Practice Question and Answer

Q:

Computer can transmit data in the position of _____ in ring topology.

975 0

  • 1
    Packet
    Correct
    Wrong
  • 2
    Data
    Correct
    Wrong
  • 3
    Access Method
    Correct
    Wrong
  • 4
    Token
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Token"

Q:

All of the following are mobile computing devices except

942 0

  • 1
    Notebook Computer
    Correct
    Wrong
  • 2
    Cellular Phone
    Correct
    Wrong
  • 3
    Digital Scanner
    Correct
    Wrong
  • 4
    Personal Digital Assistant
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Digital Scanner"

Q:

_______ are specially designed computer chips that reside within other designs, such as your car or electronic thermostat.

882 0

  • 1
    Server
    Correct
    Wrong
  • 2
    Embedded Computers
    Correct
    Wrong
  • 3
    Robotic Computers
    Correct
    Wrong
  • 4
    Mainframe
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Embedded Computers"

Q:

System software is a set of programs that enable computer hardware devices and software to work together.

990 0

  • 1
    Management
    Correct
    Wrong
  • 2
    Processing
    Correct
    Wrong
  • 3
    Utility
    Correct
    Wrong
  • 4
    Applications
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Applications"

Q:

What is called the OSI model layer is divided into ____________ processes.

893 0

  • 1
    Five
    Correct
    Wrong
  • 2
    Six
    Correct
    Wrong
  • 3
    Seven
    Correct
    Wrong
  • 4
    Eight
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Seven"

Q:

______ terminals (earlier called cash registers) are often associated with complex inventory and sales computer systems.

884 0

  • 1
    Data
    Correct
    Wrong
  • 2
    Sales
    Correct
    Wrong
  • 3
    Query
    Correct
    Wrong
  • 4
    Point of Sales
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Data"

Q:

All of the following are examples of real security and privacy risk except _____.

1003 0

  • 1
    Hackers
    Correct
    Wrong
  • 2
    Spam
    Correct
    Wrong
  • 3
    Virus
    Correct
    Wrong
  • 4
    Identity Theft
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 5. "None of these"

Q:

________ servers store and manage files for network users.

939 0

  • 1
    Authentication
    Correct
    Wrong
  • 2
    Main
    Correct
    Wrong
  • 3
    web
    Correct
    Wrong
  • 4
    File
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "File"

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully