* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Pretest Answers
Computer security wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Pretest Answers INLS 182 – Fall 2004 1. Which of the following roles must a computer service professional play? (Choose all answers that are correct.) a. Technician b. Programmer c. Scholar d. Diplomat 2. Your role as a technician is to seek answers to what you do not know and build your base of knowledge. (True or False?) 3. Which of the following skills are required for today’s computer service professional? (Choose all answers that are correct.) a. The ability to repair hardware and software b. The ability to find answers to what you do not know c. The ability to instill confidence in customers d. The ability to write a computer program 4. A byte is the smallest unit of information that is recognized by a computer. (True or False?) 5. What is the unit that represents one character of information? a. A bit b. A nibble c. A word d. A megabyte e. A byte 6. How many bits are in a byte? a. 2 b. 4 c. 16 d. 32 e. None of the above 7. What hardware component enables computers to connect to each other and share information and programs? 8. If a customer complains of strange noises inside his computer, what is a good place to check? a. RAM b. The CPU fan c. The heat sink d. The power supply 9. What is the term for a radio frequency that is emitted from an electrical or electronic device that is harmful to the surrounding equipment or that interferes with the operation of another electrical or electronic device? 10. What is the term for a program that acts as an interface between the operating system and the hardware device? 11. An Industry Standard Architecture (ISA) card can work in which types of bus slots? (Choose all answers that are correct.) a. Extended ISA (EISA) slot b. Micro Channel Architecture (MCA) slot c. VESA local bus (VLB) slot d. Peripheral Component Interconnect (PCI) slot e. ISA slot 12. Which connector is used for cables in a data network? a. DB-11 b. RJ-25 c. DB-9 d. DB-25 e. RJ-45 13. Which of the following statements regarding the termination of Small Computer System Interface (SCSI) devices are correct? (Choose all answers that are correct.) a. Both ends of the SCSI chain must be terminated. b. Termination can be either active or passive. c. Improper termination will damage newer SCSI hardware. d. Termination blocks can provide proper termination. 14. The resolution on a new 19-inch Video Graphics Adapter (VGA) monitor was set to 640 480 resolution with 16 colors. You change the resolution to 1600 1200 in 2 16-bit mode (high color), and the screen image becomes unreadable or unstable. What is the most likely cause? a. The power cable is loose. b. You did not change the dot pitch. c. The monitor is in standby mode. d. The refresh rate has auto-adjusted to a faster rate that is not supported by the monitor. 15. You own a notebook computer that does not have any way to be connected to the network. Which two solutions can you implement in order to connect to the company network? a. Change the computer basic input/output system (BIOS). b. Use the notebook in a docking station that has network components. c. Attach a network cable to the notebook computer. d. Insert a Personal Computer Memory Card International Association (PCMCIA) local area network (LAN) card in the PC card slot, install card drivers, and use a network cable to attach to the network. e. Install network software written for the brand of notebook. 16. In which one of the following types of computers would you use a PC Card? a. Laptop b. Server c. Personal computer d. Palmtop e. Macintosh 17. A group of computers is connected to a hub. A central server authenticates users logging on at these stations. The computers communicate using a standard, nonproprietary protocol. Which of the following statements are true regarding this environment? (Choose all answers that are correct.) a. This is a peer-to-peer network. b. The network uses Internet Packet Exchange/Sequenced Packet Exchange (IPX/SPX) for communication. c. The network uses Transmission Control Protocol/Internet Protocol (TCP/IP) for communication. d. This is a star topology. e. This is a bus topology. 18. A network segment is 50 meters long. All stations use the wire as needed when they have data to transmit. They transmit at speeds of 100 Mbps. The network interface 3 cards (NICs) are equipped with only an RJ-45 connector. Which of the following statements are true regarding this environment? (Choose all answers that are correct.) a. This is a 100Base-T network. b. This is a Token Ring network. c. This is a 10Base-T network. d. This is a 10Base5 network. e. This is a Fast Ethernet network. 4 19. Which resources are commonly shared on a local area network (LAN)? (Choose all answers that are correct.) a. Data b. Peripherals c. Storage d. Software 20. In a bus topology, all devices are connected to a central point called a hub. (True or False?) 21. What is the term for a computer that shares its resources on the network? a. Client b. Hub c. Server d. Workstation e. Router 22. Which components provide a physical and electrical connection to a network? (Choose all answers that are correct.) a. Router b. Transmission Control Protocol/Internet Protocol (TCP/IP) c. Gateway d. Coaxial cable e. Network interface card (NIC) 23. Which are valid types of connectors on a network interface card (NIC)? (Choose all answers that are correct.) a. RJ-45 b. DLC c. BNC d. RJ-11 e. All of the above 24. Which one of the following is not a valid step when installing a network interface card (NIC)? a. Measure the distance between the computer and the hub. b. Turn off the machine and remove the cover. c. Document any changes that you make to the computer. 5 d. Turn on the machine and run the setup utility provided by the manufacturer. e. Set the NIC’s jumpers or dual inline package (DIP) switches. 25. Which cable type is immune to electromagnetic interference (EMI)? a. Unshielded twisted-pair (UTP) b. Fiber optic c. Shielded twisted-pair (STP) d. Coaxial e. Category 5 26. Which method of network access uses collision detection when transmitting data? a. Star b. Token Ring c. Ethernet d. Bus e. Random access 27. Which device can be used to create a wide area network (WAN) and connect dissimilar networks? a. A router b. A repeater c. A bridge d. A gateway e. A hub 28. The Domain Name System (DNS) maps DNS domain names to TCP addresses, and vice versa. (True or False?) 29. A firewall can help prevent the introduction of a virus or attempts to hack into the protected system or network. (True or False?) 30. What is the primary safety hazard encountered when servicing a computer? a. Fire b. Electrical power c. Overheated components d. Electrostatic discharge (ESD) e. None of the above 6 31. Kelly has been hired as a consultant for a firm that needs to have eight computers share a single database. Kelly’s solution must support this type of sharing. The company expects to double in size over the next five years, and ideally, Kelly’s solution would also position the company for growth and minimize the amount of money spent on the current implementation of a solution. Kelly proposes that the firm install Microsoft Windows NT Workstation on eight computers and use the peer-to-peer networking feature of Windows NT Workstation to share the database on one of the eight computers between all the users. How well does Kelly’s proposal satisfy the required outcome and the two ideal outcomes? a. It satisfies the required outcome and both ideal outcomes. b. It satisfies the required outcome but only one of the ideal outcomes. c. It satisfies only the required outcome. d. It satisfies neither the required nor the ideal outcomes. 32. What is the term used to refer to the physical layout of a network cable installation? 33. Which one of the following is the smallest form of a network and the building block for larger networks? a. WAN b. MAN c. Internetwork d. LAN 34. Networks make it possible for several users to use data and peripherals, such as printers, simultaneously. (True or False?) 7 35. Which one of the following is true about peer-to-peer networks? a. They provide greater security and more control than server-based networks. b. They are recommended for networks with fewer than 10 users in the same physical area. c. They require a powerful central server. d. Users are typically located in a large geographical area. 36. Which one of the following best describes a bus topology network? a. It needs significantly more cabling than other topologies. b. A missing terminator will cause the network to go down. c. It is easier to troubleshoot than other topologies. d. The number of computers on the network does not affect performance. 37. Your company is expanding its network. When a network spans cities, states, or countries, it is called which of the following? a. WAN b. MAN c. Peer-to-peer d. LAN 38. Which of the following types of cable can support a 100-Mbps data transmission rate? (Choose all answers that are correct.) a. ThickNet b. Category 5 unshielded twisted pair (UTP) c. ThinNet d. Fiber optic 39. Which one of the following types of cable is most susceptible to crosstalk? a. Fiber optic b. Shielded twisted pair (STP) c. Coaxial d. Unshielded twisted pair (UTP) 40. Which of the following statements are true about fiber optic cable? (Choose all answers that are correct.) a. Data can travel at very high speeds—100 Mbps or more. b. Fiber optic cable is more costly than other alternatives. c. No specialized installation expertise is required. 8 d. Fiber optic cable is not subject to electrical interference. 41. Which one of the following terms is used to describe the loss of signal strength that occurs as the signal travels along a copper cable? a. Crosstalk b. Attenuation c. Shielding d. Baseband 42. Coaxial cable is made of light-conducting glass or plastic fibers at the center of a thick tube of protective cladding surrounded by a tough outer sheath. (True or False?) 43. What is the term for a set of rules or standards designed to enable computers to connect with one another and to exchange information with as little error as possible? 44. Which of the following can a network operating system do? (Choose all answers that are correct.) a. Tie together all computers and peripherals b. Provide security by controlling access to data and peripherals c. Control the allocation and use of software resources on all computers and peripherals d. Coordinate the functions of all computers and peripherals 45. What is the most familiar and popular example of a network operating system in which the client computer’s networking software is added on to its existing computer operating system? 46. The Open Systems Interconnection (OSI) reference model is composed of how many layers? a. 5 b. 9 c. 7 d. 4 9 47. Which one of the following indicates the correct order of the layers in the Open Systems Interconnection (OSI) reference model? a. Physical, data-link, transport, network, session, presentation, application b. Data-link, physical, transport, network, session, presentation, application c. Physical, data-link, network, transport, session, presentation, application d. Physical, data-link, network, session, transport, presentation, application 48. Which layer of the Open Systems Interconnection (OSI) reference model is responsible for routing? 49. Which one of the following terms best describes a device driver? a. Hardware b. Peripheral device c. Card d. Software 50. You have been asked to add additional components to your company’s network. Your supervisor suggests that you check the HCL. Which one of the following is the HCL? a. A list of network operating system vendors b. A list of hardware the operating system vendor has approved for use c. A list of all network interface cards (NICs) and their compatible drivers d. A list of local area network (LAN) drivers 10