Вы находитесь на странице: 1из 9

1. A desktop computer with a modem is an example of a DCE because it prepares data to be transmitted.

A) True B) False

2. Many UNIX/Linux operating systems, including Red Hat Enterprise Linux, now run Mozilla as the Web browser and use Ximian Evolution for e-mail. A) True B) False

3. In token ring networks, when the token is captured by a station, no other station can transmit until the station that has the token is finished. A) True B) False

4. NetBEUI was introduced in the early nineties as the main protocol for LAN Manager, a network server operating system developed by Microsoft and IBM. A) True B) False

5. Access to directories and files on a UNIX/Linux server is also governed through user accounts, groups, and access permissions. A) True B) False

6.

_____ communication uses fairly accurate clocks (timers) at both ends of the connection to synchronize data. A) Asynchronous B) Synchronous

7. In the AT command set, the _____ command sets the modem to defaults. A) W B) H C) Z

8. The connection speeds through a satellite network are currently up to about _____ for download speeds and up to 50 Kbps for uploading data A) 256 Kbps B) 500 Kbps C) 1 Mbps

9. _____ satellite technology is working to offer up to 720 Kbps downlink communications and up to 128 Kbps uplink communications. A) GEO B) REO C) LEO

10. In the initialization string AT&F&C1&D2E0V0Q1S0=2&W, the _____ component instructs the modem to send numeric, as opposed to verbal, error and progress messages. A) AT B) EO

C) VO

11. A _____ is a computer that has a central processing unit (CPU) and can run applications locally or obtain applications and files from another computer on the network. A) client B) workstation C) terminal

12. A _____ coordinates network activities and enables client workstations to access shared network resources such as printers, files, or software. A) network computing system B) server operating system C) client operating system

13. Starting Word XP when a user clicks a document with a .doc extension is an example of a Windows Server 2003 feature known as _____. A) assigning applications B) retrieving applications C) application publishing

14. _____ networking enables basic PCs or workstations to share resources, such as files, with other computers. A) Workgroup B) Peer-to-peer C) Server-based

15. Category _____ is the most common form of twisted pair cabling used in LANs. A) 3 B) 4e C) 5e

16. The _____ enables network services to be associated with specific computer names. A) AppleTalk Data Stream Protocol B) Name-Binding Protocol

17. In _____, a mapped drive is called a mounted volume. A) Linux B) Mac OS X C) Both a and b

18. The Windows 2000 Server/Windows Server 2003 _____ permission allows a user to view file contents, view folder attributes and permissions, but prevents traversing folders or executing files. A) Browse B) Read C) Write

19. The _____ Web sharing application permission enables clients to execute programs and scripts via an Internet or intranet connection A) Execute B) Scripts

20. In UNIX/Linux, the UID can be a number as large as _____. A) 60,000 B) 30,000

21. The UNIX/Linux _____ useradd command parameter specifies the users home directory location. A) -c B) -d C) -m

22. In UNIX/Linux, the _____ permission has a value of 6. A) read and write B) write C) read

23. When a client mounts an NFS volume on a host, both the client and host use _____. A) remote procedure calls B) redundant procedure calls C) required process calls

24. When using NFS in Red Hat Enterprise Linux 3.0, the _____ service enables the Linux kernel to manage specific requests from a client. A) portmap B) rpc.mountd

C) rpc.nfsd

25. The _____ UNIX/Linux directory is used for system and configuration files. A) etc B) sbin C) bin

26. The UNIX/Linux _____ option displays files in an unsorted list A) -t B) -s C) -f

27. The UNIX/Linux _____ option displays files on the basis of the time they were last modified. A) -u B) -r C) -s

28. The _____ NDIR command is used to sort files on the basis of size A) /SORT B) /SORT SI

29. A(n) _____ backup is a type of partial backup. A) differential

B) incremental C) sequential D) Both a and b

30. In UNIX/Linux, the _____ utility requires that you provide specifics about the length and density of the information to be backed up. A) dump B) volcopy C) backup

31. The advantage of ___________________________ flow control is that in serial communications, the serial cable requires fewer wires inside the cable. A) Xon-Xoff B) Xon

32. Most modems use the ITUs ___________________________ standard to provide error checking. A) V.42 B) WAN

33. An example of a simple ___________________________ is using a modem and telephone line at your computer to dial into your Internet service provider, which connects you to other computers worldwide. A) WAN B) Groups C) Terminal

34. An effective way to manage the rights granted to accounts is by creating ___________________________ that need the same kinds of access. A) WAN B) groups C) Protocols

35. A close relative of e-mail is ___________________________, which consists of thousands of servers connected to the Internet conducting business, such as taking and fulfilling product orders. A) e-commerce B) root C) groups

36. Microsoft ___________________________ Services enable users to log onto a Windows 2000/2003 server and run applications on the server. A) Terminal B) Disk Striping C) WAN

37. ___________________________ is a technique for spreading data over multiple disk volumes. A) Groups B) Disk Striping C) WAN

38.

An easy way to tune the operating system is to periodically check which ___________________________ are configured, and eliminate those that are no longer used. A) Root B) Protocols C) Xon

39. Operating system directories are typically placed in the ___________________________ directory and have appropriate subdirectories under a main directory. A) root B) disk C) groups

40. The hardware or software portion of a modem that is responsible for converting digital data into analog signals for transmission over a telephone line is known as: A) Data pump B) stop bit C) LAPM

Вам также может понравиться