Uro

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Periculum
P
Periculum
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,953
| Attempts: 2,953
SettingsSettings
Please wait...
  • 1/106 Questions

    Na sledećoj sliciPrikazana je interakcija korisnika korišćenjem: 

    • Terminal i mainframe računara
    • PC računara
    • Umreženog računara
    • Računara povezanog na internet
    • Distribuiranog sistema
    • Oblaka
Please wait...
About This Quiz

.

Uro - Quiz

Quiz Preview

  • 2. 

    Operativni sistem: 

    • Ima ulogu da obezbedi povezivanje korisnika sa Internetom

    • Upravlja resursima računarskog sistema i obezdeđuje interfejs prema korisniku

    • Je program koji služi za kreiranje video igara, animacija i zvučnih efekata

    Correct Answer
    A. Upravlja resursima računarskog sistema i obezdeđuje interfejs prema korisniku
    Explanation
    The correct answer is "Upravlja resursima računarskog sistema i obezdeđuje interfejs prema korisniku." This answer accurately describes the role of an operating system, which is to manage the resources of a computer system and provide an interface for the user to interact with the system.

    Rate this question:

  • 3. 

    Internet je zasnovan na TCP/IP skupu protokola.

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    The given statement is true. The internet is indeed based on the TCP/IP protocol suite. TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of communication protocols used for connecting devices on the internet. TCP/IP provides a reliable and standardized method for data transmission and ensures that data packets are delivered accurately and efficiently across networks. This protocol suite is the foundation of modern internet communication and enables various internet services such as web browsing, email, file transfer, and more.

    Rate this question:

  • 4. 

    Svaki računar i ruter na Internetu ima svoju jedinstvenu IP adresu:

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    Every computer and router on the Internet has its own unique IP address.

    Rate this question:

  • 5. 

    “Shortest Job First” je ime jednog od algoritama koji se koristi za raspoređivanje procesa.

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    The given statement is true. "Shortest Job First" is indeed the name of one of the algorithms used for process scheduling. This algorithm prioritizes the execution of the process with the shortest burst time, aiming to minimize the waiting time and improve overall system efficiency.

    Rate this question:

  • 6. 

    HAL je skraćenica koja označava: 

    • Superinteligentni računar iz knjige i istoimenog filma “Odiseja u svemiru”

    • Sloj apstrakcije hardvera kao deo jezgra operativnog sistema koji omogućava da operativni sistem vidi različit hardver na isti način

    • Proizvođača halogenih sijalica

    Correct Answer
    A. Sloj apstrakcije hardvera kao deo jezgra operativnog sistema koji omogućava da operativni sistem vidi različit hardver na isti način
    Explanation
    The correct answer is "Sloj apstrakcije hardvera kao deo jezgra operativnog sistema koji omogućava da operativni sistem vidi različit hardver na isti način." This answer explains that HAL is an abbreviation for a hardware abstraction layer, which is a component of an operating system that allows the operating system to interact with different hardware in a uniform manner.

    Rate this question:

  • 7. 

    BIOS (basic input-output system) izvršava POST (Power On Self Test), koji predstavlja seriju testova hardvera.

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    The given statement is correct. BIOS (basic input-output system) performs the POST (Power On Self Test), which is a series of hardware tests.

    Rate this question:

  • 8. 

    Resursi računarskog sistema obuhvataju: 

    • Samo hardver (procesor, memorija, ulazno-izlazni uređaji)

    • Samo softver (programi, podaci, datoteke svih vrsta)

    • I hardver i softver

    Correct Answer
    A. I hardver i softver
    Explanation
    The correct answer is "I hardver i softver". This means that computer resources include both hardware (processor, memory, input-output devices) and software (programs, data, files of all types). This answer acknowledges that both components are essential for the functioning of a computer system.

    Rate this question:

  • 9. 

    Bootstraping je pojam u računarstvu koji se odnosi  na: 

    • Bilo koji samostartujući proces koji se odvija bez spoljne inicijalizacije

    • Buđenje računara iz stand by režima rada

    • Proceduru koja obuhvata niz lančano vezanih koraka (izvršavanje programa u BIOS ROM memoriji, učitavanje i izvršavanje MBR-master boot record koda...), čiji je cilj dovođenje računarskog sistema u operativno stanje

    Correct Answer
    A. Proceduru koja obuhvata niz lančano vezanih koraka (izvršavanje programa u BIOS ROM memoriji, učitavanje i izvršavanje MBR-master boot record koda...), čiji je cilj dovođenje računarskog sistema u operativno stanje
    Explanation
    Bootstraping se odnosi na proceduru koja obuhvata niz lančano vezanih koraka, čiji je cilj dovođenje računarskog sistema u operativno stanje. Ovi koraci uključuju izvršavanje programa u BIOS ROM memoriji, učitavanje i izvršavanje MBR-master boot record koda i slično. Ova procedura omogućava računaru da se pokrene i započne sa izvršavanjem operativnog sistema.

    Rate this question:

  • 10. 

    Računarska mreža predstavlja skup međusobno povezanih računara visokog stepena autonomije:

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    The given statement is true. A computer network refers to a collection of interconnected computers that have a high degree of autonomy. This means that each computer in the network is capable of making independent decisions and performing tasks without requiring constant supervision or control from a central authority. The computers in a network can communicate with each other, share resources, and collaborate on various tasks, making them highly autonomous entities within the network.

    Rate this question:

  • 11. 

    Koliko slojeva ima OSI referentni model? 

    Correct Answer
    7
    Explanation
    The OSI reference model consists of seven layers. These layers are responsible for different functions in the process of network communication. Each layer has its own set of protocols and services that enable the transmission and reception of data. The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer builds upon the previous one, creating a hierarchical structure that allows for efficient and standardized communication between network devices.

    Rate this question:

  • 12. 

    Za dešifrovanje poruke, neophodno je imati

    • Otvoreni tekst I kanal za prijem poruke

    • Ključ I otvoreni tekst

    • Ključ I šifrat

    Correct Answer
    A. Ključ I šifrat
    Explanation
    To encrypt a message, it is necessary to have both the key and the ciphertext. The key is used to transform the plaintext into the ciphertext using a specific encryption algorithm. Without the key, it would be impossible to decrypt the ciphertext and retrieve the original message. Therefore, having both the key and the ciphertext is essential for the encryption process.

    Rate this question:

  • 13. 

    Cloud manager pripada:

    • Gornjem sloju

    • Srednjem sloju

    • Donjem sloju

    Correct Answer
    A. Gornjem sloju
    Explanation
    Cloud manager pripada gornjem sloju jer je odgovoran za upravljanje i kontrolu cloud infrastrukture. Gornji sloj u cloud arhitekturi obuhvaća aplikacijske usluge i korisničko sučelje, a cloud manager je odgovoran za upravljanje resursima, nadzor i automatizaciju procesa u cloud okruženju. Ovaj sloj pruža korisnicima mogućnost upravljanja i kontrolu nad svojim cloud resursima, kao što su virtualni strojevi, mreže i pohrana podataka.

    Rate this question:

  • 14. 

    Jedan od nabrojanih pojmova je “uljez”. Koji? 

    • Sektor

    • Staza

    • Glava za čitanje i pisanje

    • “Round Robin” algoritam

    • Cilindar

    • Rotacione ploče sa magnetnom površinom

    Correct Answer
    A. “Round Robin” algoritam
    Explanation
    The correct answer is the "Round Robin" algorithm. This algorithm is a scheduling algorithm that is commonly used in computer operating systems and network systems. It works by assigning a fixed time slot to each process in a system, allowing each process to execute for a certain amount of time before moving on to the next process. This helps in achieving fairness and preventing any single process from monopolizing the system's resources.

    Rate this question:

  • 15. 

    Namenski server je računar koji je optimizovan za brzo opsluživanje velikog broja zahteva klijenata iz mreže:

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    A dedicated server is a computer that is optimized to quickly serve a large number of client requests from the network. This means that it is specifically designed and configured to handle high volumes of traffic and provide efficient and reliable performance. By dedicating its resources solely to serving client requests, a dedicated server can offer faster response times and better overall performance compared to a regular server. Therefore, the statement "Tacno" (True) is the correct answer.

    Rate this question:

  • 16. 

    IP adrese klase B nalaze se u opsegu:

    • 1.0.0.0 do 126.255.255.255

    • 192.0.0.0 do 223.255.255.255

    • 128.0.0.0 do 191.255.255.255

    Correct Answer
    A. 128.0.0.0 do 191.255.255.255
    Explanation
    The given correct answer states that IP addresses of class B are in the range of 128.0.0.0 to 191.255.255.255. This is accurate because class B IP addresses have the first two bits set to 1 and 0 respectively, and the remaining 14 bits are used to identify the network and host. Therefore, the range of class B addresses starts from 128.0.0.0 (10000000.00000000.00000000.00000000 in binary) and ends at 191.255.255.255 (10111111.11111111.11111111.11111111 in binary).

    Rate this question:

  • 17. 

    Maska podmreže je:

    • 16-bitni broj

    • 32-bitni broj

    • 64-bitni broj

    Correct Answer
    A. 32-bitni broj
    Explanation
    A subnet mask is a 32-bit number used in IPv4 to divide an IP address into network and host portions. It is used to determine the network address by performing a bitwise AND operation between the IP address and the subnet mask. Since the subnet mask is a 32-bit number, it is represented as a 32-bit binary or a 32-bit decimal number. Therefore, the correct answer is a 32-bit number.

    Rate this question:

  • 18. 

    Kernel je:

    • Korisnički interfejs operativnog sistema

    • Korisnički interfejs BIOS-a

    • Jezgro operativnog sistema, tj. veza između hardevera i ostalih slojeva operativnog sistema

    Correct Answer
    A. Jezgro operativnog sistema, tj. veza između hardevera i ostalih slojeva operativnog sistema
    Explanation
    Kernel je jezgro operativnog sistema koje služi kao veza između hardvera i ostalih slojeva operativnog sistema. On upravlja resursima računara, kao što su procesor, memorija i ulazno/izlazni uređaji, i omogućava komunikaciju između aplikacija i hardvera. Kernel je odgovoran za osnovne funkcionalnosti operativnog sistema, kao što su upravljanje procesima, memorijom, datotekama i mrežom. On pruža apstrakciju hardvera i omogućava da se aplikacije izvršavaju na različitim platformama.

    Rate this question:

  • 19. 

    Na sledećoj slici prikazano je: 

    • Straničenje memorije

    • Korišćenje virtualne memorije

    • Generisanje fizičke adrese korišćenjem segmentacije memorije

    Correct Answer
    A. Generisanje fizičke adrese korišćenjem segmentacije memorije
    Explanation
    The given image represents the process of generating a physical address using memory segmentation. Memory segmentation is a memory management technique where the memory is divided into different segments, each having a specific purpose. When a program needs to access a specific memory location, the segment number and offset are combined to generate a physical address. This technique allows for efficient memory allocation and management.

    Rate this question:

  • 20. 

    Stek sekcija memorije jednog procesa služi za:

    • Čuvanje programskog koda procesa

    • Čuvanje podataka procesa

    • Čuvanje privremenih podataka procesa (parametri za procedure, privremene adrese i sl.)

    Correct Answer
    A. Čuvanje privremenih podataka procesa (parametri za procedure, privremene adrese i sl.)
    Explanation
    The stack section of memory in a process is used for storing temporary data such as parameters for procedures, temporary addresses, and other temporary data. This section is typically used for managing the execution of functions and procedures within the process. It is separate from the sections used for storing the program code and data of the process.

    Rate this question:

  • 21. 

    Koje su 4 generalizovane kategorije napada? 

    • Presretanje, Preuzimanje, Izmena I Fabrikovanje

    • Presretanje, Presecanje, Izmena I Fabrikovanje

    • Manipulacija, Presecanje, Izmena I Ubrizgavanje

    Correct Answer
    A. Presretanje, Presecanje, Izmena I Fabrikovanje
    Explanation
    The correct answer is "Presretanje, Presecanje, Izmena I Fabrikovanje". These four categories are commonly known as interception, interruption, modification, and fabrication.

    Rate this question:

  • 22. 

    VI se najčešće koristi da poveća performanse onih mehanizama kod kojih se detektujuanomalije u ponašanju. 

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    VI se najčešće koristi za povećanje performansi mehanizama koji detektuju anomalije u ponašanju.

    Rate this question:

  • 23. 

    Na sledećoj sliciPrikazana je interakcija korisnika korišćenjem: 

    • Terminal i mainframe računara

    • PC računara

    • Umreženog računara

    • Računara povezanog na internet

    • Distribuiranog sistema

    • Oblaka

    Correct Answer
    A. Umreženog računara
  • 24. 

    Koncept prema kome organizacije su vlasnice nad infrastrukturom oblaka je:

    • Privatni oblak

    • Javni oblak

    • Hibridni oblak

    Correct Answer
    A. Privatni oblak
    Explanation
    The correct answer is "Privatni oblak". In a privatni oblak (private cloud), organizations have ownership and control over the cloud infrastructure. This means that the infrastructure is dedicated solely to the organization and is not shared with other entities. This provides a higher level of security and privacy as the organization has full control over the infrastructure and can customize it according to their specific needs.

    Rate this question:

  • 25. 

    Platforma u vidu servisa omogućava korisniku da konfiguriše hosting okruženje:

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    The given statement is true. The platform in the form of a service allows the user to configure the hosting environment. This means that the user has the ability to customize and set up their hosting environment according to their specific needs and requirements. This flexibility and control over the hosting environment can be beneficial for the user in terms of optimizing performance, security, and scalability.

    Rate this question:

  • 26. 

    Ruter je mrežni uređaj koji pripada:

    • Mrežnom sloju

    • Fizičkom sloju

    • Sloju veze

    Correct Answer
    A. Mrežnom sloju
    Explanation
    The correct answer is "Mrežnom sloju." A router is a network device that operates at the network layer of the OSI model. It is responsible for routing data packets between different networks, making decisions based on IP addresses. The network layer is responsible for logical addressing and routing of data packets across different networks, making it the appropriate layer for routers. The physical layer deals with the physical transmission of data, while the data link layer is responsible for error detection and correction at the link level.

    Rate this question:

  • 27. 

    TCP/IP je:

    • Konceptualni model sastavljen od 7 slojeva

    • Stvorila međunarodna organizacija za standardizaciju ISO

    • Skup protokola koju je razvila agencija DARPA

    Correct Answer
    A. Skup protokola koju je razvila agencija DARPA
    Explanation
    TCP/IP je skup protokola koji je razvila agencija DARPA. Agencija DARPA (Defense Advanced Research Projects Agency) je američka agencija za napredna istraživanja u vojne svrhe, koja je razvila TCP/IP protokol za potrebe vojnih komunikacija. TCP/IP je skup protokola koji omogućava komunikaciju između računara na internetu i predstavlja osnovu za funkcionisanje interneta.

    Rate this question:

  • 28. 

    Šta označava broj porta 443?

    • HTTP protokol

    • HTTPS protokol

    • Internet Message Access protokol

    Correct Answer
    A. HTTPS protokol
    Explanation
    HTTPS protokol označava broj porta 443. HTTPS (Hypertext Transfer Protocol Secure) je sigurna verzija HTTP protokola koja koristi enkripciju za zaštitu podataka koji se prenose između web preglednika i web servera. Port 443 je standardni port koji se koristi za HTTPS komunikaciju.

    Rate this question:

  • 29. 

    Koncept gde se kompanije ne bave infrastrukturom i održavanje servisa i hardvera je:

    • Privatni oblak

    • Javni oblak

    • Hibridni oblak

    • Option 4

    Correct Answer
    A. Javni oblak
    Explanation
    The correct answer is "Javni oblak." In a public cloud concept, companies do not have to deal with infrastructure, service maintenance, or hardware management. Public cloud services are provided by third-party vendors over the internet, allowing organizations to access and use resources such as servers, storage, and applications without having to worry about the underlying infrastructure. This enables businesses to focus on their core operations while benefiting from the scalability, flexibility, and cost-effectiveness of public cloud services.

    Rate this question:

  • 30. 

    Cluster managers pripada:

    • Gornjem sloju

    • Srednjem sloju

    • Donjem sloju

    Correct Answer
    A. Srednjem sloju
    Explanation
    Cluster managers typically belong to the middle layer of an organization. This is because cluster managers are responsible for overseeing and coordinating the activities of multiple clusters or groups within an organization. They act as a bridge between top-level management and lower-level employees, ensuring that the goals and objectives set by upper management are effectively communicated and implemented at the cluster level. Cluster managers also play a crucial role in facilitating communication and collaboration between different clusters, promoting synergy and efficiency within the organization.

    Rate this question:

  • 31. 

    IaaS se realizuje:

    • Virtuelizacijom

    • PC računarom

    • Routingom

    Correct Answer
    A. Virtuelizacijom
    Explanation
    IaaS (Infrastructure as a Service) is a cloud computing model where virtualized resources are provided over the internet. This means that instead of having physical servers or hardware, the infrastructure is created and managed virtually. Therefore, the correct answer is "Virtuelizacijom" which refers to the process of creating virtual versions of resources such as servers, storage, and networks. This allows users to access and utilize these resources remotely without the need for physical infrastructure.

    Rate this question:

  • 32. 

    SATA (Serial Advanced Technology Attachment) je naziv za: 

    • Disk kontroler integrisan na matičnoj ploči

    • Sloj operativnog sistema koji je kontroler memorije

    • Disk kontroler koji nije integrisan na matičnoj ploči

    Correct Answer
    A. Disk kontroler integrisan na matičnoj ploči
    Explanation
    SATA (Serial Advanced Technology Attachment) je naziv za disk kontroler koji je integrisan na matičnoj ploči.

    Rate this question:

  • 33. 

    Izmena je aktivan napad na integritet (integrity) dok je Fabrikovanje aktivan napad na 

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    Izmena je aktivan napad na integritet, što znači da se vrši namerno menjanje ili oštećenje podataka kako bi se narušila njihova celovitost. Sa druge strane, fabrikovanje je takođe aktivan napad, ali na autentičnost podataka, gde se podaci lažno stvaraju ili modifikuju kako bi se stekao neovlašćeni pristup ili manipulisalo informacijama.

    Rate this question:

  • 34. 

    Ispitivački napadi za cilj imaju: 

    • Sticanje pristupa udaljenom računaru na kome napadač nema legitiman korisnički nalog

    • Posledicu nedostupnosti resursa

    • Eksploatisanje ranjivosti operativnih sistema ili softvera

    • Prikupljanje informacija o sistemu ili mreži I traženje ranjivosti koje se mogu iskoristiti

    Correct Answer
    A. Prikupljanje informacija o sistemu ili mreži I traženje ranjivosti koje se mogu iskoristiti
    Explanation
    The correct answer is "Prikupljanje informacija o sistemu ili mreži I traženje ranjivosti koje se mogu iskoristiti." This means that the goal of the attacker is to gather information about the system or network and search for vulnerabilities that can be exploited. This type of attack aims to identify weaknesses in the system or network in order to gain unauthorized access or cause harm.

    Rate this question:

  • 35. 

    Hipervizor (hypervisor) je:

    • Softver ili firmver koji upravlja hardverskim resursima i virtuelnim mašinama

    • Računar na kom se efektivno izvršava virtuelizacija

    • Virtualna mašina Virtualna mašina Virtualna mašina

    Correct Answer
    A. Softver ili firmver koji upravlja hardverskim resursima i virtuelnim mašinama
    Explanation
    A hypervisor, also known as a virtual machine monitor, is a software or firmware that manages hardware resources and virtual machines. It allows multiple operating systems to run on a single physical machine by dividing the resources and providing isolation between the virtual machines. The hypervisor controls the allocation of CPU, memory, storage, and other hardware resources to ensure efficient and secure virtualization.

    Rate this question:

  • 36. 

    Na sledećoj slici, Prikazana je interakcija korisnika korišćenjem: 

    • Terminal i mainframe računara

    • PC računara

    • Umreženog računara

    • Računara povezanog na internet

    • Distribuiranog sistema

    • Oblaka

    Correct Answer
    A. Terminal i mainframe računara
    Explanation
    The given answer suggests that the interaction depicted in the image is related to the use of terminal and mainframe computers. This means that the user is likely accessing and interacting with a mainframe computer through a terminal, which is a device used to input and output data from the mainframe. This type of setup was common in the early days of computing when mainframes were the primary form of computer technology.

    Rate this question:

  • 37. 

    Opšti slojevi u arhitekturi u vidu servisa su:

    • Cloud, Cluster, Computer managers

    • Cloud, Cluster, Data managers

    • Cloud, Computer, Data managers

    • Cluster, Computer, Data managers

    Correct Answer
    A. Cloud, Cluster, Computer managers
    Explanation
    The correct answer is Cloud, Cluster, Computer managers. In the architecture of a system, different layers or components are used to manage various aspects of the system. In this case, the three layers mentioned - Cloud, Cluster, and Computer managers - represent different levels of management in the system. The Cloud manager oversees the management of resources and services in the cloud environment. The Cluster manager handles the management of clusters, which are groups of interconnected computers. The Computer manager is responsible for managing individual computers in the system. Together, these layers ensure efficient management of the system's resources and services.

    Rate this question:

  • 38. 

    Pristup PaaS-u putem web čitača predstavlja bezbednosni rizik:

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    Accessing PaaS through a web browser can pose a security risk because web browsers are susceptible to various vulnerabilities such as cross-site scripting (XSS), cross-site request forgery (CSRF), and browser-based attacks. These vulnerabilities can be exploited by malicious actors to gain unauthorized access to the PaaS platform, steal sensitive data, or manipulate the system. Therefore, it is important to implement proper security measures and precautions when accessing PaaS through a web browser to mitigate these risks.

    Rate this question:

  • 39. 

    Proces je: 

    • Svaka aktivnost procesora

    • Program ili deo programa u stanju izvršavanja

    • Datoteka na disku u koju je smešten programski kod

    Correct Answer
    A. Program ili deo programa u stanju izvršavanja
    Explanation
    The correct answer is "Program ili deo programa u stanju izvršavanja." This answer states that a process is a program or a part of a program that is currently being executed. This implies that a process is an active entity in the computer system, carrying out instructions and performing tasks. The other options mentioned do not accurately describe what a process is.

    Rate this question:

  • 40. 

    Procesor je nedeljivi resurs.

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    The statement "Procesor je nedeljivi resurs" translates to "The processor is an indivisible resource." This means that the processor cannot be divided or shared among multiple tasks or processes simultaneously. Each task or process requires exclusive access to the processor in order to execute its instructions. Therefore, the statement is correct.

    Rate this question:

  • 41. 

    Na sledećoj slici prikazano je:

    • Straničenje memorije

    • Korišćenje virtualne memorije

    • Generisanje fizičke adrese

    • Korišćenje fizičke memorije

    Correct Answer
    A. Korišćenje virtualne memorije
    Explanation
    The given image represents the concept of using virtual memory. Virtual memory is a memory management technique where the computer's operating system uses a combination of RAM and disk space to simulate additional memory. It allows the system to run programs that require more memory than what is physically available. The image may depict the process of mapping virtual addresses to physical addresses and the utilization of disk space as an extension of the physical memory.

    Rate this question:

  • 42. 

    Aplikacioni sloj TCP/IP skupa protokola:

    • Preuzima podatke sa višeg nivoa

    • Odgovara sloju mreže u OSI modelu

    • Omogućava aplikacijama odnosno korisnicima da pristupe servisima Internet mreže

    Correct Answer
    A. Omogućava aplikacijama odnosno korisnicima da pristupe servisima Internet mreže
    Explanation
    The application layer of the TCP/IP protocol suite allows applications or users to access services on the Internet. It acts as an interface between the application and the lower layers of the protocol stack. It provides services such as email, file transfer, remote login, and web browsing to users by utilizing the underlying network protocols. This layer is responsible for establishing communication between applications running on different hosts and ensuring that data is properly formatted for transmission over the network.

    Rate this question:

  • 43. 

    DHCP je skraćenica za:

    • Dynamic Host Configuration Protocol

    • Dynamic Host Connect Protocol

    • Dynamic Host Configuration Port

    • Direct Host Configuration Protocol

    Correct Answer
    A. Dynamic Host Configuration Protocol
    Explanation
    DHCP stands for Dynamic Host Configuration Protocol. This protocol is used to automatically assign IP addresses to devices on a network. It allows devices to join a network and obtain the necessary network configuration information, such as IP address, subnet mask, default gateway, and DNS server addresses, without manual configuration. DHCP simplifies network administration by centrally managing and distributing IP addresses, eliminating the need for manual IP address assignment.

    Rate this question:

  • 44. 

    U binarnom obliku IP adrese klase A počinju sa: 

    Correct Answer
    0
    Explanation
    In binary form, IP addresses of class A start with a 0. This is because class A IP addresses have a range of 1.0.0.0 to 126.0.0.0, and the first octet (8 bits) of these addresses must always start with a 0 in binary form. This allows for a large number of network addresses in class A, as the first bit being 0 indicates that it is a class A address.

    Rate this question:

  • 45. 

    Utičnicu (socket) čine:

    • Broj porta : IP adresa računara

    • IP adresa računara : broj porta

    • IP adresa računara

    Correct Answer
    A. IP adresa računara : broj porta
    Explanation
    The correct answer is "IP adresa računara : broj porta". This answer states that a socket consists of an IP address of the computer and a port number. In computer networking, a socket is a combination of an IP address and a port number that uniquely identifies a specific endpoint on a network. The IP address identifies the computer, while the port number specifies the specific application or service running on that computer.

    Rate this question:

  • 46. 

    Kao odgovor na aktivnosti unutar mreže koji mogu da ukažu na napade I potencijalno narušavanje integriteta, poverljivosti ili raspoloživosti resursa, predstavljaju sistemi za detekciju I sprečavanje upada. 

    • Tacno

    • Netacno

    Correct Answer
    A. Tacno
    Explanation
    The given statement is stating that intrusion detection and prevention systems are a response to activities within a network that can indicate attacks and potentially compromise the integrity, confidentiality, or availability of resources. This means that these systems are designed to detect and prevent unauthorized access or malicious activities within a network, thereby enhancing the security and protection of the network and its resources.

    Rate this question:

  • 47. 

    Koncept gde kompanije iznajmljuju servise za širi broj korisnika pored sopstvene infratrukture je:

    • Privatni oblak

    • Javni oblak

    • Hibridni oblak

    Correct Answer
    A. Hibridni oblak
    Explanation
    The concept where companies rent services to a wider range of users in addition to their own infrastructure is called a hybrid cloud. This means that the company combines their own private cloud with the public cloud services to create a hybrid cloud environment. This allows them to have more flexibility and scalability in managing their resources, as they can choose which data and applications to keep in their private cloud and which to store in the public cloud.

    Rate this question:

  • 48. 

    Serveri, sistemi za skladištenje podataka i umrežavanje deo su:

    • Infrastrukture u vidu servisa

    • Platforme u vidu servisa

    • Softvera u vidu servisa

    Correct Answer
    A. Infrastrukture u vidu servisa
    Explanation
    The correct answer is "Infrastrukture u vidu servisa". This is because servers, data storage systems, and networking are all components of infrastructure that are provided as services. This means that they are available for use by individuals or organizations on a subscription or pay-per-use basis, rather than being owned and managed directly by the user.

    Rate this question:

  • 49. 

    U hijerarhiji operativnog sistema:

    • Jezgro je na vrhu, a korisnički interfejs na dnu hijerarhije

    • Korisnički interfejs je na vrhu, a jezgro na dnu hijerarhije

    • Ni jedan od gore ponuđenih odgovora

    Correct Answer
    A. Korisnički interfejs je na vrhu, a jezgro na dnu hijerarhije
    Explanation
    The correct answer is "Korisnički interfejs je na vrhu, a jezgro na dnu hijerarhije." This means that in the hierarchy of an operating system, the user interface is at the top, while the kernel is at the bottom. This arrangement suggests that the user interface is the layer that interacts directly with the user, while the kernel is responsible for managing system resources and providing essential services to other parts of the operating system.

    Rate this question:

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 13, 2017
    Quiz Created by
    Periculum
Back to Top Back to top
Advertisement