1. A peer-to-peer LAN is an appropriate network architecture for____
(1) The Internet.
(2) Home network
(3) Network requiring a server with shared resources.
(4) wide area network
(5) None of these
2. Similar to a hub in an Ethernet network, a ____________ helps relay data between wireless network nodes.
(1) Wireless port
(2) Wireless access point
(3) wireless adapter
(4) wireless transceiver
(5) None of these
3. Cell phones use ____________ to access the Internet.
(1) MMS technology
(2) a notation system
(3) micro browser software
(4) HTML language
(5) None of these
4. In CSMA/CD, the computer sends a fixed unit of data called a(n)_______
(1) Node.
(2) Packet.
(3) Override.
(4) Token.
(5) None of these
5. The uniform resource locator (URL) is case sensitive in the ____.
(1) Protocol
(2) Authority
(3) Directory
(4) Type
(5) None of these
6. ASCII is a(n)________
(1) Numbering system for representing numbers with decimals.
(2) Character representation standard common in older mainframe computers.
(3) Encoding standard used to represent letters and characters.
(4) Symbolic programming language that directly represents machine instructions.
(5) None of these
7. A global network made up of thousands of privately owned computers and networks is called the:
(1) World Wide Web.
(2) Internet.
(3) Specialized search engine.
(4) Internet2.
(5) None of these
8. Which of the following is NOT a basic function of the operating system?
(1) Manage memory
(2) Provide the user interface
(3) Start the computer
(4) Provide the word processing system
(5) None of these
9. Which of the following scrambles a message by applying a secret code?
(1) Encryption
(2) Audits
(3) UPS
(4) Firewalls
(5) None of these
10. The Internet began with the development of
(1) USENET
(2) internet
(3) Ethernet
(4) arpanet
(5) None of these
ANSWERS
1-(2) Home network
2-(2) Wireless access point
3-(3) micro browser software
4-(2) Packet
5-(3) Directory
6-(3) Encoding standard used to represent letters and characters.
7-(2) Internet
8-(4) Provide the word processing system
9-(1) Encryption
10-(4) arpanet
Shared By Abhishek Kumar...
Comment Policy : We invite you to comment on our posts, as long as they are respectful, to the point and approving. We do not perform pre-moderation of comments. However, in order to keep this site clean and useful, we reserve the right to remove any comment that is not in accordance with our Comment Policy.