0% found this document useful (0 votes)
32 views4 pages

B. Oracle

The document consists of a series of multiple-choice questions related to computer networking, hardware, and software concepts. Topics covered include maintenance types, network devices, internet connectivity, operating systems, and troubleshooting techniques. Each question presents four options, with only one correct answer for each.

Uploaded by

seifualemnesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views4 pages

B. Oracle

The document consists of a series of multiple-choice questions related to computer networking, hardware, and software concepts. Topics covered include maintenance types, network devices, internet connectivity, operating systems, and troubleshooting techniques. Each question presents four options, with only one correct answer for each.

Uploaded by

seifualemnesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Is a type of maintenance that need regular maintenance schedule

a. Preventive maintenance b. Proactive maintenance c. Breakdown maintenance d.


Predictive maintenance

2. Is a utility program that allows you to check connectivity between network


device on the network

a. Toolkit b. NIC c. Ping d. Ipconfig

3. The equipment needed to allow home computer to connect to the internet is


called

a. Gateway b. Modem c. Peripheral d. Monitor

4. Is a network that covers the size of a state, country, and could even be
considered to include the entire internet. a. WAN b. CAN c. IP d. LAN

5. Which one of the following is an input device? a. Monitor b. Keyboard c. Speaker


d. Printer

6. CPU and memory are located on the a. Storage device b. Motherboard c.


Expansion board d. Output device

7. HTTP is protocol a. Application layer b. Transport layer c. Network layer d.


Datalink layer

8. Which of the following is not an operating system? a. Linux b. Oracle c. Windows


d. DOS

9. What is the purpose of the DHCP? a. To provide storage for email b. To provide
an IP configuration information to hosts c. To translate IPv4 addresses to MAC
addresses d. To translate URLs to IP addresses

10. It is a network device that are used to amplify/ regenerate the weak signal is
called a. Modem b. Firewall c. Gateway d. Repeater
11. Which of the following do attackers commonly target for fetching IP address of
a target or victim user? a. Web pages

b. IP tracker c. Emails d. Websites

12. Which topology creates a very reliable network but requires a large amount of
cable and it is difficult to administer. a. Mesh topology b. Star topology c. Ring
topology d. Bus topology

13. Which of the following is not an advantage of implementing 5s technique a. To


standardize work practices b. To create a dirty workplace c. To improve work
efficiency d. To improve work discipline

14. If all devices are connected to a central hub, then topology is called a. Ring
topology b. Bus topology c. Star topology d. Tree topology

15. Is any devices directly connected to the network that has been assigned a
unique ident or address. a. Wall outlet b. Port c. IP d. Node

16. Which of the following commands will display the MAC (Media Access Control)
address of given computer? a. Ipconfig/all b. Nbtstat c. Nbt

d. Nslookup

17. Which function key is used for opening help? a. F2 b. F12 c. F1 d. F3

18. You have a PC with no video, which of the following LEAST likely to be the
cause? a. Defective microprocessor b. Defective RAM (bank zero) c. Crashed hard
drive d. Loose video card

19. Electrostatic Discharge (ESD) would cause the most damage to which
component? a. Monitor b. Power supply c. Keyboard d. Expansion board

20. Which of the following is not a type of MS Access database object? a. Form b.
Table c. Modules d. Worksheets

21. Computers on the internet owned and operated by education institution form
part of the a. Mil domain b. Gov domain c. Com domain d. Edu domain

22. One of your print devices is not working properly, so you want to temporarily
prevent users from sending jobs to the printer

serving that device. Which of the following actions should you take? a. Stop
sharing the printer b. Install the new printer again c. Disconnect the whole system
d. Allow sharing the printer

23. Which software prevents the external access to a system? a. Virus checker b.
Firewall c. Router d. Gateway
24. Which of the following would be a logical first step in troubleshooting a PC? a.
Check the computer CMOS b. Define what applications are being used c. Define
the circumstances of the problem d. Call the vendor

25. Which of the following is NOT an advantage of network security? a. Makes the
system slower b. Gives privacy to users c. Protects system against viruses d.
Minimizes computer freezing and crashes

26. In peer to peer network each computer in a network is referred as a. Client b.


Sender c. Peer d. Server

27. Identify among the following the network device used to connect two dis
similar types of networks. a. Bridge

b. Gateway c. Hub d. Switch

28. Computer date and time is found in/on a. Scroll bar b. Menu bar c. Status bar
d. Task bar

29. Servers as a reference model for data communication. It is made up of 7


layers, with each layer defining a particular aspect of how network devices connect
and communicate with one another. a. Network model b. Database model c. OSI
model d. DoD model

30. An application software that is/are used to perform calculation functions and
charts? a. Microsoft Office Access b. Microsoft Office publisher c. Microsoft Office
Excel d. Microsoft Office Word

31. What is the function of network interface cards? a. Connects the clients,
servers and peripherals to the network through a port b. Connects networks with
different protocols like TCP/IP c. Boost the signal between two cable segments or
wireless access points d. Allows you to segment a large network into smaller,
efficient networks

32. How can you edit a relationship already established between two tables? a.
Double clicks the relationship line

b. Edit the table by design view c. Right click and select properties d. Left click
the relationship line

33. Domain name system can obtain the known and vice versa. Of host it is domain
name is a. IP address b. Port address c. Station address d. Checksum

34. The equipment needed to allow home computers to connect to the internet is
called a. Gateway b. Modem c. Peripheral d. Monitor

35. If all devices are connected to a central hub, then topology is called a. Ring
topology b. Bus topology c. Star topology d. Tree topology
36. A byte is equivalent to ___________ a. 8 bits b. 32 bits c. 16 bits d. 64 bits

37. A device that connects networks with different protocols a. Gateway b. Proxy
server c. Switch d. Hub

38. Which of the following is the brain of the computer?

a. Control unit b. Arithmetic and logic unit c. Central processing unit d. Memory

39. Most of the telephone cable uses the connector. a. RF b. BNC c. RJ45 d. RJ11

40. The primarily activity of is to prevent an external user who are identifying the
IP address of an internal network. a. AD server b. Data server c. Proxy server d.
File server

41. When you deleted file in your computer, where does it go? a. Flash disk b. My
document c. Hard disk d. Recycle bin

42. Hardware address is known as a. Hardware brand b. IP address c. Network


interface card d. MAC address

43. the process of keeping addresses in memory for future is called a. Routing b.
Resolving c. caching d. checking

44. which of the communication modes support two way traffic but in only one
direction of time? a. Half duplex b. Full duplex c. Simplex d. Three quarter’s duplex

45. A byte is equivalent to a. 8 bits b. 32 bits c. 16 bits d. 64 bits

46. Is a network that covers the size of state, country, and could even be
considered to include the entire internet. a. IP b. LAN c. CAN d. WAN

47. During the normal PC boot process, which of the following is active first? a.
ROM BIOS b. RAM BIOS c. Hard Disk d. CMOS

48. SMTP standard for a. Simple mail transfer protocol b. Simple message
transport port c. Same mail transfer port d. Simple mail transport protocol

49. What is recommended maximum length UTP a. 150m b. 200m c. 50m

d. 100m

50. The process by which windows server verifies that the user match the user
account employed into gain access a. Active directory b. Domain address c.
Dcpromo d. Active directory

You might also like