Sei sulla pagina 1di 12

Mock Test 2

Section score4/10
 
The part of the network that establishes a communications
channel between the nodes of the network is known as
___________________.
0/1
transmission media
network operating software
 
a network navigation device
a switch
Correct answer
transmission media
 
ISP providers like Digicel and FLOW use _____________ to send data
packets along specific routes on their networks.
0/1
routers
web browsers
IP addresses
 
switches
Correct answer
switches
 
Structured query language is a
0/1
first generation language
second generation language
 
third generation language
fourth generation language
Correct answer
fourth generation language
 
Over the Internet, servers always return the data requested along
the same pathway on which they took from the clients.
0/1
True
 
False
Correct answer
False
 
What is the key characteristic of web 2.0?
1/1
Better design
Better sound
User generated content
Sharing and openness
 
 
Assembly language is a
0/1
first generation language
 
second generation language
third generation language
fourth generation language
Correct answer
second generation language
 
Stationary & Wholesale Office Supplies receiving a bulk order
from Hugh Kennedy Book Shop for retail made on-line is a form of
1/1
B2B
 
C2C
B2C
both b & c
 
Enabling smartphones and mobile devices to communicate with
each other and with web servers in a common format, is the
responsibility of the ______________ protocol
1/1
TCP/IP
 
WWW
SMTP
IP
 
The communication protocol used by Internet is:
0/1
HTTP
 
www
TCP/IP
FTP
Correct answer
TCP/IP
 
The ____________________ translates internet domain and host
names to IP address.
1/1
domain name system
 
routing information protocol
network time protocol
internet relay chat
Section score1/10
 
To transmit e-mail messages across the Internet, the
______________ protocol is used.
0/1
SMTP
TCP/IP
STMP
HTTP
 
Correct answer
SMTP
 
In a ring topology, a computer, after it finishes communicating,
generates a new token to pass around the ring after it
0/1
receives an acknowledgement
receives the token
 
detects a data collision
receives a data packet
Correct answer
receives an acknowledgement
 
Packet switching allows for
0/1
packets to be sent along different and alternate routes
data being sent to broken into packets (or smaller pieces)
 
data packets to be reassembled at the point of origin
both a & b
Correct answer
both a & b
 
To add WiFi to a network, a _____________ that features wireless
capabilities is required
0/1
NIC
Switch
transmission medium
 
router
Option 5
Correct answer
router
 
The set of rules that define how nodes on a network must
exchange data among themselves is called
0/1
Option 1
peer-to-peer communication
transmission media
communication protocols
Web 2.0
 
Correct answer
communication protocols
 
In a star topology
1/1
the central switch receives a signal from the destination node
then passes it on to the sending node
each node on the network receives all transmission addressed
to other nodes
the central switch receives a signal from the sending node,
then passes it directly to the destination node
 
the network can still continue to operate if the switch fails
 
Wireless transmission (i.e. Wi-Fi) uses __________________ to
connect two mobile devices connected to the Internet
0/1
a router
a NIC
broadband
 
radio waves
Correct answer
radio waves
 
www.Download.com is an online service allowing the
downloading of freeware and shareware. It's more likely to be
hosted on a ____________ server
0/1
file
web
 
e-commerce
commerce
Correct answer
file
 
For large networks that are constantly adding users, the _________
topology is more suitable
0/1
bus
ring
star
Ethernet
 
Correct answer
star
 
The Ethernet is a type of _______________________
0/1
network interface card
topology
communication protocol
file server
 
Correct answer
communication protocol
Section score7/10
 
A type of program that runs on a web server rather than on a
computer is called a
0/1
a) server-side program
b) client-side program
c) network operating system
 
d) Both a & b
Correct answer
a) server-side program
 
Which of the following is considered a cybercrime?
1/1
a) Purchasing an airline ticket online using a stolen credit card
b) Obtaining someone's TRN# online by trickery
c) Online distribution of Shaggy music CDs without Shaggy’s
permission
d) All of the above
 
 
There's no Wifi available where you are, but you have a data plan
with FLOW or Digicel. You can
1/1
a) use tethering to connect your laptop to the internet
 
b) create a wireless network
c) create a wired network connection using Bluetooth
technology
d) create a wireless network connection using the phone's
USB port
 
A computer is infected with a virus it is exposed to after the
infected file is
1/1
a) received
b) infected
c) opened or executed
 
d) copied
 
Internet connection sharing is achieved using a
1/1
client/server network
 
b) P2P network
c) network operating system
d) network adapter
 
Employees accessing the same copy of the application program
(e.g. payroll) is an advantage of using a
0/1
a) database
b) network administrator
 
c) network
d) WAN
Correct answer
c) network
 
A virus that replicates itself into the master boot record of a
flash drive or hard drive is called a _________ virus
1/1
Option 1
a) botnet
b) zombie
c) boot-sector
 
d) stealth
 
Bluetooth uses _________________ signals to enable Bluetooth-
enabled computers and devices to communicate with each other
in the range 3-300ft.
0/1
a) short-range radio
b) long-range satellite
c) tethering
 
d) wired
Correct answer
a) short-range radio
 
A/The ___________ allows students and staff on the Papine campus
of UTech to share data and collaborate with students and staff
on the Montego Bay campus on dedicated communication lines.
1/1
a) VPN
b) Internet
c) WAN
 
d) MAN
 
The physical component that moves data between devices on a
network is called a/an
1/1
network interface card
transmission media
 
network topology
Ethernet
Section score3/10
 
When users are directed to bogus websites even when they enter
the correct address of the real website is a feature of a
successful.
0/1
a) pharming
b) phishing
c) spyware
d) malware
 
Correct answer
a) pharming
 
“Your computer is infected with a virus . . . immediate removal is
required.” is an example of a possible
0/1
a) adware
b) botnet
c) spyware
 
d) scareware
Correct answer
d) scareware
 
A destructive program that masquerades as a benign application
waiting to be clicked is called a
1/1
a) sniffer
b) worm
c) trojan horse
 
d) all of the above
 
Before sound is finally passed on to the person at the receiving
end of a conversation using a cell phone after being processed it
(the sound) is
0/1
a) decompressed
b) compressed
c) digitized
 
d) amplified
Correct answer
d) amplified
 
A virus that temporarily erases its code from the files where it
resides and hides in the active memory of the computer is called
a _______________ virus.
0/1
a) botnet
 
b) zombie
c) boot-sector
d) stealth
Correct answer
d) stealth
 
Overloading a server purposely from multiple sources (or clients)
simultaneously, causing the server to possibly shut down is
usually a ________________ attack
0/1
a) single source zombie
b) black-hat
c) botnet
d) stealth virus
 
Correct answer
c) botnet
 
There's no Wifi available where you are, but you have a data plan
with FLOW or Digicel. You can
1/1
a) use tethering to connect your laptop to the internet
 
b) create a wireless network
c) create a wired network connection using Bluetooth
technology
d) create a wireless network connection using the phone's
USB port
 
Which of the following is an advantage of a peer-to-peer network,
as compared with a client/server network?
0/1
a) Simplified administration
b) More scalable
 
c) Less expensive
d) Better performance
Correct answer
a) Simplified administration
 
Bluetooth uses _________________ signals to enable Bluetooth-
enabled computers and devices to communicate with each other
in the range 3-300ft.
0/1
a) short-range radio
b) long-range satellite
c) tethering
 
d) wired
Correct answer
a) short-range radio
 
With SMS technology on your smartphone, you can send
________________________ to any another mobile device or email
address
1/1
a) MMS
b) text, sound and images
c) only text messages
 
d) both a & c

Potrebbero piacerti anche