Chapter1 Review
Questions
1. Which of the following is one of the three basic
functions a computer performs? (Choose all that apply.)
a. Processing
b. Internet access
c.
Input
d. Graphics
e. Output
f. E-mail
2. The executes instructions provided by computer programs.
a. CPU
b. NIC
c. Hard drive
d. USB
3. When a CPU is composed of two or more processors, each
one is referred to as a(n) .
a. I/O
b. Core
c. OS
d. Flash
4. Which of the following is considered
long-term storage? (Choose all that apply.)
a. Flash
drive
b. RAM
c. Working storage
d. Hard
drive
5. Which motherboard component controls data
transfers between memory, expansion slots, I/O devices, and the CPU?
a. RAM slots
b. IDE connectors
c.
Chipset
d. PCI-Express
6. You want to purchase a new high-performance
graphics card for your computer. Which type of connector should it have?
a. PCI
b. SATA
c. IDE
d.
PCI-Express
7. The time it takes for read/write heads to
move to the correct spot on the platter is the.
a. Rotational delay
b. Seek
time
c. Transfer time
d. Access time
8. Which of the following is a task usually
performed by the BIOS? (Choose all that apply.)
a.
Perform a POST.
b. Create an interrupt.
c. Store the operating system.
d. Begin
the boot procedure.
9. Place the following steps of the boot
procedure in order.
a. The OS is loaded into RAM.
b. CPU starts.
c. OS services are started.
d. Power is applied.
e. The POST is executed.
f. Boot devices are searched.1
Answer: d, b, e, f, a, c
10. Which of the following is a critical service
provided by the OS? (Choose all that apply.)
a. Power-on self test
b. Memory
management
c. Web browsing
d. File
system
e. Storage
11. An OS’ s capability to run more than one
application or process at the same time is referred to which of the following?
a. Multicore
b. Double time
c.
Multitasking
d. Multiprocessor
e. Interrupt processing
12. You have just installed a new NIC in your PC
to replace the old one that had started malfunctioning. What additional
software must be installed to allow the OS to communicate with the new NIC?
a. Network application
b. Device
driver
c. BIOS
d. Protocol
13. Which of the following requests information
stored on another computer?
a. NIC
b.
Network client
c. Network server
d. Network protocol
e. Device driver
14. Choose the correct order for the process of
a user attempting to access network resources:
1. Network protocol
2. Application
3. Network client
4. NIC driver
a. 4, 2, 1, 3
b. 3, 2, 1, 4
c. 1, 4, 2, 3
d. 2, 3,
1, 4
e. 3, 1, 2, 4
15. TCP/IP is an example of which of the
following?
a. NIC
b. Network client
c. Network server
d.
Network protocol
e. Device driver
16. In network communication, the address is
used to deliver a frame to the correct computer on the network. (Choose all
that apply.)
a. MAC
b. Logical
c. IP
d.
Physical
17. A(n) message is used to determine whether a
computer is listening on the network.
a. MAC
b. Ping
c. IP
d. TCP
18. TCP/IP uses to look up a computer’ s IP
address, given its name.
a. DNS
b. Ping
c. MAC
d. TCP
19. The unit of information containing MAC
addresses and an error-checking code that’ s processed by the network interface
layer is referred to as a.
a. Packet
b. Ping
c. Frame
d. Chunk
20. Data is processed from the time an
application creates it to the time it reaches the network medium. This process
includes adding information such as addresses and is called which of the
following?
a. Packetization
b.
Encapsulation
c. Deencapsulation
d. Layering
1
21. You’
re the network administrator for a company that has just expanded from one floor
to two floors of a large building, and the number of workstations you need has
doubled from 50 to 100. You’ re concerned that network performance will suffer
if you add computers to your existing LAN. In addition, new users will be
working in a separate business unit, and there are reasons to logically
separate the two groups of computers. What type of network should you
configure?
a. WAN
b. MAN
c.
Internetwork
d. Extended LAN
22. Which of the following best describes a
client?
a. A computer’ s primary role in the network is
to give other computers access to network resources and services.
b. A
computer’ s primary role in the network is to run user applications and access
network resources.
c. It’s the software that responds to requests
for network resources.
d. The OS installed on a computer is designed
mainly to share network resources.
23. You work for a small company with four users
who need to share information on their computers. The budget is tight, so the
network must be as inexpensive as possible. What type of network should you
install?
a. Server-based network
b.
Peer-to-peer network
c. WPAN
d. Storage area network
24. Which of the following characteristics is
associated with a peer-to-peer network? (Choose all that apply.)
a.
Decentralized data storage
b.
Inexpensive
c.
User-managed resources
d. Centralized control
e. Uses a directory service
25. A device interconnects five computers and a
printer in a single office so that users can share the printer. This
configuration is an example of which of the following?
a. LAN
b. MAN
c. WAN
d. Internetwork
26. At Yavapai College, the Prescott and Prescott Valley
campuses (8 miles apart) have LANs connected via the local phone company. This
configuration is an example of which of the following? (Choose the best
answer.)
a. MAN
b. WPAN
c. WAN
d. SAN
27. You have installed Windows Server 2008 on a new server
and want to centralize user logons and security policies. What type of software
should you install and configure on this server?
a. Naming services
b. Application services
c. Communication services
d. Directory services
28. Peer-to-peer networks aren’t suitable in which of the
following situations?
a. Tight security is
required.
b. Five or fewer users need network access.
c. Budget is the primary consideration.
d. No one uses the network heavily.
29. Which of the following best describes a storage area
network?
a. Provides a mechanism for users to access a network’ s
storage resources remotely
b. Uses high-speed
networking technologies to give servers fast access to large amounts of disk
storage
c. Is a short-range networking technology designed to
connect personal devices to exchange information
d. Provides secure centralized file storage and sharing and
access to networked printers
30. Why might Windows 7 or Windows Vista require more RAM or
disk space than Windows Server 2008?
a. They need to accommodate handling centralized logon.
b. They include a directory service and a naming service.
c. They run many background networking services.
d. They support a
graphics-intensive user interface.
Chapter 4
Review Questions
1. Which of the following is a common
characteristic of a networking medium? (Choose all that apply.)
a.
Bandwidth rating
b.
Interference susceptibility
c. Broadband rating
d.
Maximum segment length
2. Which of the following types of fiber-optic
connectors provides high density and requires only one connector for two
cables?
a. SC
b. ST
c. MT-RJ
d. RJ-45
3. Which of the following conditions requires
cables not to exceed a recommended maximum length?
a. Diminution
b. Capacitance
c. Bandwidth
d.
Attenuation
4. Which of the following is the process for
representing bit signals on the medium?
a. Encryption
b.
Encoding
c. Decryption
d. Decoding
5. What happens to signals as they travel the
length of the medium?
a. They decode.
b. They amplify.
c. They
attenuate.
d. They implode.
4
6. Which of the following is UTP susceptible to?
(Choose all that apply.)
a. EMI
b.
Crosstalk
c. Signal enhancement
d. LEDs
7. The space between a false ceiling and the
true ceiling where heating and cooling air circulates is called the.
a. Duct-equivalent airspace
b. Conduit
c. Return air
d. Plenum
8. What type of connector is used most commonly
with TP network wiring?
a. RJ-11
b. RJ-45
c. BNC
d. MT-RJ
9. You have been hired to install a network at a
large government agency that wants to reduce the likelihood of electronic
eavesdropping on its network. What type of cable is most resistant to
eavesdropping?
a. UTP
b. STP
c. Coaxial
d. Fiber
optic
10. Which of the following is a characteristic
of unshielded twisted-pair cable? (Choose all that apply.)
a. Consists of four wires
b. Commonly used in physical bus topologies
c. Has a
distance limitation of 100 meters
d. Is
susceptible to electrical interference
11. Which of the following is a characteristic
of fiber-optic cabling? (Choose all that apply.)
a. Can be
used in electrically noisy environments
b. Requires only a single strand of fiber for
network connections
c. Carries data over longer distances than UTP
d. Has low bandwidth
12. You’re preparing to install a conventional
Ethernet network in your new office building, but your boss tells you to be
ready to handle a switchover to 1 Gbps Ethernet next year.
What types of cable could you install? (Choose
all that apply.)
a. Cat 5
b. Fiber
optic
c. Cat 4
d. Cat 6
e. Coax
13. When two cables run side by side, signals
traveling down one wire might interfere with signals traveling on the other
wire. What is this phenomenon called?
a. RFI
b. Attenuation
c. Impedance
d.
Crosstalk
14. What characteristic of twisted-pair cabling
helps mitigate the effects of crosstalk?
a.
Differential signals
b. Copper conductors
c. Four pairs of wires
d. 100-ohm impedance
15. What is the wireless device used to link
buildings without cable?
a. Hub
b. Router
c. Gateway
d. Bridge
16. Which of the following is a wiring standard
for twisted-pair cable connections? (Choose all that apply.)
a. IEEE 802.3a
b.
TIA/EIA 568A
c. IEEE 802.3b
d.
TIA/EIA 568B
17. Which of the following is a component of a
structured cabling system? (Choose all that apply.)
a. Patch
cables
b. RJ-11 plugs
c. Coax cable
d.
Horizontal wiring
4
18. Where
are you most likely to find vertical cabling? (Choose all that apply.)
a.
Equipment rooms
b. In the work area
c. Connecting
TCs
d. Connecting a work area to a TC
19. Which of the following are tool needed to
make a patch cable? (Choose all that apply.)
a. 110 punchdown tool
b. Cable
stripper
c.
Crimping tool
d. RJ-45 jack
20. Which type of connection is most likely to
require a crossover cable?
a. PC to hub
b. Hub to router
c. Router to switch
d. PC to
router
21. Which UTP limitations can be solved by
fiber-optic cable? (Choose all that apply.)
a.
Bandwidth
b. EMI
susceptibility
c. Installation cost
d.
Segment length
22. How many strands of fiber-optic cable are
needed for a network connection?
a. 1
b. 2
c. 4
d. 8
23. Which statement is true about fiber-optic
cables?
a. MMF uses lasers and has a thicker core.
b. SMF
uses lasers and has a thinner core.
c. MMF uses LEDs and has a thinner core.
d. SMF uses LEDs and has a thicker core.
24. Which type of wireless network requires a
clear line of sight between transmitter and receiver? (Choose all that apply.)
a.
Infrared
b. Narrowband radio
c. Spread-spectrum LAN
d. Terrestrial
microwave
25. Which of the following wireless technologies does a
802.11 wireless network using the
2.4 GHz frequency range use?
a. Infrared
b. Narrowband radio
c. Frequency hopping
d. Direct-sequence
spread spectrum
Chapter8
Review Questions
1. Which of the following is an objective of a
file system? (Choose all that apply.)
a.
Organize space on a drive.
b.
Organize files hierarchically.
c. Schedule access to applications.
d. Secure
access to files.
2. A cluster is composed of which of the following?
a. One or more 512-bit blocks8
b. Two or more 2K-byte sectors
c. One or
more 512-byte sectors
d. One or more 2K-byte blocks
3. Large cluster sizes can result in which of
the following on a disk drive?
a. Faster
performance for large files, more wasted space for small files
b. Faster performance for small files, less
wasted space for small files
c. More fragmentation, faster performance for
large files
d. Less fragmentation, more wasted space for
large files
4. Which of these file systems includes file and
folder permissions? (Choose all that apply.)
a. FAT32
b. Ext3
c. NTFS
d. Ext2
5. What feature of a file system makes it
possible to find a file based on keywords in it?
Indexing
6. Which of the following is best described as a
program loaded into memory that has no user interface but communicates with
other programs?
a. Process
b. Task
c.
Service
d. Application
7. The DNS function is built into most
applications.
True or False?
8. Which best describes context switching?
a. Dividing computing cycles equally among
processes
b. The OS
suspending the running process and activating another process
c. Cooperative multitasking
d. Changing from one OS to another in a virtual
environment
9. The most common form of multitasking in
current OSs is cooperative multitasking.
True or False?
10. The OS component that schedules processes to
run is the .
a. File system
b. User interface
c. Memory manager
d. Kernel
11. Which best describes a thread?
a. A process you can view in Task Manager
b. The smallest schedulable unit of software
c. A process in a preemptive multitasking OS
d. A multiprocessing computer
12. Which answer shows the correct order of DHCP
packets generated when a computer requests a new address lease?
a.
DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck
b. DHCPDiscover, DHCPRequest, DHCPOffer, DHCPAck
c. DHCPRequest, DHCPDiscover, DHCPOffer, DHCPAck
d. DHCPRequest, DHCPOffer, DHCPDiscover, DHCPAck
13. If you want a computer to query DNS by
appending more than one domain name to the computer name, which of the
following should you configure?
a. Two or more DNS server addresses
b. Additional DNS port numbers
c.
Additional DNS suffixes
d. Two or more primary DNS suffixes
14. Which port does your Web browser use to
communicate securely with the Web server by using SSL?
a. 80
b. 25
c. 110
d. 443
15. Why should you set the “ Register this connection’
s addresses in DNS” option?
a. So that you can query multiple domains when
looking up a computer name
b. So
that the computer’ s name and address are added to the DNS database
automatically
c. So that the NIC receives a DNS address from
DHCP
d. To disable Dynamic DNS for that computer
16. Which is the correct syntax for mapping
drive letter W to a shared folder named Accounting on the Finance server?
a. net
use W: \\Finance\Accounting
b. net
share W: \\Accounting\Finance
c. net
use W: \\Accounting\Finance
d. net
share W: \\Finance\Accounting
17. A
text file containing a list of commands is called which of the following?
a. Logon process file
b. Service file
c. Task file
d. Batch
file
8
18. The
default protocol Windows uses to share folders is which of the following?
a. NFS
b. SMB
c. WPA
d. FTP
19. Which of the following refers to a Windows
server with Active Directory installed?
a. Member server
b. NIS server
c. Domain
controller
d. LDAP controller
20. Which of the following best describes an
NAS?
a. A
dedicated device designed to provide shared storage for network users
b. A high-speed network storage solution that
can replace locally attached drives on servers
c. A storage solution in which some or all data
is stored on offsite servers
d. A SATA or SCSI drive connected to a server
21. Which of the following is an element of a
DNS server? (Choose all that apply.)
a. Zone
b. Root
hints
c. Scope
d. Reservations
22. If you want one server to take over the
processing of a server that has failed, what should you configure?
a. RAID
b.
Failover cluster
c. Redundant array of servers
d. Load-balancing disk system
23. Software that creates and monitors the virtual
hardware environment is called what?
a. Host computer
b.
Hypervisor
c. Snapshot
d. Guest OS
24. Bare-metal virtualization is best for
desktop virtualization.
True or False?
25. If you want your virtual machine to have
direct access to the physical network, which virtual network option should you
configure?
a.
Bridged
b. NAT
c. Host-only
d. Internal
please upload answers of chapters 9 to 13.....send me that links arslanshabbirgujjar@yahoo.com
ReplyDelete