Section A: Networks
1.   A collection of devices with the ability to communicate and share data,
          hardware, and software is called a:
          A) Server
          B) Protocol
          C) Network
          D) Application
            2.   The largest computer network is:
          A) Intranet
          B) LAN
          C) WAN
          D) Internet
            3.   In networking, a “node” refers to:
          A) A data packet
          B) Any connected device
          C) A communication protocol
          D) An IP address
            4.   Which of the following is an advantage of a network?
          A) Vulnerability to viruses
          B) Unauthorized access risk
          C) Reduced hardware/software costs
          D) System crashes
            5.   The main function of network administration includes:
          A) Playing online games
          B) Monitoring and securing networks
          C) Sending emails only
          D) Making websites
            6.   Bandwidth refers to:
          A) Actual achieved data speed
          B) Maximum possible data transfer rate
          C) Security protocols
          D) Distance between nodes
            7.   Throughput refers to:
          A) Maximum speed possible
          B) Actual achieved data transfer rate
          C) Speed of light in fiber cables
          D) Signal interference
            8.   A PAN (Personal Area Network) is typically used for:
          A) Interconnecting cities
          B) Communication between devices close to one person
          C) Home networking
           D) Internet service providers
             9.     A HAN (Home Area Network) is a type of:
           A) WAN
           B) MAN
           C) LAN
           D) PAN
             10. A network covering an entire city is called:
           A) WAN
           B) LAN
           C) MAN
           D) PAN
Section B: Internet
             11.    Which protocol divides data into packets for Internet transfer?
           A) HTML
           B) TCP/IP
           C) FTP
           D) SMTP
             12. The main routes for data traffic across the Internet are known as:
           A) Nodes
           B) Backbone
           C) LANs
           D) Routers
             13. ISPs provide:
           A) Local data storage
           B) Internet access
           C) Anti-virus protection
           D) Web design
             14. Which of the following is a South African ISP?
           A) Google
           B) MWEB
           C) Facebook
           D) YouTube
             15. DSL stands for:
           A) Digital Signal Line
           B) Digital Subscriber Line
           C) Data Signal Link
           D) Dial-up Service Link
             16. Which Internet service is the slowest?
          A) DSL
          B) Cable
          C) Dial-up
          D) ADSL
            17.   A symmetrical Internet connection means:
          A) Faster download speed only
          B) Faster upload speed only
          C) Same upload and download speed
          D) Limited bandwidth
            18. Latency refers to:
          A) Uneven packet delivery
          B) Time for a packet to travel from one point to another
          C) Amount of bandwidth used
          D) Number of connections
            19. Jitter is:
          A) Speed of connection
          B) Unevenness in packet delivery
          C) Network type
          D) Encryption error
            20. The Internet and the Web differ in that the Web is:
          A) A collection of hyperlinked documents
          B) A type of ISP
          C) The Internet backbone
          D) A wireless technology
Section C: Web
            21. An IP address identifies:
          A) A web page
          B) A specific device on a network
          C) A search engine
          D) A domain registrar
            22. Which IP type is permanently assigned?
          A) Dynamic IP
          B) Private IP
          C) Static IP
          D) Proxy IP
            23. The main page of a website is called:
          A) Landing page
          B) Home page
           C) Server page
           D) Index page
             24. A URL beginning with “https://” indicates:
           A) Secure site
           B) Proxy server
           C) FTP site
           D) Dial-up
             25. The software that displays web pages is called:
           A) Web server
           B) Web browser
           C) Search engine
           D) HTML
             26. A small text file stored by a website to identify users is called:
           A) Virus
           B) Cookie
           C) Packet
           D) Spam
             27. Which of the following is a search engine for scholarly literature?
           A) Bing
           B) Yahoo
           C) Google Scholar
           D) Safari
             28. A Web server is used to:
           A) Display HTML locally
           B) Host and deliver web pages
           C) Manage computer hardware
           D) Encrypt IP addresses
             29. A person who creates and maintains a website is called:
           A) Webmaster
           B) Designer
           C) Programmer
           D) Blogger
             30. A blog is best described as:
           A) E-commerce site
           B) Online journal entries
           C) Internet backbone
           D) Email server
Section D: Email
  31. The system that stores and forwards e-mail messages is called:
A) ISP
B) Email server
C) Web server
D) DNS
  32. Gmail is an example of:
A) POP mail
B) Web-based email
C) Dial-up mail
D) LAN mail
  33. Microsoft Outlook is an example of:
A) Local email software
B) Web-based mail
C) ISP software
D) Proxy server
  34. In emails, Bcc stands for:
A) Broadcast carbon copy
B) Blind carbon copy
C) Background computer code
D) Backup carbon copy
  35. The usual size limit for email attachments is between:
A) 1–5 KB
B) 2–10 MB
C) 20–50 GB
D) 100–500 MB
  36. Spam refers to:
A) Wanted promotional email
B) Unwanted electronic junk mail
C) Secure encrypted mail
D) Digital signatures
  37. Phishing is a scam designed to:
A) Speed up Internet connection
B) Trick users into revealing confidential information
C) Compress large files
D) Block advertisements
  38. A spam filter is used to:
A) Increase connection speed
B) Capture unsolicited emails
C) Encrypt web traffic
D) Detect viruses only
  39. Which of the following is considered good netiquette?
A) Using sarcasm freely
B) Writing in all caps
C) Giving a meaningful subject line
D) Leaving spelling errors
  40. An automatic reply in emails is typically used when:
A) You are offline or away
B) You receive spam
C) You open a website
D) You change your password