Filters
Question type

Study Flashcards

What type of chips limit the number of instructions the CPU can execute to increase processing speed?


A) DISC
B) RISC
C) DDIC
D) CPUD

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Simple Mail Transfer Protocol (SMTP) is a standard used for electronic mail transmission.

A) True
B) False

Correct Answer

verifed

verified

What is a router?


A) Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer
B) Hardware to perform traffic control in the distribution of the network signals (requests and transmissions) . A router is the name given for a switch that is used for Internet traffic
C) The geometric arrangement of the actual physical organisation of the computers and other network devices in a network
D) A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

____________ is the set of instructions that the hardware executes to carry out specific tasks.

Correct Answer

verifed

verified

What is similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time?


A) Tablet
B) PDA
C) Workstation
D) Minicomputer

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

___________ is the number of billions of CPU cycles per second.

Correct Answer

verifed

verified

List and describe the four components that differentiate networks.

Correct Answer

verifed

verified

Networks are differentiated by the follo...

View Answer

Architecture,the design of the computer network(that is,the computers and their functional organisation and configuration) is based on what model?


A) ODI
B) OSI
C) PSI
D) CSS .

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Which of the following represents the ring topology?


A) All devices are connected to a central cable or backbone.
B) All devices are connected to a central device, called a hub.
C) All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it.
D) Groups of star-configured workstations are connected to a linear bus backbone cable.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Describe TCP/IP along with its primary purpose.

Correct Answer

verifed

verified

Transmission Control Protocol/Internet P...

View Answer

What is the collection of wires through which data is transmitted from one part of a computer to another?


A) Data conduit
B) Data pathway
C) Data bus
D) Data map

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following is not a commonly used type of guided media?


A) Twisted-pair cable
B) Coaxial cable
C) Fibre-optic cable
D) Transmission control protocol/internet protocol

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What provides the tools for data retrieval,modification,deletion and insertion?


A) Data management
B) Desktop publishing
C) Email
D) Groupware

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

What is a peer-to-peer network?


A) Enables the transmission of data over public or private networks
B) A communications, data exchange and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
C) A computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralised server
D) A computer that is designed to request information from a server

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Describe the six major categories of hardware and provide an example of each.

Correct Answer

verifed

verified

Central processing unit (CPU)-the actual...

View Answer

Network security is required to protect the data contained on the computers connected to the network as the data are valuable corporate resources.Why would organisations have to consider the ethical aspects of network security as well?

Correct Answer

verifed

verified

Network security is required to protect ...

View Answer

A _____________ device is equipment used to send information and receive it from one location to another.

Correct Answer

verifed

verified

Architecture,the design of the computer network(that is,the computers and their functional organisation and configuration) is based on what model?


A) ODI
B) OSI
C) PSI
D) CSS .

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following represents the bus topology?


A) All devices are connected to a central cable or backbone.
B) All devices are connected to a central device, called a hub.
C) All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it.
D) Groups of star-configured workstations are connected to a linear bus backbone cable.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

File Transfer Protocol is a standard used to transfer computer files from one computer to another over a bi-directional network.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 76

Related Exams

Show Answer