TLE 10- CSS
QUARTER 3 DIAGNOSTIC TEST
1. What does LAN stand for?
A. Local Area Network
B. Large Area Network
C. Line Area Network
D. Logical Access Network
2. Which device connects multiple computers to form a network?
A. Monitor
B. Switch
C. Printer
D. Mouse
3. What is the main purpose of a router in a network?
A. Printing documents
B. Routing data packets between networks
C. Displaying graphics
D. Storing data
4. Which of the following is a type of network topology?
A. Star
B. Rectangle
C. Grid
D. Circle
5. What is the Internet?
A. A local computer system
B. A type of software
C. A programming language
D. A global network of interconnected computers
6. Why is a star topology often preferred over a bus topology?
A. It is less expensive to set up.
B. It is easier to troubleshoot and expand.
C. It requires fewer cables.
D. It has no central hub.
7. What differentiates the Internet from a computer network?
A. The Internet is a collection of networks worldwide.
B. The Internet only uses wired connections.
C. A computer network is wireless, while the Internet is not.
D. A computer network is larger than the Internet.
8. How does a peer-to-peer network function?
A. It requires a server to manage data.
B. Each device acts as both client and server.
C. It uses satellites for communication.
D. It only works with mobile devices.
9. Which network type is best for connecting devices within a building?
A. WAN
B. MAN
C. LAN
D. PAN
10. What role does topology play in a network?
A. It selects the software used.
B. It specifies the user rights.
C. It determines the physical layout of devices.
D. It determines the operating system.
11. If you were to design a small office network, which topology would you choose and
why?
A. Star for its scalability
B. Ring for its simplicity
C. Bus for its efficiency
D. Mesh for its low cost
12. What features would you include in a network for a school and why?
A. Internet access for research
B. File-sharing capabilities for collaboration
C. Centralized storage for easy management
D. All of the above
13. How would you design a secure wireless network?
A. Leave the network open for easy access
B. Use strong encryption like WPA3
C. Avoid setting a password
D. Disable all security features
14. Which type of network would you use to connect multiple offices in a city?
A. WAN
B. MAN
C. LAN
D. PAN
15. What would you do to prevent data loss in a network?
A. Regularly back up data
B. Use encryption
C. Implement a firewall
D. All of the above
16. What would happen if a central hub in a star topology fails?
A. Only the affected device stops working.
B. The network automatically repairs itself.
C. The speed of the network increases.
D. The entire network stops working.
17. Why might a bus topology be a poor choice for a large network?
A. It is too expensive to set up.
B. A single failure can disrupt the entire network.
C. It cannot handle wireless connections.
D. It uses too much power.
18. How does a router differ from a switch in a network?
A. A router connects different networks; a switch connects devices in the same
network.
B. A switch is used only for wireless networks.
C. A router stores data permanently.
D. A switch is faster but less reliable.
19. What problem might arise in a ring topology?
A. Data collisions are frequent.
B. The network becomes slower as more devices connect.
C. A break in the ring can disable the entire network.
D. It requires too many cables.
20. Why would a company choose a mesh topology?
A. For better redundancy and reliability
B. To reduce the cost of cabling
C. For its centralized structure
D. To simplify network troubleshooting
21. Which network type offers the best balance of cost and performance for a home
office?
A. PAN
B. WAN
C. MAN
D. LAN
22. What makes a mesh topology more expensive than other topologies?
A. It uses outdated technology.
B. It requires fewer connections.
C. It requires more devices and cabling.
D. It does not work with wireless networks.
23. How would you assess the security of a public Wi-Fi network?
A. It is generally secure without a password.
B. It is risky as data can be intercepted.
C. It is safer than private networks.
D. It does not allow encryption.
24. Which topology would you recommend for a reliable and scalable network?
A. Star
B. Ring
C. Bus
D. Mesh
25. Why is encryption important in a network?
A. It speeds up data transmission.
B. It protects data from unauthorized access.
C. It reduces the number of cables required.
D. It prevents physical damage to devices.
26. How would you combine multiple networks to improve connectivity in a large
organization?
A. Disconnect all separate networks.
B. Use switches for each department.
C. Use routers to connect LANs.
D. Install firewalls for each LAN.
27. What strategies could you combine to make a network both efficient and secure?
A. Reduce the number of devices.
B. Avoid using any wireless technology.
C. Disable all monitoring tools.
D. Use encryption, strong passwords, and backups.
28. How can a hybrid topology combine the strengths of multiple topologies?
A. By using only wireless networks
B. By integrating star and bus topologies for flexibility and reliability
C. By avoiding centralized systems
D. By reducing the overall cost
29. What combination of equipment would you suggest for a remote work setup?
A. Laptop, headset, reliable internet, and VPN
B. Desktop computer and a shared phone line
C. Multiple routers without security features
D. Printers and fax machines
30. How could you integrate the Internet and a LAN to improve access to online
resources?
A. Connect the LAN to a router with internet access.
B. Remove all firewalls from the network.
C. Use only wired connections.
D. Avoid using any DNS servers.
31. Which tool is used to connect network cables to a patch panel or keystone jack?
A. Crimping Tool
B. Punch-Down Tool
C. Screwdriver
D. Cable Tester
32. What is the purpose of a cable tester in networking?
A. To install network cables
B. To check if a network cable is functioning correctly
C. To cut network cables to the right length
D. To measure the speed of the network
33. Which tool is used to attach an RJ45 connector to a network cable?
A. Crimping Tool
B. Punch-Down Tool
C. Wire Cutter
D. Multimeter
34. What is a multimeter commonly used for in networking?
A. Testing electrical properties like voltage and continuity in cables
B. Installing connectors
C. Cutting and stripping cables
D. Organizing cables in a network rack
35. Which tool is used to strip the protective outer jacket of a network cable?
A. Cable Stripper
B. Crimping Tool
C. Screwdriver
D. Punch-Down Tool
36. What protocol automatically assigns IP addresses to the clients in a computer
network?
A. Constructive Host Configuration Protocol
B. Dynamic Host Configuration Protocol
C. Interactive Host Configuration Protocol
D. Static Host Configuration Protocol
37. What type of IP address is manually assigned to the clients in a computer network?
A. Absolute
B. Dynamic
C. Inactive
D. Static
38. What type of IP address changes every time a client connects to a server?
A. Absolute
B. Dynamic
C. Inactive
D. Static
39. The host address refers to the IP address’ ________________.
A. first two numbers
B. first and last numbers
C. last two numbers
D. middle two numbers
40. The network identifier refers to the __________.
A. first two numbers of an IP address
B. first and last numbers of an IP address
C. last two numbers of an IP address
D. middle two numbers of an IP address
41. How many sets of numbers does an IP address has?
A. One
B. Two
C. Three
D. Four
42. Which of the following sets the rules that governs the transmission of data in a
local area network?
A. Dynamic Protocol
B. Internet Protocol
C. Local Protocol
D. Transmission Protocol
43. Which of the following addresses uniquely identifies all the devices connected to a
network?
A. internet Practical address
B. Internet Protocol address
C. Intranet Permanent address
D. Intranet Protocol address
44. What term is used to describe the most powerful computer in a network?
A. Client
B. Protocol
C. Router
D. Server
45. What term is used to describe a computer system that normally gets resources
from a more powerful computer in the network?
A. Client
B. Protocol
C. Router
D. Server
46. What must be established to ensure that data will be communicated in a network?
A. Transaction Medium
B. Transcendence Medium
C. Transference Medium
D. Transmission Medium
47. What type of cable is the most used transmission medium?
A. Coaxial
B. Electrical
C. Fiber Optic
D. Twisted-pair
48. What type of connector is usually attached to both ends of a twisted-pair cable?
A. RJ43
B. RJ44
C. RJ45
D. RJ46
49. How many pairs of wires does a twisted-pair cable has?
A. One
B. Two
C. Four
D. Eight
50. Which of the following is used to attach the RJ45 jack to the end of a twisted-pair
cable?
A. Clamping tool
B. Crimping tool
C. Crimpling Tool
D. Crumping tool
51. What type of cable is used to connect a client to a host?
A. Cross-over
B. Cross-through
C. Straight-over
D. Straight-through
52. What type of cable is used to connect a host to another host?
A. Cross-over
B. Cross-through
C. Straight-over
D. Straight-through
53. What other name is used for a straight-through cable?
A. Catch cable
B. Hatch cable
C. Latch cable
D. Patch cable
54. The arrangement of the wires in both ends of a straight-through cable is ___________.
A. dissimilar
B. divergent
C. random
D. similar
55. In inserting the wires to the RJ45 jack, the lock must be located at the
_______________.
A. bottom
B. left
C. right
D. top
56. What type of connector is used for a twisted-pair cable?
A. RJ43
B. RJ44
C. RJ45
D. RJ46
57. What type of cable is the most used transmission medium?
A. Coaxial
B. Electrical
C. Fiber Optic
D. Twisted-pair
58. What type of cable is used to connect a client to a host?
A. Cross-over
B. Cross-through
C. Straight-over
D. Straight-through
59. What type of cable is used to connect a host to another host?
A. Cross-over
B. Cross-through
C. Straight-over
D. Straight-through
60. Connectivity between the networking device and a computer system can be
tested by sending a __________.
A. Ding
B. Ping
C. Ring
D. Sing