1.
Which of the following is one of the three basic
functions a computer performs?
(Choose all that apply.)
Processing
Interet access
Input
Graphics
Output
E-mail
2.
The ____________ executes instructions provided
by computer programs.
CPU
NIC
Hard drive
USB
3.
When a CPU is composed of two or more
processors, each one is referred to as a(n) _______________ .
I/O
Core
OS
Flash
4.
Which of the following is considered long-term
storage? (Choose all that apply.)
Flash
drive
RAM
Working storage
Hard
drive
5.
Which motherboard component controls data
transfers between memory, expansion slots, I/O devices, and the CPU?
RAM slots
IDE connectors
Chipset
PCI-Express
6.
You want to purchase a new high-performance graphics
card for your computer. Which type of connector should it have?
PCI
SATA
IDE
PCI-Express
7.
The time it takes for read/write heads to move
to the correct spot on the platter is the ______________ .
Question options:
Rotational delay
Seek
time
Transfer time
Access time
8.
Which of the following is a task usually
performed by the BIOS? (Choose all that apply.)
Question options:
Perform
a POST.
Create an interrupt.
Store the operating system.
Begin
the boot procedure.
9.
Place the following steps of the boot procedure
in order.
(when you put your answer type letter in sequence and put
comma with NO space. For example, a,b,c,d,e,f)
a. The OS is loaded into RAM.
b. CPU starts.
c. OS services are started.
d. Power is applied.
e. The POST is executed.
f. Boot devices are searched.
Answer: d,b,e,f,a,c
10. Which
of the following is a critical service provided by the OS? (Choose all that
apply.)
Power-on self test
Memory
management
Web browsing
File
system
Storage
11. An
OS’s capability to run more than one application or process at the same time is
referred to which of the following?
Multicore
Doubletime
Multitasking
Multiprocessor
Interrupt processing
12. You
have just installed a new NIC in your PC to replace the old one that had
started malfunctioning. What additional software must be installed to allow the
OS to communicate with the new NIC?
Network application
Device
driver
BIOS
Protocol
13. Which
of the following requests information stored on another computer?
NIC
Network
client
Network server
Network protocol
Device driver
14. Choose
the correct order for the process of a user attempting to access network
resources:
1. Network protocol
2. Application
3. Network client
4. NIC driver
4,2,1,3
3,2,1,4
1,4,2,3
2,3,1,4
3,1,2,4
15. TCP/IP
is an example of which of the following?
NIC
Network client
Network server
Network
protocol
Device driver
16. In
network communication, the __________________ address is used to deliver a
frame to the correct computer on the network. (Choose all that apply.)
MAC
Logical
IP
Physical
17. A(n)
_____________ message is used to determine whether a computer is listening on
the network.
MAC
Ping
IP
TCP
18. TCP/IP
uses ____________ to look up a computer’s IP address, given its name.
DNS
Ping
MAC
TCP
19. The
unit of information containing MAC addresses and an error-checking code that’s
processed by the network interface layer is referred to as a _____________ .
Packet
Ping
Frame
Chunk
20. Data
is processed from the time an application creates it to the time it reaches the
network medium. This process includes adding information such as addresses and
is called which of the following?
Packetization
Encapsulation
Deencapsulation
Layering
21. You’re
the network administrator for a company that has just expanded from one floor
to two floors of a large building, and the number of workstations you need has
doubled from 50 to 100. You’re concerned that network performance will suffer
if you add computers to your existing LAN. In addition, new users will be
working in a separate business unit, and there are reasons to logically
separate the two groups of computers. What type of network should you
configure?
WAN
MAN
Internetwork
Extended LAN
22. Which
of the following best describes a client?
A computer’s primary role in the network is to give other
computers access to network resources and services.
A
computer’s primary role in the network is to run user applications and access
network resources.
It’s the software that responds to requests for network
resources.
The OS installed on a computer is designed mainly to share
network resources.
23. You
work for a small company with four users who need to share information on their
computers. The budget is tight, so the network must be as inexpensive as
possible. What type of network should you install?
Server-based network
Peer-to-peer
network
WPAN
Storage area network
24. Which
of the following characteristics is associated with a peer-to-peer network?
(Choose all that apply.)
Decentralized
data storage
Inexpensive
User-managed
resources
Centralized control
Uses a directory service
25. A
device interconnects five computers and a printer in a single office so that
users can share the printer. This configuration is an example of which of the
following?
LAN
MAN
WAN
Internetwork
26. At
Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) have
LANs connected via the local phone company. This configuration is an example of
which of the following? (Choose the best answer.)
MAN
WPAN
WAN
SAN
27. You
have installed Windows Server 2008 on a new server and want to centralize user
logons and security policies. What type of software should you install and
configure on this server?
Naming services
Application services
Communication services
Directory
services
28. Peer-to-peer
networks aren’t suitable in which of the following situations?
Tight
security is required.
Five or fewer users need network access.
Budget is the primary consideration.
No one uses the network heavily.
29. Which
of the following best describes a storage area network?
Provides a mechanism for users to access a network’s storage
resources remotely
Uses
high-speed networking technologies to give servers fast access to large amounts
of disk storage
Is a short-range networking technology designed to connect
personal devices to exchange information
Provides secure centralized file storage and sharing and
access to networked printers
30. Why
might Windows 7 or Windows Vista require more RAM or disk space than Windows
Server 2008?
They need to accommodate handling centralized logon.
They include a directory service and a naming service.
They run many background networking services.
They
support a graphics-intensive user interface.
No comments:
Post a Comment