Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
MCQ.docx
Скачиваний:
16
Добавлен:
25.02.2016
Размер:
131.49 Кб
Скачать

Identify the type of email attachment so a suitable program can be used to open the attachmen

159.

Which of the following can be used to specify that the XML for the contact details of a person can contain an email address XML element, but the email address XML element cannot contain the superset representing the contact details of a person?

Document Type Definition (DTD)

160.

A drive letter (E.g., “E:”) can be assigned to a network shared folder using:

Drive mapping

161.

An IPv4 address is a set of four numbers between 0 and

255

162.

The type of connector typically used for Unshielded Twisted Pair and Shielded Twisted Pair is

RJ45

163.

Which of the following does not typically require the use of a network user account?

Save a file on the local workstation

164.

Which type of software is used to automate the routing of documents?

Workflow software

165.

Which of the following is not a local resource?

Printer connected to a print server

166.

Which of the following types of characters is usually invalid for passwords?

Spaces

167.

Which of the following would you use to setup a network printer on the workstation?

Add Printer Wizard

168.

Which of the following is more susceptible to electrical and radio frequency interference?

Unshielded Twisted Pair

169.

Which of the following statements is false?

Email servers cannot communicate with other email servers

170.

Which of the following are valid examples of client-server systems on the Internet?

  1. Reading messages on a newsgroup application

  2. Reading and sending email messages through an email application

  3. Receiving Web pages through a browser application

171.

Which of the following statements is true?

Java applets can be used to act as thick clients

172.

A network that operates without a central server is called a:

Peer-to-peer network

173.

Client software that performs a substantial portion of work is referred to as:

Thick client

174.

Rules used by devices to encode and decode data are referred to as

Protocols

175.

Which of the following is suitable for fast Ethernet connections?

Category 5 UTP

176.

Which of the following describes one-way communication?

Simplex communication

177.

Which of the following is a characteristic of bus networks?

Devices are connected to a central cable

178.

Which of the following cables is unsuitable for data transmission?

Category 1 UTP

179.

When two devices communicate, they must agree on protocols for

  1. starting and ending a transmission

  2. recognizing transmission errors

  3. determining the rate of data transmission

180.

Which of the following is not a LAN protocol?

X25

181.

Which of the following types of network connection services use strictly digital transfers of data? I. ISDN II. T1 III. Cable modem

182.

Which of the following is not determined by communication protocols?

User accounts

183.

The rate at which data is transmitted is referred to as

Throughput

184.

Which of the following statements about digital signals is false?

Digital signals require more complex circuitry

185.

The height of electromagnetic signal waves is referred to as

Amplitude

186.

For situations where extremely high bandwidth is required, _____ cable is the best solution.

fiber-optic

187.

Which of the following utilities can be used to find all hops between two hosts on a network?

TRACERT

188.

Which of the following statements is false?

DNS services are used to assign IP addresses

189.

What is the name of the Internet protocol used to make sure messages are reliably transmitted and received by the destination computer?

TCP

190.

The length of an Ethernet address is

48 bits

191.

Which of the following is a possible cause of data loss during routing?

The data is routed across multiple hops and the queue on one of the routers is full

192.

The link speed of an OC-3 connection is:

155Mbps

193.

The link speed of a T3 line is

45Mbps

194.

If a URL begins with the protocol HTTPS, then

  1. information transmitted, such as credit card numbers, will be encrypted

  2. a secure version of HTTP is being used

195.

Which of the following statements is false about the Internet backbone?

The Internet backbone connects Internet users to each other directly

196.

What is the protocol used to transfer Web pages?

 http

197.

A dynamic IP address:

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]