1.
What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communication network systems?
Correct Answer
A. pHysical
Explanation
The physical layer of the Open System Interconnect model is responsible for defining the electrical, mechanical, procedural, and functional specifications for the links between communication network systems. This layer deals with the physical transmission of data and the physical characteristics of the network, such as cables, connectors, and signaling. It ensures that the data is properly transmitted over the network and provides the necessary hardware and software interfaces for communication between devices.
2.
The computing part of the computer is the central processing unit, also called the
Correct Answer
C. Microprocessor
Explanation
The correct answer is microprocessor because it is the part of the computer that performs most of the processing inside the computer. It is responsible for executing instructions, performing calculations, and managing data flow between different parts of the computer. The microprocessor is often referred to as the "brain" of the computer as it controls and coordinates all the activities of the computer system.
3.
What are two main componets make up the central processing unit?
Correct Answer
B. Control unit and arithmetic logic unit
Explanation
The central processing unit (CPU) is composed of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for managing and coordinating the operations of the CPU, including fetching instructions from memory, decoding them, and executing them. On the other hand, the ALU performs arithmetic and logical operations, such as addition, subtraction, and comparisons. Together, these two components form the core of the CPU, allowing it to carry out the instructions and perform calculations required by the computer system.
4.
What is the type of memory that retains data after power is removed or lost?
Correct Answer
B. Nonvolatile
Explanation
Nonvolatile memory is the type of memory that retains data even after power is removed or lost. This means that the data stored in nonvolatile memory remains intact and can be accessed again once power is restored. Unlike volatile memory, which loses its data when power is turned off, nonvolatile memory is designed to retain information for long periods of time, making it ideal for storing important data that needs to be preserved even in the absence of power.
5.
Which landline transmission medium is the primary carier of voice communications?
Correct Answer
A. Twisted pair cable
Explanation
Twisted pair cable is the primary carrier of voice communications because it is a widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to reduce interference and crosstalk. Twisted pair cable is cost-effective, easy to install, and can transmit voice signals over long distances without significant loss of quality. It is commonly used in residential and business telephone systems, making it the preferred choice for voice communication transmission.
6.
An optical communications system is comprised of a
Correct Answer
A. Transmitter, cable and receiver
Explanation
The correct answer is Transmitter, cable, and receiver. In an optical communications system, the transmitter is responsible for converting electrical signals into optical signals, which are then transmitted through a cable or fiber optic medium. The receiver at the other end of the cable receives the optical signals and converts them back into electrical signals. Therefore, the transmitter, cable, and receiver are the essential components of an optical communications system. The other options, such as logic analyzer and protocol analyzer, are not directly involved in the transmission and reception of optical signals.
7.
Which of the following is not one of the three advantages to using wireless technology?
Correct Answer
C. Safety
Explanation
The given answer, "Safety," is not one of the three advantages to using wireless technology. The three advantages mentioned are ease of installation, lower cost, and mobility. Safety, although important, is not listed as one of the advantages.
8.
The ability to move about without being tethered by wires in wireless technology is called
Correct Answer
A. Mobility
Explanation
The term "mobility" refers to the ability to move freely without being restricted by wires in wireless technology. It indicates the convenience and freedom provided by wireless devices that allow users to move around while maintaining connectivity. This term encompasses the idea of being untethered and having the flexibility to move about with ease.
9.
Which of the following is not one of the four security threats to Wireless Local Area Network?
Correct Answer
B. Direct Connections
Explanation
Direct Connections are not one of the four security threats to Wireless Local Area Network. Rogue Access Points are unauthorized access points that can be used by attackers to gain access to the network. War Drivers are individuals who drive around searching for wireless networks to exploit. Hackers are individuals who attempt to gain unauthorized access to the network. However, Direct Connections refer to wired connections and are not specific to wireless networks, making them not a security threat in this context.
10.
Who is an authorized client that may unknowingly or maliciously help outside parites gain access to a network?
Correct Answer
B. Employee
Explanation
An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user, an employee has legitimate access to the network and can potentially misuse their privileges to compromise the security of the network. This can be done either unintentionally, through negligence or lack of awareness of security protocols, or intentionally, through malicious actions such as sharing sensitive information or installing malware. Therefore, an employee poses a significant risk to the network's security if their actions are not properly monitored and controlled.
11.
What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?
Correct Answer
A. Institute of Electrical Elctronics Engineers
Explanation
The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards include IEEE 802.11 (Wi-Fi), IEEE 802.15 (Bluetooth), and IEEE 802.16 (WiMAX). These standards ensure that wireless devices from different manufacturers can communicate with each other effectively and securely, promoting interoperability and advancing the development of wireless technology.
12.
How many peripherals can a Universal Serial Bus handle at once?
Correct Answer
A. 127
Explanation
A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because USB uses a 7-bit address field, allowing for a maximum of 127 unique addresses for connected devices. Each peripheral connected to the USB requires a unique address, and the remaining address (address 0) is reserved for the host controller. Therefore, the correct answer is 127.
13.
How many devices can connect to FireWire bus?
Correct Answer
A. 63
Explanation
FireWire, also known as IEEE 1394, is a high-speed serial bus technology that allows multiple devices to be connected and communicate with each other. The maximum number of devices that can connect to a FireWire bus is 63. This limitation is due to the addressing scheme used by FireWire, which only allows for a maximum of 63 unique device addresses. Therefore, the correct answer is 63.
14.
What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property>
Correct Answer
B. Voltage
Explanation
Voltage is applied across Liquid Crystal Display (LCD) material to change the alignment and light polarizing property. This is because LCDs work on the principle of electrically controlling the alignment of liquid crystal molecules. By applying voltage, the orientation of the liquid crystal molecules can be altered, which in turn changes the polarizing property of light passing through the material. This allows the LCD to control the amount of light that is transmitted and create the desired display.
15.
What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
Correct Answer
B. Bridge
Explanation
A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It does this by examining the destination MAC address of each incoming frame and forwarding it only to the appropriate segment. This helps to reduce collisions and improve network performance by limiting the number of devices sharing the same network segment. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge intelligently routes traffic to specific segments, making it a more efficient and scalable solution for network segmentation.
16.
What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?
Correct Answer
B. 80/20 rule
Explanation
The 80/20 rule is a principle that suggests that 80% of the data should be local to a segment, while the remaining 20% should be destined to traverse a bridge to the other segment. This rule implies that the majority of the data should be stored and processed within the segment itself, reducing the need for communication between segments. By adhering to this rule, network efficiency and performance can be optimized, as local data processing is faster and requires less network bandwidth compared to data transmission between segments.
17.
This type of bridge is used to convert one Data Link layer protocol to another
Correct Answer
C. Translational
Explanation
A translational bridge is used to convert one Data Link layer protocol to another. It acts as a mediator between two different protocols, allowing communication between devices that use different protocols. This type of bridge is responsible for translating the data frames from one protocol to another, ensuring compatibility and seamless communication between the devices.