Chala

This page lists questions and answers that were posted by visitors named Chala.

Questions

The following questions were asked by visitors named Chala.

-16t^3+100t=72
4 years ago
What is communication?
1 year ago
What is SMT
1 year ago
48. Each computer is connected to every other computer by separate cabling and network offers superior redundancy and reliability. A. Star topology B. Mesh topology C. Ring topology D. Bus topology
1 year ago
What is the mesh Topology?
1 year ago
What is star topology
1 year ago
What is the Bus topology by example
1 year ago
Ring topology
1 year ago
The use of physical layer
1 year ago
Network layer
1 year ago
Data layer
1 year ago
Transport layer
1 year ago
Session layer
1 year ago
Application Layer
1 year ago
The kind of IP
1 year ago
The host and network by example
1 year ago
Brorcast Ip address
1 year ago
15. At which layer of the OSI are 1s and 0s converted to a digital signal? A. Transport B. Data link C. Network D. Physical
1 year ago
UDP
1 year ago
Bridge
1 year ago
Gather data on business requirements
1 year ago
41. Which class the IP addressing provides 24 bits of network addressing and 8 bits of host addressing by default. The most secure and strong password from the following list is: A. Class A B. Class B C. Class C D. Class D
1 year ago
50. Users are complaining that the performance of the network is not satisfactory. It takes a long time to pull files from the server and under heavy loads; workstations can become disconnected from the server. The network is heavily used and a new video...
1 year ago
1. Which of the following is behavior of good team members? A. Do not take turns B. Do not respect the opinions of others in the team C. Keep individual information about development D. Share responsibilities
1 year ago
2. You are the network administrator for a small window 2003. One of your users has come to you because he cannot remember the password he uses to log onto your windows server 2003 domain. Which utility should you use to change a user’s password? A. The s...
1 year ago
3. You are a network administrator in your office. You have 255.255.255.224 subnet mask. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses this subnet? A. 15 B. 30 C. 16 D. 14
1 year ago
4. All of the following are results of Kaizen implementation in workplaces except? A. High waiting time B. Efficient space utilization C. Improvement in product quality D. Safety in workplaces
1 year ago
Kaizen implementation
1 year ago
5. A type of maintenance that has regular schedule? A. Breakdown Maintenance B. Predictive Maintenance C. Proactive Maintenance D. Preventive Maintenance
1 year ago
6. What does the 10Base T refers? A. Transmit data at 100 Mbps with a distance limit of 100 meters per segment. B. Transmit signals at 10 Mbps with a distance limit of 200 meters per segment. C. Transmit signals at 10 Mbps with a distance limit of 100 met...
1 year ago
7. A computer cannot communicate with any of the computer on a different network segment. It has no problem connecting to other computer that is located on its own network segment. The IP address parameter that is possibly incorrectly on the computer? A....
1 year ago
8. One of the options below is correct steps in conducting ICT Training? A. Identifying training needs - Planning - Implementation B. Implementation - Planning - Identifying training needs C. Planning - Implementation - Identifying training needs D. Plann...
1 year ago
9. There are one thousand employees in the entire company at present and the company is experiencing growth. Additionally, some of the information that will be sent over the network is confidential. Which network Types would be most appropriate in this si...
1 year ago
10. Which of the following statements are associated with a bus LAN network? A. Uses a single backbone computer to connect all network devices. B. Uses dedicated server. C. All devices connect to a central device. D. Uses a dual ring configuration.
1 year ago
11. What command would be used to establish network connectivity? A. IPCONFIG/all B. IPCONFIG/registerdns C. IPCONFIG/release D. IPCONFIG/renew
1 year ago
13. In the following figure each computer is connected to every other computer by separate cabling. This configuration provides redundant paths throughout the network so that if one cable fails, another will take over the traffic. While ease of troublesho...
1 year ago
14. You have just created an active directory user on a windows 2003 domain controller. The security requirements for this user specify that the user should not be able to logon to the computer between 12:01 AM and 4:00 AM because this is when your compan...
1 year ago
16. Which of the following are firewall-related constraints relating to Remote Assistance? A. NAT cannot be used. B. Internet connection sharing is not possible. C. Port 3389 must be open. D. You cannot use Remote Assistance across a virtual Network (VPN)
1 year ago
17. The best method which is used to repair your system partition or make minor changes to windows to get the operating system functional. A. Directory services restore mode B. Last known good configuration C. Recovery console D. Emergency Repair Disk (ER...
1 year ago
18. Which of the following versions of windows server 2003 require product activation? A. Windows server 2003, Enterprise Edition, Evaluation version B. Windows server 2003, standard Edition, volume license version C. Windows server 2003, standard Edition...
1 year ago
19. Which one of the following is a private IP address? A. 172.33.194.30 B. 168.172.19.39 C. 127.0.0.1 D. 172.20.14.36
1 year ago
20. To decide what type of network resource model is not needed? A. The need of the network designer B. How much will it cost? C. How much security does the company require? D. What is the size of the organization
1 year ago
21. Where would you configure workstations to boot from the USB drive first and hard drive only if there is not a bootable USB device attached? A. Configured in workstations BIOS B. NTLDR C. Boot.ini D. C:\windows\TEMP\1st.txt
1 year ago
22. Which layer 1 device can be used to enlarge the area covered by a single LAN segment? A. NIC B. RJ-45 transceiver C. Repeater D. Switch
1 year ago
23. A user has forgotten his or her password and attempts to logon several times with an incorrect password. Eventually, the user receives a logon message indicating that the account is either disabled or locked out. The message suggests that the user con...
1 year ago
24. The flow of information across persons of work units at the same hierarchical level is called? A. Vertical communication B. Down ward communication C. Upward communication D. Lateral communication
1 year ago
26. Which of the following is categorized as richest channel in conveying information effectively? A. Face to face communication B. Posted notices and bulletins C. Telephone D. E-mail
1 year ago
27. You are the administrator for your company’s domain. You need to subdivide groups in your organization with in active directory. If you want to separate sales from marketing department what could you use as a system of organizing this subdivision? A....
1 year ago
28. Which of the following is not market promotional tool? A. Seminars B. Advertising C. Supply/Demand D. Networking and referrals
1 year ago
29. One of following is type of account policies? A. Password policy B. User right assignment C. Security options D. Audit policy
1 year ago
30. One of the following is not function of firewalls. A. Differential backup B. Stetful inspection C. Packet filter D. Proxy firewall
1 year ago
31. Let say you are a network administrator in your office. You have an interface on a router with the IP address of 192.168.192.10/29. What is the broadcast address the hosts will use on this LAN? A. 192.168.192.127 B. 192.168.192.63 C. 192.168.192.15 D....
1 year ago
32. A _____ system to join two or more device and computers together to communicate and share resources. A. Network B. Resource C. NIC D. Modem
1 year ago
33. The most effective way to migrate congestion on a LAN would be to ____________ A. Upgrade the network cards B. Change the cabling to cat 6 C. Upgrade the CPUs in the routers D. Replace the HUBs with switches
1 year ago
34. Which topology the workstation goes down, it does not affect the entire network? A. Star B. Bus C. Ring D. Straight line
1 year ago
35. One of your printers is not working properly and you want to prevent users from sending print jobs to the logical printer servicing that device. What should you do? A. Remove the printer from active directory B. Stop sharing the printer C. Rename the...
1 year ago
36. What type of profile will be most useful to maintain a locked-down desktop common to all sales representatives? A. Local profile B. The all users profile C. Preconfigured roaming group profile D. Local mandatory profile
1 year ago
37. While reviewing the security logs for your server, you notice that a user on the internet has attempted to access your internal mail server. Although it appears that the user’s attempts were unsuccessful you are still very concerned about the possibil...
1 year ago
38. One of the following is not an example of network resource. A. Printer and other peripherals B. Files and applications C. Disk storage D. Hub A
1 year ago
39. A user can determine the network settings on the client’s network interface cards as well as any that a DHCP server has leased to your computer by typing the following command at a command prompt. A. Ping B. IP C. Ipconfig/all D. Connect
1 year ago
40. You want to ensure the highest level of security for your corporate intranet without the infrastructure of certificate services. The goal is to provide Authentication that is transparent to users and to allow securing intranet recourses with the group...
1 year ago
42. Which one of the following is used only with domain controllers and enables you to restore directory services? A. Directory services restore mode B. Last Known good configuration C. Debugging mode D. Safe mode
1 year ago
45. What is the default subnet mask for class C network? A. 255.0.0.0 B. 127.0.0.1 C. 255. 255.0.0 D. 255. 255. 255.0
1 year ago
46. You are troubleshooting a network using STP twisted pair and suspect that the maximum length has been exceeded. What is the maximum length of STP twisted pair? A. 25 meters B. 1000 meters C. 10000 meters D. 100 meters
1 year ago
47. Which of the following is the address of the router? A. The default getaway B. The subnet mask C. The IP address D. The TCP address
1 year ago
49. You have been asked to install a network that will provide the network users with the greatest amount of fault tolerance. Which of the following network topologies would you choose? A. Star B. Ring C. Bus D. Mesh
1 year ago
51. Computers that access shared resources for network users. A. Server B. Client C. Peer to peer D. Server based
1 year ago
52. When troubleshooting a network connectivity problem, you are able to ping your local loopback, the IP address of your system and the IP address of another system on your network. However, you cannot ping the default gateway. Which of the following is...
1 year ago
53. ARP (Address Resolution Protocol) is A. TCP/IP protocol used by dynamically bind a high level IP address to a low level physical hardware address B. TCP/IP high level protocol for transferring files from one machine to another C. Protocol that handles...
1 year ago
55. Which of the following OSI layers is responsible for establishing connections between two devices? A. Transport B. Network C. Session D. Data-link
1 year ago
56. A user in the sales department calls you and complains that she is unable to log on to the server and use the accounting software. All the members of the sales department have access to the application and the user has worked with the software before....
1 year ago
57. Which of the following topologies allow for network expansion with the least Amount of disruption for the current network users? A. Ring B. Hybrid C. Star D. Bus
1 year ago
58. Which of the following devices forwards data packets to all connected ports? A. Switch B. Hub C. Bridge A. Router
1 year ago
59. Frames from one LAN can be transmitted to another LAN via the device. A. Router B. Repeater C. modem D. Bridge
1 year ago
60. Sustainable energy principles and work practices may not include A. Switching off equipment when not in use. B. Cleaning filters irregularly C. Insulating rooms and buildings to reduce energy use D. Recycling and reusing materials wherever practicable
1 year ago
61. Which of the following summation operation is performed on the bits to check an error detecting code? A. Checksum B. Attenuation C. Codec D. Code-decoder
1 year ago
62. A large network with 500 users notices that at specific times in the morning and afternoon network congestion ties up their computers. What is the most likely cause? A. Many users are logging on or off B. A terminator is not grounded C. The switch con...
1 year ago
63. Which of the following is used for modulation and demodulation? A. Protocols B. Multiplexer C. Gateway D. Modem
1 year ago
64. Which of the following definitions describe the loss of signal strength as a signal Travels through a particular media? A. chatter B. crosstalk C. attenuation D. EMI
1 year ago
65. Which one of the following is Functions of physical layer? A. Handles the discovery of destination systems and addressing B. Provides the mechanism by which data can be passed from one network to another. C. Provides error detection and correction D....
1 year ago
66. Which of the following is not an example of business abuse? A. Falsify records B. Break confidentiality C. Ignore safety rules D. Better client satisfaction
1 year ago
67. One of the following is not included in SMART objectives? A. Objectives should be sustainable B. Objectives should be measurable C. Objectives should be Achievable D. Objectives should be Realistic
1 year ago
68. Sending a file from your personal computer primary memory or disk to another computer is called? A. Hang on B. Logging on C. Uploading D. Downloading
1 year ago
69. A communication network which is used by large organization over regional, national or global area is called A. LAN B. WAN C. MAN D. Intranet
1 year ago
70. Which of the following network device two dissimilar networks can be connected and it operate all layers of the OSI model? A. Router B. Switch C. Bridge D. Gateway
1 year ago
71. Which one is the function network device amplifies the signal it receives on one port before it transmits it on other ports? A. Switch/hub B. Router C. Bridge D. Repeater
1 year ago
72. You are the network administrator for a small company. Your company has one windows server 2003 computer configured as a domain controller and 25 clients running windows XP professional. You want to ensure that your server stays up to date through win...
1 year ago
73. What subnet mask would correspond to a CIDR notation of /24? A. 255. 255. 255.0 B. 255. 255. 255. 255 C. 255. 255.0.0 D. 255.0.0.0
1 year ago
76. You are network administrator for a medium-sized network. Your company develops applications that will be used on windows server 2003 platforms. You run a test lab that has windows 2003 on member servers within several workgroups. You hire a user name...
1 year ago
77. Which of the following is not a benefit of an upgrade to a server-based network will provide? A. Data will not secure B. The network will be able to handle more users C. Data backups will be easier to schedule and perform D. Handle complex tasks
1 year ago
78. Which of the following is not part of a Fully Qualified Domain Name? A. Host name B. CPU type C. Company name D. Type of organization
1 year ago
79. When you try to turn computer on, you notice that the computer won’t activate. The monitor is blank and the fan on the power supply is not active. Turning the switch off and then back on makes no difference. What is the most likely cause of this probl...
1 year ago

Answers

The following answers were posted by visitors named Chala.