1 which internet access method can be affected by the


1. Which Internet access method can be affected by the number of people concurrently online in a neighborhood?

  • Dial-up
  • DSL
  • Cable Broadband
  • ISDN

2. For which of these items should you always change the default settings on a wireless router?

  • SSID and Administrative Password
  • IP Address
  • Channel
  • Frequency (2.4/5.0 GHz)

3. When utilizing IPv4, each network node has a ____-bit IP address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.

  • 16
  • 32
  • 48
  • 64

4. Which of the following is the default class A subnet mask?

  • 255.255.255.0
  • 255.240.0.0
  • 255.0.0.0
  • 255.255.0.0

5. A _______ is an administrative grouping of network resources such as computers, printers, and network devices.

  • container
  • class
  • range
  • domain

6. A(n)_________ cable is the most frequently used network cable because it is relatively inexpensive and easy to install.

  • Shielded twisted-pair
  • Unshielded twisted-pair
  • Thin coax
  • Thick coax

7. What type of topology is represented in this diagram?

  • Bus
  • Ring
  • Tree
  • Star

8. Which standards organization developed the OSI Model?

  • IEEE
  • Department of Defense
  • OSI
  • ISO

9. A network computer that shares resources with and responds to requests from other computers in known as a ________.

  • Client
  • Host
  • Terminal
  • Server

10. A DHCP server is a server that uses software and DHCP to automatically assign a(n) ______ address from a pool of possible addresses.

  • MAC
  • LAA
  • IP
  • BIA

11. Which Internet access method uses existing TV coaxial cables?

  • Cable Broadband
  • DSL
  • T-1
  • ISDN

12. Which Internet access method uses existing telephone lines and regular phone service?

  • Cable Broadband
  • DSL
  • T-1
  • ISDN

13. Which of the following types of media are used in LANs?

  • Twisted Pair
  • Coaxial Cable
  • Radio Waves
  • All of the selection are valid

14. Which of the following is a class B address?

  • 126.4.27.19
  • 127.276.2.15
  • 177.125.3.17
  • 221.34.2.17

15. Which of the following network related informational items is not needed in order to install an Operating System on a PC that will be connected to the internet?

  • Default Gateway
  • IP address
  • Subnet mask
  • Switch number

16. A ________ server isolates internal clients from the servers by downloading and storing files on behalf of the clients.

  • DNS
  • DHCP
  • NTP
  • Proxy

17. In which layer of the TCPIP Model do routers belong?

  • Physical
  • Internetwork
  • Application
  • Transport

18. Which of the following is considered a base 10 numbering system?

  • Decimal
  • Binary
  • Hexadecimal
  • Octal

19. Use the ________ utility as the first step in diagnosing connectivity problems.

  • Tracert
  • Nstat
  • Net view
  • Ping

20. Which of the following is a class C address?

  • 169.254.27.19
  • 10.276.2.15
  • 172.22.3.17
  • 221.34.2.17

21. Which of the following is the default class B subnet mask?

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255

22. Which of the following is a drawback of Broadband technology, compared to ADSL?

  • Its standards are less developed
  • Its installation is more difficult
  • Multiple subscribers must share a fixed amount of bandwidth
  • Cable is an asymmetrical technology, while ADSL is symmetrical

23. Which of these wireless encryption standards is the most secure?

  • WPA
  • WEP
  • WPA2
  • WEP2

24. Which standards organization developed the 802 series of standards?

  • IEEE
  • ITU
  • OSI
  • ISO

25. Which of the following is a class A address?

  • 126.4.27.19
  • 128.276.2.15
  • 172.22.3.17
  • 192.168.2.17

26. Users on a particular floor can't access the Internet, but can log onto the local network. What should they check first?

  • TCP/IP properties
  • Is switch turned on?
  • Are users on other floors having the same issue?
  • Call their ISP

27. The OSI model consists of ______ distinct layers stacked on one another.

  • two
  • three
  • four
  • seven

28. A computer that acts as both a client and a server is known as a _________.

  • Server
  • Client
  • Host
  • Peer

29. At what layer of the TCP model is the User Datagram Protocol (UDP) found?

  • Host to Host
  • Application
  • Network
  • Internet

30. Which of the following is considered a base 2 numbering system?

  • Hexadecimal
  • Decimal
  • Binary
  • Octal

31. The new IPv6 is better than IPv4 for all the following reasons except:

  • More addresses
  • Less bits in the address
  • Better security
  • Compatibility with IPv4

32. A ________ transmission sends a message to all points on a specific network.

  • multicast
  • unicast
  • simulcast
  • broadcast

33. In which type of wired network is it easier to add multiple new nodes?

  • Bus
  • Star
  • Ring
  • Mesh

34. A ________ is the place where a telephone company terminates lines and switches at a client location.

  • telco office
  • central office
  • central switching facility
  • demarcation point

35. What is the primary difference between LANs and WANs?

  • The use of an external provider due to distance they span
  • The type of DHCP servers they use
  • The type of data they transmit
  • All of the above

36. The _________ layer of the TCP model is responsible for logical addressing.

  • Internetwork
  • Host to Host
  • Logical
  • Session

37. A ______ consists of interconnected computers, printers, and other computer equipment in close physical proximity.

  • WAN
  • MAN
  • WWAN
  • LAN

38. Which of the following is considered a base 16 numbering system?

  • Decimal
  • Binary
  • Hexadecimal
  • Octal

39. Which of the following is the default class C subnet mask?

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255

40. What type of topology is represented in this diagram?

  • Bus
  • Ring
  • Point to Point
  • Mesh

41. A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology.

  • bus
  • mesh
  • ring
  • star

42. Which of the following is a cryptographic technique for that converts plain data into coded data?

  • Encryption
  • PKA
  • KPA
  • RXStenography

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: 1 which internet access method can be affected by the
Reference No:- TGS01464143

Now Priced at $40 (50% Discount)

Recommended (91%)

Rated (4.3/5)