1.
Is a type of maintenance that need regular maintenance schedule
a. Preventive maintenance b. Proactive maintenance c. Breakdown maintenance d.
Predictive maintenance
2. Is a utility program that allows you to check connectivity between network
device on the network
a. Toolkit b. NIC c. Ping d. Ipconfig
3. The equipment needed to allow home computer to connect to the internet is
called
a. Gateway b. Modem c. Peripheral d. Monitor
4. Is a network that covers the size of a state, country, and could even be
considered to include the entire internet. a. WAN b. CAN c. IP d. LAN
5. Which one of the following is an input device? a. Monitor b. Keyboard c. Speaker
d. Printer
6. CPU and memory are located on the a. Storage device b. Motherboard c.
Expansion board d. Output device
7. HTTP is protocol a. Application layer b. Transport layer c. Network layer d.
Datalink layer
8. Which of the following is not an operating system? a. Linux b. Oracle c. Windows
d. DOS
9. What is the purpose of the DHCP? a. To provide storage for email b. To provide
an IP configuration information to hosts c. To translate IPv4 addresses to MAC
addresses d. To translate URLs to IP addresses
10. It is a network device that are used to amplify/ regenerate the weak signal is
called a. Modem b. Firewall c. Gateway d. Repeater
11. Which of the following do attackers commonly target for fetching IP address of
a target or victim user? a. Web pages
b. IP tracker c. Emails d. Websites
12. Which topology creates a very reliable network but requires a large amount of
cable and it is difficult to administer. a. Mesh topology b. Star topology c. Ring
topology d. Bus topology
13. Which of the following is not an advantage of implementing 5s technique a. To
standardize work practices b. To create a dirty workplace c. To improve work
efficiency d. To improve work discipline
14. If all devices are connected to a central hub, then topology is called a. Ring
topology b. Bus topology c. Star topology d. Tree topology
15. Is any devices directly connected to the network that has been assigned a
unique ident or address. a. Wall outlet b. Port c. IP d. Node
16. Which of the following commands will display the MAC (Media Access Control)
address of given computer? a. Ipconfig/all b. Nbtstat c. Nbt
d. Nslookup
17. Which function key is used for opening help? a. F2 b. F12 c. F1 d. F3
18. You have a PC with no video, which of the following LEAST likely to be the
cause? a. Defective microprocessor b. Defective RAM (bank zero) c. Crashed hard
drive d. Loose video card
19. Electrostatic Discharge (ESD) would cause the most damage to which
component? a. Monitor b. Power supply c. Keyboard d. Expansion board
20. Which of the following is not a type of MS Access database object? a. Form b.
Table c. Modules d. Worksheets
21. Computers on the internet owned and operated by education institution form
part of the a. Mil domain b. Gov domain c. Com domain d. Edu domain
22. One of your print devices is not working properly, so you want to temporarily
prevent users from sending jobs to the printer
serving that device. Which of the following actions should you take? a. Stop
sharing the printer b. Install the new printer again c. Disconnect the whole system
d. Allow sharing the printer
23. Which software prevents the external access to a system? a. Virus checker b.
Firewall c. Router d. Gateway
24. Which of the following would be a logical first step in troubleshooting a PC? a.
Check the computer CMOS b. Define what applications are being used c. Define
the circumstances of the problem d. Call the vendor
25. Which of the following is NOT an advantage of network security? a. Makes the
system slower b. Gives privacy to users c. Protects system against viruses d.
Minimizes computer freezing and crashes
26. In peer to peer network each computer in a network is referred as a. Client b.
Sender c. Peer d. Server
27. Identify among the following the network device used to connect two dis
similar types of networks. a. Bridge
b. Gateway c. Hub d. Switch
28. Computer date and time is found in/on a. Scroll bar b. Menu bar c. Status bar
d. Task bar
29. Servers as a reference model for data communication. It is made up of 7
layers, with each layer defining a particular aspect of how network devices connect
and communicate with one another. a. Network model b. Database model c. OSI
model d. DoD model
30. An application software that is/are used to perform calculation functions and
charts? a. Microsoft Office Access b. Microsoft Office publisher c. Microsoft Office
Excel d. Microsoft Office Word
31. What is the function of network interface cards? a. Connects the clients,
servers and peripherals to the network through a port b. Connects networks with
different protocols like TCP/IP c. Boost the signal between two cable segments or
wireless access points d. Allows you to segment a large network into smaller,
efficient networks
32. How can you edit a relationship already established between two tables? a.
Double clicks the relationship line
b. Edit the table by design view c. Right click and select properties d. Left click
the relationship line
33. Domain name system can obtain the known and vice versa. Of host it is domain
name is a. IP address b. Port address c. Station address d. Checksum
34. The equipment needed to allow home computers to connect to the internet is
called a. Gateway b. Modem c. Peripheral d. Monitor
35. If all devices are connected to a central hub, then topology is called a. Ring
topology b. Bus topology c. Star topology d. Tree topology
36. A byte is equivalent to ___________ a. 8 bits b. 32 bits c. 16 bits d. 64 bits
37. A device that connects networks with different protocols a. Gateway b. Proxy
server c. Switch d. Hub
38. Which of the following is the brain of the computer?
a. Control unit b. Arithmetic and logic unit c. Central processing unit d. Memory
39. Most of the telephone cable uses the connector. a. RF b. BNC c. RJ45 d. RJ11
40. The primarily activity of is to prevent an external user who are identifying the
IP address of an internal network. a. AD server b. Data server c. Proxy server d.
File server
41. When you deleted file in your computer, where does it go? a. Flash disk b. My
document c. Hard disk d. Recycle bin
42. Hardware address is known as a. Hardware brand b. IP address c. Network
interface card d. MAC address
43. the process of keeping addresses in memory for future is called a. Routing b.
Resolving c. caching d. checking
44. which of the communication modes support two way traffic but in only one
direction of time? a. Half duplex b. Full duplex c. Simplex d. Three quarter’s duplex
45. A byte is equivalent to a. 8 bits b. 32 bits c. 16 bits d. 64 bits
46. Is a network that covers the size of state, country, and could even be
considered to include the entire internet. a. IP b. LAN c. CAN d. WAN
47. During the normal PC boot process, which of the following is active first? a.
ROM BIOS b. RAM BIOS c. Hard Disk d. CMOS
48. SMTP standard for a. Simple mail transfer protocol b. Simple message
transport port c. Same mail transfer port d. Simple mail transport protocol
49. What is recommended maximum length UTP a. 150m b. 200m c. 50m
d. 100m
50. The process by which windows server verifies that the user match the user
account employed into gain access a. Active directory b. Domain address c.
Dcpromo d. Active directory