Вы находитесь на странице: 1из 2

COMPLETE NAME: _____________________________ DATE: ______________

SECTION: ______________

WRITTEN EXAM (75 pts. all-in-all): STRICTLY NO “ERASURES”, WRONG SPELLING IS WRONG.

I. DEFINITION OF TERMS (Complete and Correct Spelling)


1.CMOS- 6. SSID- 11. DDR-

2.BIOS- 7. LAN- 12. DHCP-

3.AGP- 8. WIFI- 13. DNS-

4.PCIE- 9. MODEM- 14. TCP/IP-

5.DIMM- 10. ADDS- 15. MBR-

II. MATCHING TYPE: Choose The Correct Answer From The LETTERS on the Boxes
16. A Logical Numeric address that is assigned to every single computer, printer, or any other device that is
a part of a TCP/IP-Based Network
17. A Separate and identifiable portion of an organization’s network, typically arranged by floor, building or
geographical location
18. A 32-bit number used to differentiate the network component of an IP Address by dividing the IP
Address into a Network address and Host Address
19. A Type of DATA which is stored in individual bits which have a value of either 1 or 0
20. A Type of DATA that Refers to information being presented continuously (Ex. Clock)
21. A Type of cable that consists of 2 independently insulated wires twisted around one another
22. A Technology that uses glass / plastic threads to transmit data; thinner and lighter than metal wires
23. The Amount of DATA that can be transmitted in a fixed amount of Time
24. A device that forwards data packets across an internetwork toward their destinations, through a
process known ROUTING.
25. A group of wireless devices that connect to access points within a specified area. Access points are
typically connected to the network using copper cabling.
26. A type of OS that are designed to more efficiently handle corporate networking, internet / intranet
hosting, databases etc.
27. It is part of the Server Control Pane where you can view the Computer Name, Workgroup etc. much
like the Computer Properties of an Ordinary Operating System.
28. The Brain of the Server. It is a database that keeps track huge amount of information in a centralize
way to manage all network machines, users and resources.
29. The Machine that Runs the Active Directory Services, “The Boss of the Network”
30. A Logical Group of computer that share a central directory database.
31. A Collection of one or more domains & domain trees in a contiguous namespace.
32. Are container objects; used to arrange other objects in a manner that supports administrative purposes.
By arrangement, it makes it easier to be located and managed.
33. ___ A type of security policy that is specifically applied to a given domain. It is used to set security
protocols for a part of a network (Passwords, access levels etc...)
34. A set of software programs that, when they are installed and properly configured, lets a computer
perform a specific function for multiple users or other computers within a network.
35. A server role that allows administrator to manage and store information about resources from a
network. As well as application data, in a distributed database.

“INSPIRATION Can Only Be Borrowed From OTHERS. PERMANENT inspiration requires PERSEVERANCE”
Prepared by: Harrish Padilla, ICT Coordinator, LIS Coordinator, CSS & Animation Trainer
A. IP ADDRESS B. WINDOWS SERVER C. TWISTED PAIR D. FOREST

E. SUBNET F. LOCAL SERVER G. FIBER OPTICS H. ORGANIZATIONAL UNIT

I. SUBNET MASK J. ACTIVE DIRECTORY K. BANDWIDTH L. DOMAIN POLICY

M. DIGITAL DATA N. DOMAIN CONTROLLER O. ROUTER P. ROLES

Q. ANALOG DATA R. DOMAIN S. WLAN T. ADDS

III. IDENTIFICATION: Provide the Correct Answer for Each Number


36. A system for naming computers and network services that is organized into a hierarchy of domains.
37. Standardized network protocol used on Internet Protocol (IP) networks. Controlled by a _____ server
that dynamically distributes network configuration parameters, such as IP addresses, for interfaces and
services.
38. It is the consecutive range of possible IP addresses that the DHCP server can lease to clients on a
subnet.
39. It is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active
Directory to implement specific configurations (Policy) for users and computers.
40. A ROLE which Enables users and administrators to redirect the path of a known folder to a new
location, manually or by using Group Policy. The new location can be a folder on the local computer or
a directory on a file share.
41. A ROLE which redirects user profiles to a file share so that users receive the same operating system
and application settings on multiple computers.
42. A ROLE BASED INSTALLATION (SERVICE) used to enable Printers and Printing Capabilities for the
Server to its clients
43. A ROLE BASED INSTALLATION (SERVICE) which allows a user to take control of a remote
computer or virtual machine over a network connection.
44. It has a full control of the domain. It can assign user rights and access control permissions to domain
users as necessary. The first account that is created when you set up a new domain.
45. A TYPE OF USER available when applying permissions directly to an object can be placed in Local
Computer Groups. It cannot be added as a member to another user created domain groups.
46. “Every Device is a Server or a Client”
47. The Equivalent of 8 Bits = ____________
48. A Type of Cables Used to Connect Two (2) Dissimilar Devices Together
49. The Total Value of the Subnet Mask of Class C: __________________
50. The Total Number of Bits of IPV4: ___________
51. A set of computers connected together for the purpose of sharing resources.
52. A global computer network providing a variety of information and communication facilities, consisting of
interconnected networks using standardized communication protocols.
53. A typical Default IP Address which is commonly used in Routing: ______________
54. A Type of Cables Used to Connect Two (2) Similar Devices Together
55. The practice of distributing or providing access to digital media, such as computer
programs, multimedia (audio, images and video), documents or electronic books.

IV. ENUMERATION: Give what is ASKED ONLY (No Extra Answers irrelevant to the TOPIC. Use the back
portion of this paper for your answers.)
56. -57. Types of Server Installation
58. -60. Active Directory Manages the Following:
61. -63. 3 Methods of Allocating IP Addresses to a Computer
64. -65. Folder/s that can be REDIRECTED Using the GPO
66. -69. Important PINS & COLORS in the Wiring of a Good T-568-B LAN Cable (Correct PIN & Color)
70. -73. Commonly Used Network Devices (Especially in CSS NC II Assessment Proper)
74. -75. 2 Commonly Type of Physical Network Topology

“INSPIRATION Can Only Be Borrowed From OTHERS. PERMANENT inspiration requires PERSEVERANCE”
Prepared by: Harrish Padilla, ICT Coordinator, LIS Coordinator, CSS & Animation Trainer

Вам также может понравиться