0% found this document useful (0 votes)
32 views

hns mgo-1

The document consists of a series of multiple-choice questions related to computer networking, hardware, software, and operating systems. It covers topics such as network devices, protocols, maintenance strategies, and security measures. Each question presents four options, with one correct answer among them.

Uploaded by

darojesus4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

hns mgo-1

The document consists of a series of multiple-choice questions related to computer networking, hardware, software, and operating systems. It covers topics such as network devices, protocols, maintenance strategies, and security measures. Each question presents four options, with one correct answer among them.

Uploaded by

darojesus4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1. All are examples of interconnect devices EXCEPT.

A Gateways B Switches C Routers D LCD Projectors


2.What is the purpose of the DHCP? A To translate URLs to IP addresses B To translate IPv4 addresses to MAC
addresses C To provide storage for email D To provide an IP configuration information to hosts
3.Hardware address is known as__________. A Hardware brand B MAC address C Network Interface Card D IP
address
4.Which of the following would be a logical first step in troubleshooting a PC? A Define what applications are being
used B Check the computer CMOS C Define the circumstances of the problem D Call the vendor
5.The standard internet protocol is: _____. A UDP B TCP/IP C WWW D FTP
6.Which topology creates a very reliable network but requires a large amount of cable and it is difficult to administer.
A Ring Topology B Mesh Topology C Bus Topology D Star Topology
7.Which of the following is/are an example of internet browsers? A System information B System software C
Mozilla fire fox D Operating system
8. The hardware infrastructure of the Internet happens at which layers of the OSI model? A Layers 3 and 4 B Layers
1 and 2 C Layers 1 and 4 D Layers 2 and 3
9. What is the recommended maximum length (approximate) for a segment of UTP cable? A 500M B 100m C 1km D
180m
10 Which of the following is not an open-source operating system? A Ubuntu B Windows C Android D Linux
11 What's the best way to protect your hard drive data? A Regular backups B periodically defrag it C By regular
diagnostic D troubleshoot least once a week
12 Which of the communication modes support two-way traffic but in only once direction of a time? A Half-duplex
B Simplex C Three - quarter's duplex D Full duplex
13 _______is specifically defines how data intended to be send over a network is broken into packets before
transmission and reliably reassembled in the right order at the destination application. A UDP B TCP C SMTP D
FTP
14 Which of the following is NOT an advantage of network security? A Gives privacy to users B Minimizes
computer freezing and crashes C Protects system against viruses D Makes the system slower
15 The CPU and memory are located on the? A Expansion board B Storage device C Output device D Motherboard
16 Computer date and time is found in/on ___________. A Status bar B Scroll bar C Task bar D Menu bar
17 During the normal PC boot process, which of the following is active first? A ROM BIOS B Hard Disk C CMOS
D RAM BIOS
18 Which of the following do attackers commonly target for fetching IP address of a target or victim user? A IP
tracker B Websites C Web pages D Emails
19 The server on the internet is also known as a_________. A Gateway B Host C Hub D Repeater
20 The primarily activity of_______is to prevent an external user who are identifying the IP addresses of an internal
network. A File server B Data server C Proxy server D AD server
21 An application software that is/are used to perform calculation functions and charts? A Microsoft Office Word
B Microsoft Office Publisher C Microsoft Office Excel D Microsoft Office Access
22 ______is a type of maintenance that need regular maintenance schedule. A Predictive maintenance B Preventive
maintenance C Breakdown maintenance D Proactive maintenance
23 When you deleted file in your computer, where does it go? A Recycle bin B Hard disk C My document D Flash
disk
24 It is a network device that are used to amplify/ regenerate the weak signal is called. A Firewall B Gateway C
Modem D Repeater
25 SMTP stands for ___________. A Simple Mail Transfer Protocol B Switch Mode Transfer Programming C
Simple Main Transfer Protocol D Switch Mode Transfer Protocol
26 _______is a network that covers the size of a state, country, and could even be considered to include the entire
Internet. A WAN B LAN C IP D CAN
27 Which one is NOT an internet service provider technology? A Fiber optics and Satellite internet B Cable and
cell-based internet C Ethio-Telecomunication D DSL-Digital Subscriber Line
28 One of your print devices is not working properly, so you want to temporarily prevent users from sending jobs to
the printer serving that device. Which of the following actions should you take? A Stop sharing the printer B
Install the new printer again C Disconnect the whole system D Allow sharing the printer
29 When the mail server sends mail to other mail servers it becomes _________? A File server B SMTP client C
SMTP server D Peer-severs
30 A piece of program code that inserted into another program to cause damage is called____A Program B Password
C Virus D Anti-virus
31 Which function key is used for opening help? A F12 B F1 C F3 D F2
32 ________ is a good, cost-effective choice for smaller networks because the layout is simple, allowing all devices
to be connected via a single coaxial or RJ45 cable. A Hybrid topology B Bus topology C Ring topology D Star
topology
33 _____controls the way in which the computer system function and provide a means by which a user can interact
with computer. A Application software B The platform C The operating system D Motherboard
34 A device that connects networks with different protocols. A Proxy Server B Hub C Switch D Gateway
35 The easiest topology to set up and maintain and having a central hub/switch that connects to nodes. A Ring
topology B Mesh topology C Bus topology D Star topology
36 A plug and play storage device that simply plugs in the port of a computer is____. A Hard disk B Card C Flash
Disk D CD
37 A piece of program code that inserted into another program to cause damage is called______ A Program B
Password C Virus D Anti-virus
38 _______is anything that does not have value or does not add value. Waste is something the customer will not pay
for. A MURA B Muri C MUDA D kaizen
39 The easiest topology to set up and maintain and having a central hub/switch that connects to nodes. A Ring
topology B Mesh topology C Bus topology D Star topology
40 Which of the following is not a type of MS Access database object? A Worksheets B Table C Modules D Form
41 Identify among the following the network device used to connect two dis-similar types of networks. A Switch B
Gateway C Bridge D Hub
42 A byte is equivalent to_______. A 8 bits B 32 bits C 6 bits D 64 bits
43 A user can get files from another computer on the internet by using______. A FTP B HTTP C TELNET D UTP
44 How can you edit a relationship already established between two tables? A Left click the relationship line B
Double clicks the relationship line C Edit the table by Design view D Right click and select properties
45 Which one of the following is an Input device? A Printer B Speaker C Monitor D Keyboard
46 Which of the following are advantages of the internet? A Provides the latest news and happenings but around a
specific area B Allows you to easily communicate with other people C Provides information on few topics D
Make peoples not to focus on their task
47 _______is any device directly connected to the network that has been assigned a unique identifier or address. A
IP B Wall outlet C Port D Node
48 Which software prevents the external access to a system? A Router B Firewall C Gateway D Virus checker
49 Which of the following commands will display the MAC (Media Access Control) address of a given computer?
A nbt B ipconfig/all C ns lookup D nbt stat
50 Electrostatic Discharge (ESD) would cause the most damage to which component? A Keyboard B Monitor C
Expansion Board D Power supply
51 Domain Name System can obtain the__________of host if its domain name is known and vice versa. A Port
address B Station address C IP address D Checksum
52 Choose the output device among the given alternatives A Projector B Mouse C Scanner D Keyboard
53 The process by which Windows Server verifies that the user matches the user account employed to gain access.
A Active Directory B Authentication C Hypervisor D Domain Name System
54 The first page that you normally view at a website is its_____. A Master page B First page C URL D Home page
55 Which IP address is reserved for loopback testing? A 127.0.0.1 B 127.0.0.0 C 192.168.10.1 D 127.0.1.1
56 From the internal component of personal computer, one is used to maintain date and time. AVROM B CMOS
RAM C Jumper D VRAM
57 What is the best maintenance strategy? A Preventive maintenance B Predictive maintenance C Time based
maintenance D Corrective maintenance
58 It serves to protect an internal network from external attacks. A Blockers B Password C Firewalls D Security
59 What is the function of Network Interface Cards? A Connects the clients, servers and peripherals to the network
through a port B boost the signal between two cable segments or wireless access points C allows you to segment a
large network into smaller, efficient networks D connects networks with different protocols like TCP/IP
60 What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to
electrical interferences? A Coaxial cable B Microwave C Optical Fiber D Unshielded twisted pair
61 In peer-to-peer network, each computer in a network is referred as______. A Peer B Server C Client D Sender
62 Devices on one network can communicate with devices on another network via a______. A Gateway B Printer
Server C Utility Server D File Server
63 In a ____ topology, if there are n devices in a network, each device has n-1 ports for cables. A Mesh B Star C
Ring D Bus
64 HTTP is ___________protocol. A Data link layer B Transport layer C Application layer D Network layer
65 Which of the following is not an advantage of implementing 5S technique? A To standardize work practices B To
improve work efficiency C To create a dirty workplace D To improve work discipline
66 If all devices are connected to a central hub, then topology is called. A Ring Topology B Bus Topology C Star
Topology D Tree Topology
67 Monitor and System unit can be connected by A Modem B PS/2 Bus C Network Cable D Video Graphic Adapter
cable
68 _________is working in a helpdesk environment, including topics such as logging and prioritizing client requests,
communicating with personnel to identify the problem and give solution for the problem A Information help desk
B Record Client Support Requirements C Conduct and facilitate user training D Technical documentation
69 Which of the following qualifies as best Disaster Recovery (DR) site? A DR site in different country B DR site in
country C DR site in the same city D DR site in the same campus
70 Most of the telephone cable uses the__________ connector. A RJ11 B BNC C RF D RJ45
71 To access and manage files of your computer, you have to login with _______account. A Guest user account B
Administrator user account C Standard user account D Limited user account
72 Computers on the internet owned and operated by education institution form part of the______ A edu domain B
mil domain C gov domain D com domain
73 __________is a utility program that allows you to check connectivity between network devices on the network.
A Ipconfig B NIC C Toolkit D Ping
74 ________serves as a reference model for data communication. It is made up of 7 layers, with each layer defining
a particular aspect of how network devices connect and communicate with one another. A DoD model B
Database model C OSI model D Network model
75 Which of the following actions compromise security? A Threat B Vulnerability C Exploit D Attack
76 The equipment needed to allow home computers to connect to the internet is called______ A Peripheral B
Monitor C Modem D Gateway
77 A plug and play storage device that simply plugs in the port of a computer is____A Hard disk B Card C Flash
Disk D CD
78 Which of the following is the brain of the computer? A Central Processing Unit B Arithmetic and Logic unit C
Control unit D Memory
79 You have a PC with no video, which of the following is LEAST likely to be the cause? A Loose video card B
Defective RAM (bank zero) C Crashed hard drive D Defective microprocessor
80 The process of keeping addresses in memory for future is called_________. A Caching B Checking C Routing D
Resolving
81 _______is a network with connected devices in a close geographical range. It is generally owned, managed, and
used by people in one building. A LAN B PAN C MAN D CAN
82 Which of the following is not an operating system? A Linux B DOS C Oracle D Windows

You might also like