Chapter 8 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
الاجابه
|
السؤال
|
WAN
|
The Internet is an example of which type of network?
|
TCP/IP
|
Which suite of protocols is used to transmit data across the Internet?
|
subnet mask
|
Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?
|
ADSL
|
What is the most commonly used DSL technology?
|
1- The company network requires secure access to confidential information.
2- The users need a central database to store inventory and sales information.
3- The data gathered by the employees is critical and should be backed up on a regular basis
|
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
|
1- The number of twists in the wires inside the cable
2- The number of wires inside the cable.
|
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
|
tracert
|
Which Windows XP command displays the route taken by packets crossing an IP network?
|
328 ft (100 m)
|
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
|
1- supported by IEEE 802.3 standards
2- uses a bus logical topology
|
Which two characteristics describe Ethernet technology? (Choose two.)
|
hub
|
Which device enables computers to be attached to a network without segmenting the network?
|
a bad network cable
|
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
|
the available wireless networks within range
|
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
|
Attach a cable that has an RJ-45 connector.
|
Which procedure is normally performedwhen connecting a computer to an Ethernet network for the first time?
|
VPN
|
Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN?
|
1- Fewer peripherals are needed
2- Centralized administration capabilities are enhanced.
|
Which two statements are true of network computing in contrast to non-network computing? (Choose two.)
|
It developed standards to replace proprietary standards after U.S. telephone industry deregulation.
|
What is true about the TIA/EIA?
|
1- faulty NIC
2- faulty patch cord
|
A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.)
|
to save troubleshooting time
|
Why should network cables always be labeled?
|
Purchase equipment only through manufacturer-authorized partners.
|
Which method is recommended in order to avoid problems with counterfeit network equipment?
|
DNS
|
Which networking protocol translates a network name such as www.cisco.com to a unique IP address?
|
Posting Komentar
Perhatian Para Pembaca!
Dilarang Keras:
1. Menggunakan kata-kata kotor dalam menulis komentar, terima kasih atas partisipasi saudara/i.
2. Menulis link hidup, link yang tidak berkaitan.
3. Silahkan sertakan sumber jika meng-copy tulisan di atas.
4. Sangat disarankan untuk memfollow blog ini.
5. Jangan lupa untuk berlangganan artikel terbaru.