20 questions
What is the primary goal of an operating system?
to connect to internet
to browse websites
to use hardware in an efficient manner.
to run application
Which of the following is the primary function of an Operating System Function?
Resource Management
Task Management
File management
Application management
Which of the following is a computer program or a device that provides functionality for other programs or devices, called "clients"?
Control panel
Device driver
Operating system
Server
Which of the following is a server usage advantage?
All files are stored in a central location
Specialist staff such as a network manager is needed
Users cannot access shared data which is centrally controlled
A specialist network operating system is needed
Which of the following is the latest storage media?
Cloud
RAID
CD
Disk
Which of the following is a Database application?
Microsoft PowerPoint
Microsoft Access
Microsoft Word
Microsoft Excel
Which one of the following is a company that delivers applications - software - through the Internet and charges a monthly fee?
Microsoft
ISP
ASP
SPI
What does an internet hosting service provides?
online storage services, email
email, database
online storage services, server
email, internet access
Which one of the following is an assembled group of data that allows easy and efficient storage, retrieval and modification of data?
Memory
BIOS settings
Server
Database
Which one of the following is a network node connecting two networks that use different protocols?
Host
hub
Gateway
router
What do we use to protect the Network Data can be protected during transmission, so that if the data was accessed by intruder a key will be required to decipher the message?
Encryption
Adding a security layer/Header
data-leakage prevention
software
hiding information
What does LAN stand for?
Local Application Network
location Area Node
Limited Area Network
Local Area Network
Which of the following device helps you to connect your network to the internet while hiding your local IP?
Bridge
Modem
Router
Repeater
Which of these constrains we can overcome by changing the network topology from full mesh to ring topology?
time constrains
cost constrains
manpower constrains
location constrains
Which ones of the following are considered as factors when determining system requirements when you are implementing a system?
Environment / user
Environment/ geography
Weather/ geography
Health/ safety
Which one of the following is an example network protocol used during data transfer for Data Encryption?
Diameter Protocols
AAA framework
TCP/IP protocol
Transition protocols
Which one of the following is a critical disadvantage of using mobile devices?
Always connected
Difficult to carry along
Possibility of Privacy and security Leak
Constant calls
In which of the security levels of the internet options, the IE browser will prompt you before downloading potentially unsafe contents?
High
Medium-High
Medium
Low
Which of the following is a standard security technology used for establishing an encrypted link between a server and a client? —typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook)?
SSL (Secure Sockets Layer)
Mac OS
Real Time OS
Window XP
How can we add trusted sites?
Firewall
Router settings
Browser
We can not