Computer Network || Fill in the Blanks || Class 12



1. Through _____ you can establish contact with anyone in the world.

2. The main function of _____ is to divide the message or data into packets of a definite size on the source computer.

3. _____ refers to wireless fidelity which enables us to connect to the ISP without any cable.

4. _____ is a software that enables us to access the internet and explore websites.

5. Web page constitutes the _____.

6. A ______ is someone with a strong interest in how things work, who likes to create and modify things for their own enjoyment.

7. A computer _____ is a small software program that spreads from one computer to another and interferes with the normal functioning of computer.

8. Electronic junk mail or junk newsgroup postings are known as _____.

9. Digital signature meets the need for _____ and integrity.

10. The first network that planted the seed of internet was ______.

11. The protocol used for internet is _____.

12. A device used to connect dissimilar networks is called _____.

13. _____ is responsible for handling the address of the destination computer so that each packet is delivered to its proper destination.

14. Tricking people through authentic-looking emails or websites is called _____.

15. A program designed to replicate and eat up a computer's storage is called _____.

16. A digital document issued to a site by a certification authority of the internet is called a _____.

17. To connect computers located in a specific building or campus is known as _____.

18. Wi-Fi, infrared and Bluetooth are examples of _____.

19. Interspace is a _____.

20. A server that provides its services to other workstations on a network is a _____.

21. The technique of switching in which data is divided into smaller fragments is called _____.

22. _____ is a dedicated link between the sender and the receiver.

23. _____ is the measuring unit of speed at which the data transfer takes place.

24. All the computers are connected with each other in an unorganized manner in _____ topology.

25. In _____, all computers share equivalent responsibility for processing data.

26. A computer network that spans a relatively large geographical area is called _____.

27. WAN stands for _____.

28. Wired networks use an access method called _____.

29. Wireless networks use an access method called _____.

30. _____ is a protocol which allows users to download E Mail messages from mail server to a local computer.

31. _____ is a protocol that allows to send/upload email message from local computer to an email server.

32. A network of networks is known as _____.

33. In a network, a machine is identified by unique address called _____.

34. The physical address assigned by NIC manufacturer is called _____ address.

35. A MAC address consumes _____ bytes or _____ bits.

36. _____ is an example of Public cloud.

37. _____ is a network of physical objects embedded with electronics, software, sensors and network connectivity

38. TCP/IP stands for _____.

39. The _____ is the protocol used to make hypertext document readable on the WWW.

40. All computers connected to the Internet and wanting to use it for sending/receiving data must follow a common set of rules for communication called _____.

41. CSMA/CA stands for _____.

42. _____ Protocol tells each system how to form mail messages and transfer them between computers.

43. For access control, _____ is used for collision handling in wireless networks while _____ is used for collision handling in wired networks.

44. _____ is the technique of changing the characteristics of the signal being transmitted so that it carries data on it.

45. _____ is the process of extracting data from the received modulated signal.

46. Sum of data bits calculated from digital data so as to ensure data integrity is called ______.

47. _____ is the process of efficiently selecting a path/route in a network along which the data packets will travel to their destination.

48. The table maintained by routers for routing purposes, is called _____ table.

49. The Internet is most often used for the exchange of _____ and _____.

50. Web pages on a site are linked together through a system of _____.

51. The address of location of the document on the world wide web is called its _____.

52. The _____ is a computer based worldwide communication network.

53. The _____ is a component of the Internet that allows exchange of multimedia based and hyperlinked content.

54. Full form of WWW is _____ _____ _____.

55. A digital document hosted on a website is a _____ _____.

56. The landing page of a website is _____.

57. A webpage whose content is generated every time it is loaded is called a _____ webpage.

58. A webpage whose content is fixed and appears the same every time it is loaded, is called a _____ webpage.

59. A _____ _____ is a specialised computer which serves the requests made by web browsers.

60. Full form of URL is _____ _____ _____.

61. Full form of cc in the content of email is _____ _____.

62. Full form of bcc in the context of email is _____ _____ _____.

63. Full form of IP is _____ _____.

64. Full form of VoIP is _____ _____ _____ _____.

65. Website store the browsing activity through _____.

66. A network with a dedicated server is called a _____ network.

67. A computer, part of a computer network is called a _____.

68. A network having a span within a building is called a _____.

69. A network having a span of city, is called a _____.

70. The _____ is a central connection point where all network cables are concentrated.

71. The _____ is a network device that can connect the network segments based on the same protocol.

72. The _____ is a network device that navigates the data packets over large networks through the most efficient route.

73. The _____ is a network device that connects dissimilar networks.

74. The _____ is a networking device that regenerates or recreates a weak signal into its original strength and form.

75. The _____ topology has a central line and all nodes are connected to it.

76. The _____ topology has a central controller.

77. The tree topology is said to be a combination of _____ and _____ topologies.

78. In _____ topology, there exists multiple paths between any two nodes of the network.

79. The _____ is a small network created by linking many personal devices.


Answers:-

1. internet
2. TCP
3. Wi-Fi
4. Browser
5. World Wide Web
6. hacker
7. virus
8. spam
9. authentication
10. ARPANET
11.  TCP/IP
12. gateway
13. IP
14. hacking
15. worm
16. digital certificate
17. LAN
18. communication mediums
19. network
20. Dedicated server
21. Packet switching
22. Circuit switching
23. bits/second
24. Mesh
25. peer-to-peer network
26. WAN
27. Wide Area Network
28. CSMA/CD
29. CSMA/CA
30. IMAP
31. SMTP
32. Internet
33. IP address
34. MAC
35. 6, 48
36. Google Drive, One Drive (Microsoft’s) etc.  
37. The Internet of Things/IOT
38. Transmission Control Protocol/Internet Protocol
39. HTTP
40. Protocol
41. Carrier Sense Multiple Access with Collision Avoidance
42. SMTP
43. CSMA/CA, CSMA/CD
44. Modulation
45. Demodulation
46. Checksum
47. Routing
48. routing
49. messages, information
50. hyperlinks
51. URL
52. Internet
53. WWW
54. World Wide Web
55. web page
56. home page
57. dynamic
58. static
59. web server
60. Uniform Resource Locator
61. carbon copy
62. Blind carbon copy
63. Internet Protocol
64. Voice over Internet Protocol
65. cookies
66. client/server
67. node/host
68. LAN
69. MAN
70. hub
71. bridge
72. router
73. gateway
74. reapter
75. bus
76. star
77. star, bus
78. mesh
79. PAN

1 Comments

You can help us by Clicking on ads. ^_^
Please do not send spam comment : )

Post a Comment

You can help us by Clicking on ads. ^_^
Please do not send spam comment : )

Previous Post Next Post