Reading Assignment

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

1.

The method of communication in which transmission takes place in both directions,


but only one direction at a time is called
A. Simplex
B. Four wire circuit
C. Full Duplex
D. Half Duplex
2. Protocols are
A. Agreements on how communication components and DTE
B. Logical communication channels used for transferring
C. Physical communication channels used for transferring
D. None of the above
3. The topology with highest reliability is:
A. Bus topology
B. Star topology
C. Ring topology
D. Mesh topology
4. Which of the following ISO level is more closely related to the physical
communications facilities?
A. Application
B. Session
C. Networking
D. Data Link
5. If one link fails, only that link is affected. All other links remain active. Which topology
does this?
A. Mesh topology
B. Star topology
C. Bus topology
D. Physical topology

6. OSI model means:


A. Open systems interconnection
B. Operating system interconnection
C. Open source interconnection
D. Operating source interconnection
7. Select the correct cable that transport signals in the form of light:
A. Twisted-Pair cable
B. Fiber optic cable
C. Coaxial Cable
D. Shielded Twisted Pair cable
8. Twisted pair wires, coaxial cable, optical fiber cables are the examples of:
A. Wired Media
B. Wireless Media
C. Both A & B
D. None of these
10. Frames from one LAN can be transmitted to another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
E. None of the above
11. What is the default subnet mask for a class C
network?

A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
E. None of the above
12. Which of the following is used for modulation and demodulation?
A. modem
B. protocols
C. gateway
D. multiplexer
E. None of the above
13. Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
14. Layer one of the OSI model is
A. physical layer
B. link layer
C. transport layer
D. network layer
E. None of the above
15. FTP Server Listens For Connection On Port
Number

A. 22 B. 25 C. 21 D. 23
16. A type of cabling used to connect a computer to a computer using.
A. Cross over C. Roll over B. SFP D. Straight through
17. The bit length of IPV6 address
A. 32 bits B. 192 bits C. 128 bits D. 64 bits
18. The schedule activities are based on a preset schedule that is established regardless of
need.
A. Interval based maintenance
B. Reactive maintenance
C. Predictive maintenance
D. Rehabilitation maintenance
19. A protocol which deals with resolving domain names is
A. SMTP B. POP3 C. DNS D. DHCP
20. Enabling additional users to handle administrative tasks for a particular objects is
referred to as:
A. Assignment B. Targeting C. Delegation D. Redirection
21. A network administrator is implementing a policy that requires strong, complex
passwords. Which data protection goal does this policy support?
A. Data integrity B. Data quality C. Data redundancy D. Data confidentiality
22. You want to implement a mechanism that automates the IP configuration,
including IP address, subnet mask, default getaway, and DNS information. Which
protocol will use to accomplish this?
A. SMTP B. DHCP C. ARP D. SNMP
23. Which connectivity method would be best for a corporate employee who works from
home two days a week, but needs secure access to internet corporate databases?
A. WiMAX B. Cable C. DSL D. VPN
24-------------------is the signal sent from a TV station to your TV
A. Full duplex B. Simplex C. Multiplex D. Half duplex
25. What type of network traffic requires QOS?
A. Video conferencing B. Wiki C. On-line purchasing D. Email
26. Which of the following device is used to connect two systems, especially if the systems
use different protocols?
A.hub B. bridge C. gateway D. repeater
27. Which device performs the function of determining the path that messages
should take through internetworks?
A. A DSL modem
B. Router
C. A web server
D. A firewall
28. Where is a hub specified in the OSI Model?
A. Session layer B. Data link Layer C. Physical Layer D. Application layer
29. Used for resolving IP addresses to name and names to IP Address
A. FTP Server B. DHCP Server C. DNS Server D. Proxy Server
30. HTTPS Protocol uses A port number
A. 21 B. 80 C. 443 D. 67
31. In network system if there is a DHCP server than the client will easily get
A. IP Address B. URL Address C. MAC address D. Port Address
32. Which One of the Following Used to Protect Computer from Unauthorized Remote
Access?
A. Router B. Bridge C. Firewall D. ADSL
33. When You Maintain and Troubleshoot a Computer the Final Stage Will Be
A. Documenting B. Assembling C. Formatting D. Testing
34. A Network Tools That Used to Check the STATUS OF The Network is
.
A. Netstat B. Ipconfig C. Tracert D. Ping
35. A Special Computer That Used to Manage Resources in a Networked Environment
A. Sever Computer B. Laptop Computer C. Client Computer D. Handheld Computer
36. A Network Services that Provides through a Fixed Wired Line for Voice
Purpose is
A. Aero Net B. Public Standard Telephone Network (PSTN) C. Infrared D. Satellite
37. A Leadership Style in Which the Leader Includes One or More Employees in The
Decision- Making Process is
A. Federal B. Authoritarian or Autocratic C. Delegate or Free Reign D. Participative or
Democratic
38. A computer cannot communicate with any of the computer on a different network
segment. It has no problem connecting to other computer that is located on its own
network segment. The IP address parameter that is possibly incorrectly on the computer?
A. DNS server
B. Default gateway
C. IP address
D. Subnet Mask
39. There are one thousand employees in the entire company at present and the company is
experiencing growth. Additionally, some of the information that will be sent over the
network is confidential. Which network Types would be most appropriate in this situation?

A. Peer to Peer B. Standalone Computer C. Workstation D. Server Based

40. At which layer of the OSI are 1s and 0s converted to a digital signal?

A. Transport B. Data link C. Network D. Physical

41. is the protocol used for communication between a web server and a web browser. By
default, it uses port 80.
A. HTML B. SMTP C. HTTP D. IMAP

42. A system to join two or more device and computers together to communicate and
share resources.

A. Network

B. Resource

C. NIC

D. Modem

43. Which topology the workstation goes down, it does not affect the entire network?

A. Star B. Bus C. Ring D. Straight line

44. A user can determine the network settings on the client’s network interface cards as well as any
that a DHCP server has leased to your computer by typing the following command at a command
prompt.

A. Ping B. IP C. Ipconfig/all D. Connect

45. Which class the IP addressing provides 24 bits of network addressing and 8 bits of host addressing
by default. The most secure and strong password from the following list is: A. Class A B. Class B
C. Class C D. Class D

46. What is the default subnet mask for class C network?

A. 255.0.0.0 B. 127.0.0.1 C. 255. 255.0.0 D. 255. 255. 255.0

47. You are troubleshooting a network using UTP twisted pair and suspect that the maximum length
has been exceeded. What is the maximum length of UTP twisted pair? A. 25 meters B. 1000 meters C.
10000 meters D. 100 meters

48. Each computer is connected to every other computer by separate cabling and network
offers superior redundancy and reliability.

A. Star topology B. Mesh topology C. Ring topology D. Bus topology

49. A commercial organization with permanent connection to the internet that sells
temporary connections to subscribers.

A. MAN B. ISP C. LAN D. WAN

50. Which of the following OSI layers is responsible for establishing connections between two devices?

A. Transport B. Network C. Session D. Data-link

51. Which of the following devices forwards data packets to all connected ports?

A. Switch B. Hub C. Bridge A. Router

52. Which of the following definitions describe the loss of signal strength as a signal Travels
through a particular media?
A. chatter

B. crosstalk

C. attenuation

D. EMI

53. A communication network which is used by large organization over regional, national or global
area is called

A. LAN B. WAN C. MAN D. Intranet

54. Which of the following network device two dissimilar networks can be connected and it operate
all layers of the OSI model?

A. Router B. Switch C. Bridge D. Gateway

55. Which one is the function network device amplifies the signal it receives on one port before
it transmits it on other ports?

A. Switch/hub B. Router C. Bridge D. Repeater

56. Which of the following is not part of a Fully Qualified Domain Name?

A. Host name B. CPU type C. Company name D. Type of organization

57. Which one of the following is the correct syntax to ping the reach ability of

network? A. PING: 192.168.1.1

B. 192.168.1.1 PING

C. PING 192.168.1.1

D. PING\192.168.1.1

58. A type of maintenance that has regular schedule?

A. Breakdown Maintenance

B. Predictive Maintenance

C. Proactive Maintenance

D. Preventive Maintenance

59. One of your printers is not working properly and you want to prevent users from sending print
jobs to the logical printer servicing that device. What should you do?

A. Remove the printer from active directory

B. Stop sharing the printer

C. Rename the share


D. Change the printer post

60. The physical or logical arrangement of the network is

A. routing B. Networking C. PowerShell D.topoplogy


61. Where is the CPU and RAM Located in a Computer?
A. monitor B. motherboard C. keyboard D. power supply
62. ______ is known as the Brain of the computer?
a. Motherboard
b. Disk Drives
c. CPU
d. Expansion Boards
63. The USB port might be used to connect a _________.
a. ROM Chip
b. Printer
c. CPU
d. RAM Chip
64. Which of the following is an input device?
a. Printer
b. Keyboard
c. Monitor
d. Speakers

65. A computer port is used to ______.


a. Communicate with other computer peripherals
b. Download files from the Internet
c. Communicate with all hard drives
d. Diagnose performance issues
66. A server computer that manages a reserved block of IP addresses designated for use by
Client computers and devices joining the network, and automatically assigns them to
Computers and devices when they join the network is called a _____ server.
a. DHCP
b. ISP
c. TCP
d. MAC

67. Which of the following device is used to connect two systems, especially if the systems use different
protocols?
A. hub B. bridge C. gateway D. repeater E. None of the above
 Limited user account: - user accounts that prevented from accessing several features . and
administrator account is a user account that has the highest level of access and control over
a computer system or network.
 The maximum distance for Unshielded Twisted Pair cable is 100 meters
 Repeaters are defined as a networking device that is used to amplify and generate the
incoming signal.
 1byte is equivalents to 8bit.
 Education domain name is edu.gov
 A proxy server acts as an intermediary between a client and a server, facilitating requests
and responses between them. Here are some key points about proxy servers: Privacy and
Security:
 (3)Firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predetermined security rules.
 Virtual Private Network (VPN) is a service that creates a secure, encrypted connection
over a less secure network, such as the internet. Here are some key points about VPNs
 Operating system (OS) is the software that manages computer hardware and software
resources and provides common services for computer programs.
 DNS (Domain Name System) is the process of converting a domain name (like
www.example.com) into an IP address (like 192.0.2.1) that computers use to identify each
other on the network.
 A server on the internet is often referred to as a "host."
 Hub is a basic networking device that broadcasts data to all devices connected to it.
 SMTP (Simple Mail Transfer Protocol) is primarily used for sending Receiving Emails.
 USB (Universal Serial Bus) is a standard for connecting peripherals to a computer. It's
known for its "plug and play" capability, which means devices can be connected and used
without needing to restart the computer or install additional drivers.
 Which one is not network serive technology A. Ethiotelecom B. Dsl C. Router D. Satalite
 Which of the following is not Advantages of Kaizen?
 Internet is a global network of interconnected computers and servers that communicate using
standardized protocols.
 Caching is a technique used to store frequently accessed data in a temporary storage location, or
cache, to improve performance and reduce latency.
 RJ45: This connector is used for UTP (Unshielded Twisted Pair) cables, which are commonly used
in Ethernet networks. RJ11: This connector is used for telephone lines. It typically has 4 or 6 pins
and is used to connect telephones.
 Information help desk provides support, information, and solutions to customers, employees, or
both.
 TCP/IP (Transmission Control Protocol/Internet Protocol) is known for providing reliable
connections, ensuring data is delivered accurately and in the correct order.
 UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee delivery,
order, or error-checking, making it faster but less reliable than TCP.
 How to find the MAC address of your device? ipconfig /all
 Ping command is a network utility used to test the reachability of a host on an IP network and
measure the round-trip time for messages sent from the originating host to a destination computer.
 Ping command is run on the command prompt (or terminal) of your operating system.
 CMOS battery stores important system information, including the date and time.
 For small organizations, Class C IP addresses are commonly used.
 Authentication:-Logging into a website with a username and password. And Authorization: - After
logging in, determining whether the user can access certain files or perform specific actions.
 WAN (Wide Area Network) is a telecommunications network that extends over a large
geographical area, often a country or continent.
 LAN (Local Area Network) is a network that connects devices within a limited area, such as a
home, office, or building.
 FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a
client and a server on a computer network.
 If a shared printer is not working and a user has sent a print job? Stopping the shared printer can
be a temporary solution to prevent further issues.
 Information related to users and groups is stored in the domain controller.
 In-Country Disaster Recovery and Out-of-Country Disaster Recovery (reading assignment )
 A virus is a harmful program designed corrupt or delete data, steal personal information.
 Electrostatic Discharge (ESD) can indeed cause significant damage to electronic components,
including expansion boards.
 HTTPS (Hypertext Transfer Protocol Secure) operates at the application layer of the TCP/IP
model.
 Presentation layer is the sixth layer of the OSI model, is responsible for data translation,
encryption, and decryption.
 Muda refers to waste or uselessness in a process. In lean manufacturing, it is minimized or
eliminated to improve efficiency and productivity.
 DHCP stands for Dynamic Host Configuration Protocol.
 IP address is essential for two devices to communicate over a network.
 Peer-to-peer (P2P) network is a decentralized network where each device, or "peer," has equal
status and can act as both a client and a server.
 Network is a collection of interconnected devices that communicate with each other to share

For n node of 𝑛 − 1 cables is in bus topology.


resources and information.

You might also like