Networks in Our Lives
Network Components
Types of Networks
Reliable Networks
Network Trends & Security
100

Communication today is considered as important as air, water, food, and shelter. What technology makes this level of connection possible?
 A) Servers
 B) Networks
 C) Switches
 D) Firewalls

 B) Networks 

100

Every computer on a network is called a ________.
 A) Router
 B) Host
 C) Switch
 D) Server

B) Host

100

What does LAN stand for?
 A) Local Area Network
 B) Long Access Node
 C) Large Area Network
 D) Line Access Network

A) Local Area Network

100

What is the term for the ability of a network to continue operating even if one path fails?
 A) Scalability
 B) Fault Tolerance
 C) Redundancy
 D) QoS

B) Fault Tolerance

100

What does BYOD stand for?
 A) Bring Your Own Device
 B) Build Your Own Database
 C) Back Your Online Data
 D) Bridge Your Organization Devices

A) Bring Your Own Device

200

What term is used to describe the idea that networks have created a “world without boundaries”?
 A) Open Access
 B) World Wide Web
 C) World without boundaries
 D) Digital Divide

C) World without boundaries

200

What type of device provides information to clients, such as web or email services?
 A) Client
 B) Router
 C) Server
 D) Switch

 C) Server

200

Which type of network spans a wide geographical area, LAN or WAN?
 A) LAN
 B) WAN
 C) WLAN
 D) Intranet

B) WAN

200

What network design feature allows a network to grow without reducing performance?
 A) Scalability
 B) Fault Tolerance
 C) Cloud Storage
 D) Accessibility

A) Scalability

200

Name one tool used for online collaboration.
 A) Cisco WebEx
 B) Facebook Messenger
 C) USB Drives
 D) File Explorer

A) Cisco WebEx

300

What is the human aspect of networking often referred to as, connecting people globally?
 A) Social Media
 B) The Human Network
 C) Peer-to-Peer Network
 D) Smart Network

B) The Human Network ✅

300

Name one advantage and one disadvantage of a peer-to-peer network.
 A) Advantage: Easy to set up; Disadvantage: Not secure
 B) Advantage: Expensive; Disadvantage: Fast
 C) Advantage: Secure; Disadvantage: Centralized
 D) Advantage: Scalable; Disadvantage: Cheap

A) Advantage: Easy to set up; Disadvantage: Not secure

300

Who typically administers a WAN compared to a LAN?
 A) LAN → service providers, WAN → one user
 B) LAN → one person/organization, WAN → service providers
 C) LAN → government, WAN → schools
 D) LAN → cloud, WAN → peer-to-peer

B) LAN → one person/organization, WAN → service providers

300

What mechanism is used to ensure reliable delivery of content like video and voice?
 A) VPN
 B) QoS (Quality of Service)
 C) Firewall
 D) ACL

B) QoS (Quality of Service)

300

What is the difference between a public cloud and a private cloud?
 A) Public → global access; Private → dedicated to one organization
 B) Public → fast; Private → slow
 C) Public → free; Private → paid
 D) Public → peer-to-peer; Private → centralized

A) Public → global access; Private → dedicated to one organization

400

Name one way networks have changed the way we form global communities.
 A) Watching TV
 B) Online collaboration and social media
 C) Using USB drives
 D) Local file transfers

B) Online collaboration and social media ✅

400

Identify two functions performed by intermediary network devices.
 A) Print documents, open apps
 B) Regenerate signals, maintain pathway info
 C) Store files, delete viruses
 D) Run operating systems, encrypt data

B) Regenerate signals, maintain pathway info

400

What is the difference between an intranet and an extranet?
 A) Intranet = global; Extranet = local
 B) Intranet = private internal; Extranet = allows external authorized access
 C) Intranet = cloud; Extranet = server
 D) Intranet = peer-to-peer; Extranet = centralized

B) Intranet = private internal; Extranet = allows external authorized access

400

What are the three goals of network security (the CIA triad)?
 A) Confidentiality, Integrity, Availability
 B) Cloud, Internet, Access
 C) Control, Input, Analysis
 D) Confidentiality, Innovation, Authentication

A) Confidentiality, Integrity, Availability

400

Name two external security threats and one internal threat to networks.
 A) External: Viruses, worms; Internal: Malicious employees
 B) External: USB drives, printers; Internal: Routers
 C) External: LAN, WAN; Internal: Switches
 D) External: Servers, PCs; Internal: Fiber cables

A) External: Viruses, worms; Internal: Malicious employees

500

How do networks influence not just communication, but also education, business, and entertainment in daily life?
 A) They isolate people
 B) They make access to information and services more global and connected
 C) They only help entertainment
 D) They are limited to local areas

B) They make access to information and services more global and connected ✅

500

List and describe the three main types of network media used to transmit data.
 A) Fiber cables, VPNs, USB
 B) Metal wires (electrical impulses), Fiber-optic (light pulses), Wireless (radio waves)
 C) Cloud, Bluetooth, LAN
 D) Copper, Plastic, Wooden

B) Metal wires (electrical impulses), Fiber-optic (light pulses), Wireless (radio waves)

500

Which three organizations (acronyms) shown on the module is said to help maintain structure on the internet?
 A) HTTP, FTP, SMTP
 B) LAN, WAN, WLAN
 C) IETF, ICANN, IAB
 D) SSL, TLS, VPN

C) IETF, ICANN, IAB

500

Explain how packet switching increases fault tolerance compared to circuit switching.
 A) Packet switching uses one path like circuit switching
 B) Packet switching sends packets over multiple paths, unlike circuit switching
 C) Packet switching is slower than circuit switching
 D) Packet switching does not use redundancy

B) Packet switching sends packets over multiple paths, unlike circuit switching

500

Larger networks use multiple layers of security. Name three advanced security solutions beyond antivirus and basic firewalls.
 A) ACL, IPS, VPN
 B) USB, Bluetooth, Wi-Fi
 C) Cloud, Fiber, Copper
 D) Peer-to-peer, Routers, Servers

A) ACL, IPS, VPN

M
e
n
u