1.
How many volts of static electricity does it take to destroy a computer chip?
Correct Answer
D. More than 200.
Explanation
Static electricity can be harmful to computer chips as it can cause damage to the delicate electronic components. The answer "More than 200" suggests that it takes a voltage higher than 200 volts of static electricity to destroy a computer chip. This indicates that a significant amount of static electricity is required to cause damage to the chip, emphasizing the sensitivity of computer chips to static electricity.
2.
What do we call the emitted gas from new computer equipment or computers that are exposed to ultraviolet light and sunlight?
Correct Answer
B. Out-gassing.
Explanation
Out-gassing refers to the emission of gas from new computer equipment or computers that are exposed to ultraviolet light and sunlight. This process occurs due to the release of volatile organic compounds (VOCs) from the materials used in manufacturing the equipment. These VOCs can include chemicals such as formaldehyde, benzene, and toluene. Out-gassing can contribute to indoor air pollution and may cause health issues such as respiratory irritation and allergies.
3.
To prevent head aches caused by the almost invisible flicker of the monitor as the image on the screen is refreshed, you should increase the refresh rate of the monitor to at:
Correct Answer
D. 75 hertz.
Explanation
Increasing the refresh rate of the monitor to 75 hertz helps to prevent headaches caused by the almost invisible flicker of the monitor as the image on the screen is refreshed. A higher refresh rate means that the screen is being refreshed more frequently, reducing the flickering effect that can strain the eyes and lead to headaches.
4.
At what minimum decibel (dB) level shall signs be placed notifying occupants they have entered a "hazardous noise area?"
Correct Answer
B. 85.
Explanation
Signs notifying occupants they have entered a "hazardous noise area" should be placed at a minimum decibel (dB) level of 85. This is because noise levels above 85 dB can cause hearing damage with prolonged exposure. Therefore, it is important to alert individuals when they enter an area where noise levels are potentially harmful to their hearing.
5.
In which electrostatic discharge (ESD) class would sensitive items be when the voltage ranges from 1,000 to 3,999?
Correct Answer
B. II.
Explanation
Sensitive items with a voltage range from 1,000 to 3,999 would fall into ESD Class II. This class is suitable for items that are more sensitive to electrostatic discharge than those in ESD Class I, but less sensitive than those in ESD Class III or IV. It indicates that precautions need to be taken to prevent damage from electrostatic discharge, but the sensitivity level is not as high as in the other classes.
6.
What numbering system term indicates the number of digits used ina particular numbering system?
Correct Answer
A. Radix.
Explanation
The term "radix" refers to the base or the number of digits used in a particular numbering system. It determines the range of possible values that can be represented in that system. For example, in the decimal system, the radix is 10 because it uses 10 digits (0-9). In binary, the radix is 2 because it uses only 2 digits (0 and 1). Therefore, the correct answer is radix.
7.
What numbering system term indicates how many times a number is to be multiplied by itself?
Correct Answer
C. Exponent.
Explanation
The term "exponent" refers to the power or index in a mathematical expression that indicates how many times a number is to be multiplied by itself. It is represented by a superscript number written to the right and above the base number. For example, in the expression 5^3, the base number is 5 and the exponent is 3, indicating that 5 is to be multiplied by itself three times (5 x 5 x 5 = 125). This term is commonly used in exponential notation and plays a crucial role in understanding and solving mathematical equations involving multiplication and exponents.
8.
To change a decimal to metric prefix format, you must first convert the number to a value multiplied by the base:
Correct Answer
A. 10 multiplier associated with the prefix you want to use.
Explanation
To change a decimal to metric prefix format, you must first convert the number to a value multiplied by the base: 10 multiplier associated with the prefix you want to use. This means that you need to multiply the decimal number by 10 raised to the power of the prefix's exponent. This is because metric prefixes are based on powers of 10, where each prefix represents a different power of 10. By multiplying the decimal by 10, you are effectively moving the decimal point one place to the right, which corresponds to increasing the exponent of the prefix by 1.
9.
How many symbols does the binary numbering system use?
Correct Answer
A. Two.
Explanation
The binary numbering system uses two symbols, 0 and 1. In this system, numbers are represented using only these two digits. The digit 0 represents a value of zero, while the digit 1 represents a value of one. The binary system is widely used in computer science and digital electronics as it is the foundation for representing and manipulating data in these fields.
10.
What is used as placeholders in the binary numbering system?
Correct Answer
A. Zeros.
Explanation
In the binary numbering system, zeros are used as placeholders. In this system, each digit can only have two possible values, either 0 or 1. Zeros are used to indicate that there is no value in that position, while ones represent the presence of a value. These zeros act as placeholders to maintain the correct positional value of the digits in a binary number.
11.
What decimal number is represented by 1111011.2 in the binary numbering system?
Correct Answer
C. 123.10
Explanation
The binary number 1111011.2 can be converted to decimal by multiplying each digit by its corresponding power of 2 and adding the results. Starting from the left, the digit 1 in the first position represents 2^6, the digit 1 in the second position represents 2^5, the digit 1 in the third position represents 2^4, and so on. The digit 2 in the last position represents 2^-1. Adding all these values, we get 64 + 32 + 16 + 8 + 4 + 2 + 1 + 0.5 = 127.5. Therefore, the correct answer is 123.10.
12.
What does the power in the binary system do as the exponent increases by one?
Correct Answer
C. Doubles its value.
Explanation
In the binary system, the power represents the position of a digit in a binary number. As the exponent increases by one, it means that the digit is moving one position to the left. In binary, moving one position to the left is equivalent to multiplying the value by 2. Therefore, the power in the binary system doubles its value as the exponent increases by one.
13.
When developing a place value chart, what is the power of the exponent at the far right of the chart's base or radix line?
Correct Answer
A. 0
Explanation
In a place value chart, the power of the exponent at the far right of the chart's base or radix line is 0. This is because the far right position represents the ones place, which has a value of 10^0. Any number raised to the power of 0 is equal to 1, so the exponent at the far right is 0.
14.
What is the most common mistake people make when adding binary numbers?
Correct Answer
A. Forgetting to add in the carries or adding them incorrectly.
Explanation
The most common mistake people make when adding binary numbers is forgetting to add in the carries or adding them incorrectly. When adding binary numbers, carries occur when the sum of two digits is greater than 1. If the carries are not accounted for or added incorrectly, it can lead to incorrect results in the final sum.
15.
When doing binary subtraction, you borrow when subtracting
Correct Answer
B. 0-1
Explanation
When doing binary subtraction, if the digit being subtracted is larger than the digit being subtracted from, borrowing is required. In the given example, the digit being subtracted is 1 and the digit being subtracted from is 0. Since 0 is smaller than 1, borrowing is necessary. Therefore, the correct answer is 0-1.
16.
Compared to the binary system, how many numbers dows the hexadecimal numbering system take to represent a number?
Correct Answer
D. One-fourth of the numbers.
Explanation
The hexadecimal numbering system uses sixteen different symbols (0-9 and A-F) to represent numbers, while the binary system uses only two symbols (0 and 1). Since sixteen is four times greater than four, the hexadecimal system can represent four times as many numbers as the binary system. Therefore, the answer is "One-fourth of the numbers."
17.
What are the decimal postitions 10 through 15 represented by in the hexadecimal numbering system?
Correct Answer
C. AlpHabetic characters A through F.
Explanation
In the hexadecimal numbering system, the decimal positions 10 through 15 are represented by alphabetic characters A through F. In this system, after the digits 0-9, the letters A-F are used to represent the values 10-15 respectively. So, the correct answer is alphabetic characters A through F.
18.
What is the last step in the hexadecimal-to-decimal conversion?
Correct Answer
D. Decimally add the results and write the number witha base ten subscript.
Explanation
The last step in the hexadecimal-to-decimal conversion is to decimally add the results and write the number with a base ten subscript. This means adding up the decimal values obtained from converting each digit of the hexadecimal number to decimal, and then representing the final result with a base ten subscript to indicate that it is in decimal form.
19.
How is decimal-to-hexadecimal conversion done?
Correct Answer
D. By dividing the decimal number successively by the base of the hexadecimal system.
Explanation
Decimal-to-hexadecimal conversion is done by dividing the decimal number successively by the base of the hexadecimal system. This involves dividing the decimal number by 16 repeatedly and recording the remainders as hexadecimal digits until the quotient becomes zero. The remainders are then arranged in reverse order to obtain the hexadecimal equivalent of the decimal number.
20.
What is the last step in binary-to-hexadecimal conversion?
Correct Answer
B. Write the new hexadecimal number witha subscript radix of 16.
Explanation
The last step in binary-to-hexadecimal conversion is to write the new hexadecimal number with a subscript radix of 16. This means that the hexadecimal number is written with a small "16" below it, indicating that it is in base 16. This is because hexadecimal is a base-16 number system, where each digit can represent values from 0 to 15.
21.
How many steps are there in hexadecimal subtraction?
Correct Answer
B. 4.
Explanation
Hexadecimal subtraction involves subtracting each digit of the second number from the corresponding digit of the first number. If the result is negative, a borrow is taken from the next higher digit. Since hexadecimal numbers have 16 digits (0-9 and A-F), there can be a maximum of 16 steps in the subtraction process. However, it is possible for the subtraction to be completed in fewer steps depending on the numbers being subtracted. Therefore, the correct answer is 4, but it is important to note that the number of steps can vary.
22.
What is a set of rules that define how network communications are to take place?
Correct Answer
A. Protocols.
Explanation
Protocols are a set of rules that govern how network communications occur. They define the format, timing, sequencing, and error control of data transmission between devices. Protocols ensure that devices can communicate effectively and understand each other's messages. They provide a framework for data exchange and enable devices to establish connections, transmit and receive data, and terminate communication sessions. Standards, applications, and specifications are related concepts but not specifically focused on defining network communication rules like protocols do.
23.
In which layer of the Open Systems Interconnect (OSI) Model does the checksum and the cyclic redundancy checksum (CRC) reside?
Correct Answer
D. Data-link.
Explanation
The checksum and cyclic redundancy checksum (CRC) are error detection techniques used to ensure data integrity during transmission. These techniques are implemented at the data-link layer of the OSI model. This layer is responsible for the reliable transmission of data between nodes on the same network segment. It performs functions such as framing, error detection, and flow control. Therefore, the correct answer is data-link.
24.
Which layer of the Open Systems Interconnect (OSI) Model is responsible for reliable end-to-end, also caleld host-to-host, packet delivery?
Correct Answer
C. Transport.
Explanation
The Transport layer of the OSI Model is responsible for reliable end-to-end packet delivery. It ensures that data is transferred accurately and efficiently between the source and destination hosts. This layer breaks the data into smaller packets, adds necessary information for reassembly at the receiving end, and handles any errors or lost packets during transmission. It also provides flow control and congestion control mechanisms to regulate the data flow and prevent network congestion.
25.
How many layers are there in the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and the Open Systems Interconnect (OSI) Model?
Correct Answer
C. Five and seven, respectively.
Explanation
The TCP/IP suite consists of five layers: the physical layer, data link layer, network layer, transport layer, and application layer. The OSI Model consists of seven layers: the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer.
26.
In which protocol standard is one that had become popular without the guidance of any standards organization?
Correct Answer
B. De facto.
Explanation
De facto refers to a protocol standard that has gained popularity and widespread use without being officially established or guided by any standards organization. This means that it has become widely accepted and adopted by users and industry players based on its practicality and effectiveness rather than any formal endorsement or regulation.
27.
What is a family of protocols working together in a consistent fashion to provide communication services?
Correct Answer
A. Protocol suite.
Explanation
A family of protocols working together in a consistent fashion to provide communication services is referred to as a protocol suite. This term encompasses a set of protocols that work together to enable communication between devices or networks. It includes various protocols such as internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), and others. These protocols collaborate to ensure the smooth transmission of data over a network, allowing devices to communicate effectively.
28.
Internet protocol version six (IPv6) has help alleviate the problem brought about from IPv4 by
Correct Answer
D. Expanding Internet addressing from 32 to 128 bits.
Explanation
IPv6 has helped alleviate the problem brought about from IPv4 by expanding Internet addressing from 32 to 128 bits. This expansion allows for a significantly larger number of unique IP addresses, which is necessary as the number of devices connected to the internet continues to grow. With IPv6, there are approximately 340 undecillion unique addresses available, compared to the limited number of addresses available with IPv4. This helps to ensure that there are enough IP addresses to accommodate the increasing demand for internet connectivity.
29.
Which type of computer system port is used to transmit system data one bit at a time to external devices?
Correct Answer
A. Serial.
Explanation
Serial ports are used to transmit data one bit at a time to external devices. Unlike parallel ports, which transmit multiple bits simultaneously, serial ports transmit data sequentially, one bit after another. This type of port is commonly used for connecting devices such as modems, mice, and keyboards to a computer system. Universal serial ports, on the other hand, are a type of serial port that supports multiple communication protocols and can be used with various devices. However, in this case, the question specifically asks for the type of port that transmits data one bit at a time, which is serial.
30.
Which type of computer system port can transfer eight bits of data or one byte simultaneously through eight separate lines in a single cable?
Correct Answer
B. Parallel.
Explanation
Parallel ports are computer system ports that can transfer eight bits of data or one byte simultaneously through eight separate lines in a single cable. This means that each line carries one bit of data, allowing for faster data transfer compared to serial ports where data is transferred one bit at a time. Parallel ports are commonly used for connecting printers and other devices that require high-speed data transfer.
31.
Which computer system port would you use to encrypt credit card transactions with e-commerce sites?
Correct Answer
C. Port 443.
Explanation
Port 443 is the correct answer because it is the default port for secure HTTP (HTTPS) communication. When encrypting credit card transactions with e-commerce sites, it is crucial to use a secure connection to protect sensitive information. Port 443 ensures the data is encrypted and transmitted securely over the internet, providing a layer of protection against unauthorized access and potential data breaches.
32.
Which is a common computer system port that contains HTTP servers and proxies?
Correct Answer
D. Port 8080.
Explanation
Port 8080 is a common computer system port that contains HTTP servers and proxies. This port is often used as an alternative to the default HTTP port (Port 80) for running web servers or proxies. It allows for the simultaneous operation of multiple web servers on the same computer, providing flexibility and scalability. Port 110 is used for POP3 email protocol, Port 443 is used for secure HTTP (HTTPS) communication, and Port 8080 is specifically designated for HTTP servers and proxies.
33.
What is the "brain" of the computer system?
Correct Answer
A. Central processing unit.
Explanation
The brain of a computer system is known as the central processing unit (CPU). It is responsible for executing instructions, performing calculations, and coordinating the activities of all the hardware and software components in the computer. The CPU is often referred to as the brain because it is the most important component and controls the overall operation of the computer system. It processes data and instructions, performs arithmetic and logical operations, and manages the flow of information between different parts of the computer.
34.
What is a permanent type of memory storage used by the computer for important data taht does not change?
Correct Answer
B. Read-only memory.
Explanation
Read-only memory (ROM) is a permanent type of memory storage used by the computer for important data that does not change. Unlike random access memory (RAM) which is volatile and loses data when the power is turned off, ROM retains its data even when the power is off. ROM is used to store firmware, BIOS, and other essential software that is required to boot up the computer. It is called read-only memory because the data stored in it cannot be modified or erased by normal computer operations, hence making it suitable for storing important and unchangeable data.
35.
Which network configuration is best suited for serving a small geographic area?
Correct Answer
B. Local area network.
Explanation
A local area network (LAN) is the best network configuration for serving a small geographic area. LANs are designed to connect devices within a limited area, such as a home, office, or school. They offer high-speed connections and low latency, making them ideal for small-scale operations. In contrast, a metropolitan area network (MAN) is designed for larger areas, such as a city, and wide area networks (WANs) cover even larger regions, such as multiple cities or countries. Hybrid networks combine different types of networks to meet specific requirements. However, for a small geographic area, a LAN is the most efficient and cost-effective option.
36.
Which network configuration is best suited to serve a regional are subject to local or state utility commissions regulations?
Correct Answer
A. Metropolitan area network.
Explanation
A metropolitan area network (MAN) is the best suited network configuration to serve a regional area subject to local or state utility commissions regulations. A MAN covers a larger geographical area than a local area network (LAN) but is smaller than a wide area network (WAN). It is designed to serve a specific region, such as a city or a metropolitan area, making it an ideal choice for complying with local regulations. A hybrid network, on the other hand, combines different types of networks and may not be specifically tailored to meet the regulations of a regional area.
37.
What are the two main reasons for using a virtual private network?
Correct Answer
A. Remote access and extranet.
Explanation
A virtual private network (VPN) is used for two main reasons: remote access and extranet. Remote access allows users to securely connect to a private network from a remote location, enabling them to access resources and data as if they were directly connected to the network. An extranet is a private network that extends beyond the boundaries of an organization, allowing authorized external users to access specific resources or services. Therefore, the correct answer is remote access and extranet.
38.
A virtual private network can also work as an extranet connection which allows:
Correct Answer
A. Outside users access to data on the network through a secure Web browser connection.
Explanation
A virtual private network (VPN) can function as an extranet connection, enabling outside users to access data on the network through a secure Web browser connection. This means that users who are not physically connected to the network can securely access and retrieve data by using a web browser. The secure connection provided by the VPN ensures that the data transmitted between the user and the network is encrypted and protected from unauthorized access or interception.
39.
Which network topology has the advantage of having each node act as a repeater?
Correct Answer
B. pHysical ring.
Explanation
A physical ring network topology has the advantage of having each node act as a repeater. In a physical ring, each node is connected to exactly two other nodes, forming a closed loop. Data travels in a circular manner, passing through each node, which acts as a repeater by regenerating and retransmitting the signal. This allows the network to have a higher fault tolerance, as if one node fails, the data can still flow in the opposite direction. Additionally, the physical ring topology provides equal access to all nodes, making it suitable for applications where each node needs to have the same level of priority.
40.
Which network topology has all devices attached to the same transmission medium or cable backbone?
Correct Answer
B. pHysical bus.
Explanation
A physical bus network topology has all devices connected to the same transmission medium or cable backbone. In this type of topology, all devices share the same communication channel, and data is transmitted in both directions along the bus. Each device on the network receives all the data transmitted, but only the intended recipient processes the data.
41.
Which network topology transmits all data simultaneously to all nodes on the backbone media?
Correct Answer
D. Logical bus.
Explanation
A logical bus network topology transmits all data simultaneously to all nodes on the backbone media. In this topology, all nodes are connected to a single communication channel, which acts as a shared bus. When a node transmits data, it is received by all other nodes on the network. This allows for efficient and simultaneous communication between all nodes on the network.
42.
What type of video teleconferencing center (VTC) is being conducted when transmissions are from one point to several locations?
Correct Answer
B. Multipoint.
Explanation
When transmissions are from one point to several locations, it indicates that multiple locations are involved in the video teleconferencing center (VTC). This type of VTC is known as multipoint, where multiple participants can join the conference from different locations simultaneously. Point-to-point refers to a VTC between two locations only, terrestrial refers to using land-based communication infrastructure, and satellite refers to using satellite communication for the VTC.
43.
A terrestrial network transmits signals by:
Correct Answer
B. Land lines.
Explanation
A terrestrial network transmits signals through land lines, which are physical cables or wires that connect different locations. These land lines can be made of copper, fiber optic, or other materials and are used to transmit data, voice, and video signals. Unlike satellite communication, which relies on signals being transmitted to and from satellites in space, terrestrial networks use physical infrastructure on the ground to transmit signals between different points. This makes land lines a reliable and widely used method for transmitting signals in terrestrial networks.
44.
Switches work at what layers of the Open System Interconnection (OSI) Model?
Correct Answer
B. Data Link and Network.
Explanation
Switches work at the Data Link and Network layers of the OSI Model. At the Data Link layer, switches use MAC addresses to forward data packets within a local area network (LAN). They examine the destination MAC address of each packet and forward it to the appropriate port. At the Network layer, switches use IP addresses to make routing decisions between different networks. They examine the destination IP address of each packet and forward it to the appropriate network. Therefore, switches operate at both the Data Link and Network layers to enable efficient and accurate data transmission within a network.
45.
Switching conducted at the layer 2 category is base solely upon what information?
Correct Answer
A. The media access control (MAC) address.
Explanation
Switching conducted at the layer 2 category is based solely upon the media access control (MAC) address. Layer 2 switching uses the MAC address of the destination device to determine the appropriate port to forward the data to. This is done by building a MAC address table, which maps MAC addresses to specific ports on the switch. When a switch receives a frame, it checks the destination MAC address and forwards the frame only to the port associated with that MAC address, improving network efficiency and reducing unnecessary traffic.
46.
Switching conducted at the layer 3 category is based upon what information?
Correct Answer
A. The media access control (MAC) and Internet protocol (IP) adresses.
Explanation
Switching conducted at the layer 3 category is based upon the media access control (MAC) and Internet protocol (IP) addresses. Layer 3 switching involves routing packets based on IP addresses, which are used to identify the source and destination of the data. The MAC addresses, on the other hand, are used for identifying devices within a local network. By considering both the MAC and IP addresses, layer 3 switching can efficiently route packets between different networks.
47.
What type of switch is designed for enterprise wide applications, where error checking and throughput are of concern?
Correct Answer
D. Store and forward.
Explanation
The correct answer is "Store and forward." This type of switch is designed for enterprise wide applications where error checking and throughput are of concern. In a store and forward switch, the entire frame is received and checked for errors before being forwarded to its destination. This ensures that any errors in the frame are detected and corrected before transmission, resulting in improved data integrity. Additionally, the store and forward switch allows for better control over data flow and can handle higher volumes of traffic efficiently.
48.
What type of switch reads the first 64 bytes before forwarding the frame?
Correct Answer
B. Fragment free.
Explanation
Fragment free is the correct answer because this type of switch reads the first 64 bytes of a frame before forwarding it. Fragment free switches are designed to prevent forwarding frames that contain errors or collisions, specifically by checking the first 64 bytes of the frame for any errors. This helps to ensure that only valid frames are forwarded, reducing the chances of network congestion and improving overall network performance.
49.
What is the technology that allows network interface card (NIC) to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?
Correct Answer
A. Autonegotiation.
Explanation
Autonegotiation is the technology that enables a network interface card (NIC) to determine the type of Ethernet signal being transmitted by a device at the other end and automatically adjust its speed to the highest common speed between the two devices. This allows for seamless communication between devices with different speed capabilities, ensuring optimal performance and compatibility. Autodatasensing, speed sensing, and auto timing are not accurate terms for this specific technology.
50.
Which communications networking device modulates outgoing digital signals to analog signals for telephone line usage?
Correct Answer
A. Modems.
Explanation
Modems are the correct answer because they are communication networking devices that convert digital signals from computers into analog signals that can be transmitted over telephone lines. Modems modulate the outgoing digital signals into analog signals and demodulate incoming analog signals back into digital signals for the receiving computer. Switches, multiplexers, and line drivers are not specifically designed for this purpose and do not perform the modulation and demodulation functions required for telephone line usage.