CDC 3D151 Vol 1 Ure

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dakota.lindberg
D
Dakota.lindberg
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,006
Questions: 100 | Attempts: 207

SettingsSettingsSettings
CDC 3D151 Vol 1 Ure - Quiz


Questions and Answers
  • 1. 

    Which functions do client systems technicians perform regarding personal wireless communications systems

    • A.

      Plan, schedule, and implement installation and maintenances

    • B.

      Develop system timelines

    • C.

      Implement fix actions 

    • D.

      Manage databases 

    Correct Answer
    A. Plan, schedule, and implement installation and maintenances
    Explanation
    Client systems technicians perform the functions of planning, scheduling, and implementing installation and maintenance tasks for personal wireless communications systems. This includes developing system timelines, implementing fix actions, and managing databases. These technicians are responsible for ensuring that the installation and maintenance processes are carried out efficiently and effectively to ensure the smooth functioning of the wireless communications systems.

    Rate this question:

  • 2. 

    What requirement must an Apprentice complete to be awarded Journeyman level?

    • A.

      All 7-skill level tasks.

    • B.

      Cyberspace Advancement Course.

    • C.

      Core tasks identified for client systems craftsman.

    • D.

      Client Systems career development courses (CDC).

    Correct Answer
    D. Client Systems career development courses (CDC).
    Explanation
    To be awarded Journeyman level, an Apprentice must complete Client Systems career development courses (CDC). These courses are specifically designed to develop the necessary skills and knowledge required for a Journeyman level in the Client Systems career field. By completing these courses, the Apprentice demonstrates their proficiency in the core tasks and requirements of a Journeyman and is therefore eligible for the promotion.

    Rate this question:

  • 3. 

    What systems entail how we communicate and manage data?

    • A.

      Information.

    • B.

      Satellite.

    • C.

      Airfield.

    • D.

      Power.

    Correct Answer
    A. Information.
    Explanation
    The correct answer is "Information" because systems that entail how we communicate and manage data are primarily concerned with the transmission, storage, and processing of information. Information systems, such as computer networks and databases, play a crucial role in facilitating communication and managing data within organizations and across different platforms. These systems enable the sharing, retrieval, and analysis of information, which is essential for effective communication and data management.

    Rate this question:

  • 4. 

    What part do client systems technicians (CST) play in amassing, distributing, and controlling information?

    • A.

      Adapting

    • B.

      Efficiency

    • C.

      Production

    • D.

      Procedures

    Correct Answer
    B. Efficiency
    Explanation
    Client systems technicians (CST) play a role in ensuring the efficiency of amassing, distributing, and controlling information. They are responsible for optimizing the systems and processes involved in managing information, making sure that it is collected, shared, and controlled in the most efficient and effective manner. They may implement procedures and protocols to streamline information flow, troubleshoot technical issues, and ensure that the systems are operating at their highest level of efficiency. Overall, CSTs contribute to the smooth and efficient management of information within an organization.

    Rate this question:

  • 5. 

    A non-wireless way to load software or interface hardware to a tablet is with the

    • A.

      Ethernet port.

    • B.

      optical drive.

    • C.

      network interface card (NIC).

    • D.

      universal serial bus (USB) port.

    Correct Answer
    D. universal serial bus (USB) port.
    Explanation
    The USB port is a non-wireless way to load software or interface hardware to a tablet. This port allows for the connection of external devices such as flash drives, external hard drives, or other peripheral devices. It provides a fast and reliable method for transferring data and loading software onto the tablet.

    Rate this question:

  • 6. 

    A personal computer (PC) is such a great tool because it

    • A.

      is a single purpose processor.

    • B.

      has a central processing unit.

    • C.

      is a multi-purpose processor.

    • D.

      has a hard drive.

    Correct Answer
    C. is a multi-purpose processor.
    Explanation
    A personal computer (PC) is a great tool because it is a multi-purpose processor. Unlike a single purpose processor, which is designed for a specific task, a PC can perform a wide range of functions. It has the ability to run various software applications, access the internet, create and edit documents, play media files, and much more. This versatility makes a PC a valuable tool for both personal and professional use.

    Rate this question:

  • 7. 

    The primary interface for the hard drive that is now the most commonly used connector for hard drives is the

    • A.

      motherboard.

    • B.

      small computer system interface.

    • C.

      integrated drive electronics controller.

    • D.

      Serial Advanced Technology Attachment (SATA).

    Correct Answer
    D. Serial Advanced Technology Attachment (SATA).
    Explanation
    The correct answer is Serial Advanced Technology Attachment (SATA). SATA is the most commonly used connector for hard drives today. It is a high-speed interface that allows for fast data transfer between the hard drive and the motherboard. SATA has replaced older interfaces like integrated drive electronics (IDE) and small computer system interface (SCSI) due to its faster speeds and improved performance.

    Rate this question:

  • 8. 

    Any hardware added to a computer that expands its capabilities is refereed to as

    • A.

      a port.

    • B.

      a peripheral.

    • C.

      an interface.

    • D.

      an input/output (I/O) device.

    Correct Answer
    B. a peripheral.
    Explanation
    A peripheral is any hardware device that is added to a computer to expand its capabilities. This can include devices such as printers, scanners, keyboards, and mice, which are all considered peripherals because they are connected to the computer and provide additional functionality. A port refers to a physical connection on a computer or device, an interface refers to the way in which different components communicate with each other, and an input/output (I/O) device is a type of peripheral that allows for input and output of data. Therefore, the correct answer is a peripheral.

    Rate this question:

  • 9. 

    Transferring eight bits of data simultaneously through eight separate lines in a single cable is function of what kind of port?

    • A.

      Serial.

    • B.

      Parallel.

    • C.

      Switching.

    • D.

      Universal serial bus.

    Correct Answer
    B. Parallel.
    Explanation
    Parallel ports are capable of transferring multiple bits of data simultaneously through separate lines in a single cable. This is in contrast to serial ports, which transfer data one bit at a time. Switching and universal serial bus (USB) are not specifically designed for transferring data in this manner.

    Rate this question:

  • 10. 

    What term refers to the process of launching an operating system (OS)?

    • A.

      Boot.

    • B.

      Ransom access memory (RAM).

    • C.

      Basic Input/Output System (BIOS).

    • D.

      Complimentary metal-oxide-semiconductor (CMOS).

    Correct Answer
    A. Boot.
    Explanation
    The term "boot" refers to the process of launching an operating system (OS). When a computer is powered on or restarted, the boot process begins, during which the BIOS (Basic Input/Output System) is loaded and it initializes the hardware components. The BIOS then locates the OS stored on the computer's storage device and loads it into the RAM (Random Access Memory), allowing the OS to start running and providing the user with access to the computer's functionalities.

    Rate this question:

  • 11. 

    What program sets up the divisions of memory that hold the operating system (OS), user information and applications?

    • A.

      The memory.

    • B.

      The bootstrap loader.

    • C.

      Basic Input/Output System (BIOS).

    • D.

      Complimentary metal-oxide-semiconductor (CMOS).

    Correct Answer
    B. The bootstrap loader.
    Explanation
    The bootstrap loader is the program that sets up the divisions of memory that hold the operating system (OS), user information, and applications. It is responsible for loading the OS into memory and initializing the necessary components for the system to start running. This program is typically stored in the computer's firmware and is executed during the boot process.

    Rate this question:

  • 12. 

    What describes how computers find a specific byte it is looking for in memory?

    • A.

      Processing.

    • B.

      Programming.

    • C.

      Memory addressing.

    • D.

      Memory segmenting.

    Correct Answer
    C. Memory addressing.
    Explanation
    Computers find a specific byte they are looking for in memory through memory addressing. Memory addressing is the process of assigning unique addresses to each byte in the memory, allowing the computer to locate and retrieve specific bytes when needed. This is an essential aspect of computer architecture and enables efficient data retrieval and manipulation.

    Rate this question:

  • 13. 

    How manty bits long are the addresses that computer instructions work with?

    • A.

      8.

    • B.

      16.

    • C.

      24.

    • D.

      32.

    Correct Answer
    B. 16.
    Explanation
    Computer instructions work with addresses that are 16 bits long. This means that the computer can address up to 2^16 = 65,536 different memory locations. The length of the address determines the maximum amount of memory that can be accessed by the computer. In this case, with 16-bit addresses, the computer can access a maximum of 65,536 memory locations.

    Rate this question:

  • 14. 

    What type of memory is non-volatile, considered permanent, and is also firmware in reference to the data and instructions stored?

    • A.

      Cache.

    • B.

      Read-only memory (ROM).

    • C.

      Random access memory (RAM).

    • D.

      Complimentary metal-oxide-semiconductor (CMOS).

    Correct Answer
    B. Read-only memory (ROM).
    Explanation
    ROM is a type of memory that is non-volatile, meaning it retains data even when power is turned off. It is considered permanent because the data and instructions stored in ROM cannot be easily modified or erased. ROM is also firmware, which means it contains software instructions that are permanently programmed during manufacturing. Therefore, ROM is the correct answer as it fits all the given criteria.

    Rate this question:

  • 15. 

    This type of memory is blank and instructions can be placed on it permanently

    • A.

      Read-only memory (ROM)

    • B.

      Random access memory (RAM)

    • C.

      Programmable read-only memory (PROM)

    • D.

      Complimentary metal-oxide-semiconductor (CMOS)

    Correct Answer
    C. Programmable read-only memory (PROM)
    Explanation
    PROM stands for Programmable Read-Only Memory. It is a type of memory that allows instructions to be permanently placed on it. Unlike RAM, which is volatile and can be written and rewritten, PROM is non-volatile and its contents cannot be changed once programmed. ROM, on the other hand, is not programmable and its contents are fixed during manufacturing. CMOS refers to the technology used in integrated circuits but is not a type of memory. Therefore, PROM is the correct answer for a memory type that can have instructions permanently placed on it.

    Rate this question:

  • 16. 

    This type of random acess memory (RAM) transfers sixteen times as much data per each clock cycle

    • A.

      Synchronous dynamic random access memory (SDRAM).

    • B.

      Double data rate synchronous dynamic random access memory (DDR SDRAM).

    • C.

      DDR3 SDRAM.

    • D.

      DDR4 SDRAM.

    Correct Answer
    D. DDR4 SDRAM.
    Explanation
    DDR4 SDRAM is the correct answer because it is a type of RAM that transfers sixteen times as much data per clock cycle compared to other types of RAM such as SDRAM, DDR SDRAM, and DDR3 SDRAM. This means that DDR4 SDRAM has a higher data transfer rate and can process more data in a shorter amount of time, making it more efficient and faster than other types of RAM.

    Rate this question:

  • 17. 

    Which type of memory is used to duplicate frequently accessed information stored elsewhere or computed earlier because the original data is time consuming to retrieve or compute?

    • A.

      Random access memory (RAM).

    • B.

      Read-only memory (ROM).

    • C.

      Buffer.

    • D.

      Cache.

    Correct Answer
    D. Cache.
    Explanation
    Cache is a type of memory that is used to duplicate frequently accessed information stored elsewhere or computed earlier because the original data is time-consuming to retrieve or compute. Cache memory is designed to store copies of data that are likely to be accessed again in the near future, reducing the time it takes to retrieve the data from the original source. This helps to improve the overall performance and speed of the system by providing faster access to frequently used data.

    Rate this question:

  • 18. 

    Which type of memory is located on just about every kind of circuit board there is in today's computer technology?

    • A.

      Random access memory (RAM).

    • B.

      Read-only memory (ROM).

    • C.

      Buffer.

    • D.

      Cache.

    Correct Answer
    C. Buffer.
  • 19. 

    Actively sampling the status of an external device by a client program is known as

    • A.

      polling.

    • B.

      signaling.

    • C.

      processing.

    • D.

      multitasking.

    Correct Answer
    A. polling.
    Explanation
    Polling refers to the process of actively sampling the status of an external device by a client program. It involves regularly checking the device to see if it has any new data or events that need to be processed. This is commonly used in computer systems to interact with hardware devices and ensure timely communication between the client program and the external device.

    Rate this question:

  • 20. 

    what is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event indicating the need for a change in execution?

    • A.

      Cache.

    • B.

      Buffer.

    • C.

      Interface.

    • D.

      Interrupt.

    Correct Answer
    D. Interrupt.
    Explanation
    An interrupt is a signal from a hardware device to the CPU indicating that it needs attention. It can be either asynchronous, meaning it occurs at any time, or synchronous, meaning it occurs at a specific time. The interrupt prompts the CPU to temporarily halt its current execution and handle the request from the device. This allows for efficient multitasking and responsiveness in computer systems.

    Rate this question:

  • 21. 

    Which term describes that data is whole or complete?

    • A.

      Driver.

    • B.

      Parity bit.

    • C.

      Data integritiy.

    • D.

      Error correction.

    Correct Answer
    C. Data integritiy.
    Explanation
    Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that data is whole and complete, without any errors or inconsistencies. The term "data integrity" describes the concept of maintaining the completeness and accuracy of data.

    Rate this question:

  • 22. 

    Which is a very simple example of an error detecting code?

    • A.

      Interrupt.

    • B.

      Parity bit.

    • C.

      Data integrity.

    • D.

      Error correction.

    Correct Answer
    B. Parity bit.
    Explanation
    The parity bit is a very simple example of an error detecting code. It is a single bit that is added to a binary code to make the total number of ones either even or odd. By checking the parity bit, errors in the transmission of the binary code can be detected. If the number of ones in the code does not match the expected parity, an error is present. This method is simple and efficient for detecting errors, although it cannot correct them.

    Rate this question:

  • 23. 

    What operating system (OS) task ensures each process and application recieves time to function and is used for real work as often as possible?

    • A.

      Application program interface.

    • B.

      Processor management.

    • C.

      Memory management.

    • D.

      Device management.

    Correct Answer
    B. Processor management.
    Explanation
    Processor management is the operating system task that ensures each process and application receives time to function and is used for real work as often as possible. This involves scheduling and allocating the processor's time to different processes and applications, allowing them to execute their tasks efficiently and fairly. By managing the processor effectively, the operating system can optimize the utilization of system resources and ensure that all processes and applications have the opportunity to execute their tasks in a timely manner.

    Rate this question:

  • 24. 

    Which is not a type of computer user interface?

    • A.

      Application driven.

    • B.

      Command driven.

    • C.

      Graphical user.

    • D.

      Menu driven.

    Correct Answer
    A. Application driven.
    Explanation
    The question asks for a type of computer user interface that is not present among the given options. The other options - command driven, graphical user, and menu driven - are all types of computer user interfaces. However, "application driven" is not a commonly recognized type of user interface.

    Rate this question:

  • 25. 

    Which computer system requirements must be satisfied for software to be usable at all?

    • A.

      Minimum.

    • B.

      Processor.

    • C.

      Installation.

    • D.

      Recommended.

    Correct Answer
    A. Minimum.
    Explanation
    The correct answer is "Minimum." This is because the minimum system requirements refer to the bare minimum specifications that a computer system must have in order to run the software. Without meeting these minimum requirements, the software may not even be able to run or function properly.

    Rate this question:

  • 26. 

    What is the most common set of system requirements defined by an operating system (OS) or software application?

    • A.

      Recommended.

    • B.

      Installation.

    • C.

      Hardware.

    • D.

      Power.

    Correct Answer
    C. Hardware.
    Explanation
    The most common set of system requirements defined by an operating system or software application is hardware. This refers to the specific components and specifications that a computer or device needs to have in order to run the operating system or software effectively. These requirements can include the processor, memory, storage, and graphics capabilities of the device. Ensuring that the hardware meets the specified requirements is important for the smooth functioning of the operating system or software application.

    Rate this question:

  • 27. 

    Which hardware requirement is defined as the model and the clock speed of central processing units (CPU)?

    • A.

      Memory.

    • B.

      Peripherals.

    • C.

      Architecture.

    • D.

      Processing power.

    Correct Answer
    D. Processing power.
    Explanation
    The hardware requirement that is defined as the model and the clock speed of central processing units (CPU) is processing power. The processing power of a CPU is determined by its model, which indicates its capabilities and features, and its clock speed, which measures the number of cycles per second that the CPU can execute. Therefore, processing power is the correct answer in this case.

    Rate this question:

  • 28. 

    The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system (OS) without constant problems is for the computer to have the minimum

    • A.

      Software.

    • B.

      Hardware.

    • C.

      Processors.

    • D.

      Applications.

    Correct Answer
    B. Hardware.
    Explanation
    To ensure a computer is compatible and powerful enough to run an operating system (OS) without constant problems, it is essential for the computer to have the necessary hardware specifications. These hardware specifications include components such as the processor, memory, storage, and graphics card. Without adequate hardware, the computer may struggle to handle the demands of the operating system, resulting in performance issues and frequent problems. Therefore, having the right hardware is crucial for a smooth and efficient OS experience.

    Rate this question:

  • 29. 

    Which is not considered a utility application?

    • A.

      Adobe Acrobat reader.

    • B.

      An antivirus program.

    • C.

      A spreadsheet.

    • D.

      WinZip.

    Correct Answer
    C. A spreadsheet.
    Explanation
    A spreadsheet is not considered a utility application because it is primarily used for organizing and analyzing data, rather than performing specific tasks or functions related to system maintenance or file management. Utility applications, such as Adobe Acrobat reader, antivirus programs, and WinZip, are designed to provide specific functions or services that aid in the operation and management of computer systems.

    Rate this question:

  • 30. 

    A hard disk is divided into how many byte sectors?

    • A.

      124.

    • B.

      248.

    • C.

      512.

    • D.

      1024.

    Correct Answer
    C. 512.
    Explanation
    A hard disk is divided into 512-byte sectors. This means that the data on the hard disk is organized into chunks of 512 bytes, which is the smallest unit of data that can be read or written on the disk. Each sector is assigned a unique address, allowing the computer to easily locate and access specific data on the hard disk.

    Rate this question:

  • 31. 

    The first sector at the begining of a hard drive is called the master

    • A.

      volume.

    • B.

      cylinder.

    • C.

      partition.

    • D.

      boot record.

    Correct Answer
    D. boot record.
    Explanation
    The first sector at the beginning of a hard drive is called the boot record. This sector contains important information about the file system and the operating system installed on the drive. When the computer starts up, it reads the boot record to determine how to load the operating system. It also contains the instructions for the computer to locate and load the necessary files for booting up the system. Therefore, the boot record is crucial for the proper functioning of the computer's operating system.

    Rate this question:

  • 32. 

    On a hard drive, how many logical drives can a primary partition have?

    • A.

      One.

    • B.

      Two.

    • C.

      Three.

    • D.

      Four.

    Correct Answer
    A. One.
    Explanation
    A primary partition on a hard drive can have only one logical drive. This means that the primary partition can only be divided into one additional partition, resulting in a total of two partitions on the hard drive.

    Rate this question:

  • 33. 

    A formatted disk partition that is used for a particular file system is called

    • A.

      dynamic storage.

    • B.

      basic storage.

    • C.

      a volume.

    • D.

      a sector.

    Correct Answer
    C. a volume.
    Explanation
    A formatted disk partition that is used for a particular file system is called a volume. A volume is a logical partition on a physical disk that is formatted with a specific file system, such as NTFS or FAT. It is used to organize and store files and folders.

    Rate this question:

  • 34. 

    Which file system is the best choice for data storage if the computer is a 32-bit Windows System?

    • A.

      New Technology File System (NTFS).

    • B.

      File Allocation Table System (FATS).

    • C.

      Neither FATS nor NFTS.

    • D.

      Either FATS or NFTS.

    Correct Answer
    A. New Technology File System (NTFS).
    Explanation
    The best choice for data storage on a 32-bit Windows system is the New Technology File System (NTFS). NTFS is a more advanced and secure file system compared to the File Allocation Table System (FAT). It supports larger file sizes, better file compression, and improved security features such as file encryption and access control. NTFS also provides better performance and reliability, making it the preferred choice for data storage on Windows systems.

    Rate this question:

  • 35. 

    Which logical structure component is a container used to organize objects into logical adminstrative groups?

    • A.

      Trees.

    • B.

      Forests.

    • C.

      Objects.

    • D.

      Domains.

    Correct Answer
    D. Domains.
    Explanation
    Domains are a logical structure component used to organize objects into logical administrative groups. They provide a way to manage and administer objects such as users, computers, and groups in a hierarchical manner. Domains help in organizing and controlling access to resources and provide a centralized administration point for managing security policies, user accounts, and other administrative tasks.

    Rate this question:

  • 36. 

    What type of remote network provides a private tunnel through public cloud (the Internet)?

    • A.

      Virtual private network (VPN).

    • B.

      Peer-to-peer (P2P).

    • C.

      Broadband.

    • D.

      Three tier.

    Correct Answer
    A. Virtual private network (VPN).
    Explanation
    A virtual private network (VPN) is a type of remote network that provides a private tunnel through the public cloud, which is the internet. It allows users to securely access and transmit data over the internet by encrypting the connection between the user's device and the VPN server. This ensures that the data remains private and protected from unauthorized access or interception. VPNs are commonly used by businesses and individuals to establish secure connections for remote access to their network resources.

    Rate this question:

  • 37. 

    In cable internet, as the distance increases, the speed of the overall transfer rate of data

    • A.

      halves

    • B.

      doubles

    • C.

      decreases

    • D.

      stays the same

    Correct Answer
    D. stays the same
    Explanation
    The speed of the overall transfer rate of data in cable internet stays the same regardless of the distance. Cable internet uses coaxial cables to transmit data, and these cables are capable of maintaining a consistent speed over long distances. Unlike other types of internet connections, such as DSL or dial-up, cable internet does not experience a decrease in speed as the distance increases. This is one of the advantages of cable internet, as it allows for reliable and consistent speeds regardless of the user's location.

    Rate this question:

  • 38. 

    What form of remote network access is often the only choice for rural or remote areas?

    • A.

      Dial-up.

    • B.

      Wireless.

    • C.

      Broadband.

    • D.

      Virtual private network (VPN).

    Correct Answer
    A. Dial-up.
    Explanation
    Dial-up is often the only choice for rural or remote areas because it uses existing telephone lines to establish a connection. In areas where broadband or wireless access is not available or reliable, dial-up remains a viable option. While it may be slower and less efficient than other forms of remote network access, it is still accessible in areas where other options are not feasible.

    Rate this question:

  • 39. 

    What does Wi-Fi (wireless fidelity) use to carry network signals to the network access point?

    • A.

      Cable lines.

    • B.

      Radio waves.

    • C.

      Dedicated lines.

    • D.

      Telephone lines.

    Correct Answer
    B. Radio waves.
    Explanation
    Wi-Fi, short for wireless fidelity, uses radio waves to carry network signals to the network access point. These radio waves are transmitted through the air and allow devices to connect to the internet without the need for physical cables. This wireless technology has become widely used for its convenience and flexibility in providing internet connectivity.

    Rate this question:

  • 40. 

    What is installed on a computer to act as the interface between the computer and the network?

    • A.

      Network interface card (NIC).

    • B.

      Coaxial cable.

    • C.

      Transciever.

    • D.

      Ethernet.

    Correct Answer
    A. Network interface card (NIC).
    Explanation
    A network interface card (NIC) is installed on a computer to act as the interface between the computer and the network. It allows the computer to connect to the network and communicate with other devices on the network. The NIC is responsible for sending and receiving data packets over the network, translating the data into a format that can be understood by the computer, and managing the network connection. It is an essential component for connecting a computer to a network.

    Rate this question:

  • 41. 

    What is the unique identification number a network interface card (NIC) provides to a personal computer (PC)?

    • A.

      Media access control address.

    • B.

      Organization unique identifier address.

    • C.

      Institute of Electrical and Electronics Engineers address.

    • D.

      Serial attached small comuter system interface (SAS) address

    Correct Answer
    A. Media access control address.
    Explanation
    A network interface card (NIC) provides a unique identification number called the Media Access Control (MAC) address to a personal computer (PC). This address is used to identify the NIC on the network and is assigned by the manufacturer of the NIC. It consists of six pairs of hexadecimal digits, separated by colons or hyphens, and is unique to each NIC. The MAC address is essential for communication on a network as it helps in routing and forwarding network packets to the correct destination.

    Rate this question:

  • 42. 

    How many connector interfaces does a network interface card (NIC) provide for network cables?

    • A.

      one.

    • B.

      two.

    • C.

      three.

    • D.

      four.

    Correct Answer
    D. four.
    Explanation
    A network interface card (NIC) typically provides four connector interfaces for network cables. This allows for multiple network connections to be made simultaneously, increasing the flexibility and capacity of the network.

    Rate this question:

  • 43. 

    What software activates the actual transmission and receipt of data over the network?

    • A.

      Network interface card (NIC) connector interfaces.

    • B.

      Network interface drivers.

    • C.

      Media access control (MAC).

    • D.

      Open data interfaces.

    Correct Answer
    B. Network interface drivers.
    Explanation
    Network interface drivers are software programs that enable the communication between the operating system and the network interface card (NIC). They control the transmission and receipt of data over the network by providing the necessary instructions and protocols for data transfer. Without the network interface drivers, the NIC would not be able to function properly and the transmission of data would not be possible.

    Rate this question:

  • 44. 

    Which of these is not defined by network protocols?

    • A.

      Packet sizes.

    • B.

      Signal timing.

    • C.

      Connector interfaces.

    • D.

      Whether acknowledgement is needed.

    Correct Answer
    C. Connector interfaces.
    Explanation
    Network protocols define the rules and standards for communication between devices on a network. They determine how data is transmitted, received, and interpreted. Packet sizes, signal timing, and whether acknowledgment is needed are all aspects that are defined by network protocols. However, connector interfaces refer to the physical connectors and cables used to connect devices, which are not defined by network protocols.

    Rate this question:

  • 45. 

    Which information is not required when configuring Transmisson Control Protocol/Internet Protocol (TCP/IP)?

    • A.

      Domain name system server address.

    • B.

      Media access control (MAC) address.

    • C.

      Internet Protocol (IP) address.

    • D.

      Administrator access.

    Correct Answer
    B. Media access control (MAC) address.
    Explanation
    When configuring TCP/IP, the information that is not required is the Media Access Control (MAC) address. The MAC address is a unique identifier assigned to network interfaces, and it is used at the data link layer of the TCP/IP protocol stack. However, when configuring TCP/IP, the focus is on the network layer, specifically the IP address, which is used for routing packets across networks. The MAC address is automatically assigned to network interfaces and does not need to be manually configured for TCP/IP.

    Rate this question:

  • 46. 

    What stores print jobs in a print queue until a printer becomes available?

    • A.

      Print pool.

    • B.

      Print farm.

    • C.

      Print server.

    • D.

      Distributive print

    Correct Answer
    C. Print server.
    Explanation
    A print server is a device or software that stores print jobs in a print queue until a printer becomes available. It acts as a central hub for managing and distributing print jobs to different printers on a network. When a print job is sent to a print server, it is held in a queue until a printer is ready to process it. This allows for efficient printing and ensures that print jobs are not lost or delayed when printers are busy or offline.

    Rate this question:

  • 47. 

    Which is not a transmission medium for a wireless local area network?

    • A.

      Microwaves.

    • B.

      Fiber optics.

    • C.

      Radio.

    • D.

      Light.

    Correct Answer
    B. Fiber optics.
    Explanation
    Fiber optics is not a transmission medium for a wireless local area network because it involves the use of cables made of glass or plastic fibers to transmit data through light signals. Wireless local area networks, on the other hand, use radio waves to transmit data without the need for physical cables. Therefore, fiber optics is not a suitable option for a wireless LAN transmission medium.

    Rate this question:

  • 48. 

    What does the Air Force Network Integration Center (AFNIC) recommend for most military wireless network applications?

    • A.

      Fiber optics.

    • B.

      Microwaves.

    • C.

      Satellite.

    • D.

      Light.

    Correct Answer
    C. Satellite.
    Explanation
    The Air Force Network Integration Center (AFNIC) recommends satellite for most military wireless network applications. This is because satellite communication can provide reliable and secure connectivity even in remote and challenging environments. It allows for long-range communication and can be easily deployed in various locations. Additionally, satellite communication offers high bandwidth capacity, which is essential for transmitting large amounts of data in military operations. Fiber optics, microwaves, and light may also be used in specific cases, but satellite is the recommended choice for most military wireless network applications.

    Rate this question:

  • 49. 

    How does a router send information to the internet on a wireless network?

    • A.

      An ethernet connection.

    • B.

      Radio Waves.

    • C.

      An antenna.

    • D.

      Wi-Fi (wireless fidelity).

    Correct Answer
    A. An ethernet connection.
    Explanation
    A router sends information to the internet on a wireless network through an ethernet connection. Ethernet is a common method of transmitting data over a wired network, and in the case of a wireless network, the router uses an ethernet connection to connect to the modem, which then connects to the internet. The router acts as a bridge between the wireless devices and the internet, allowing them to communicate and access the internet through the ethernet connection.

    Rate this question:

  • 50. 

    What device recieves information from the internet, translates it into a radio signal, and sends it to the computers wireless adapter?

    • A.

      Network interface card (NIC).

    • B.

      Ethernet.

    • C.

      Router.

    • D.

      Wi-Fi (wireless fidelity).

    Correct Answer
    C. Router.
    Explanation
    A router is a device that receives information from the internet and translates it into a radio signal, which is then sent to the computer's wireless adapter. The router acts as a bridge between the internet and the computer, allowing the computer to connect to the internet wirelessly. A network interface card (NIC) is a hardware component that allows a computer to connect to a network, but it does not perform the specific function of receiving information from the internet and translating it into a radio signal. Ethernet is a type of wired network connection, not a device. Wi-Fi (wireless fidelity) is a technology that allows devices to connect to a wireless network, but it is not a specific device itself. Therefore, the correct answer is the router.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.