Questions Flashcards

1
Q

Which of the following components is NOT required to create a network?

A. Network media

B. Network interfaces

C. Computer systems

D. Wireless adapter

A

D. Wireless adapter

To create a network, four things are required:

The computers

Network media (transmitting data from one computer to another).The most common network media are wires and radio signals.

Network interfaces - These are devices installed on each computer that can send and receive signals through the network media.

Network protocols - Protocols are rules that computers on a network must follow to send and receive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multiple computers configured to be able to communicate and share information with each other form a ____________.

A. Group

B. Family

C. Network

D. Commune

A

C. Network

A network is a group of computer systems that are interconnected so they can share information with each other. The computer you’re using to watch this video has a network connection to the computer the video file is stored on. In this video, we’ll look at the components of a network, then compare different kinds of networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the best definition for a LAN?

A. The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less).

B. A network whose computers and servers are separated geographically but still connected.

C. A network in a small geographic area, like in an office.

D. An extension of a private network over a shared or public network, such as the Internet.

A

C. A network in a small geographic area, like in an office.

A local area network, or LAN, is a group of connected computers that are physically close together, usually in the same building. The computers in your office, school, or library are most likely connected to each other on a LAN.

A LAN is a network in a small geographic area, like in an office.

A WAN is a network whose computers and servers are geographically far apart but still connected. A PAN (personal area network) is the interconnection of components, such as laptops, mobile devices, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters or less). A VPN is the extension of a private network over a shared or public network, such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.

Which of the following features lets you allow or reject client connections based on the hardware address?

A. WEP

B. SSID

C. DHCP

D. MAC address filtering

A

D. MAC address filtering

MAC address filtering allows or rejects client connections based on the hardware address. Wi-Fi Protected Access II (WPA2) provides encryption and user authentication for wireless networks. Wired Equivalent Privacy (WEP) also provides security, but WPA2 is considered more secure than WEP. The SSID is the network name or identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following provides services to hosts on its network?

A. Email

B. Server

C. Client

D. Storage

A

B. Server

Servers are computers that provide network services to other hosts on a network.

Clients are computers that consume network services provided by servers. The computer you’re using right now is a client.

Storage and email are both services that can be provided to clients by servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.

Which of the following is the technology being used in these phones?

A. Infrared transmitters

B. NFC chips

C. Bluetooth transmitters

D. VPN

A

B. NFC chips

Near field communications (NFC) chips are a wireless mobile technology that can be embedded in credit cards and smartphones for transmitting financial information when making payments. For example, many point of sale devices can read information from NFC chips. NFC chips can also be used in passports to contain identity information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

A. ArcNet

B. Token Ring

C. Ethernet

D. 802.11n

E. Bluetooth

A

C. Ethernet

Ethernet is a wired, local area network (LAN) standard. Most laptops and desktop computers have built-in Ethernet network ports.

Bluetooth is a wireless standard that allows the creation of short-range Personal Area Networks (PANs). Token Ring and ArcNet are older wired network standards that are nearly obsolete and not commonly used in a modern LAN. 802.11n is a wireless standard used in local area networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network.

Which of the following network devices would be the BEST choice for this connectivity?

A. Router

B. Switch

C. Firewall

D. Access point

A

D. Access point

An access point gives WiFi access to a network.

A firewall filters network traffic based on a set of rules.

A switch maintains a table of MAC addresses by port and forwards network frames only to the port that matches the MAC address.

A router manages IP traffic between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the best device to deploy to protect your private network from an untrusted public network?

A. Firewall

B. Gateway

C. Router

D. Hub

A

A. Firewall

A firewall is the best device to deploy to protect your private network from an untrusted public network. Firewalls are used to control traffic entering and leaving your trusted network environment. Firewalls can manage traffic based on source or destination IP address, port number, service protocol, application or service type, user account, and even traffic content. Routers offer some packet-based access control but not as extensive as that of a full-fledged firewall. Hubs and gateways are not sufficient for managing the interface between a trusted and an untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

A. Server

B. Router

C. Modem

D. Switch

A

C. Modem

Cable internet providers require the client to have a modem to receive the signal from a coax cable and convert the signal for use with a data network, typically over copper Ethernet cables.

A router is a network device that moves traffic between two different IP networks.

A switch is a network device that moves traffic within an IP network.

A server is a computer that provides services to clients on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following components stores values in short-term memory?

A. Hard drive
B. Flash drive
C. RAM
D. Processor

A

C. Ram

RAM stores values in short-term memory.

Hard drives store data in long-term memory.

Processors execute instructions stored in computer programs.

Flash drives are portable devices that store data in long-term memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which hardware component processes data?

HDD
RAM
CPU
SSD

A

The CPU, or Central Processing Unit, processes data.

RAM stores values in short-term memory.

HDD and SDD are two types of long-term memory storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following components converts AC to DC?

Voltage regulator
Correct Answer:
Power supply
Surge protector
Capacitor

A

A computer’s power supply converts alternating current (AC) from the wall outlet to direct current (DC) used by the computer’s internal components.

A voltage regulator is an electronic device that supplies the appropriate voltage to a processor. It does not convert the power input from one form to another; it only ensures that the voltage remains at the appropriate level for the device. A surge protector protects a system from power spikes. A UPS (uninterruptable power supply) provides backup AC power using a reserve battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following computer components is the MOST important part of any modern computer?

RAM
NIC
CPU
BIOS

A

The CPU is the most important part of any modern computer system because it controls the other parts of the computer.

RAM is the main memory of a computer. It can be quickly accessed by the CPU and is where the computer stores data and instructions that it is actively using.

A network interface card (NIC) is a component (sometimes built into the CPU and sometimes plugged into the motherboard) that provides network connectivity.

The BIOS makes sure all necessary parts are plugged in and working properly on bootup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Becca is working on a program that will store data. The program will need quick access to data and data persistence is not important. Where should the data be stored?

In memory
In a flat file
In a database
In flash memory

A

Random Access Memory (RAM) is extremely fast, and the processor can read from and write to it billions of times each second. RAM is not persistent, which means if the system turns off, RAM loses everything it had stored in memory. But data persistence is not important in this scenario.

Flash memory, flat files, and databases all provide persistent storage, but much slower data access than RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following should be done before working on hardware in a computer system?

Touch a plastic part of the case
Ensure the system is plugged in
Rub your feet on the carpet
Ground yourself using an ESD wrist strap

A

Before working on hardware in a computer system, you should ground yourself so that a static charge doesn’t build up. You can wear a special wrist strap that has a metal plate.

Rubbing your feet on carpet will build up a static charge. This will shock any component you touch.

You should never begin working on hardware in a computer system while it’s plugged in. Always unplug a computer before beginning your work.

Before working on hardware in a computer system, you can discharge yourself by touching a metal part of the computer case. Touching a plastic part does not discharge any built-up static charge.

17
Q

Which of the following voltages from an ESD discharge would be the minimum to short a computer’s hardware components?

3.3 volts
100 volts
12 volts
5 volts

A

An ESD discharge as small as 100 volts can damage a computer’s components.

12, 5, or 3.3 volts are common voltages used for powering components. A ESD discharge this small wouldn’t hurt a component.

18
Q

Where are values the computer is directly working with at a particular moment in time stored?

On the CPU register
On RAM
On the CPU clock
On the hard drive

A

The CPU register stores values the computer is working with at a particular moment in time.

RAM stores the instructions for the CPU to execute as well as the results of any calculations that the processor doesn’t need to work with at the given moment.

Hard drives are long-term storage for files and applications.

The CPU clock controls the speed that a processor executes instructions.

19
Q

Which of the following companies is a manufacturer of CPUs?

Intel
DELL
nVidia
Apple

A

Intel is one of the biggest manufacturers of CPUs along with AMD.

nVidia is known for making graphic processing units (GPUs).

Apple and DELL both make computer systems but not the hardware inside of them.

20
Q

Which CPU type would MOST LIKELY be found in a smartphone?

x64
ARM
IA-64
x86

A

Most tablets and smartphones use ARM processors. ARM processors use a reduced instruction set, which means they can’t do as many things as x86 processors can.

x86 processors are 32-bit CPUs used in computer systems.

x64 processors are 64-bit CPUs used in computer systems.

IA-64 processors were special CPUs developed by Intel that were only used in servers.

21
Q
A