1.
The________ stage on the Laser printing process is when the laser produces the image on the drum.
Explanation
The imaging stage on the Laser printing process is when the laser produces the image on the drum. During this stage, the laser beam scans across the surface of the drum, creating a static charge pattern that represents the content to be printed. This static charge pattern will later attract toner particles to form the image on the drum.
2.
The MAC address never changes. True or False
Explanation
False. The MAC address, also known as the Media Access Control address, is a unique identifier assigned to a network interface card. While it is true that the MAC address is typically assigned by the manufacturer and remains constant for the lifetime of the device, there are methods to change or spoof the MAC address. This can be done for various reasons, such as enhancing privacy or bypassing network restrictions. Therefore, it is not accurate to say that the MAC address never changes.
3.
DSL stands for _________.
4.
_______ is used to connect to the internet via power lines.
Explanation
Powerline communication (PLC) is used to connect to the internet via power lines.
5.
Which topology has no administrator/controller
Correct Answer
D. Bus
Explanation
The correct answer is Bus. In a Bus topology, there is no central administrator or controller. All the devices are connected to a single communication line, called the bus, and they communicate directly with each other. This means that there is no need for a central device to manage or control the network. Each device has equal access to the bus and can transmit data whenever it wants.
6.
To help protect against social engineering you should
Correct Answer
A. Escort all visitors
Explanation
To help protect against social engineering, it is important to escort all visitors. This ensures that unauthorized individuals do not gain access to sensitive information or areas within the organization. By escorting visitors, you can monitor their activities and prevent them from attempting any malicious actions or social engineering tactics. This practice helps maintain the security and integrity of the organization's assets and reduces the risk of unauthorized access or information leakage.
7.
Which type of printer melts ink and sprays it through a nozzle onto a drum to transfer an image onto paper?
Correct Answer
E. Solid-ink
Explanation
Solid-ink printers melt ink and spray it through a nozzle onto a drum to transfer an image onto paper. This type of printer uses solid blocks of ink that are heated until they become a liquid. The liquid ink is then sprayed onto the drum, which rotates and transfers the image onto the paper. Solid-ink printers are known for their high-quality prints and vibrant colors.
8.
The internet is a type of which network?
Correct Answer
C. WAN
Explanation
The internet is a type of WAN (Wide Area Network). A WAN is a network that spans a large geographical area, connecting multiple smaller networks together. The internet is a global network that connects computers and devices from all around the world, allowing them to communicate and share information. It uses a variety of technologies, such as fiber optic cables, satellites, and wireless connections, to connect different networks and enable worldwide connectivity.
9.
Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
Correct Answer
D. Spyware
Explanation
Spyware is a type of security threat that installs to a computer without the user's knowledge and then monitors all computer activity. It is designed to collect personal information, such as browsing habits, passwords, and credit card details, without the user's consent. This information is often used for malicious purposes, such as identity theft or unauthorized access to sensitive data. Spyware can be difficult to detect and remove, making it a serious threat to computer security.
10.
Which of the following uses the network to duplicate its code to the hosts on a network, often without any intervention.
Correct Answer
D. Worm
Explanation
A worm is a type of malicious software that uses a network to replicate itself and spread to other computers or devices on the network. Unlike viruses, worms do not require any user intervention to spread. They can exploit vulnerabilities in network protocols or software to automatically copy and execute themselves on other hosts, causing damage and disruption.
11.
Which method of data transfer allows information to be sent and received at the same time?
Correct Answer
A. Full Duplex
Explanation
Full Duplex is the correct answer because it is a method of data transfer that allows information to be sent and received simultaneously. In Full Duplex, communication can occur in both directions at the same time, enabling faster and more efficient data transfer compared to other methods. Half Duplex allows communication in both directions but not simultaneously, Multiplex allows multiple signals to be transmitted over a single channel, and Simplex only allows communication in one direction.
12.
_________ is a piece of hardware desktops use to connect to networks.
Correct Answer
NIC
Network interface card
Explanation
A Network Interface Card (NIC) is a hardware component that is used by desktop computers to connect to networks. It is responsible for facilitating the communication between the computer and the network, allowing the computer to send and receive data over the network. The NIC is typically installed inside the computer and connects to the network through an Ethernet cable. It provides the necessary hardware and software components to establish a network connection and enables the computer to access resources and services on the network.