Nocti Book Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Nocti Book Review | * |
| In order to avoid electronic discharge, a technician should | B. wear a wrist strap when working on the computer |
| A 32 bit processor can access ____ of RAM. | C. 16 GB |
| The wireless Bluetooth radio frequency standard connects up to ___devices in 10 meter radius. | B. 8 |
| What is the term for the essential program in a computer that maintains disk files, runs applications, and handles devices? | C. Operating system |
| Every NIC (Network Interface Controller) has a unique | B. MAC Address |
| A network that uses a public telecommunication infrastructure to provide remote users with secure access to their organization's network is known as a | C. Virtual Private Network |
| Which of the following is connected to the PC by the NIC? | A. Network |
| Of the following, the media that lightening is least likely to have an adverse effect on is | D. Fiber optic |
| To connect Cat-6 cable to a wall mounted network port, a ________connector is necessary. | D. RJ-45 |
| A signal losing strength over a given distance is known as | A. attenuation |
| In the OSI model, Layer 3 is the _________layer. | C. network |
| In the OSI model, the layer that establishes, manages, and terminates connections between applications is the ______ layer. | D. Session |
| The 568A and 568B standards were established by | D. EIA/TIA |
| The Department of Defense (DoD) networking model is a ______ layer model. | B. four |
| Which of the following layers of the OSI Model provides the electrical and mechanical transmission of data? | A. physical |
| The netsta command can be used to display routing tables and | D. active connections |
| What type of cable should a technician chose when connecting a switch to another switch? | A. crossover |
| Switches an the forwarding decisions use MAC addresses to make decisions and operate at | B. OSI Layer-2 |
| IP, Appletalk, and ______are routed protocols. | C. IPX |
| The process of packaging and transferring data from one computer to another is known as | A. encapsulation |
| A Linux installation will require at least _____ of RAM. | A. 8 MB |
| Two devices transmitting on a shared medium at the same time is known as | c. Collision |
| The encapsulation process is best described as data, segments, packets, frames, and | A. bits |
| In network architecture, FDDI stand for | C. Fiber Distribution Data Interface |
| Examples of LAN topology include bus, star and | A. tree |
| The pattern or the layout of the nodes on a network is the | B. physical topology |
| Which of the following is described as the physical arrangement of network nodes and media within a network structure? | C. topology |
| Which of the following LAN topologies has each network host connected to a central hub and connects each node to the hub with a point to point connection? | B. star |
| What is the network address class for 193.27.3.4? | C. Class C |
| What portion of the Class A address 126.45.3.7 is the network address? | A. 126 |
| A router using RIP updates the routing table every | B. 30 seconds |
| The components of an IP address are network address and | D. host address |
| A system or group of systems that enforces an access control policy between two networks is known as a | A. firewall |
| Which of the following is the most secure password? | B. R#$34wb*e |
| Which of the following prevents, detects, and removes viruses, worms, and Trojan horses? | C. virus protection |
| According to EIA/TIA 568 standard, each floor in a building that will be connected to the network must have a minimum of _____ telecommunications room(s). | A. one |
| The two major categories of virtual machines are process and _______virtual machines. | D. system |
Created by:
sokira95