Question 1
Question
A Local Area Network (LAN) is...
Answer
-
confined to one site such as an office or a school campus. - connected using equipment owned by the organisation. - maintained by the organisation (or it maybe be outsourced).
-
confined to one or more sites such as an office or a school campus. - connected using equipment. - maintained by the organisation.
-
confined to one site such as an office or a school campus. - connected using equipment owned by the organisation. - maintained by one person, usually an IT manager.
Question 2
Question
Wide Area Network's (WAN)...
Answer
-
often connect only 2 LANs together. - make use of publicly available telecoms facilities. - allow businesses to function from any location.
-
often connect LANs together. - make use of publicly available telecoms facilities. - allow businesses to function from any location.
-
often connect only 2 LANs together. - make use of private telecoms facilities. - allow businesses to function from any location.
Question 3
Question
A Network Interface Card (NIC) is...
Answer
-
a physical device that generates and receives suitable electrical signals.
-
a physical device that receives suitable electrical signals.
-
a physical device that generates and receives suitable signals.
Question 4
Answer
-
receives data in the form of packets and forwards them on.
-
receives data in the form of pulses and forwards them to their destination.
-
receives data in the form of packets and forwards them to their destination.
Question 5
Question
A client-server network is when...
Answer
-
one server provides services to many client machines where the users work.
-
one or more servers provide services to a few client machines where the users work.
-
one or more servers provide limited services to many client machines where the users work.
-
one or more servers provide services to many client machines where the users work.
Question 6
Question
Advantages of a client-server network are...
Answer
-
network functions are handled by dedicated machines. - clients can provide for the immediate needs of the user. - this is an efficient, high speed model.
-
network functions are handled by dedicated machines. - clients can provide for the immediate needs of the user most of the time. - this is sometimes an efficient, high speed model.
-
network functions are handled by dedicated machines. - clients can provide for the immediate needs of the user. - this is an efficient model.
-
network functions are handled by a single machine. - clients can provide for the immediate needs of the user. - this is an efficient, high speed model.
Question 7
Question
In a peer-to-peer network...
Answer
-
all computers are equal. Each computer serves the needs of the user as well as carrying out networking functions.
-
all computers are equal. Each computer serves the needs of the user.
-
some computers are equal. Each computer serves the needs of the user as well as carrying out networking functions.
-
most computers are equal. Each computer serves the needs of the user as well as carrying out limited networking functions.
Question 8
Question
Dis-advantages of a peer-to-peer network are...
Answer
-
maintenance is more difficult with a dedicated server. - security is poor. - they tend to be slow because of the amount of clients.
-
maintenance is more difficult because of the number of clients. - security is poor. - they tend to be slow because of the amount of multi-tasking.
-
maintenance is more difficult with a dedicated server. - security is poor. - they tend to be slow because of the amount of multi-tasking.
-
maintenance is more difficult with a dedicated server. - security is non-existent. - they tend to be slow because of the amount of multi-tasking.
Question 9
Question
The three main network topologies are...
Answer
-
Ring, Bus & Wave.
-
Ring, Line & Star.
-
Star, Bus & Circle.
-
Ring, Bus & Star.
Question 10
Question
Sending data in a network requires rules and standards. By sharing these rules, different networks and different devices can can talk to each other. A protocol is...
Answer
-
a set of rules that covers data communications.
-
a set of rules that covers how data moves between hosts.
-
a set of rules that covers the use of data packets.
-
a set of rules that identifies which packets of data can be sent.
Question 11
Question
Which of the following lists contains only VALID network protocols?
Answer
-
DNS, FTD, HTTP, POP4
-
DNS, FTP, HTTP, POP3
-
FTP, HTTP, TLS, DNS
-
FTP, HTTP, SSL, DNA
Question 12
Question
Networks involve linking many devices which poses potential security threats because data can be accessed at multiple locations.Which of the following is a valid list of security measures?
Answer
-
Backups, Archives, Failunder, Disaster site, Authentication & Acceptable use policies (AUP).
-
Backups, Archives, Failover, Disaster recovery, Authentication & Acceptable use policies (AUP).
-
Backups, Archives, Failover, Disaster recovery, Authentication & Acceptable policies (AP).
-
Backups, Archives, Failover, Disaster recovery, Syncing & Acceptable use policies (AUP).
Question 13
Question
The internet is a means of connecting millions of computers and computer networks across the world. The connections are made through routers, servers and other transmission media like fibre-optic cables. The internet is used for...
Answer
-
he transmission of all sorts of information such as text, graphics, voice, video and computer programs.
-
retrieving all sorts of information such as text, graphics, voice, video and computer programs.
-
posting of all sorts of information such as text, graphics, voice, video and computer programs.
-
the transmission of all sorts of information such as text and graphics only.
Question 14
Question
The world wide web is...
Answer
-
one of the facilities that makes use of the internet. It consists of millions of pages written in HTML only.
-
one of two facilities that makes use of the internet. It consists of billions of pages written in HTML or its derivatives.
-
the only facilities that makes use of the internet. It consists of billions of pages written in HTML.
-
one of the facilities that makes use of the internet. It consists of billions of pages written in HTML.
Question 15
Question
A URL (Uniform Resource Locator) is a standard way of describing a resource on the internet. It consists of a domain name and may include a path to the file itself. In the following URL which section is the path to the server? http://www.hoddereducation.co.uk/Title/943656934594390/OCR_Computing_for_GCSE
Question 16
Question
In the following URL which section is the domain?
http://www.hoddereducation.co.uk/Title/943656934594390/OCR_Computing_for_GCSE
Question 17
Question
In the following URL which section refers to the web page?
http://www.hoddereducation.co.uk/Title/943656934594390/OCR_Computing_for_GCSE
Question 18
Question
A JPG file is used to...
Answer
-
store bit-mapped images using lossless compression.
-
store still images using lossy compression.
-
represent digital audio using lossy compression.
Question 19
Question
A PDF file is used to...
Answer
-
represent documents in the same way no matter what software is being used to display them.
-
store bit-mapped images using lossless compression.
-
represent digital audio using lossy compression.
Question 20
Question
File compression means reducing the size of a file. This usually done in order to...
Answer
-
i) save storage space on media. ii) reduce transmission times on a network.
-
i) save storage space. ii) reduce transmission times on the internet.
-
i) save storage space online. ii) reduce file sizes.
Question 21
Question
Lossy compression is when...
Answer
-
files are compressed by removing some data that is less essential for the purpose.
-
files are compressed by removing half the data of a selected file.
-
files are compressed with no loss of essential data.
Question 22
Question
Lossless compression is when
Answer
-
files are compressed with severe loss of essential data.
-
files are compressed with no loss of any data.
-
files are compressed with no loss of essential data.