Healthcare Information Technology Flashcards
What network topology uses a token to communicate with?
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Mesh Topology
B. Ring Topology
A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host. A token is a frame of data transmitted between network points. Only a host that holds a token can send data, and tokens are released when receipt of the data is confirmed. IBM developed token ring technology in the 1980s as an alternative to Ethernet.
Convert binary 1001100 to a decimal number.
A. 75
B. 76
C. 101
D. 52
B. 76
Divide by 2 until you get 1. (ignore remainder)
0 = even, 1 = odd
1 = 2/2 = 4/2 = 9/2 = 19/2 = 38/2 = 76/2
1 0 0 1 1 0 0
What type of cable is used in the open space above a dropped ceiling?
A. RJ 45 Cable
B. Plenum Rated Cable
C. Fiber Optic Cable
D. Coaxial Cable
B. Plenum Rated Cable
In a “Star” topology network, what device provides the central connection point?
A. Network switch or hub
B. Network Interfacing Computer
C. Router
D. The bus or “daisy chain”
A. Network switch or hub
In the Star Topology there is a central connection point called the hub which is a computer hub or sometimes just a switch. In a Star Network the best advantage is when there is a failure in cable then only one computer might get affected and not the entire network.
What function does this 15 pin cable perform?
A. HDMI Video
B. VGA Video
C. Composite Video
D. DVI Video
B. VGA Video
On a PS-2 based computer, what type of communication does the keyboard and mouse use?
A. Serial Communication
B. Baud Communication
C. Octal Communication
D. Parallel Communication
A. Serial Communication
Personal system/2 (PS-2) launched the serial port.
Describe what type of memory RAM is.
A. Stable memory
B. Volatile memory
C. Long term memory
D. Encrypted memory
B. Volatile memory
Random access memory - designed to read and write over
What simple command can be used to check the communications on a VLAN network?
A. ASCII Code
B. Active Response
C. Ping
D. Echo Response
C. Ping
Name two styles of connectors that are used on fiber-optic cables.
A. Straight Tip and Subscriber Connector
B. RJ45 and Coaxial
C. Straight Tip and Coupling
D. Optic Coupling and Fiber Subscriber
A. Straight Tip and Subscriber Connector
SC stands for subscriber connector and is a standard-duplex fiber-optic connector with a square molded plastic body and push-pull locking features. SC connectors are typically used in data communication, CATV, and telephony environments.
ST stands for straight tip, a high-performance fiber-optic connector with round ceramic ferrules and bayonet locking features. ST connectors are more common than SC connectors.
What is “middleware” usedfor?
A.Bridge between different OS levels
B.Connect two separate applications
C.It is part of a switch
D.It is used to connect different nodes in bus topology
B.Connect two separate applications
Middleware is software that bridges gaps between other applications, tools, and databases in order to provide unified services to users.
What type of cable uses a “BNC” connector?
A.Cat 5 twisted pair
B.Cat 6 twisted pair
C.Fiber Optic
D.Coaxial Cable
D.Coaxial Cable
The BNC (Bayonet Neill–Concelman) connector is a miniature quick connect/disconnect radio frequency connector used for coaxial cable
Convert decimal 482 to a hexadecimal number.
A.1E2
B.E1F
C.A5B
D.FCD
A. 1E2
Hexidecimal is A-F = 10-15 on multi scale.
0 1 2 3 4 5 6 7 8 9 A B C D E F
What software is used to monitor communications on a “Bus” network?
A.Middle Ware
B.CSMA/CD
C.Firewall Software
D.MAU Ware
B. CSMA/CD
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. … On detection of a collision, the station stops transmitting, sends a jam signal, and then waits for a random time interval before retransmission.
What network device is useful in converting from fiber-optic to UTP cable?
A.Repeater
B.MAU
C.Hub
D.Subscriber Tip
A. Repeater
If a “worm” program is accidently downloaded onto a PC. What process does the worm start performing?
A. Replicates itself
B. Eats volatile memory
C. Destroys power supplies
D. Corrupts Email
A. Replicates itself
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers