Computer Questions For IBPS IT Specialist Officer .

1. Which of the following is NOT an advantage of using networks compared to a stand-alone computer?
A. ease of maintenance and administration
B. enhanced resource sharing
C. increased productivity
D. increased communication capabilities
Answer: A

2. ____________ networks may experience significant slowdowns if more than ten (10) users are on the network.
A. Wide area
B. Peer-to-peer
C. Server-based
D. Metropolitan area
Answer: B

3. All of the following statements are DISADVANTAGES of peer-to-peer networks EXCEPT:
A. P2P networks do not require servers.
B. security cannot be implemented centrally on P2P networks.
C. each computer must be updated individually in P2P networks.
D. P2P networks are decentralized and not easily scalable.
Answer: A

4. Individual users must take responsibility for data backups and security on a peer-to-peer network because this kind of network is considered:
A. scalable.
B. centralized.
C. decentralized.
D. dedicated.
Answer: C

5. The ability to easily add additional users means that a network is:
A. scalable.
B. dedicated.
C. decentralized.
D. secure.
Answer: A

6. In a client/server network, all clients are connected to a server that performs tasks for them, such as backup and security; therefore, it is known as a ____________ network.
A. local area
B. dedicated
C. decentralized
D. centralized
Answer: D

7. A(n) ____________ is a small group of computers and peripherals linked together in a small geographic area.
Answer: A

8. The Internet is most accurately categorized as a:
Answer: C

9. PANs are used to connect ____________ devices (such as Bluetooth-enabled devices) in close proximity to each other.
A. peripheral
B. wireless
C. dedicated
D. client
Answer: B

10. A(n) ____________ is a private corporate network, used exclusively by company employees.
A. Internet
B. local area network
C. peer-to-peer
D. intranet
Answer: D

11. ____________ is specialized software that runs on a server computer to control network functionality.
A. NOS software
B. NCP software
C. TCP software
D. MAC software
Answer: A

12. The layout and structure of the network is known as the network’s:
B. topology.
C. components.
D. protocol.
Answer: B

13. Cable and wireless communication technologies are types of:
A. network adapters.
B. topologies.
C. transmission media.
D. network operating systems.
Answer: C

14. Network navigation devices include all of the following EXCEPT:
A. servers.
B. routers.
C. switches.
D. hubs.
Answer: A

15. ____________ servers store and manage files for network users.
A. File
B. Web
C. Authentication
D. Main
Answer: A

16. A(n) ____________ server keeps track of users logging onto the network and the services available to the users.
A. file
B. authentication
C. Web
D. e-mail
Answer: B

17. ____________ servers are used to fulfill one specific function, such as handling e-mail.
A. Dedicated
B. Network
C. Protocol
D. Peer-to-peer
Answer: A

18. ____________ servers are used to manage all client-requested printing jobs for all printers.
A. Database
B. Network
C. Print
D. E-mail
Answer: C

19. A(n) ____________ server, on a network, delivers the software to the clients because the software does not reside on the client computers.
A. Web
B. application
C. communications
D. database
Answer: B

20. The ____________ server, on a network, is the single point of contact with the outside world and is often the only device connected to the Internet.
A. intranet
B. database
C. application
D. communications
Answer: D

21. In a(n) ____________ topology, all computers are connected in sequence, using a single cable.
A. bus
B. star
C. hybrid
D. ring
Answer: A

22. In a bus topology, a ____________, located at each end of the network, absorbs the signal to prevent it from being reflected back onto the cable.
A. node
B. terminator
C. packet
D. network device
Answer: B

23. In a bus topology, the nodes do nothing to move the data along the network, making it a(n) ____________ topology.
A. client/server
B. active
C. passive
D. terminated
Answer: C

24. Active topologies differ from passive topologies in that nodes on the active topology network:
A. help pass the data along the network.
B. listen for signals on the line before transmitting.
C. ultimately send their messages to a terminator.
D. actively search for packets intended for themselves.
Answer: A

25. When two computers send data at the same time on a bus network it is called a(n):
A. access method.
B. data collision.
C. active topology.
D. data termination.
Answer: B

26. In a ring topology, the computer in possession of the ____________can transmit data.
A. packet
B. data
C. access method
D. token
Answer: D Reference: Ring Topology Difficulty: Moderate
27. Because each node on the network is responsible for retransmitting the token and the data to the next node, the ____________ topology is considered an active topology.
A. ring
B. bus
C. star
D. hybrid
Answer: A

28. Which of the following statements about ring topology networks is TRUE?
A. A ring topology network is plagued with data collisions.
B. A ring topology network uses the CSMA/CD access method to transmit data.
C. A ring topology network allows only one node to transmit data at a time.
D. A ring topology network is considered passive.
Answer: C

29. In the star topology, the central point of failure is the:
A. client.
B. switch.
C. terminator.
D. access point.
Answer: B

30. Which of the following statements, concerning star topology networks, is FALSE?
A. Star topology networks use the CSMA/CD access method.
B. If one computer fails, it does not affect the rest of the network.
C. There are no data collisions on a star topology network.
D. If the switch fails, the network no longer functions.
Answer: C

31. When a collision occurs on an Ethernet network, the node that detects the collision sends a(n):
A. token.
B. packet.
C. jam signal.
D. warning.
Answer: C

32. On an Ethernet network, after a collision occurs between two computers and a jam signal is sent, what happens next?
A. The signals are encrypted to avoid a second collision.
B. A token is resent by the two computers that caused the collision.
C. The two computers wait random amounts of time, and then resend their signals.
D. The switch notifies the network of the collision.
Answer: C

33. Which of the following statements is FALSE concerning bandwidth?
A. Bandwidth defines the speed at which the data flows on the network.
B. Cable is rated by the maximum amount of bandwidth it supports.
C. Bandwidth is the amount of data transmitted across the transmission medium in a certain amount of time.
D. Bandwidth is measured in bits per second (bps).
Answer: A

34. ____________ defines whether the transmission media uses electrical impulses or pulses of light to transmit data.
A. Bandwidth
B. Susceptibility to interference
C. Signal transmission method
D. Access method
Answer: C

35. EMI and RFI are types of:
A. signal interference.
B. bandwidth measurements.
C. twisted pair cable.
D. wireless transmission media.
Answer: A

36. All of the following statements concerning twisted pair cable are true EXCEPT:
A. Twisted pair uses pulses of light to send data.
B. The number of twists in twisted pair is significant because it makes the wires less susceptible to interference.
C. UTP is not recommended in areas with significant sources of interference.
D. The two most common types of UTP in use today are Cat 5e and Cat 6.
Answer: A

37. UTP and STP are examples of:
A. CATV cable.
B. thicknet coaxial cable.
C. fiber-optic cable.
D. twisted pair cable.
Answer: D

38. The core of a coaxial cable is usually made from:
A. magnesium oxide.
B. copper.
C. silicon.
D. glass fibers.
Answer: B

39. All of the following statements regarding fiber-optic cable are true EXCEPT:
A. the core of fiber-optic cable is composed of copper.
B. fiber-optic cable uses pulses of light to transmit data.
C. data passes through fiber-optic cable in one direction only.
D. the outer jacket of fiber-optic cables is often made of Kevlar.
Answer: A

40. The wired medium least susceptible to signal interference is:
A. STP cable.
B. coaxial cable.
C. fiber-optic cable.
D. UTP cable.
Answer: C

41. ____________ wireless devices have largely been replaced with faster technology.
A. 802.11b
B. 802.11g
C. 802.11n
D. 802.11a
Answer: A

42. All of the following protocols are proprietary EXCEPT:
Answer: A

43. The major network operating systems for installation on the server, in a client/server environment, include all of the following EXCEPT:
A. Windows Server 2003.
C. Windows XP.
D. Novell NetWare.
Answer: C

44. The OSI model is divided into ____________ processes called layers.
A. five
B. six
C. seven
D. eight
Answer: C

45. In the OSI model, the ____________ layer handles data encryption and compression.
A. application
B. presentation
C. data link
D. session
Answer: B

46. In the OSI model, the ____________ layer is responsible for assembling the data packets into frames.
A. session
B. transport
C. data link
D. network
Answer: C

47. The device that acts as an interface to connect with and communicate on a network is known as the:
A. network adapter.
B. hub.
C. repeater.
D. switch.
Answer: A

48. Which of the following statements concerning MAC addresses is TRUE?
A. A MAC address is used to externally identify a computer on a network.
B. The MAC address and the IP address can be used interchangeably.
C. A MAC address must match the IP address.
D. The first three numbers in the address identify the manufacturer.
Answer: D

49. If a network requires a cable to connect two devices farther apart than the normal maximum run length of the media, the way to prevent signal degradation is to install a(n):
A. adapter.
B. repeater.
C. bridge.
D. switch.
Answer: B

50. Another name for a “smart” hub is a:
A. bridge.
B. repeater.
C. firewall.
D. switch.
Answer: D