0% found this document useful (0 votes)
110 views9 pages

MCQ HNS L4-1

The document contains a series of questions and answers related to computer networking, operating systems, and hardware components. Key topics include network types, protocols, troubleshooting, and maintenance strategies. It also addresses various technical concepts such as DHCP, MAC addresses, and different network topologies.

Uploaded by

mokediriba12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views9 pages

MCQ HNS L4-1

The document contains a series of questions and answers related to computer networking, operating systems, and hardware components. Key topics include network types, protocols, troubleshooting, and maintenance strategies. It also addresses various technical concepts such as DHCP, MAC addresses, and different network topologies.

Uploaded by

mokediriba12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

1.

_____controls the way in which the computer system function and provide a
means by which a user can interact with computer
Operating software

2. Which of the communication modes support two-way traffic but in only


once direction of a time? Half duplicx

3. The hardware infrastructure of the Internet happens at which layers of the


OSI model? Data link layer

Layer 1 and layer 2

4. SMTP stands for ___________ simple mail t.p

5. _______is a network that covers the size of a state, country, and could even
be considered to include the entire Internet.
WAN
6. Which of the following commands will display the MAC (Media Access
Control) address of a given computer?
Ping
7. Which of the following qualifies as best Disaster Recovery (DR) site?

8. _______is specifically defines how data intended to be send over a network


is broken into packets before transmission and reliably reassembled in the
right order at the destination application
Tranport layer
9. ________is working in a helpdesk environment, including topics such as
logging and prioritizing client requests, communicating with personnel to
identify the problem and give solution for the problem
Record Client support requriment

10.Computer date and time is found in/on _______________


Task bar
11.What is the purpose of the DHCP?

Authmatic assign IP address


12.Monitor and System unit can be connected by VGA

13.___is the data that has been organized or presented in a meaning full way.
Information

14.Which of the following is not an operating system?


Oracle

15.Which one of the following is an Input device?

16.To access and manage files of your computer, you have to login with
_______accountAdministator account

17.During the normal PC boot process, which of the following is active first?
ROM-BIOS

18.Which function key is used for opening help?


F1

19.Which one is NOT an internet service provider technology?

20.The process by which Windows Server verifies that the user matches the
user account and Password employed to gain access
Administrator User account

21.When you deleted file in your computer, where does it go?

22.HTTP is ___________protocol

23.A byte is equivalent to_______


8bits

24.You have a PC with no video, which of the following is LEAST likely to be


the cause?

25.The server on the internet is also known as a_________


Network/host

26.Which of the following is not an advantage of implementing 5S technique

27.Hardware address is known as__________


MAC/Physical
28.Electrostatic Discharge (ESD) would cause the most damage to which
component?

Power Supply

29.Computers on the internet owned and operated by education institution form


part of the______

Edu.domin
30.The standard internet protocol is: _____ IPV4

31.Which of the following would be a logical first step in troubleshooting a


PC?

32._______is anything that does not have value or does not add value.
Waste is something the customer will not pay for
Muda

33.The process of keeping addresses in memory for future is called_________.


Cache memory
Which of the following do attackers commonly target for fetching IP address of a
target or victim user?

34._______is any device directly connected to the network that has been
assigned a unique identifier or address. Domain name system

The primarily activity of_______is to prevent an external user who are identifying
the IP addresses of an internal network

35.Which of the following is not an open-source operating system?

36.Which of the following is NOT an advantage of network security?

37.Choose the output device among the given alternatives

38.What is the function of Network Interface Cards?

39.The CPU and memory are located on the


Motherboard

40.If all devices are connected to a central hub, then topology is called

Star topology

41.Which of the following is/are an example of internet browsers?


MOzialfirefox

42.All are examples of interconnect devices EXCEPT.


43.From the internal component of personal computer, one is used to maintain
date and time.
CMOS ROM/Battery

44.Which of the following are advantages of the internet?

45.In a ____ topology, if there are n devices in a network, each device has n-1
ports for cables.

Mesh Toplogy

46.__________is a utility program that allows you to check connectivity


between network devices on the network
Ping

47.________ is a good, cost-effective choice for smaller networks because the


layout is simple, allowing all devices to be connected via a single coaxial or
RJ45 cable.

Bus Topology

48.Which of the following is the brain of the computer?

CPU

49._______is a network with connected devices in a close geographical range.


It is generally owned, managed, and used by people in one building.

LAN

50.A user can get files from another computer on the internet by
using_________
Administrator password

51.Most of the telephone cable uses the__________ connector

RJ-11

52.________serves as a reference model for data communication. It is made up


of 7 layers, with each layer defining a particular aspect of how network
devices connect and communicate with one another.

Layer3

53.Which of the following actions compromise security?

54.It serves to protect an internal network from external attacks

Firewall

55.A plug and play storage device that simply plugs in the port of a computer
is________

Flash driver /

56.Identify among the following the network device used to connect two dis-
similar types of networks

Router

57.Which of the following is not a type of MS Access database object

58.When the mail server sends mail to other mail servers it becomes ____
E-mail

59.The first page that you normally view at a website is its__________


Home page

60.What is the best maintenance strategy?


Pereventive

61.Which IP address is reserved for loopback testing

127.0.0.1

62.An application software that is/are used to perform calculation functions and
charts?
Speradesheet

63.A piece of program code that inserted into another program to cause damage
is called

Virus

64.How can you edit a relationship already established between two tables?

Double on the line

65.The equipment needed to allow home computers to connect to the internet is


called
LAN

69. Devices on one network can communicate with devices on another network via
a______
Router
66.Which topology creates a very reliable network but requires a large amount
of cable and it is difficult to administer.

Mesh toplogy

67.A device that connects networks with different protocols


Gateway
68.One of your print devices is not working properly, so you want to
temporarily prevent users from sending jobs to the printer serving that
device. Which of the following actions should you take?
Stop Printer Sharing

69.Domain Name System can obtain the__________of host if its domain name
is known and vice versa.
IP address

70.What is the recommended maximum length (approximate) for a segment of


UTP cable
100m

71.What kind of transmission medium is most appropriate to carry data in a


computer network that is exposed to electrical interferences?
FiberOptic/UTP

72.In peer-to-peer network, each computer in a network is referred as________


A. ServerB.client C. peer D. sender

73.What's the best way to protect your hard drive data?


1. regular backups.
2. periodically defrag it.
3. run check disk at least once a week.
4. run scandisk at least once a week.
5. run a regular diagnostic.

74.It is a network device that are used to amplify/ regenerate the weak signal is
called
Repeaters

75.Which software prevents the external access to a system?


Firewall

76.The easiest topology to set up and maintainand having a central hub/switch


that connects to nodes.
Star topology

77.________is a type of maintenance that need regular maintenance schedule

Preventive Maintenance

You might also like