1. Which of the following is one of the three basic functions a computer perform
ID: 3665489 • Letter: 1
Question
1. Which of the following is one of the three basic functions a computer performs?
(Choose all that apply.)
a. Processing
b. Internet access
c. Input
d. Graphics
e. Output
f. E-mail
2. The executes instructions provided by computer programs.
a. CPU
b. NIC
c. Hard drive
d. USB
3. When a CPU is composed of two or more processors, each one is referred to as a(n) .
a. I/O
b. Core
c. OS
d. Flash
4. Which of the following is considered long-term storage? (Choose all that apply.)
a. Flash drive
b. RAM
c. Working storage
d. Hard drive
5. Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?
a. RAM slots
b. IDE connectors
c. Chipset
d. PCI-Express
6. You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have?
a. PCI
b. SATA
c. IDE
d. PCI-Express
7. The time it takes for read/write heads to move to the correct spot on the platter is the .
a. Rotational delay
b. Seek time
c. Transfer time
d. Access time
8. Which of the following is a task usually performed by the BIOS? (Choose all that apply.)
a. Perform a POST.
b. Create an interrupt.
c. Store the operating system.
d. Begin the boot procedure.
9. Place the following steps of the boot procedure in order.
a. The OS is loaded into RAM.
b. CPU starts.
c. OS services are started.
d. Power is applied.
e. The POST is executed.
f. Boot devices are searched.
10. Which of the following is a critical service provided by the OS? (Choose all that apply.)
a. Power-on self test
b. Memory management
c. Web browsing
d. File system
e. Storage
11. An OS’s capability to run more than one application or process at the same time is referred to which of the following?
a. Multicore
b. Doubletime
c. Multitasking
d. Multiprocessor
e. Interrupt processing
12. You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?
a. Network application
b. Device driver
c. BIOS
d. Protocol
13. Which of the following requests information stored on another computer?
a. NIC
b. Network client
c. Network server
d. Network protocol
e. Device driver
14. Choose the correct order for the process of a user attempting to access network resources:
1. Network protocol
2. Application
3. Network client
4. NIC driver
a. 4, 2, 1, 3
b. 3, 2, 1, 4
c. 1, 4, 2, 3
d. 2, 3, 1, 4
e. 3, 1, 2, 4
15. TCP/IP is an example of which of the following?
a. NIC
b. Network client
c. Network server
d. Network protocol
e. Device driver
16. In network communication, the address is used to deliver a frame to the correct computer on the network. (Choose all that apply.)
a. MAC
b. Logical
c. IP
d. Physical
17. A(n) message is used to determine whether a computer is listening on the network.
a. MAC
b. Ping
c. IP
d. TCP
18. TCP/IP uses to look up a computer’s IP address, given its name.
a. DNS
b. Ping
c. MAC
d. TCP
19. The unit of information containing MAC addresses and an error-checking code that’s processed by the network interface layer is referred to as a .
a. Packet
b. Ping
c. Frame
d. Chunk
20. Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?
a. Packetization
b. Encapsulation
c. Deencapsulation
d. Layering
21. You’re the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You’re concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?
a. WAN
b. MAN
c. Internetwork
d. Extended LAN
22. Which of the following best describes a client?
a. A computer’s primary role in the network is to give other computers access to network resources and services.
b. A computer’s primary role in the network is to run user applications and access network resources.
c. It’s the software that responds to requests for network resources.
d. The OS installed on a computer is designed mainly to share network resources.
23. You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install?
a. Server-based network
b. Peer-to-peer network
c. WPAN
d. Storage area network
24. Which of the following characteristics is associated with a peer-to-peer network?
(Choose all that apply.)
a. Decentralized data storage
b. Inexpensive
c. User-managed resources
d. Centralized control
e. Uses a directory service
25. A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?
a. LAN
b. MAN
c. WAN
d. Internetwork
26. At Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) have LANs connected via the local phone company. This configuration is an example of which of the following? (Choose the best answer.)
a. MAN
b. WPAN
c. WAN
d. SAN
27. You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?
a. Naming services
b. Application services
c. Communication services
d. Directory services
28. Peer-to-peer networks aren’t suitable in which of the following situations?
a. Tight security is required.
b. Five or fewer users need network access.
c. Budget is the primary consideration.
d. No one uses the network heavily.
29. Which of the following best describes a storage area network?
a. Provides a mechanism for users to access a network’s storage resources remotely
b. Uses high-speed networking technologies to give servers fast access to large amounts of disk storage
c. Is a short-range networking technology designed to connect personal devices to exchange information
d. Provides secure centralized file storage and sharing and access to networked printers
30. Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008?
a. They need to accommodate handling centralized logon.
b. They include a directory service and a naming service.
c. They run many background networking services.
d. They support a graphics-intensive user interface.
1. Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers? (Choose all that apply.)
a. Total number of computers that could be connected
b. The processing speed of the computers connected
c. Cable length
d. No Internet access
2. Which of the following is true of a repeater?
a. Receives frames and forwards them
b. Determines which network to send a packet
c. Receives bit signals and strengthens them
d. Has a burned-in MAC address for each port
3. Which of the following is true of a hub? (Choose all that apply.)
a. Usually has just two ports
b. Transmits regenerated signals to all connected ports
c. Usually has four or more ports
d. Works with MAC addresses
4. Which of the following is the unit of measurement by which a hub’s bandwidth is usually specified?
a. Bytes per second
b. Bits per second
c. Packets per second
d. Bytes per minute
5. Which of the following describes how devices connected to a hub use the speed at which the hub can transmit data?
a. Bandwidth optimization
b. Bandwidth dedication
c. Bandwidth sharing
d. Bandwidth multiplier
6. Which of the following is a likely indicator light on a hub? (Choose all that apply.)
a. CRC error
b. Link status
c. Connection speed
d. Activity
e. Signal strength
7. Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data?
a. Dedicated bandwidth
b. Half-duplex bandwidth
c. Half-scale bandwidth
d. Shared bandwidth
8. What does a switch use to create its switching table?
a. Source IP addresses
b. Destination logical addresses
c. Destination physical addresses
d. Source MAC addresses
9. What purpose does the timestamp serve in a switching table?
a. Tells the switch when to forward a frame
b. Tells the switch how long to wait for a response
c. Tells the switch when to delete an entry
d. Tells the switch how long it has been running
10. What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch?
a. Uplink port
b. Full-duplex mode
c. Shared bandwidth
d. Bit strengthening
e. Frame doubling
f. Signal regeneration
11. To which device is a wireless access point most similar in how it operates?
a. Hub
b. Switch
c. NIC
d. Router
12. What’s the purpose of an RTS signal in wireless networking?
a. It allows the AP to request which device is the transmitting station.
b. It allows the AP to tell all stations that it’s ready to transmit data.
c. It allows a client to notify the AP that it’s ready to send data.
d. It allows a client to request data from the AP.
13. Which of the following is a common operational speed of a wireless network?
a. 10 Kbps
b. 110 Gbps
c. 600 Kbps
d. 11 Mbps
14. Which of the following is a task performed by a NIC and its driver? (Choose all that apply.)
a. Provides a connection to the network medium
b. Converts bit signals into frames for transmission on the medium
c. Receives packets from the network protocol and creates frames
d. Adds a header before sending a frame to the network protocol
e. Adds error-checking data to the frame
15. Which of the following best describes a MAC address?
a. A 24-bit number expressed as 12 decimal digits
b. Two 24-bit numbers, in which one is the OUI
c. A 48-bit number composed of 12 octal digits
d. A dotted decimal number burned into the NIC
16. Under which circumstances does a NIC allow inbound communications to pass through the interface? (Choose all that apply.)
a. The source MAC address is the broadcast address.
b. The destination MAC address matches the built-in MAC address.
c. The destination MAC address is all binary 1s.
d. The NIC is operating in exclusive mode.
17. How does a protocol analyzer capture all frames?
a. It configures the NIC to capture only unicast frames.
b. It sets all incoming destination addresses to be broadcasts.
c. It configures the NIC to operate in promiscuous mode.
d. It sets the exclusive mode option on the NIC.
e. It captures only multicast frames.
18. In Windows 7, which of the following displays information about currently installed NICs?
a. Network Connections
b. NICs and Drivers
c. Local Area Networks
d. Computers and Devices
19. Which of the following is the purpose of an SSID?
a. Assigns an address to a wireless NIC
b. Acts as a unique name for a local area connection
c. Acts as a security key for securing a network
d. Identifies a wireless network
20. Which of the following describe the function of routers? (Choose all that apply.)
a. Forward frames from one network to another
b. Connect LANS
c. Attach computers to the internetwork
d. Work with packets and IP addresses
21. What information is found in a routing table?
a. Computer names and IP addresses
b. Network addresses and interfaces
c. MAC addresses and ports
d. IP addresses and MAC addresses
22. You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with each other in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do?
a. Connect the switches in groups of five, and connect each group of switches to a central hub.
b. Upgrade the switches to a faster speed.
c. Reorganize the network into smaller groups and connect each group to a router.
d. Disable broadcast forwarding on the switches.
23. Review the routing table in Figure 2-29. Based on this figure, where will the router send a packet with the source network number 1.0 and the destination network number 3.0?
a. EthA
b. WAN A
c. WAN B
d. None of the above
24. If a router receives a packet with a destination network address unknown to the router, what will the router do?
a. Send the packet out all interfaces.
b. Discard the packet.
c. Add the destination network to its routing table.
d. Query the network for the destination network.
25. Which of the following is true about routers? (Choose all that apply.)
a. Forward broadcasts
b. Use default routes for unknown network addresses
c. Forward unicasts
d. Used primarily to connect workstations
Explanation / Answer
Here 'r the questions with answers:
1. Which of the following is one of the three basic functions a computer performs?(Choose all that apply.)
a. Processing
c. Input
e. Output
2. The executes instructions provided by computer programs.
a. CPU
3. When a CPU is composed of two or more processors, each one is referred to as a(n) .
b. Core
4. Which of the following is considered long-term storage? (Choose all that apply.)
a. Flash drive
b.Hard drive
5. Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?
c.Chipset
6. You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have?
d. PCI-Express
7. Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data?
a. Dedicated bandwidth
8. What does a switch use to create its switching table?
d. Source MAC addresses
9. What purpose does the timestamp serve in a switching table?
c. Tells the switch when to delete an entry
10. What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch?
b. Full-duplex mode
11. To which device is a wireless access point most similar in how it operates?
a. Hub
12. What’s the purpose of an RTS signal in wireless networking?
c. It allows a client to notify the AP that it’s ready to send data.
13. Which of the following is a common operational speed of a wireless network?
d. 11 Mbps
14. Which of the following is a task performed by a NIC and its driver? (Choose all that apply.)
a. Provides a connection to the network medium
c. Receives packets from the network protocol and creates frames
e.Adds error-checking data to the frame
15. Which of the following best describes a MAC address?
b. Two 24-bit numbers, in which one is the OUI
16. Under which circumstances does a NIC allow inbound communications to pass through the interface? (Choose all that apply.)
b. The destination MAC address matches the built-in MAC address.
c. The destination MAC address is all binary 1s.
17. How does a protocol analyzer capture all frames?
c. It configures the NIC to operate in promiscuous mode.
18. In Windows 7, which of the following displays information about currently installed NICs?
a. Network Connections
19. Which of the following is the purpose of an SSID?
d. Identifies a wireless network
20. Which of the following describe the function of routers? (Choose all that apply.)
b.Connect LANS
d.Work with packets and IP addresses
21. What information is found in a routing table?
b. Network addresses and interfaces
22. You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with each other in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do?
c. Reorganize the network into smaller groups and connect each group to a router.
23. Review the routing table in Figure 2-29. Based on this figure, where will the router send
(DON'T HAVE ANY FIGURE DISPLAYED)
24. If a router receives a packet with a destination network address unknown to the router, what will the router do?
b. Discard the packet.
25. Which of the following is true about routers? (Choose all that apply.)
b. Use default routes for unknown network addresses
c. Forward unicasts
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.