protect sensitive information from unauthorized access and ensures the confidentiality and security of the data being transmitted.

Submit
3. In a star network, if the central hub fails the network will:

Explanation

In a star network, all the devices are connected to a central hub. This central hub is responsible for managing the network and facilitating communication between the devices. If the central hub fails, it means that the network's main control and communication point is no longer functioning. As a result, the devices will not be able to communicate with each other, leading to a network failure. Therefore, if the central hub fails, the network will fail as well.

Submit
4. For successful communication you need which of the following:i. sending deviceii. receiving deviceiii. communication channeliv modem

Explanation

Successful communication requires both a sending device and a receiving device, as well as a communication channel through which the information can be transmitted. The sending device is responsible for encoding and sending the message, while the receiving device is responsible for decoding and receiving the message. The communication channel is the medium through which the message travels, such as a telephone line or the internet. Therefore, options i, ii, and iii are correct as they include all the necessary components for successful communication. Option iv, which includes only the modem, is incorrect as it does not include the sending and receiving devices.

Submit
5. In a token ring network, which device can transmit the data?

Explanation

In a token ring network, the device with the token is the one that can transmit the data. In this type of network, a token is passed from device to device in a sequential manner. Only the device that possesses the token has the authority to transmit data. Once it finishes transmitting, it passes the token to the next device in the ring. Therefore, the device with the token at any given time is the one that can transmit the data.

Submit
6. Hardware/ software which restricts access to data and information on a network, is known as a:

Explanation

A firewall is a hardware or software that is designed to restrict access to data and information on a network. It acts as a barrier between an internal network and the external internet, monitoring and controlling incoming and outgoing network traffic. It helps to prevent unauthorized access, malicious attacks, and potential security breaches by analyzing the data packets and enforcing security rules and policies. Firewalls can also be configured to filter specific types of traffic or block certain websites or applications, providing an additional layer of protection for the network.

Submit
7. What sort of signal do computers use?

Explanation

Computers use digital signals, which are represented by discrete values of 0s and 1s. Unlike analogue signals, which are continuous and can have infinite values, digital signals provide a more reliable and accurate way of transmitting and storing information. These signals are used by computers to process and communicate data, as they can be easily manipulated, encoded, and decoded by electronic circuits and software algorithms. Continuous electrical waves and broadcast radio are not specifically used by computers for their internal operations, making them incorrect options.

Submit
8. The amount of data which a communications channel can transmit at any one time is referred to as the:

Explanation

Bandwidth refers to the amount of data that can be transmitted through a communications channel at any given time. It is a measure of the channel's capacity and represents the maximum data rate that can be achieved. The term "channel size" is not commonly used in this context, while "baseband" and "broadband size" are not accurate descriptions of the capacity of a communications channel. Therefore, the correct answer is bandwidth.

Submit
9. The physical layout of a network is called the ?

Explanation

The physical layout of a network refers to how the devices and cables are arranged and connected to each other. This includes the placement of routers, switches, and other networking equipment, as well as the paths that data takes through the network. This concept is known as network topology. Network design refers to the overall plan and strategy for creating a network, while network implementation refers to the process of actually setting up and configuring the network. Network presentation does not accurately describe the physical layout of a network.

Submit
10. Another name for a server is:

Explanation

A server is commonly referred to as a host computer because it acts as a central hub that provides services and resources to other computers or devices on a network. It hosts various applications, data, and files, allowing clients or other devices to access and utilize them. The term "host" emphasizes the server's role as the main source or provider of services, distinguishing it from clients or desktop computers that primarily consume or access these services.

Submit
11. Misty has a coffee shop. Many of her patrons use their laptops and PDAs to work while having coffee and donuts. Several of the patrons have suggested that she establish the coffee shop as a 'hotspot'?   Which of the following statements BEST describes 'hotspot'?

Explanation

A hotspot refers to an area where the Internet can be accessed without using wires. In the context of Misty's coffee shop, establishing it as a hotspot means providing wireless internet access to her patrons who use laptops and PDAs to work while having coffee and donuts. This allows them to connect to the internet without the need for physical cables or wires.

Submit
12. Which of the following groups best describe authentication methods:

Explanation

The correct answer includes a combination of authentication methods such as passwords, biometric devices, signatures, and smart cards. These methods are commonly used to verify the identity of individuals and grant them access to systems, devices, or sensitive information. Passwords require users to provide a unique combination of characters, while biometric devices use physical or behavioral characteristics like fingerprints or facial recognition. Signatures and smart cards provide additional layers of authentication by requiring users to provide a handwritten signature or use a physical card with embedded authentication data. Together, these methods help ensure secure access to important resources.

Submit
13. Which of the following types of physical transmission media is the fastest?

Explanation

Fibre-optic cable is the fastest type of physical transmission media because it uses light signals to transmit data, which allows for extremely high transmission speeds. Unlike twisted-pair and coaxial cables, fibre-optic cables have a much higher bandwidth and can transmit data over longer distances without any loss in signal quality. In addition, fibre-optic cables are not affected by electromagnetic interference, making them more reliable for high-speed data transmission. Infra-red, on the other hand, is not a physical transmission media and is typically used for wireless communication rather than wired connections.

Submit
14. The health club 'Live Well Gym and Spa' is developing a website to be used for marketing itself, allowing members to make payments and purchasing products online. Which of the following is the MOST appropriate domain name for the health club's website?

Explanation

The most appropriate domain name for the health club's website is www.livewell.com because it is a commercial website and ".com" is the most common and recognized domain extension for commercial purposes.

Submit
15. Which of the following networks rely on a single network backbone cable?

Explanation

A bus network relies on a single network backbone cable to connect all devices in the network. In this type of network, all devices are connected to the backbone cable, forming a linear structure. Data is transmitted along the cable and each device receives the data and decides whether to process it or ignore it. If the backbone cable is damaged or breaks, the entire network can be affected.

Submit
16. Which of the following types of physical transmission media is the most expensive?

Explanation

Fibre-optic cable is the most expensive type of physical transmission media because it uses advanced technology and materials to transmit data using light signals. It offers high bandwidth and long-distance capabilities, making it ideal for high-speed and long-distance communication. The cost of manufacturing and installing fibre-optic cables is higher compared to other types of cables like twisted-pair or coaxial, which contributes to its higher price. Additionally, fibre-optic cables require specialized equipment and expertise for installation and maintenance, further increasing the overall cost.

Submit
17. The field of Human Computer Interaction involves the use of technology to:

Explanation

The field of Human Computer Interaction focuses on designing and developing interfaces that allow users to interact with computers effectively and efficiently. This involves creating user-friendly interfaces, such as icons and menus, that make it easier for individuals to navigate and use computer systems. The goal is to enhance the user experience and ensure that technology is accessible and intuitive for users. The other options, imitating human behavior and influencing behavior in humans, are not directly related to the primary objective of providing user interfaces for computers.

Submit
18. In most modern computers, which of the following pieces of hardware is commonly inbuilt?

Explanation

A Network Interface Card (NIC) is commonly inbuilt in most modern computers. This hardware component allows the computer to connect to a network, such as a local area network (LAN) or the internet. It provides the necessary interface and communication protocols for the computer to send and receive data over the network. Without a NIC, a computer would not be able to connect to a network and access resources or communicate with other devices on the network.

Submit
19. The process of breaking a message into individual packets and sending them along the best route, is known as:

Explanation

Packet switching is the correct answer because it refers to the process of breaking a message into smaller packets and sending them individually over a network. These packets are then routed independently through the network to their destination, where they are reassembled into the original message. This method allows for more efficient and reliable transmission of data, as packets can take different routes and be reassembled at the destination even if some of them are lost or delayed during transmission.

Submit
20. Ethernet standard uses what what medium to transmit data?

Explanation

Ethernet standard uses cable as the medium to transmit data. Cable is a physical medium that allows for the transmission of electrical signals carrying data between devices. This can include various types of cables such as twisted pair cables, coaxial cables, or fiber optic cables. These cables provide a reliable and secure connection for data transmission in Ethernet networks.

Submit
21. A network that provides a mobile user with a secure connection to a company network server is a :

Explanation

A VPN (Virtual Private Network) is a network that provides a mobile user with a secure connection to a company network server. It allows users to access and transmit data over a public network (such as the internet) in a secure and encrypted manner, ensuring that their connection is private and protected from unauthorized access. VPNs are commonly used by remote workers or individuals who need to access company resources from outside the office, providing a secure way to connect to the company network as if they were physically present in the office.

Submit
22. Every site on the Internet has an address known as the

Explanation

URL stands for Uniform Resource Locator, which is the address of a specific webpage or resource on the internet. It is used to locate and access websites or specific webpages. Every website or webpage has a unique URL that allows users to navigate and access the desired content on the internet.

Submit
23. All of the following are benefits of a Common User Interface EXCEPT:

Explanation

A common user interface provides benefits such as ease of use across different software, increased speed of learning, and confidence for novice users. However, it does not increase the cost of training. In fact, a common user interface reduces the need for extensive training as users can easily transfer their knowledge and skills from one software to another. This ultimately saves time and resources that would otherwise be spent on training sessions.

Submit
24. Which of the following statements about Networks is FALSE:

Explanation

Networks do not reduce security risks, but rather introduce new security risks. While networks can provide benefits such as improved communication and resource sharing, they also create vulnerabilities that can be exploited by hackers or unauthorized users. Therefore, it is important to implement security measures such as firewalls, encryption, and user authentication to mitigate these risks.

Submit
25. When is 802.11 used?

Explanation

802.11 is used to transmit data over a wireless network. This is because 802.11 is a set of standards that define wireless local area network (WLAN) communication. It specifies how devices can communicate wirelessly, allowing data to be transmitted between devices without the need for physical cables. Therefore, when the goal is to transmit data over a wireless network, 802.11 is the appropriate choice.

Submit
26. A computer network that allows controlled access from outside for specific business or educational purposes isknown as :

Explanation

An extranet is a computer network that allows controlled access from outside for specific business or educational purposes. It is different from an intranet, which is a private network restricted to a specific organization. The internet is a global network that allows access to information and resources from anywhere. A private network refers to a network that is exclusively used by a specific organization and is not accessible to the public. Therefore, the correct answer is extranet.

Submit
27. Gloria will be developing an interface for users in a company who are not technology 'savvy'. The software for which the interface is to be built is quite powerful with more than two hundred features. The MOST appropriate user interface would be  

Explanation

A graphical user interface (GUI) would be the most appropriate user interface for users who are not technology savvy and for software with more than two hundred features. GUIs use visual elements like icons, buttons, and menus to make it easier for users to interact with the software. This type of interface is typically more intuitive and user-friendly compared to others like command line interfaces or menu-driven interfaces, which may require users to have more technical knowledge or memorize specific commands.

Submit
28. The protocol responsible for transferring email messages from client computers to an email server is known as:

Explanation

SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the protocol used for transferring email messages from client computers to an email server. SMTP is specifically designed for sending emails and is widely used by email clients and servers to communicate and transfer messages over the internet. It is responsible for the delivery of outgoing emails from the client to the server, ensuring that the emails reach their intended recipients.

Submit
29. Which network hardware device is best suited to connecting multiple networks together?

Explanation

A router is the best network hardware device for connecting multiple networks together. Unlike a modem, which is used to connect a network to the internet, a router is specifically designed to direct network traffic between different networks. A hub is a simple device that broadcasts all incoming network traffic to all connected devices, making it inefficient for connecting multiple networks. A switch is more advanced than a hub as it can direct network traffic to specific devices, but it is still limited in its ability to connect multiple networks. A router, on the other hand, can intelligently route traffic between different networks, making it the ideal choice for this purpose.

Submit
30. One advantage of a ring network compared to a bus is that:

Explanation

A ring network can span a larger area than a bus because in a ring network, each device is connected to two neighboring devices, forming a closed loop. This allows for longer distances between devices and the ability to cover a larger geographical area. In contrast, a bus network has a linear topology where all devices are connected to a single communication line, limiting the distance that can be covered. Therefore, the ring network's ability to span a larger area is an advantage over a bus network.

Submit
31. Which of the following are true for a peer to peer network: i)  A peer to peer network is usually suited for less than 10 devices ii) A peer to peer network can only be a LAN iii) In a peer to peer network all data is stored on a central computer iv) A peer to peer network does not require a server

Explanation

A peer to peer network is usually suited for less than 10 devices because it is a decentralized network where each device (peer) has equal capabilities and responsibilities. It does not require a server as all devices can directly communicate and share resources with each other. Therefore, both statements i and iv are true for a peer to peer network.

Submit
32. Which statements below BEST describe an appropriate user interface for a visually impaired person I.   Allows the use of text commands II. Allows the use of menus, icons and pointers III. Allows the use of voice commands

Explanation

An appropriate user interface for a visually impaired person would include the use of text commands (i) and voice commands (iii). Text commands allow the user to interact with the interface by typing or entering specific commands using a keyboard or other input device. Voice commands, on the other hand, allow the user to control the interface using spoken words or phrases. These features are especially important for visually impaired individuals as they provide alternative means of interacting with the interface without relying on visual cues or icons.

Submit
33. In a large organisations network with an Internet connection, which of the following pieces of hardware would be required? i)   Firewall ii)  Modem iii) Router iv) Switch

Explanation

In a large organization's network with an Internet connection, the required pieces of hardware would be a firewall, modem, and router.

A firewall is essential for network security as it monitors and controls incoming and outgoing network traffic based on predetermined security rules.

A modem is necessary to connect the network to the Internet, converting the digital signals from the network into analog signals that can be transmitted over the Internet.

A router is required to direct network traffic between different networks, such as connecting the organization's internal network to the Internet.

Therefore, the correct answer is i, ii & iii.

Submit
34. When accessing the Internet through a mobile phone you are most likely to be using which of the following transmission media?

Explanation

When accessing the Internet through a mobile phone, the most likely transmission media to be used is cellular radio. This is because cellular radio technology allows mobile phones to connect to the Internet using cellular networks, which are made up of a network of cell towers that transmit and receive signals to and from mobile devices. Cellular radio provides wireless communication over long distances, making it the most suitable option for accessing the Internet on a mobile phone.

Submit
35. Microwave radio has the following characteristics:  i) High Speed ii) Expensive to set up iii) Maximum distance of 100 m iv) Requires line of sight for transmission

Explanation

Microwave radio is known for its high speed, making it a suitable choice for transmitting data quickly. Additionally, it is expensive to set up due to the need for specialized equipment and infrastructure. Lastly, microwave radio requires a clear line of sight for transmission, meaning there should be no obstacles between the transmitting and receiving antennas. Therefore, the correct answer is C, as it includes all the characteristics mentioned - high speed, expensive setup, and line of sight requirement.

Submit
36. Which of the following devices is best suited as the central point on a star network?

Explanation

A switch is the best device suited as the central point on a star network. Unlike a hub, a switch can intelligently direct network traffic to the specific device it needs to reach, rather than broadcasting it to all devices on the network. This allows for more efficient and secure communication within the network. A router is used to connect multiple networks together, while a server is a device that provides various services to other devices on the network. Therefore, a switch is the most appropriate device for a star network's central point.

Submit
37. Ethernet standard works best with which topology/ topologies? i)  Bus ii) Star iii) Ring iv) Mesh

Explanation

Ethernet standard works best with the Star and Bus topologies. In the Star topology, all devices are connected to a central hub or switch, allowing for easy scalability and troubleshooting. The Bus topology, on the other hand, uses a single cable that connects all devices in a linear fashion. Ethernet is designed to work well with both of these topologies, providing efficient and reliable communication between devices. The Ring and Mesh topologies are not as commonly used for Ethernet networks.

Submit
38. Bluetooth is an example of which of the following wireless transmission media?

Explanation

Bluetooth is an example of broadcast radio as it uses radio waves to transmit data wirelessly between devices.

Submit
39. Which of the following types of physical transmission media can also be referred to as 'ethernet cable'?

Explanation

Twisted-pair cable can also be referred to as 'ethernet cable' because it is commonly used in Ethernet networks. It consists of pairs of insulated copper wires twisted together, which helps to reduce interference and crosstalk. Twisted-pair cable is widely used for local area networks (LANs) and is compatible with Ethernet protocols, making it a popular choice for connecting devices in a network.

Submit
40. Information is valuable, hence computers use numerous physical and software access restrictions to protect and secure information. Which of the following statements about physical and software access restrictions is FALSE?

Explanation

Passwords and encryption are actually examples of software access restrictions, not physical access restrictions. Installation keys, on the other hand, can be considered as a form of physical access restriction because they are typically required to install or access certain software or systems.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 12, 2012
    Quiz Created by
    Sherraine2012
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
TCP/ IP is used for what type of network?
The method of putting messages into secret codes to safeguard the...
In a star network, if the central hub fails the network will:
For successful communication you need which of the...
In a token ring network, which device can transmit the data?
Hardware/ software which restricts access to data...
What sort of signal do computers use?
The amount of data which a communications channel can transmit at any...
The physical layout of a network is called the ?
Another name for a server is:
Misty has a coffee shop. Many of her patrons use their laptops and...
Which of the following groups best describe authentication methods:
Which of the following types of physical transmission media is the...
The health club 'Live Well Gym and Spa' is developing a website to be...
Which of the following networks rely on a single network backbone...
Which of the following types of physical transmission media is the...
The field of Human Computer Interaction involves the use of technology...
In most modern computers, which of the following pieces of hardware is...
The process of breaking a message into individual packets...
Ethernet standard uses what what medium to transmit data?
A network that provides a mobile user with a secure connection to a...
Every site on the Internet has an address known as the
All of the following are benefits of a Common User Interface EXCEPT:
Which of the following statements about Networks is FALSE:
When is 802.11 used?
A computer network that allows controlled access from outside for...
Gloria will be developing an interface for users in a company who are...
The protocol responsible for transferring email messages from client...
Which network hardware device is best suited to connecting multiple...
One advantage of a ring network compared to a bus is that:
Which of the following are true for a peer to peer network:...
Which statements below BEST describe an appropriate user interface for...
In a large organisations network with an Internet connection, which of...
When accessing the Internet through a mobile phone you are...
Microwave radio has the following characteristics: ...
Which of the following devices is best suited as the central point on...
Ethernet standard works best with which topology/ topologies?...
Bluetooth is an example of which of the following wireless...
Which of the following types of physical transmission media can also...
Information is valuable, hence computers use numerous physical and...
Alert!

Advertisement