Networking Essential Quiz1

1.      Which of the following is one of the three basic functions a computer performs?
(Choose all that apply.)
Processing
Interet access 
Input  
Graphics
Output
E-mail
2.      The ____________ executes instructions provided by computer programs.
CPU
NIC
Hard drive
USB
3.      When a CPU is composed of two or more processors, each one is referred to as a(n) _______________ .
I/O
Core
OS
Flash
4.      Which of the following is considered long-term storage? (Choose all that apply.)
Flash drive
RAM
Working storage
Hard drive
5.      Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?
RAM slots
IDE connectors
Chipset
PCI-Express
6.      You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have?
PCI
SATA
IDE
PCI-Express
7.      The time it takes for read/write heads to move to the correct spot on the platter is the ______________ .
Question options:
Rotational delay
Seek time
Transfer time
Access time
8.      Which of the following is a task usually performed by the BIOS? (Choose all that apply.)
Question options:
Perform a POST.
Create an interrupt.
Store the operating system.
Begin the boot procedure.
9.      Place the following steps of the boot procedure in order.
(when you put your answer type letter in sequence and put comma with NO space. For example, a,b,c,d,e,f)
a. The OS is loaded into RAM.
b. CPU starts.
c. OS services are started.
d. Power is applied.
e. The POST is executed.
f. Boot devices are searched.

Answer:           d,b,e,f,a,c       
10.  Which of the following is a critical service provided by the OS? (Choose all that apply.)
Power-on self test
Memory management
Web browsing
File system
Storage
11.  An OS’s capability to run more than one application or process at the same time is referred to which of the following?
Multicore
Doubletime
Multitasking
Multiprocessor
Interrupt processing
12.  You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?
Network application
Device driver
BIOS
Protocol
13.  Which of the following requests information stored on another computer?
NIC
Network client
Network server
Network protocol
Device driver
14.  Choose the correct order for the process of a user attempting to access network resources:
1. Network protocol
2. Application
3. Network client
4. NIC driver
4,2,1,3
3,2,1,4
1,4,2,3
2,3,1,4
3,1,2,4
15.  TCP/IP is an example of which of the following?
NIC
Network client
Network server
Network protocol
Device driver
16.  In network communication, the __________________ address is used to deliver a frame to the correct computer on the network. (Choose all that apply.)
MAC
Logical
IP
Physical
17.  A(n) _____________ message is used to determine whether a computer is listening on the network.
MAC
Ping
IP
TCP
18.  TCP/IP uses ____________ to look up a computer’s IP address, given its name.
DNS
Ping
MAC
TCP
19.  The unit of information containing MAC addresses and an error-checking code that’s processed by the network interface layer is referred to as a _____________ .
Packet
Ping
Frame
Chunk
20.  Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?
Packetization
Encapsulation
Deencapsulation
Layering
21.  You’re the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You’re concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?
WAN
MAN
Internetwork
Extended LAN
22.  Which of the following best describes a client?
A computer’s primary role in the network is to give other computers access to network resources and services.
A computer’s primary role in the network is to run user applications and access network resources.
It’s the software that responds to requests for network resources.
The OS installed on a computer is designed mainly to share network resources.
23.  You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install?
Server-based network
Peer-to-peer network
WPAN
Storage area network
24.  Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.)
Decentralized data storage
Inexpensive
User-managed resources
Centralized control
Uses a directory service
25.  A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?
LAN
MAN
WAN
Internetwork
26.  At Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) have LANs connected via the local phone company. This configuration is an example of which of the following? (Choose the best answer.)
MAN
WPAN
WAN
SAN
27.  You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?
Naming services
Application services
Communication services
Directory services
28.  Peer-to-peer networks aren’t suitable in which of the following situations?
Tight security is required.
Five or fewer users need network access.
Budget is the primary consideration.
No one uses the network heavily.
29.  Which of the following best describes a storage area network?
Provides a mechanism for users to access a network’s storage resources remotely
Uses high-speed networking technologies to give servers fast access to large amounts of disk storage
Is a short-range networking technology designed to connect personal devices to exchange information
Provides secure centralized file storage and sharing and access to networked printers
30.  Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008?
They need to accommodate handling centralized logon.
They include a directory service and a naming service.
They run many background networking services.

They support a graphics-intensive user interface.

No comments:

Post a Comment