Download Pretest Answers

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net bias wikipedia , lookup

Computer security wikipedia , lookup

IEEE 1355 wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer network wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Transcript
Pretest Answers
INLS 182 – Fall 2004
1. Which of the following roles must a computer service professional play?
(Choose all answers that are correct.)
a. Technician
b. Programmer
c. Scholar
d. Diplomat
2.
Your role as a technician is to seek answers to what you do not know and build your
base of knowledge. (True or False?)
3.
Which of the following skills are required for today’s computer service professional?
(Choose all answers that are correct.)
a. The ability to repair hardware and software
b. The ability to find answers to what you do not know
c. The ability to instill confidence in customers
d. The ability to write a computer program
4.
A byte is the smallest unit of information that is recognized by a computer.
(True or False?)
5.
What is the unit that represents one character of information?
a. A bit
b. A nibble
c. A word
d. A megabyte
e. A byte
6.
How many bits are in a byte?
a. 2
b. 4
c. 16
d. 32
e. None of the above
7.
What hardware component enables computers to connect to each other and share
information and programs?
8.
If a customer complains of strange noises inside his computer, what is a good place to
check?
a. RAM
b. The CPU fan
c. The heat sink
d. The power supply
9.
What is the term for a radio frequency that is emitted from an electrical or electronic
device that is harmful to the surrounding equipment or that interferes with the
operation of another electrical or electronic device?
10. What is the term for a program that acts as an interface between the operating system
and the hardware device?
11. An Industry Standard Architecture (ISA) card can work in which types of bus slots?
(Choose all answers that are correct.)
a. Extended ISA (EISA) slot
b. Micro Channel Architecture (MCA) slot
c. VESA local bus (VLB) slot
d. Peripheral Component Interconnect (PCI) slot
e. ISA slot
12. Which connector is used for cables in a data network?
a. DB-11
b. RJ-25
c. DB-9
d. DB-25
e. RJ-45
13. Which of the following statements regarding the termination of Small Computer
System Interface (SCSI) devices are correct? (Choose all answers that are correct.)
a. Both ends of the SCSI chain must be terminated.
b. Termination can be either active or passive.
c. Improper termination will damage newer SCSI hardware.
d. Termination blocks can provide proper termination.
14. The resolution on a new 19-inch Video Graphics Adapter (VGA) monitor was set to
640  480 resolution with 16 colors. You change the resolution to 1600  1200 in
2
16-bit mode (high color), and the screen image becomes unreadable or unstable.
What is the most likely cause?
a. The power cable is loose.
b. You did not change the dot pitch.
c. The monitor is in standby mode.
d. The refresh rate has auto-adjusted to a faster rate that is not supported by the
monitor.
15. You own a notebook computer that does not have any way to be connected to the
network. Which two solutions can you implement in order to connect to the company
network?
a. Change the computer basic input/output system (BIOS).
b. Use the notebook in a docking station that has network components.
c. Attach a network cable to the notebook computer.
d. Insert a Personal Computer Memory Card International Association (PCMCIA)
local area network (LAN) card in the PC card slot, install card drivers, and use a
network cable to attach to the network.
e. Install network software written for the brand of notebook.
16. In which one of the following types of computers would you use a PC Card?
a. Laptop
b. Server
c. Personal computer
d. Palmtop
e. Macintosh
17. A group of computers is connected to a hub. A central server authenticates users
logging on at these stations. The computers communicate using a standard,
nonproprietary protocol. Which of the following statements are true regarding this
environment? (Choose all answers that are correct.)
a. This is a peer-to-peer network.
b. The network uses Internet Packet Exchange/Sequenced Packet Exchange
(IPX/SPX) for communication.
c. The network uses Transmission Control Protocol/Internet Protocol (TCP/IP) for
communication.
d. This is a star topology.
e. This is a bus topology.
18. A network segment is 50 meters long. All stations use the wire as needed when they
have data to transmit. They transmit at speeds of 100 Mbps. The network interface
3
cards (NICs) are equipped with only an RJ-45 connector. Which of the following
statements are true regarding this environment? (Choose all answers that are correct.)
a. This is a 100Base-T network.
b. This is a Token Ring network.
c. This is a 10Base-T network.
d. This is a 10Base5 network.
e. This is a Fast Ethernet network.
4
19. Which resources are commonly shared on a local area network (LAN)? (Choose all
answers that are correct.)
a. Data
b. Peripherals
c. Storage
d. Software
20. In a bus topology, all devices are connected to a central point called a hub.
(True or False?)
21. What is the term for a computer that shares its resources on the network?
a. Client
b. Hub
c. Server
d. Workstation
e. Router
22. Which components provide a physical and electrical connection to a network?
(Choose all answers that are correct.)
a. Router
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Gateway
d. Coaxial cable
e. Network interface card (NIC)
23. Which are valid types of connectors on a network interface card (NIC)?
(Choose all answers that are correct.)
a. RJ-45
b. DLC
c. BNC
d. RJ-11
e. All of the above
24. Which one of the following is not a valid step when installing a network interface
card (NIC)?
a. Measure the distance between the computer and the hub.
b. Turn off the machine and remove the cover.
c. Document any changes that you make to the computer.
5
d. Turn on the machine and run the setup utility provided by the manufacturer.
e. Set the NIC’s jumpers or dual inline package (DIP) switches.
25. Which cable type is immune to electromagnetic interference (EMI)?
a. Unshielded twisted-pair (UTP)
b. Fiber optic
c. Shielded twisted-pair (STP)
d. Coaxial
e. Category 5
26. Which method of network access uses collision detection when transmitting data?
a. Star
b. Token Ring
c. Ethernet
d. Bus
e. Random access
27. Which device can be used to create a wide area network (WAN) and connect
dissimilar networks?
a. A router
b. A repeater
c. A bridge
d. A gateway
e. A hub
28. The Domain Name System (DNS) maps DNS domain names to TCP addresses, and
vice versa. (True or False?)
29. A firewall can help prevent the introduction of a virus or attempts to hack into the
protected system or network. (True or False?)
30. What is the primary safety hazard encountered when servicing a computer?
a. Fire
b. Electrical power
c. Overheated components
d. Electrostatic discharge (ESD)
e. None of the above
6
31. Kelly has been hired as a consultant for a firm that needs to have eight computers
share a single database. Kelly’s solution must support this type of sharing. The
company expects to double in size over the next five years, and ideally, Kelly’s
solution would also position the company for growth and minimize the amount of
money spent on the current implementation of a solution.
Kelly proposes that the firm install Microsoft Windows NT Workstation on eight
computers and use the peer-to-peer networking feature of Windows NT Workstation
to share the database on one of the eight computers between all the users. How well
does Kelly’s proposal satisfy the required outcome and the two ideal outcomes?
a. It satisfies the required outcome and both ideal outcomes.
b. It satisfies the required outcome but only one of the ideal outcomes.
c. It satisfies only the required outcome.
d. It satisfies neither the required nor the ideal outcomes.
32. What is the term used to refer to the physical layout of a network cable installation?
33. Which one of the following is the smallest form of a network and the building block
for larger networks?
a. WAN
b. MAN
c. Internetwork
d. LAN
34. Networks make it possible for several users to use data and peripherals, such as
printers, simultaneously. (True or False?)
7
35. Which one of the following is true about peer-to-peer networks?
a. They provide greater security and more control than server-based networks.
b. They are recommended for networks with fewer than 10 users in the same
physical area.
c. They require a powerful central server.
d. Users are typically located in a large geographical area.
36. Which one of the following best describes a bus topology network?
a. It needs significantly more cabling than other topologies.
b. A missing terminator will cause the network to go down.
c. It is easier to troubleshoot than other topologies.
d. The number of computers on the network does not affect performance.
37. Your company is expanding its network. When a network spans cities, states, or
countries, it is called which of the following?
a. WAN
b. MAN
c. Peer-to-peer
d. LAN
38. Which of the following types of cable can support a 100-Mbps data transmission
rate? (Choose all answers that are correct.)
a. ThickNet
b. Category 5 unshielded twisted pair (UTP)
c. ThinNet
d. Fiber optic
39. Which one of the following types of cable is most susceptible to crosstalk?
a. Fiber optic
b. Shielded twisted pair (STP)
c. Coaxial
d. Unshielded twisted pair (UTP)
40. Which of the following statements are true about fiber optic cable?
(Choose all answers that are correct.)
a. Data can travel at very high speeds—100 Mbps or more.
b. Fiber optic cable is more costly than other alternatives.
c. No specialized installation expertise is required.
8
d. Fiber optic cable is not subject to electrical interference.
41. Which one of the following terms is used to describe the loss of signal strength that
occurs as the signal travels along a copper cable?
a. Crosstalk
b. Attenuation
c. Shielding
d. Baseband
42. Coaxial cable is made of light-conducting glass or plastic fibers at the center
of a thick tube of protective cladding surrounded by a tough outer sheath.
(True or False?)
43. What is the term for a set of rules or standards designed to enable computers to
connect with one another and to exchange information with as little error as
possible?
44. Which of the following can a network operating system do? (Choose all answers that
are correct.)
a. Tie together all computers and peripherals
b. Provide security by controlling access to data and peripherals
c. Control the allocation and use of software resources on all computers and
peripherals
d. Coordinate the functions of all computers and peripherals
45. What is the most familiar and popular example of a network operating system in
which the client computer’s networking software is added on to its existing computer
operating system?
46. The Open Systems Interconnection (OSI) reference model is composed of how many
layers?
a. 5
b. 9
c. 7
d. 4
9
47. Which one of the following indicates the correct order of the layers in the Open
Systems Interconnection (OSI) reference model?
a. Physical, data-link, transport, network, session, presentation, application
b. Data-link, physical, transport, network, session, presentation, application
c. Physical, data-link, network, transport, session, presentation, application
d. Physical, data-link, network, session, transport, presentation, application
48. Which layer of the Open Systems Interconnection (OSI) reference model is
responsible for routing?
49. Which one of the following terms best describes a device driver?
a. Hardware
b. Peripheral device
c. Card
d. Software
50. You have been asked to add additional components to your company’s network.
Your supervisor suggests that you check the HCL. Which one of the following is the
HCL?
a. A list of network operating system vendors
b. A list of hardware the operating system vendor has approved for use
c. A list of all network interface cards (NICs) and their compatible drivers
d. A list of local area network (LAN) drivers
10