The document consists of a series of multiple-choice questions related to computer networking, hardware, software, and operating systems. It covers topics such as network devices, protocols, maintenance strategies, and security measures. Each question presents four options, with one correct answer among them.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
32 views
hns mgo-1
The document consists of a series of multiple-choice questions related to computer networking, hardware, software, and operating systems. It covers topics such as network devices, protocols, maintenance strategies, and security measures. Each question presents four options, with one correct answer among them.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
1. All are examples of interconnect devices EXCEPT.
A Gateways B Switches C Routers D LCD Projectors
2.What is the purpose of the DHCP? A To translate URLs to IP addresses B To translate IPv4 addresses to MAC addresses C To provide storage for email D To provide an IP configuration information to hosts 3.Hardware address is known as__________. A Hardware brand B MAC address C Network Interface Card D IP address 4.Which of the following would be a logical first step in troubleshooting a PC? A Define what applications are being used B Check the computer CMOS C Define the circumstances of the problem D Call the vendor 5.The standard internet protocol is: _____. A UDP B TCP/IP C WWW D FTP 6.Which topology creates a very reliable network but requires a large amount of cable and it is difficult to administer. A Ring Topology B Mesh Topology C Bus Topology D Star Topology 7.Which of the following is/are an example of internet browsers? A System information B System software C Mozilla fire fox D Operating system 8. The hardware infrastructure of the Internet happens at which layers of the OSI model? A Layers 3 and 4 B Layers 1 and 2 C Layers 1 and 4 D Layers 2 and 3 9. What is the recommended maximum length (approximate) for a segment of UTP cable? A 500M B 100m C 1km D 180m 10 Which of the following is not an open-source operating system? A Ubuntu B Windows C Android D Linux 11 What's the best way to protect your hard drive data? A Regular backups B periodically defrag it C By regular diagnostic D troubleshoot least once a week 12 Which of the communication modes support two-way traffic but in only once direction of a time? A Half-duplex B Simplex C Three - quarter's duplex D Full duplex 13 _______is specifically defines how data intended to be send over a network is broken into packets before transmission and reliably reassembled in the right order at the destination application. A UDP B TCP C SMTP D FTP 14 Which of the following is NOT an advantage of network security? A Gives privacy to users B Minimizes computer freezing and crashes C Protects system against viruses D Makes the system slower 15 The CPU and memory are located on the? A Expansion board B Storage device C Output device D Motherboard 16 Computer date and time is found in/on ___________. A Status bar B Scroll bar C Task bar D Menu bar 17 During the normal PC boot process, which of the following is active first? A ROM BIOS B Hard Disk C CMOS D RAM BIOS 18 Which of the following do attackers commonly target for fetching IP address of a target or victim user? A IP tracker B Websites C Web pages D Emails 19 The server on the internet is also known as a_________. A Gateway B Host C Hub D Repeater 20 The primarily activity of_______is to prevent an external user who are identifying the IP addresses of an internal network. A File server B Data server C Proxy server D AD server 21 An application software that is/are used to perform calculation functions and charts? A Microsoft Office Word B Microsoft Office Publisher C Microsoft Office Excel D Microsoft Office Access 22 ______is a type of maintenance that need regular maintenance schedule. A Predictive maintenance B Preventive maintenance C Breakdown maintenance D Proactive maintenance 23 When you deleted file in your computer, where does it go? A Recycle bin B Hard disk C My document D Flash disk 24 It is a network device that are used to amplify/ regenerate the weak signal is called. A Firewall B Gateway C Modem D Repeater 25 SMTP stands for ___________. A Simple Mail Transfer Protocol B Switch Mode Transfer Programming C Simple Main Transfer Protocol D Switch Mode Transfer Protocol 26 _______is a network that covers the size of a state, country, and could even be considered to include the entire Internet. A WAN B LAN C IP D CAN 27 Which one is NOT an internet service provider technology? A Fiber optics and Satellite internet B Cable and cell-based internet C Ethio-Telecomunication D DSL-Digital Subscriber Line 28 One of your print devices is not working properly, so you want to temporarily prevent users from sending jobs to the printer serving that device. Which of the following actions should you take? A Stop sharing the printer B Install the new printer again C Disconnect the whole system D Allow sharing the printer 29 When the mail server sends mail to other mail servers it becomes _________? A File server B SMTP client C SMTP server D Peer-severs 30 A piece of program code that inserted into another program to cause damage is called____A Program B Password C Virus D Anti-virus 31 Which function key is used for opening help? A F12 B F1 C F3 D F2 32 ________ is a good, cost-effective choice for smaller networks because the layout is simple, allowing all devices to be connected via a single coaxial or RJ45 cable. A Hybrid topology B Bus topology C Ring topology D Star topology 33 _____controls the way in which the computer system function and provide a means by which a user can interact with computer. A Application software B The platform C The operating system D Motherboard 34 A device that connects networks with different protocols. A Proxy Server B Hub C Switch D Gateway 35 The easiest topology to set up and maintain and having a central hub/switch that connects to nodes. A Ring topology B Mesh topology C Bus topology D Star topology 36 A plug and play storage device that simply plugs in the port of a computer is____. A Hard disk B Card C Flash Disk D CD 37 A piece of program code that inserted into another program to cause damage is called______ A Program B Password C Virus D Anti-virus 38 _______is anything that does not have value or does not add value. Waste is something the customer will not pay for. A MURA B Muri C MUDA D kaizen 39 The easiest topology to set up and maintain and having a central hub/switch that connects to nodes. A Ring topology B Mesh topology C Bus topology D Star topology 40 Which of the following is not a type of MS Access database object? A Worksheets B Table C Modules D Form 41 Identify among the following the network device used to connect two dis-similar types of networks. A Switch B Gateway C Bridge D Hub 42 A byte is equivalent to_______. A 8 bits B 32 bits C 6 bits D 64 bits 43 A user can get files from another computer on the internet by using______. A FTP B HTTP C TELNET D UTP 44 How can you edit a relationship already established between two tables? A Left click the relationship line B Double clicks the relationship line C Edit the table by Design view D Right click and select properties 45 Which one of the following is an Input device? A Printer B Speaker C Monitor D Keyboard 46 Which of the following are advantages of the internet? A Provides the latest news and happenings but around a specific area B Allows you to easily communicate with other people C Provides information on few topics D Make peoples not to focus on their task 47 _______is any device directly connected to the network that has been assigned a unique identifier or address. A IP B Wall outlet C Port D Node 48 Which software prevents the external access to a system? A Router B Firewall C Gateway D Virus checker 49 Which of the following commands will display the MAC (Media Access Control) address of a given computer? A nbt B ipconfig/all C ns lookup D nbt stat 50 Electrostatic Discharge (ESD) would cause the most damage to which component? A Keyboard B Monitor C Expansion Board D Power supply 51 Domain Name System can obtain the__________of host if its domain name is known and vice versa. A Port address B Station address C IP address D Checksum 52 Choose the output device among the given alternatives A Projector B Mouse C Scanner D Keyboard 53 The process by which Windows Server verifies that the user matches the user account employed to gain access. A Active Directory B Authentication C Hypervisor D Domain Name System 54 The first page that you normally view at a website is its_____. A Master page B First page C URL D Home page 55 Which IP address is reserved for loopback testing? A 127.0.0.1 B 127.0.0.0 C 192.168.10.1 D 127.0.1.1 56 From the internal component of personal computer, one is used to maintain date and time. AVROM B CMOS RAM C Jumper D VRAM 57 What is the best maintenance strategy? A Preventive maintenance B Predictive maintenance C Time based maintenance D Corrective maintenance 58 It serves to protect an internal network from external attacks. A Blockers B Password C Firewalls D Security 59 What is the function of Network Interface Cards? A Connects the clients, servers and peripherals to the network through a port B boost the signal between two cable segments or wireless access points C allows you to segment a large network into smaller, efficient networks D connects networks with different protocols like TCP/IP 60 What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences? A Coaxial cable B Microwave C Optical Fiber D Unshielded twisted pair 61 In peer-to-peer network, each computer in a network is referred as______. A Peer B Server C Client D Sender 62 Devices on one network can communicate with devices on another network via a______. A Gateway B Printer Server C Utility Server D File Server 63 In a ____ topology, if there are n devices in a network, each device has n-1 ports for cables. A Mesh B Star C Ring D Bus 64 HTTP is ___________protocol. A Data link layer B Transport layer C Application layer D Network layer 65 Which of the following is not an advantage of implementing 5S technique? A To standardize work practices B To improve work efficiency C To create a dirty workplace D To improve work discipline 66 If all devices are connected to a central hub, then topology is called. A Ring Topology B Bus Topology C Star Topology D Tree Topology 67 Monitor and System unit can be connected by A Modem B PS/2 Bus C Network Cable D Video Graphic Adapter cable 68 _________is working in a helpdesk environment, including topics such as logging and prioritizing client requests, communicating with personnel to identify the problem and give solution for the problem A Information help desk B Record Client Support Requirements C Conduct and facilitate user training D Technical documentation 69 Which of the following qualifies as best Disaster Recovery (DR) site? A DR site in different country B DR site in country C DR site in the same city D DR site in the same campus 70 Most of the telephone cable uses the__________ connector. A RJ11 B BNC C RF D RJ45 71 To access and manage files of your computer, you have to login with _______account. A Guest user account B Administrator user account C Standard user account D Limited user account 72 Computers on the internet owned and operated by education institution form part of the______ A edu domain B mil domain C gov domain D com domain 73 __________is a utility program that allows you to check connectivity between network devices on the network. A Ipconfig B NIC C Toolkit D Ping 74 ________serves as a reference model for data communication. It is made up of 7 layers, with each layer defining a particular aspect of how network devices connect and communicate with one another. A DoD model B Database model C OSI model D Network model 75 Which of the following actions compromise security? A Threat B Vulnerability C Exploit D Attack 76 The equipment needed to allow home computers to connect to the internet is called______ A Peripheral B Monitor C Modem D Gateway 77 A plug and play storage device that simply plugs in the port of a computer is____A Hard disk B Card C Flash Disk D CD 78 Which of the following is the brain of the computer? A Central Processing Unit B Arithmetic and Logic unit C Control unit D Memory 79 You have a PC with no video, which of the following is LEAST likely to be the cause? A Loose video card B Defective RAM (bank zero) C Crashed hard drive D Defective microprocessor 80 The process of keeping addresses in memory for future is called_________. A Caching B Checking C Routing D Resolving 81 _______is a network with connected devices in a close geographical range. It is generally owned, managed, and used by people in one building. A LAN B PAN C MAN D CAN 82 Which of the following is not an operating system? A Linux B DOS C Oracle D Windows
Full Download The 2 X 4 Model: A Neuroscience-Based Blueprint For The Modern Integrated Addiction and Mental Health Treatment System 1st Edition Robert Andrew Chambers PDF