Question 1
In asmall internet café, all computers share one
printer without using a server. What type of
network are they using?
A. Client-Server Network
B. Peer-to-Peer Network
C. Metropolitan Area Network
D. Intranet
3.
Question 2
You aresetting up a network in your small office
to share files directly between 5 computers.
Which network model is most cost-effective?
A. Cloud Network
B. Peer-to-Peer
C. Client-Server
D. Distributed WAN
4.
Question 3
A universitydatabase where all students’
records are stored on a single central system is
an example of:
A. Peer-to-Peer Network
B. Hybrid Network
C. Client-Server Network
D. Local Peer System
5.
Question 4
In aP2P setup, each device that sends or
receives data is called a:
A. Terminal
B. Node
C. Hub
D. Channel
6.
Question 5
A computertechnician notices that one infected
computer spread a worm to all others through file
sharing. What type of network were they likely
using?
A. Client-Server Network
B. Peer-to-Peer Network
C. Ring Network
D. WAN
7.
Question 6
Which ofthe following BEST describes a Client-
Server network?
A. All computers act equally as both server and
client.
B. A central server provides resources and clients
request them.
C. Data is distributed among all peers.
D. Each computer operates independently.
8.
Question 7
A computerscience class connects their laptops
to share project files directly. No admin or server
is used. What kind of network is this?
A. Client-Server
B. Peer-to-Peer
C. Centralized
D. Hybrid
9.
Question 8
When multipleclients send requests to a single
server at the same time, the server can
experience:
A. Data flooding
B. Bottleneck
C. Synchronization
D. Bandwidth leak
10.
Question 9
One advantageof a P2P network is:
A. Centralized control and backup
B. Easier to manage large organizations
C. Low setup cost and easy configuration
D. High level of security
11.
Question 10
In acompany network, the IT administrator
controls which employees can access specific
files. This setup describes:
A. Peer-to-Peer Network
B. Client-Server Network
C. Wireless Personal Network
D. Ring Network
12.
Question 11
Which situationshows a disadvantage of a P2P
network?
A. Each computer has its own backup system
B. One server manages all shared data
C. Users need permission to log in
D. Data is stored centrally
13.
Question 12
If apeer computer is shut down in a P2P
network, what is the most likely effect?
A. Entire network stops working
B. Other peers can still share files
C. Server will replace that node
D. Data is automatically backed up
14.
Question 13
In aP2P architecture, how are resources shared?
A. Through a single, centralized database
B. Each node provides and consumes data
C. Clients always depend on a server
D. Using an external storage only
15.
Question 14
Which typeof virus can spread automatically
from one peer to another through a network
connection?
A. Trojan horse
B. Spyware
C. Worm
D. Adware
16.
Question 15
A studentdownloads a movie from a P2P site
and unknowingly installs malware. What is this a
sign of?
A. High scalability
B. Weak security
C. Centralized control
D. Server bottleneck
17.
Question 16
Which statementcorrectly compares P2P and
Client-Server networks?
A. P2P is more secure than Client-Server
B. Client-Server is cheaper to maintain
C. P2P is best for small networks, while Client-
Server fits large ones
D. Client-Server doesn’t require maintenance
18.
Question 17
A smallstore owner wants to share inventory
data among 3 computers without buying a
server. What should he use?
A. P2P Network
B. Client-Server Network
C. Virtual LAN
D. Cloud Network
19.
Question 18
Which ofthe following is NOT a characteristic of
a P2P network?
A. All nodes are equal
B. Centralized data source
C. Provides and consumes data
D. No dedicated server
20.
Question 19
A hackerattacks a company’s main server and
steals thousands of records. What kind of
network was likely compromised?
A. Peer-to-Peer Network
B. Client-Server Network
C. Hybrid Network
D. Token Ring
21.
Question 20
In P2Psystems, what makes them efficient
despite lacking a central server?
A. Equal sharing of bandwidth and resources
B. Centralized data processing
C. High-cost infrastructure
D. Restricted user access
22.
Answer
1. B
2. B
3.C
4. B
5. B
6. B
7. B
8. B
9. C
10. B
11. A
12. B
13. B
14. C
15. B
16. C
17. A
18. B
19. B
20. A