1.
_____controls the way in which the computer system function and provide a
means by which a user can interact with computer
Operating software
2. Which of the communication modes support two-way traffic but in only
once direction of a time? Half duplicx
3. The hardware infrastructure of the Internet happens at which layers of the
OSI model? Data link layer
Layer 1 and layer 2
4. SMTP stands for ___________ simple mail t.p
5. _______is a network that covers the size of a state, country, and could even
be considered to include the entire Internet.
WAN
6. Which of the following commands will display the MAC (Media Access
Control) address of a given computer?
Ping
7. Which of the following qualifies as best Disaster Recovery (DR) site?
8. _______is specifically defines how data intended to be send over a network
is broken into packets before transmission and reliably reassembled in the
right order at the destination application
Tranport layer
9. ________is working in a helpdesk environment, including topics such as
logging and prioritizing client requests, communicating with personnel to
identify the problem and give solution for the problem
Record Client support requriment
10.Computer date and time is found in/on _______________
Task bar
11.What is the purpose of the DHCP?
Authmatic assign IP address
12.Monitor and System unit can be connected by VGA
13.___is the data that has been organized or presented in a meaning full way.
Information
14.Which of the following is not an operating system?
Oracle
15.Which one of the following is an Input device?
16.To access and manage files of your computer, you have to login with
_______accountAdministator account
17.During the normal PC boot process, which of the following is active first?
ROM-BIOS
18.Which function key is used for opening help?
F1
19.Which one is NOT an internet service provider technology?
20.The process by which Windows Server verifies that the user matches the
user account and Password employed to gain access
Administrator User account
21.When you deleted file in your computer, where does it go?
22.HTTP is ___________protocol
23.A byte is equivalent to_______
8bits
24.You have a PC with no video, which of the following is LEAST likely to be
the cause?
25.The server on the internet is also known as a_________
Network/host
26.Which of the following is not an advantage of implementing 5S technique
27.Hardware address is known as__________
MAC/Physical
28.Electrostatic Discharge (ESD) would cause the most damage to which
component?
Power Supply
29.Computers on the internet owned and operated by education institution form
part of the______
Edu.domin
30.The standard internet protocol is: _____ IPV4
31.Which of the following would be a logical first step in troubleshooting a
PC?
32._______is anything that does not have value or does not add value.
Waste is something the customer will not pay for
Muda
33.The process of keeping addresses in memory for future is called_________.
Cache memory
Which of the following do attackers commonly target for fetching IP address of a
target or victim user?
34._______is any device directly connected to the network that has been
assigned a unique identifier or address. Domain name system
The primarily activity of_______is to prevent an external user who are identifying
the IP addresses of an internal network
35.Which of the following is not an open-source operating system?
36.Which of the following is NOT an advantage of network security?
37.Choose the output device among the given alternatives
38.What is the function of Network Interface Cards?
39.The CPU and memory are located on the
Motherboard
40.If all devices are connected to a central hub, then topology is called
Star topology
41.Which of the following is/are an example of internet browsers?
MOzialfirefox
42.All are examples of interconnect devices EXCEPT.
43.From the internal component of personal computer, one is used to maintain
date and time.
CMOS ROM/Battery
44.Which of the following are advantages of the internet?
45.In a ____ topology, if there are n devices in a network, each device has n-1
ports for cables.
Mesh Toplogy
46.__________is a utility program that allows you to check connectivity
between network devices on the network
Ping
47.________ is a good, cost-effective choice for smaller networks because the
layout is simple, allowing all devices to be connected via a single coaxial or
RJ45 cable.
Bus Topology
48.Which of the following is the brain of the computer?
CPU
49._______is a network with connected devices in a close geographical range.
It is generally owned, managed, and used by people in one building.
LAN
50.A user can get files from another computer on the internet by
using_________
Administrator password
51.Most of the telephone cable uses the__________ connector
RJ-11
52.________serves as a reference model for data communication. It is made up
of 7 layers, with each layer defining a particular aspect of how network
devices connect and communicate with one another.
Layer3
53.Which of the following actions compromise security?
54.It serves to protect an internal network from external attacks
Firewall
55.A plug and play storage device that simply plugs in the port of a computer
is________
Flash driver /
56.Identify among the following the network device used to connect two dis-
similar types of networks
Router
57.Which of the following is not a type of MS Access database object
58.When the mail server sends mail to other mail servers it becomes ____
E-mail
59.The first page that you normally view at a website is its__________
Home page
60.What is the best maintenance strategy?
Pereventive
61.Which IP address is reserved for loopback testing
127.0.0.1
62.An application software that is/are used to perform calculation functions and
charts?
Speradesheet
63.A piece of program code that inserted into another program to cause damage
is called
Virus
64.How can you edit a relationship already established between two tables?
Double on the line
65.The equipment needed to allow home computers to connect to the internet is
called
LAN
69. Devices on one network can communicate with devices on another network via
a______
Router
66.Which topology creates a very reliable network but requires a large amount
of cable and it is difficult to administer.
Mesh toplogy
67.A device that connects networks with different protocols
Gateway
68.One of your print devices is not working properly, so you want to
temporarily prevent users from sending jobs to the printer serving that
device. Which of the following actions should you take?
Stop Printer Sharing
69.Domain Name System can obtain the__________of host if its domain name
is known and vice versa.
IP address
70.What is the recommended maximum length (approximate) for a segment of
UTP cable
100m
71.What kind of transmission medium is most appropriate to carry data in a
computer network that is exposed to electrical interferences?
FiberOptic/UTP
72.In peer-to-peer network, each computer in a network is referred as________
A. ServerB.client C. peer D. sender
73.What's the best way to protect your hard drive data?
1. regular backups.
2. periodically defrag it.
3. run check disk at least once a week.
4. run scandisk at least once a week.
5. run a regular diagnostic.
74.It is a network device that are used to amplify/ regenerate the weak signal is
called
Repeaters
75.Which software prevents the external access to a system?
Firewall
76.The easiest topology to set up and maintainand having a central hub/switch
that connects to nodes.
Star topology
77.________is a type of maintenance that need regular maintenance schedule
Preventive Maintenance