FREE COMPUTER SCIENCE MCQs by General knowledge Solutions
FREE COMPUTER SCIENCE MCQs by General knowledge Solutions
1. 1 In Terms of _________, there are local area
networks, wide area networks, and metropolitan area networks to name a few.
A. Network Scope
2. In terms of __________, examples for a LAN would be peer-to-peer or client/server.
B. Network types
3. There is a lot of maintenance involved for each user in a __ environment.
A. peer-to-peer
4. _________ networks typically have one or more dedicated network administrators who maintain not only the server but also the client computers.
B. Client/Server
5. A server has a special _____ on it designed to provide resources to clients in a multiuser environment.
C. Network Operating System (NOS)
6. _________ allows for much greater security and explains why Windows NT, Professional, XP and Server are typically used in a business environment.
D. NTFS
7. One thing that differentiates a network operating system from a desktop operating system is the specialized ___________ that can be installed on the server to provide resources such as DNS.
B. attributes
8. A _ network is an example of centralized administration whereas a ____________ network is an example of decentralized administration.
B. client/server, peer-to-peer
9. ___________ are used primarily in a peer-to-peer environment and are designed to help users find the resources in the peer-to-peer network more easily.
C. Workgroups
10. A _________ allows you to organize your files by creating a directory structure and it also keeps track of the directories and files.
B. file system
11. Disk ____ is a way of dividing one hard disk into two more logical sections of the physical disk. C. Partitioning
12. A network _ is the physical layout of the network.
B. topography
13. A network __________ defines how the packets traverse the network, each using a set of rules to get date from point A to point B.
C. technology
14. The most common network _ in local area networks today is Ethernet.
C. technology
15. _________ are the agreed-upom rules that network devices use to communicate with each other. D. Protocols
16. When designing a network, the distance of a cable run is an issue and can result in ____ which is a loss of signal strength.
B. augumentation
17. Your network interface card also has a unique identifying number called a _ address which is burned in at the manufacturer.
B. MAC
18. A ________ server interprets name to IP address and vice versa.
C. DNS
19.A __________ server is configured with the range of available IP addresses and other information that is passed on to client computers.
D. DHCP
20. _____________ are more intelligent than ________ and can help segment traffic to alleviate collisions but they also cost more.
B. Switches/hubs
A. Network Scope
2. In terms of __________, examples for a LAN would be peer-to-peer or client/server.
B. Network types
3. There is a lot of maintenance involved for each user in a __ environment.
A. peer-to-peer
4. _________ networks typically have one or more dedicated network administrators who maintain not only the server but also the client computers.
B. Client/Server
5. A server has a special _____ on it designed to provide resources to clients in a multiuser environment.
C. Network Operating System (NOS)
6. _________ allows for much greater security and explains why Windows NT, Professional, XP and Server are typically used in a business environment.
D. NTFS
7. One thing that differentiates a network operating system from a desktop operating system is the specialized ___________ that can be installed on the server to provide resources such as DNS.
B. attributes
8. A _ network is an example of centralized administration whereas a ____________ network is an example of decentralized administration.
B. client/server, peer-to-peer
9. ___________ are used primarily in a peer-to-peer environment and are designed to help users find the resources in the peer-to-peer network more easily.
C. Workgroups
10. A _________ allows you to organize your files by creating a directory structure and it also keeps track of the directories and files.
B. file system
11. Disk ____ is a way of dividing one hard disk into two more logical sections of the physical disk. C. Partitioning
12. A network _ is the physical layout of the network.
B. topography
13. A network __________ defines how the packets traverse the network, each using a set of rules to get date from point A to point B.
C. technology
14. The most common network _ in local area networks today is Ethernet.
C. technology
15. _________ are the agreed-upom rules that network devices use to communicate with each other. D. Protocols
16. When designing a network, the distance of a cable run is an issue and can result in ____ which is a loss of signal strength.
B. augumentation
17. Your network interface card also has a unique identifying number called a _ address which is burned in at the manufacturer.
B. MAC
18. A ________ server interprets name to IP address and vice versa.
C. DNS
19.A __________ server is configured with the range of available IP addresses and other information that is passed on to client computers.
D. DHCP
20. _____________ are more intelligent than ________ and can help segment traffic to alleviate collisions but they also cost more.
B. Switches/hubs
2. 21. The ___________ of the network must be
considered before any equipment is ordered.
B. design
22. The number of computers and other network devices will determine how many hubs or switches will be needed because each device will occupy one ___________
A. port
23. The ________ on the server is often a reflection of the organizational structure.
D. directory structure
24. A _________ is simply a place where the user has access to store files but typically no one else does.
C. home directory
25. Users are _________ on a network by supplying two very important pieces of information: a username and password
A. authenticated
26. A network administrator needs to monitor the software ________ to ensure that there are enough legal copies.
C. licensing
27. Computer management is an interface, known as a(n) ____________, that contains tools to configure, manage, and monitor a computer
D. MMC
28. Event Viewer has three different logs, ___________, that keep track what is happening to the computer
B. Application, Security, and System
29. Performance Logs and Alerts contains the results of any __ you have configured using the performance monitor tool.
C. monitoring
30. A(n) ___ is a snapshot of what a computer looks like when they are typically operating under a normal load and you get one by checking for results at different times of the day.
D. baseline
31. ________ displays your disk configuration information for your hard disks, partitions, and other storage media such as ZIP drive and CD-ROM drives.
C. Disk management
32. ______ is the tool that gathers together the pieces of files stored all over your hard disks and makes it easier for your operating system to find them when needed.
A. Disk Defragmenter
33. ___________ shows you all of the services installed on your computer and their current state, which could be started, stopped or paused.
A. Services
34. A ________ interprets from name to IP address and vice versa and the ________ service dynamically allocates IP addresses and other information so the network administrator doesn’t have to manually configure each machine.
D. DNS/DHCP
35. ______________ are just a database that organizes the resources in the domain.
36. Once authentication has occurred, the network operating system next checks your ________ so it knows what resources you have access to.
C. group membership
37. When creating accounts, you should follow a predetermined ____________.
B. naming convention
38. When you first install the operating system, some accounts and groups, called __________---, will automatically be created.
D. Built-in
39. By default, the ___________ account is disabled when the operating system is installed.
B. Guest
40. The __________ account is used to configure and maintain a computer.
C. Administrator
41. The ________ account is used for any transient users.
B. Guest
B. design
22. The number of computers and other network devices will determine how many hubs or switches will be needed because each device will occupy one ___________
A. port
23. The ________ on the server is often a reflection of the organizational structure.
D. directory structure
24. A _________ is simply a place where the user has access to store files but typically no one else does.
C. home directory
25. Users are _________ on a network by supplying two very important pieces of information: a username and password
A. authenticated
26. A network administrator needs to monitor the software ________ to ensure that there are enough legal copies.
C. licensing
27. Computer management is an interface, known as a(n) ____________, that contains tools to configure, manage, and monitor a computer
D. MMC
28. Event Viewer has three different logs, ___________, that keep track what is happening to the computer
B. Application, Security, and System
29. Performance Logs and Alerts contains the results of any __ you have configured using the performance monitor tool.
C. monitoring
30. A(n) ___ is a snapshot of what a computer looks like when they are typically operating under a normal load and you get one by checking for results at different times of the day.
D. baseline
31. ________ displays your disk configuration information for your hard disks, partitions, and other storage media such as ZIP drive and CD-ROM drives.
C. Disk management
32. ______ is the tool that gathers together the pieces of files stored all over your hard disks and makes it easier for your operating system to find them when needed.
A. Disk Defragmenter
33. ___________ shows you all of the services installed on your computer and their current state, which could be started, stopped or paused.
A. Services
34. A ________ interprets from name to IP address and vice versa and the ________ service dynamically allocates IP addresses and other information so the network administrator doesn’t have to manually configure each machine.
D. DNS/DHCP
35. ______________ are just a database that organizes the resources in the domain.
36. Once authentication has occurred, the network operating system next checks your ________ so it knows what resources you have access to.
C. group membership
37. When creating accounts, you should follow a predetermined ____________.
B. naming convention
38. When you first install the operating system, some accounts and groups, called __________---, will automatically be created.
D. Built-in
39. By default, the ___________ account is disabled when the operating system is installed.
B. Guest
40. The __________ account is used to configure and maintain a computer.
C. Administrator
41. The ________ account is used for any transient users.
B. Guest
3
42.Although not required in order to create an account, it is a common security practice to assign a __________ for every account.
A. password
43. Requiring that passwords have mixed characters including uppercase and lowercase is referred to as ____________.
C. complexity
44. Password _______________ is when the network operating system keeps track of the previous passwords used.
A. History
45. Password _____________ is the amount of time that must pass before a user can change their password.
C. Minimun age
42.Although not required in order to create an account, it is a common security practice to assign a __________ for every account.
A. password
43. Requiring that passwords have mixed characters including uppercase and lowercase is referred to as ____________.
C. complexity
44. Password _______________ is when the network operating system keeps track of the previous passwords used.
A. History
45. Password _____________ is the amount of time that must pass before a user can change their password.
C. Minimun age
46 .Password _________________ is when the user
is forced to change their password.
B. Maximum age
47. You should configure the ________________ option to limit the chances a hacker has to figure out a password.
D. Account lockout
B. Maximum age
47. You should configure the ________________ option to limit the chances a hacker has to figure out a password.
D. Account lockout

No comments