B. Oracle
B. Oracle
4. Is a network that covers the size of a state, country, and could even be
considered to include the entire internet. a. WAN b. CAN c. IP d. LAN
9. What is the purpose of the DHCP? a. To provide storage for email b. To provide
an IP configuration information to hosts c. To translate IPv4 addresses to MAC
addresses d. To translate URLs to IP addresses
10. It is a network device that are used to amplify/ regenerate the weak signal is
called a. Modem b. Firewall c. Gateway d. Repeater
11. Which of the following do attackers commonly target for fetching IP address of
a target or victim user? a. Web pages
12. Which topology creates a very reliable network but requires a large amount of
cable and it is difficult to administer. a. Mesh topology b. Star topology c. Ring
topology d. Bus topology
14. If all devices are connected to a central hub, then topology is called a. Ring
topology b. Bus topology c. Star topology d. Tree topology
15. Is any devices directly connected to the network that has been assigned a
unique ident or address. a. Wall outlet b. Port c. IP d. Node
16. Which of the following commands will display the MAC (Media Access Control)
address of given computer? a. Ipconfig/all b. Nbtstat c. Nbt
d. Nslookup
18. You have a PC with no video, which of the following LEAST likely to be the
cause? a. Defective microprocessor b. Defective RAM (bank zero) c. Crashed hard
drive d. Loose video card
19. Electrostatic Discharge (ESD) would cause the most damage to which
component? a. Monitor b. Power supply c. Keyboard d. Expansion board
20. Which of the following is not a type of MS Access database object? a. Form b.
Table c. Modules d. Worksheets
21. Computers on the internet owned and operated by education institution form
part of the a. Mil domain b. Gov domain c. Com domain d. Edu domain
22. One of your print devices is not working properly, so you want to temporarily
prevent users from sending jobs to the printer
serving that device. Which of the following actions should you take? a. Stop
sharing the printer b. Install the new printer again c. Disconnect the whole system
d. Allow sharing the printer
23. Which software prevents the external access to a system? a. Virus checker b.
Firewall c. Router d. Gateway
24. Which of the following would be a logical first step in troubleshooting a PC? a.
Check the computer CMOS b. Define what applications are being used c. Define
the circumstances of the problem d. Call the vendor
25. Which of the following is NOT an advantage of network security? a. Makes the
system slower b. Gives privacy to users c. Protects system against viruses d.
Minimizes computer freezing and crashes
27. Identify among the following the network device used to connect two dis
similar types of networks. a. Bridge
28. Computer date and time is found in/on a. Scroll bar b. Menu bar c. Status bar
d. Task bar
30. An application software that is/are used to perform calculation functions and
charts? a. Microsoft Office Access b. Microsoft Office publisher c. Microsoft Office
Excel d. Microsoft Office Word
31. What is the function of network interface cards? a. Connects the clients,
servers and peripherals to the network through a port b. Connects networks with
different protocols like TCP/IP c. Boost the signal between two cable segments or
wireless access points d. Allows you to segment a large network into smaller,
efficient networks
32. How can you edit a relationship already established between two tables? a.
Double clicks the relationship line
b. Edit the table by design view c. Right click and select properties d. Left click
the relationship line
33. Domain name system can obtain the known and vice versa. Of host it is domain
name is a. IP address b. Port address c. Station address d. Checksum
34. The equipment needed to allow home computers to connect to the internet is
called a. Gateway b. Modem c. Peripheral d. Monitor
35. If all devices are connected to a central hub, then topology is called a. Ring
topology b. Bus topology c. Star topology d. Tree topology
36. A byte is equivalent to ___________ a. 8 bits b. 32 bits c. 16 bits d. 64 bits
37. A device that connects networks with different protocols a. Gateway b. Proxy
server c. Switch d. Hub
a. Control unit b. Arithmetic and logic unit c. Central processing unit d. Memory
39. Most of the telephone cable uses the connector. a. RF b. BNC c. RJ45 d. RJ11
40. The primarily activity of is to prevent an external user who are identifying the
IP address of an internal network. a. AD server b. Data server c. Proxy server d.
File server
41. When you deleted file in your computer, where does it go? a. Flash disk b. My
document c. Hard disk d. Recycle bin
43. the process of keeping addresses in memory for future is called a. Routing b.
Resolving c. caching d. checking
44. which of the communication modes support two way traffic but in only one
direction of time? a. Half duplex b. Full duplex c. Simplex d. Three quarter’s duplex
46. Is a network that covers the size of state, country, and could even be
considered to include the entire internet. a. IP b. LAN c. CAN d. WAN
47. During the normal PC boot process, which of the following is active first? a.
ROM BIOS b. RAM BIOS c. Hard Disk d. CMOS
48. SMTP standard for a. Simple mail transfer protocol b. Simple message
transport port c. Same mail transfer port d. Simple mail transport protocol
d. 100m
50. The process by which windows server verifies that the user match the user
account employed into gain access a. Active directory b. Domain address c.
Dcpromo d. Active directory