1.
What does DNS stand for?
Explanation
DNS stands for Domain Name System. It is a system used to translate domain names into IP addresses. This system allows users to easily access websites by typing in a domain name instead of a long string of numbers. The DNS servers maintain a database of domain names and their corresponding IP addresses, ensuring that when a user enters a domain name, they are directed to the correct website. The correct answer is "domain name system" or "Domain Name System."
2.
What is the name of a server at the highest level of a domain?
Correct Answer
B. Root-level server
Explanation
A root-level server is the correct answer because it refers to the server at the highest level of a domain. This server is responsible for storing and distributing the top-level domain (TLD) zone files, which contain information about the domain names and their corresponding IP addresses. It acts as a starting point for resolving domain names and is essential for the functioning of the Domain Name System (DNS).
3.
What protocol do PDA use?
Correct Answer
C. WAP
Explanation
PDA stands for Personal Digital Assistant, which is a handheld device used for personal organization and communication. PDAs typically use the WAP (Wireless Application Protocol) protocol to access the internet and retrieve information. WAP allows PDAs to connect to the internet through a wireless network and access webpages, emails, and other online services. Therefore, the correct answer is WAP.
4.
What type of file used by the gunzip application?
Correct Answer
D. .tgz
Explanation
The correct answer is .tgz. The gunzip application is used to decompress files that have been compressed using the gzip compression algorithm. The .tgz file extension is commonly used for files that have been compressed using both the gzip and tar utilities. Tar is used for creating and manipulating archive files, while gzip is used for compression. Therefore, the gunzip application is used to decompress .tgz files.
5.
PIM is used for
Correct Answer
B. Supporting PDA synchronization to a computer
Explanation
PIM, which stands for Personal Information Manager, is a software application used for managing personal information on devices like PDAs (Personal Digital Assistants). It helps synchronize data between a PDA and a computer, allowing users to easily transfer and update their contacts, calendars, tasks, and other personal information. This feature is particularly useful for individuals who want to keep their PDA and computer in sync, ensuring that they have access to the latest information on both devices.
6.
This provides for digital certificates and data encryption
Correct Answer
A. SSL
Explanation
SSL (Secure Sockets Layer) is a protocol that provides secure communication over the internet by encrypting data and ensuring the authenticity of websites. It utilizes digital certificates to establish a secure connection between a client and a server, protecting sensitive information such as login credentials, credit card details, and personal data from being intercepted or tampered with by unauthorized individuals. SSL is commonly used for securing online transactions, email communication, and protecting sensitive data transfers.
7.
MTA is responsible for routing, delivering, and receiving messages
Correct Answer
A. True
Explanation
The MTA (Message Transfer Agent) is indeed responsible for routing, delivering, and receiving messages. It is a software component that handles the transfer of emails between different mail servers. When an email is sent, the MTA determines the best route for the message to reach its destination, delivers it to the recipient's mail server, and also receives incoming messages from other servers. Therefore, the statement is true.
8.
Incoming mail servers use SMTP
Correct Answer
B. False
Explanation
Incoming mail servers do not use SMTP (Simple Mail Transfer Protocol). SMTP is used by outgoing mail servers to send emails. Incoming mail servers use protocols such as POP (Post Office Protocol) or IMAP (Internet Message Access Protocol) to receive emails from the outgoing mail servers and deliver them to the recipients' mailboxes. Therefore, the correct answer is False.
9.
MDA (mail delivery agent)
Correct Answer
B. Receives sent messages and places them in the right destination mailbox
Explanation
The correct answer is MDA (mail delivery agent) receives sent messages and places them in the right destination mailbox. MDA is responsible for receiving emails that are sent and ensuring that they are delivered to the correct recipient's mailbox. It acts as an intermediary between the mail server and the recipient's mailbox, ensuring that the messages are properly sorted and placed in the appropriate mailbox for the recipient to access.
10.
What provides foundational naming services?
Correct Answer
root-level server
root level server
Explanation
A root-level server, also known as a root level server, provides foundational naming services. These servers are responsible for maintaining the root zone of the Domain Name System (DNS) hierarchy. They store the authoritative information for the top-level domains (TLDs) such as .com, .org, .net, etc. When a user queries a domain name, the root-level server helps in resolving the domain by providing the IP address of the appropriate TLD server. In essence, these servers play a crucial role in the functioning of the DNS system by directing queries towards the correct domain name servers.
11.
What type of language do PDAs use?
Correct Answer
WML
wml
Explanation
PDAs (Personal Digital Assistants) use WML (Wireless Markup Language) as their primary language. WML is a markup language specifically designed for mobile devices and is used to create web pages that can be viewed on PDAs and other handheld devices. The answer "WML, wml" indicates that both uppercase and lowercase versions of WML are correct.
12.
What protocol does the incoming mail server use?
Correct Answer(s)
A. POP
B. IMAP
Explanation
The incoming mail server uses the POP and IMAP protocols. POP (Post Office Protocol) is used to retrieve emails from the server to the recipient's device, while IMAP (Internet Message Access Protocol) allows the recipient to access and manage emails directly on the server. SMTP (Simple Mail Transfer Protocol) is used for sending outgoing emails, and MTA (Mail Transfer Agent) is responsible for routing and delivering emails between different mail servers.
13.
What keeps others from gaining unauthorized access to an unattended workstation?
Correct Answer
C. Password protected screensaver
Explanation
A password protected screensaver prevents others from gaining unauthorized access to an unattended workstation by requiring a password to be entered before anyone can access the system. This adds an extra layer of security as it ensures that only authorized individuals who know the password can use the workstation, preventing unauthorized access and potential misuse of sensitive information.
14.
Changes in project scope tend to occur when?
Correct Answer
B. Gradually in small increments
Explanation
Changes in project scope tend to occur gradually in small increments because as the project progresses, new information and requirements may arise, stakeholders may have different expectations, or external factors may impact the project. These changes are often identified and addressed through regular project reviews and communication with stakeholders, allowing for adjustments to be made in a controlled manner to ensure the project stays on track. This approach helps to minimize disruptions and allows for better management of resources and timelines.
15.
Which of the following situations provide an example of privacy concern
Correct Answer
D. A company audits its employees' hard drives
Explanation
The situation where a company audits its employees' hard drives provides an example of privacy concern. This is because auditing employees' hard drives involves accessing and potentially reviewing personal and confidential information stored on those drives without the employees' consent. This intrusion into the employees' personal data raises privacy concerns as their personal information may be exposed or misused without their knowledge or permission.
16.
When can a client access information from any server?
Correct Answer
A. When both the client and server use the same protocol
Explanation
A client can access information from any server when both the client and server use the same protocol. This is because protocols define the rules and procedures for communication between devices, ensuring that they can understand and interpret the information exchanged. If the client and server are using different protocols, they may not be able to effectively communicate and access the information. Therefore, it is crucial for both the client and server to use the same protocol for seamless information access.
17.
Which protocols are used in network and internet communication?
Correct Answer(s)
B. IPv4
D. IPv6
Explanation
IPv4 and IPv6 are the correct answers because they are the most commonly used protocols in network and internet communication. IPv4 is the fourth version of the Internet Protocol and is widely used for addressing and routing network traffic. However, due to the limited number of available IP addresses in IPv4, IPv6 was developed as the next generation protocol. IPv6 provides a much larger address space and improved security features, making it essential for the future growth of the internet. IPv3 and IPv5 are not commonly used protocols in network and internet communication.
18.
What are characteristics of IPv4?
Correct Answer(s)
A. 4 sets of numbers
C. Dotted quad
D. Uses decimals
Explanation
IPv4 is a widely used internet protocol that is characterized by having 4 sets of numbers, also known as dotted quad notation. This notation uses decimal numbers separated by periods, making it easier for humans to read and remember IP addresses. IPv4 does not use colons, which are used in IPv6, the newer version of the internet protocol. While IPv4 has been efficient in its widespread adoption and compatibility, it is not necessarily considered the most efficient internet protocol in terms of addressing and routing capabilities.
19.
What are characteristics of IPv6?
Correct Answer(s)
B. Supports 4 trillion addresses
D. Uses colons
E. Hexadecimal numbering
F. Addresses IP shortages
Explanation
IPv6 supports 4 trillion addresses, uses colons for address notation, and utilizes hexadecimal numbering system. These characteristics are essential in addressing the growing shortage of IP addresses in IPv4. By providing a significantly larger address space, IPv6 ensures that there are enough unique addresses to accommodate the increasing number of devices connected to the internet. The use of colons and hexadecimal numbering simplifies the representation and management of IPv6 addresses.
20.
The FQDN is the complete domain name of an internet computer and provides enough information to convert the domain name to an IP address.
Correct Answer
A. True
Explanation
The Fully Qualified Domain Name (FQDN) is indeed the complete domain name of an internet computer. It includes the hostname as well as the top-level domain, such as .com or .org. The FQDN provides all the necessary information to convert the domain name to an IP address using the Domain Name System (DNS). This conversion is essential for establishing connections and routing data over the internet. Therefore, the statement is true.
21.
A registered company domain name must be approved by
Correct Answer
B. ICANN
Explanation
ICANN (Internet Corporation for Assigned Names and Numbers) is the correct answer because it is the organization responsible for approving and managing domain names at the global level. ICANN ensures that domain names are registered and allocated in a fair and standardized manner. They also establish policies and guidelines for domain name registration and resolve any disputes that may arise. Therefore, any registered company domain name must go through the approval process of ICANN.
22.
What is included in a DNS?
Correct Answer(s)
A. Top-level domain
B. Server name
C. Registered company domain name
D. Host name
E. Domain category
Explanation
A DNS (Domain Name System) includes various components such as top-level domain, server name, registered company domain name, host name, and domain category. The top-level domain refers to the last part of a domain name, such as .com or .org. The server name is the name of the server that hosts the website. The registered company domain name is the unique name registered by a company for its website. The host name refers to the specific computer or device on a network. The domain category categorizes the type or purpose of the domain, such as educational, commercial, or government.
23.
Which of the following is an example of a domain category?
Correct Answer
C. .edu
Explanation
The correct answer is ".edu". This is an example of a domain category because it represents the top-level domain (TLD) used primarily for educational institutions in the United States. TLDs are the last segment of a domain name, and they categorize websites based on their purpose or geographic location. In this case, ".edu" indicates that the website belongs to an educational institution.
24.
What protocol allows a cell phone to connect to the internet?
Correct Answer
B. VoIP
Explanation
VoIP stands for Voice over Internet Protocol, which is a communication protocol that enables voice and multimedia sessions over the internet. While SSH (Secure Shell) is a network protocol used for secure remote login and other secure network services, ICANN (Internet Corporation for Assigned Names and Numbers) is a non-profit organization responsible for coordinating the unique identifiers and domain names of the internet. FQDN (Fully Qualified Domain Name) is a domain name that specifies the exact location of a resource on the internet. Therefore, VoIP is the correct answer as it specifically refers to the protocol that allows cell phones to connect to the internet for voice communication.
25.
This allows you to make voice calls using a broadband internet connection instead of a analog phone line
Correct Answer
VoIP
voip
VOIP
Explanation
VoIP stands for Voice over Internet Protocol, which allows users to make voice calls using a broadband internet connection instead of a traditional analog phone line. This technology converts voice signals into digital data packets and transmits them over the internet, enabling communication over long distances at a lower cost compared to traditional phone services. VoIP offers flexibility, scalability, and additional features such as video conferencing and voicemail, making it a popular choice for businesses and individuals seeking efficient and cost-effective communication solutions.
26.
What protocol allows a cell phone to connect to the internet and check email?
Correct Answer
WAP
wap
Explanation
WAP (Wireless Application Protocol) is a protocol that allows cell phones to connect to the internet and check email. It is specifically designed for mobile devices and enables them to access web pages and other internet services. WAP uses a markup language called WML (Wireless Markup Language) to display content on the small screens of mobile devices. By using WAP, cell phone users can browse the internet, send and receive emails, and access various online services.
27.
What are the basic elements of authorship?
Correct Answer
expression and originality
expression & originality
expression originality
expression, originality
originality and expression
Explanation
The basic elements of authorship are expression and originality. These two elements are essential for any work to be considered as the creation of an author. Expression refers to the unique way in which an author presents their ideas and thoughts, while originality emphasizes the importance of creating something new and not copying or imitating existing works. Both expression and originality are crucial in distinguishing an author's work from others and establishing their individuality and creativity.
28.
What protocol is used to transmit files across the internet?
Correct Answer
HTTP
http
Explanation
HTTP (Hypertext Transfer Protocol) is the protocol used to transmit files across the internet. It is a standardized system that allows for the retrieval and display of hypertext linked documents. HTTP operates on top of the TCP/IP protocol and is responsible for establishing a connection between a client and a server, allowing for the transmission of data such as web pages, images, videos, and other files. The use of HTTP in the URL (Uniform Resource Locator) specifies that the file being transmitted is a hypertext document.
29.
Which type of file is most likely to contain a virus?
Correct Answer
A. .exe
Explanation
The .exe file type is most likely to contain a virus. This is because .exe files are executable files that can run programs on a computer. Hackers often disguise viruses as .exe files to trick users into running them, which then infects their system. It is important to exercise caution when downloading or opening .exe files from unknown or untrusted sources to avoid potential virus infections.
30.
The Static Index/Site Map method of search enables users to
Correct Answer(s)
B. Manually search information portals
C. Locate indexed information through a directory tree
Explanation
The Static Index/Site Map method of search allows users to manually search information portals and locate indexed information through a directory tree. This means that users can navigate through a structured directory to find specific information they are looking for. It does not involve uploading files or analyzing a website layout, but rather relies on a static index or site map to organize and present the information in a searchable manner.
31.
What refers to programs or files whose specific intent is to harm computer systems? examples are viruses, worms, and Trojans
Correct Answer(s)
malware
Malware
malicious software
Malicious Software
Malicious software
Explanation
Malware, also known as malicious software, refers to programs or files that are specifically designed to harm computer systems. Examples of malware include viruses, worms, and Trojans.
32.
What is the purpose of a command line prompt in windows?
Correct Answer
B. To direct requests
Explanation
The purpose of a command line prompt in Windows is to direct requests. A command line prompt allows users to interact with the operating system by entering commands and instructions. It provides a text-based interface where users can execute various tasks, such as running programs, navigating through directories, managing files, and configuring system settings. Users can enter specific commands to request the operating system to perform certain actions, making it a powerful tool for controlling and managing the Windows environment.
33.
What does the command "open" do?
Correct Answer
D. Provide access to the ftp server
Explanation
The command "open" is used to provide access to the FTP server. FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. By using the "open" command, users can establish a connection with an FTP server and access its files and directories for downloading or uploading purposes.
34.
What does the command "get" do?
Correct Answer
C. Allow you to go a get a file/copy it to your computer
Explanation
The command "get" allows you to go and get a file or copy it to your computer. This means that the command enables you to retrieve a file from a remote location and transfer it to your own device. It provides a way to access and obtain specific files that you need from another source.
35.
What does the command "put" do?
Correct Answer
A. Allows you to upload files from your computer
Explanation
The command "put" allows you to upload files from your computer. This means that you can transfer files from your local machine to a remote server or location. It is commonly used in FTP (File Transfer Protocol) to send files to a server for storage or sharing purposes.
36.
Any third party who distributes information about you is considered a
Correct Answer
B. Privacy issue
Explanation
The term "privacy issue" refers to any concern or problem related to the protection of one's personal information. It encompasses situations where a third party, such as an organization or individual, shares or distributes information about an individual without their consent or in a manner that compromises their privacy. This can include unauthorized access to personal data, data breaches, or the misuse of personal information. Therefore, "privacy issue" is the most appropriate term to describe the scenario where a third party distributes information about an individual.
37.
Which protocol allows you to gain secure access to a remote computer and execute commands to administer the system?
Correct Answer
A. SSH
Explanation
SSH (Secure Shell) is a protocol that allows secure access to a remote computer and enables the execution of commands to administer the system. It provides a secure channel for communication between the client and the server, encrypting the data exchanged to prevent unauthorized access or tampering. SSH is commonly used in remote system administration, allowing administrators to securely manage and control remote servers or devices. It provides authentication and encryption, ensuring the confidentiality and integrity of the transmitted data. MDA, SSL, and POP3 are not protocols specifically designed for remote system administration and do not offer the same level of security as SSH.
38.
What can prevent vital features of a website from displaying?
Correct Answer
C. Pop-up blockers
Explanation
Pop-up blockers can prevent vital features of a website from displaying. Pop-up blockers are designed to block any pop-up windows that may appear while browsing the internet. These windows often contain important information or features of a website, such as login forms, notifications, or additional content. When a pop-up blocker is enabled, it prevents these windows from opening, which can result in the vital features of a website not being displayed to the user.
39.
What is absolutely necessary for an internet connection to take place?
Correct Answer
A. TCP/IP
Explanation
TCP/IP (Transmission Control Protocol/Internet Protocol) is absolutely necessary for an internet connection to take place. TCP/IP is a set of protocols that allows communication between devices over the internet. It provides a reliable and efficient way to transmit data packets across networks. TCP ensures that data is delivered in the correct order and without errors, while IP is responsible for routing and addressing packets to their destination. Without TCP/IP, devices would not be able to communicate with each other and establish an internet connection.
40.
What is the currently used protocol called, also known as the dotted quad?
Correct Answer
IPv4
ipv4
internet protocol version 4
Explanation
The currently used protocol, also known as the dotted quad, is called IPv4. IPv4 stands for Internet Protocol version 4. It is the fourth version of the Internet Protocol and is the most widely used protocol for internet communication. It uses a 32-bit address space and is identified by a series of four numbers separated by dots, known as the dotted quad notation.
41.
What is the total capacity that can be carried on a network? (also called traffic)
Correct Answer
C. Bandwidth
Explanation
Bandwidth refers to the maximum amount of data that can be transmitted over a network in a given time period. It represents the total capacity or traffic that can be carried on the network. Therefore, bandwidth is the correct answer to the question.
42.
What changes IP addresses into easily recognizable text-based names?
Correct Answer
A. DNS systems
Explanation
DNS systems change IP addresses into easily recognizable text-based names. DNS stands for Domain Name System, which is responsible for translating domain names (such as www.example.com) into IP addresses (such as 192.168.0.1) that computers can understand. This translation is important because it allows users to access websites and other online services by simply typing in a domain name instead of a complex IP address. DNS systems maintain a database of domain names and their corresponding IP addresses, allowing for efficient and user-friendly internet navigation.
43.
Network administrators must consider ______ when conducting business internationally, because they are different in various countries
Correct Answer
D. Encryption laws
Explanation
When conducting business internationally, network administrators must consider encryption laws because they vary in different countries. Encryption laws regulate the use of encryption technology to protect sensitive information. Different countries have different regulations and restrictions on encryption, including the strength of encryption algorithms allowed, key management requirements, and government access to encrypted data. Network administrators need to be aware of these laws to ensure compliance and protect the confidentiality and integrity of data transmitted over networks.
44.
What are the phases of project management?
Correct Answer(s)
A. Initiating
B. Planning
C. Executing and controlling
D. Closing
Explanation
The phases of project management are initiating, planning, executing and controlling, and closing. Initiating involves defining the project's objectives and scope. Planning includes creating a detailed project plan, setting timelines, and allocating resources. Executing and controlling involve carrying out the project activities and monitoring progress, making necessary adjustments as needed. Lastly, the closing phase involves completing and delivering the project, conducting a final review, and documenting lessons learned.
45.
What is a cookie?
Correct Answer
C. A text fie that resides in either a hard drive or the memory and contains information sent between a server and a client to help maintain and track user activities
Explanation
A cookie is a text file that is stored either in a hard drive or in the memory. It contains information that is sent between a server and a client. The purpose of a cookie is to help maintain and track user activities.
46.
What is an internal network accessible to only the users within a company
Correct Answer
A. Intranet
Explanation
An intranet is an internal network that is accessible only to the users within a company. It is a private network that allows employees to share information, collaborate, and access company resources such as documents, databases, and applications. Unlike the internet, which is accessible to anyone with an internet connection, an intranet is restricted to authorized users within the organization. This ensures that sensitive company information remains secure and confidential.
47.
What is the internet standard protocol for transferring email messages from one computer to another?
Correct Answer
D. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is the correct answer. It is the internet standard protocol used for transferring email messages from one computer to another. SMTP is responsible for sending emails, while MTA (Mail Transfer Agent) and MDA (Mail Delivery Agent) are components that handle the routing and delivery of emails within a mail server. WAP (Wireless Application Protocol) is a protocol used for accessing the internet on mobile devices and is not specifically related to email transfer.
48.
What are the protocols used to send and receive email?
Correct Answer
B. Email protocols
Explanation
The protocols used to send and receive email are commonly referred to as email protocols. These protocols define the rules and standards for transmitting email messages between mail servers and clients. Examples of email protocols include SMTP (Simple Mail Transfer Protocol) for sending emails, POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) for receiving emails, and MIME (Multipurpose Internet Mail Extensions) for defining the format of email messages. These protocols ensure the proper delivery and retrieval of emails across different mail systems and clients.
49.
To send and receive email, SMTP and POP3 or IMAP are not needed
Correct Answer
B. False
Explanation
SMTP (Simple Mail Transfer Protocol) is a protocol used to send email messages from a mail client to a mail server. POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) are protocols used to retrieve email messages from a mail server to a mail client. Therefore, to send and receive email, both SMTP and either POP3 or IMAP are needed. Hence, the correct answer is False.
50.
Check all statements that are true about spyware
Correct Answer(s)
A. Software application
C. Gathers information and relays it outside parties usually for advertising parties
D. Can be placed on a system by a virus
Explanation
Spyware is a software application that is conspicuously placed on a user's system. It gathers information and relays it to outside parties, usually for advertising purposes. Spyware can indeed be placed on a system by a virus. However, it is incorrect to say that spyware cannot be placed on a system from an application downloaded from the internet, as this is one of the common ways that spyware can infiltrate a system.