Practice Question and Answer
8 5 Q:
61b8b58327b9dc0335ba395a 5 Q:
61b8b4f43dcf35035ce19aca 5 Q:
61b8b485b700dd1b9f6cf8fb 5 Q:
61b8b3f327b9dc0335ba36f3 5 Q:
61b8b36a3dcf35035ce19a79 5 Q:
61b8b305a9d1da035de4f39a 5 Q:
61b8b28ea9d1da035de4f2e8 5 Q:
61b8b21f3dcf35035ce19826
Q: Computer can transmit data in the position of _____ in ring topology.
975 061b8b58327b9dc0335ba395a
61b8b58327b9dc0335ba395a- 1Packetfalse
- 2Datafalse
- 3Access Methodfalse
- 4Tokentrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Token"
Q: All of the following are mobile computing devices except
942 061b8b4f43dcf35035ce19aca
61b8b4f43dcf35035ce19aca- 1Notebook Computerfalse
- 2Cellular Phonefalse
- 3Digital Scannertrue
- 4Personal Digital Assistantfalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Digital Scanner"
Q: _______ are specially designed computer chips that reside within other designs, such as your car or electronic thermostat.
882 061b8b485b700dd1b9f6cf8fb
61b8b485b700dd1b9f6cf8fb- 1Serverfalse
- 2Embedded Computerstrue
- 3Robotic Computersfalse
- 4Mainframefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Embedded Computers"
Q: System software is a set of programs that enable computer hardware devices and software to work together.
990 061b8b3f327b9dc0335ba36f3
61b8b3f327b9dc0335ba36f3- 1Managementfalse
- 2Processingfalse
- 3Utilityfalse
- 4Applicationstrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Applications"
Q: What is called the OSI model layer is divided into ____________ processes.
893 061b8b36a3dcf35035ce19a79
61b8b36a3dcf35035ce19a79- 1Fivefalse
- 2Sixfalse
- 3Seventrue
- 4Eightfalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Seven"
Q: ______ terminals (earlier called cash registers) are often associated with complex inventory and sales computer systems.
884 061b8b305a9d1da035de4f39a
61b8b305a9d1da035de4f39a- 1Datatrue
- 2Salesfalse
- 3Queryfalse
- 4Point of Salesfalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Data"
Q: All of the following are examples of real security and privacy risk except _____.
1003 061b8b28ea9d1da035de4f2e8
61b8b28ea9d1da035de4f2e8- 1Hackersfalse
- 2Spamfalse
- 3Virusfalse
- 4Identity Theftfalse
- 5None of thesetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 5. "None of these"
Q: ________ servers store and manage files for network users.
939 061b8b21f3dcf35035ce19826
61b8b21f3dcf35035ce19826- 1Authenticationfalse
- 2Mainfalse
- 3webfalse
- 4Filetrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "File"
en481311450

