Chapter 8 IT Essentials

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Sgninnej
S
Sgninnej
Community Contributor
Quizzes Created: 1 | Total Attempts: 566
Questions: 19 | Attempts: 567

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

Its a quiz!


Questions and Answers
  • 1. 

    Which of the following are advantages of a client/server network? (Choose 2)

    • A.

      Centrailised administration

    • B.

      Uses more resources

    • C.

      Avoid file duplication and corruption

    • D.

      Matt damon

    Correct Answer(s)
    A. Centrailised administration
    C. Avoid file duplication and corruption
    Explanation
    A client/server network offers the advantage of centralized administration, which means that network resources and user accounts can be managed from a single location. This simplifies the management process and allows for better control and security. Additionally, a client/server network helps to avoid file duplication and corruption by storing files on a central server. This ensures that multiple users can access and edit the same file without the risk of creating conflicting versions or losing data.

    Rate this question:

  • 2. 

    Which of the following is correct about a peer-to-peer network?

    • A.

      Centralised administration

    • B.

      Everyone has the same virus definitions

    • C.

      There is no centralised data storage

    • D.

      The more PC's that are added, the easier they are to manage

    Correct Answer
    C. There is no centralised data storage
    Explanation
    A peer-to-peer network is a type of network where all devices have equal capabilities and responsibilities. In this type of network, there is no central server or central storage location for data. Instead, each device in the network can act as both a client and a server, allowing for direct communication and file sharing between devices. This decentralized approach to data storage means that each device is responsible for storing and managing its own data, eliminating the need for a central storage location.

    Rate this question:

  • 3. 

    Data travelling in two directions at once is called ____  ______? (2 words)

    Correct Answer
    Full Duplex
    Matt Damon
  • 4. 

    Which of the following describes a class C IP address?

    • A.

      Used by large networks

    • B.

      Used for experimental testing

    • C.

      Used for multicasting

    • D.

      Used by small networks

    • E.

      Used by universities

    Correct Answer
    D. Used by small networks
    Explanation
    A class C IP address is typically used by small networks. Class C addresses have a range of 192.0.0.0 to 223.255.255.255, with the first octet always starting with a number between 192 and 223. These addresses provide a relatively small number of available network addresses, making them suitable for smaller networks such as home networks or small businesses. Large networks typically require more available addresses and therefore use class A or class B IP addresses.

    Rate this question:

  • 5. 

    Which of the following is a class A subnet mask?

    • A.

      255.0.0.0

    • B.

      255.255.255.0

    • C.

      255.255.0.0

    • D.

      Matt Damon

    Correct Answer
    A. 255.0.0.0
    Explanation
    The subnet mask 255.0.0.0 is a class A subnet mask because it has a network portion of 8 bits, which means it can support a large number of networks and a small number of hosts per network. Class A subnet masks have a range of 1.0.0.0 to 126.0.0.0 and are typically used for large organizations with a large number of hosts.

    Rate this question:

  • 6. 

    Software used to automatically assign IP addresses is called? (4 words)

    Correct Answer
    Dynamic Host Configuration Protocol
    DHCP
    Matt Damon
    Explanation
    The correct answer is Dynamic Host Configuration Protocol (DHCP). DHCP is a software protocol that automatically assigns IP addresses to devices on a network. It simplifies network administration by eliminating the need for manual IP address configuration. Matt Damon is not relevant to the question and can be disregarded.

    Rate this question:

  • 7. 

    The information a DHCP server can assign to hosts is? (Choose 3 )

    • A.

      IP address

    • B.

      Default gateway

    • C.

      HTTP

    • D.

      Subnet Mask

    • E.

      Reltentext

    Correct Answer(s)
    A. IP address
    B. Default gateway
    D. Subnet Mask
    Explanation
    A DHCP server can assign IP addresses, default gateways, and subnet masks to hosts. IP addresses are necessary for devices to communicate with each other over a network. A default gateway is the IP address of the router that connects a local network to other networks. It is used to forward network traffic between different networks. Subnet masks determine the network portion and host portion of an IP address, allowing devices to identify which network they belong to and which hosts are on the same network.

    Rate this question:

  • 8. 

    A small, fast protocol designed for a workgroup network, which requires no internet connection is?

    • A.

      TCP/IP

    • B.

      NetBeui/BetBios

    • C.

      HTTP/HTTPs

    • D.

      FTP

    Correct Answer
    B. NetBeui/BetBios
    Explanation
    NetBeui/BetBios is the correct answer because it is a small and fast protocol specifically designed for workgroup networks. Unlike TCP/IP, which is used for internet connections, NetBeui/BetBios does not require an internet connection. HTTP/HTTPs and FTP are protocols used for web browsing and file transfer respectively, but they are not specifically designed for workgroup networks without internet access.

    Rate this question:

  • 9. 

    Which protocols are for use when downloading emails from an email server? (Choose 2)

    • A.

      Telnet

    • B.

      POP3

    • C.

      SSH

    • D.

      IMAP

    • E.

      SMTP

    Correct Answer(s)
    B. POP3
    D. IMAP
    Explanation
    POP3 and IMAP are protocols that are used for downloading emails from an email server. POP3 (Post Office Protocol version 3) is a standard protocol used for retrieving emails from a remote server to a local client. It allows the user to download and delete emails from the server. IMAP (Internet Message Access Protocol) is another protocol used for email retrieval. Unlike POP3, IMAP allows the user to access and manage their emails directly on the server, providing more flexibility and synchronization options across multiple devices.

    Rate this question:

  • 10. 

    A command line tool used to test connectivity with a server is? (1 word)

    Correct Answer(s)
    Ping
    Matt Damon
    Explanation
    Ping is the correct answer. Ping is a command line tool used to test connectivity with a server. It sends a small packet of data to the server and waits for a response. If the server responds, it indicates that there is a connection between the client and the server. Matt Damon is not a command line tool and is unrelated to testing connectivity with a server.

    Rate this question:

  • 11. 

    Which network cabling is immune to EMI and provides the fastest speeds?

    • A.

      Unshielded Twisted Pair

    • B.

      STP

    • C.

      Fiber optic

    • D.

      Shielded Twisted Pair

    Correct Answer
    C. Fiber optic
    Explanation
    Fiber optic cabling is immune to electromagnetic interference (EMI) due to its use of light signals instead of electrical signals. This makes it less susceptible to interference from nearby electronic devices or power sources. Additionally, fiber optic cables provide the fastest speeds compared to other options mentioned. This is because they can transmit data at a much higher bandwidth and over longer distances without loss of signal quality.

    Rate this question:

  • 12. 

    The topology which allows for most redundancy is? (1 word)

    Correct Answer
    Mesh
    Matt Damon
  • 13. 

    How does CSMA/CD known when to send data on the network?

    • A.

      Uses a token system to have its turn to send information

    • B.

      Listens for when the network is clear to send information

    • C.

      Sends information when it wants, and re-sends if it collides

    • D.

      Sends information when it wants, the network can handle it

    Correct Answer
    B. Listens for when the network is clear to send information
    Explanation
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks to ensure that multiple devices can share the same network without causing collisions. In order to avoid collisions, CSMA/CD listens for when the network is clear to send information. It first checks if the network is idle, meaning no other device is currently transmitting data. If the network is clear, it sends its own information. However, if it detects another device transmitting at the same time, it aborts its transmission and waits for a random amount of time before attempting to send again. This process helps to minimize collisions and optimize network efficiency.

    Rate this question:

  • 14. 

    Maximum length of a 10000BaseT cable is?

    • A.

      10m

    • B.

      100m

    • C.

      1000m

    • D.

      10000m

    Correct Answer
    B. 100m
    Explanation
    The maximum length of a 10000BaseT cable is 100m. This is because 10000BaseT is a type of Ethernet technology that uses twisted pair cabling, specifically Category 6 or higher. The maximum distance that can be achieved with this type of cable is 100m, beyond which the signal may degrade and cause transmission errors.

    Rate this question:

  • 15. 

    Which wireless standard transmits at 54mb/s, and operates in at 2.4ghz?

    • A.

      802.11a

    • B.

      801.22g

    • C.

      802.11n

    • D.

      802.11g

    Correct Answer
    D. 802.11g
    Explanation
    802.11g is the correct answer because it is a wireless standard that operates at a speed of 54mb/s and uses the 2.4GHz frequency. This standard was introduced as an improvement over the previous 802.11b standard, offering faster data transfer rates. It is widely used in home and small office networks for its compatibility with older devices and its ability to provide a decent balance between speed and range.

    Rate this question:

  • 16. 

    Which layer of the OSI model deals with transport and flow control across a network?

    • A.

      Transport

    • B.

      Network

    • C.

      Session

    • D.

      Application

    • E.

      Presentation

    • F.

      Physical

    • G.

      Data link

    Correct Answer
    A. Transport
    Explanation
    The correct answer is Transport. The Transport layer of the OSI model is responsible for providing reliable and transparent transfer of data between end systems. It ensures that data is delivered error-free, in the correct order, and with proper flow control. This layer also handles segmentation and reassembly of data, as well as multiplexing and demultiplexing of different connections on the same network.

    Rate this question:

  • 17. 

    A MAC address is?

    • A.

      Burned onto the inside of the case

    • B.

      Can be changed if the user wants to do it

    • C.

      Is burned onto the network card

    Correct Answer
    C. Is burned onto the network card
    Explanation
    A MAC address is burned onto the network card because it is a unique identifier assigned to the network interface hardware. It is a permanent address that cannot be changed by the user. This address is used to identify devices on a network and is essential for communication between devices.

    Rate this question:

  • 18. 

    Which type of DSL line has speeds of 384kb/s to 6mb/s and typically has a higher download speed than upload speed

    • A.

      ADSL

    • B.

      HDSL

    • C.

      VDSL

    • D.

      IDSL

    Correct Answer
    A. ADSL
    Explanation
    ADSL (Asymmetric Digital Subscriber Line) is the correct answer. ADSL is a type of DSL line that offers speeds ranging from 384kb/s to 6mb/s. It is called "asymmetric" because it typically provides a higher download speed compared to the upload speed. This makes it suitable for activities such as web browsing, streaming, and downloading files, where users require faster download speeds.

    Rate this question:

  • 19. 

    The network protocol which translates a network name into an IP address is called? (3 words)

    Correct Answer
    Domain Name Server
    DNS
    Matt Damon
    Explanation
    The correct answer is Domain Name Server (DNS). DNS is a network protocol that translates a network name into an IP address. It is responsible for resolving domain names to their corresponding IP addresses, allowing users to access websites and other resources on the internet using easy-to-remember domain names instead of complicated IP addresses. Matt Damon is not related to this network protocol.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 01, 2010
    Quiz Created by
    Sgninnej
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.