QUESTIONS WITH CORRECT ANSWERS |
NETWORK+
CH.3 QUIZ ON ADDRESSING, DBMS CHAPTER
1, AND DATABASE SYSTEMS DESIGN,
IMPLEMENTATION & MANAGEMENT STUDY
GUIDE 2026/2027
A switch distinguishes between various devices within a network by
their addresses. - CORRECT ANSWER>>>>MAC
Because they're both Apple products, the browser that works most
smoothly with Macintosh OS
X is . - CORRECT ANSWER>>>>safari
The protocol used for transmitting large files from one server to
another over the Internet is known as the Protocol (FTP). -
CORRECT ANSWER>>>>File Transfer
The wireless network privacy standard that was introduced in 2003
but was quickly replaced
Page 1 of 289
,(due to numerous vulnerabilities) was known as - CORRECT
ANSWER>>>>WPA
Your can provide hardware firewall protection for your home network
where it connects to the ISP's network, just as ISP networks have
firewalls where they connect to the Internet. -
CORRECT ANSWER>>>>router
A name identifies a server site on the Internet. - CORRECT
ANSWER>>>>domain
When you personally share an image on Pinterest it is known as a . -
CORRECT ANSWER>>>>pin
Software theft occurs when someone engages in all of the following
except .-
CORRECT ANSWER>>>>erasing a program you purchased then
sold to a friend
Personal branding can be accomplished digitally and in more
traditional means including all of the following except . - CORRECT
ANSWER>>>>writing private journal entries
Twitter recommends using no more than ___ hashtags per Tweet. -
CORRECT ANSWER>>>>2
A global nonprofit organization that empowers people to create open
resource materials that can be shared or reused is called Commons. -
CORRECT ANSWER>>>>creative
Page 2 of 289
,There are risks associated with downloading content from the
Internet. It is important to consider
all of the following when downloading from the Internet except -
CORRECT ANSWER>>>>your anti-virus software will ensure your
files are safe.
Two main factors concerning your digital identity are privacy and-----
--- CORRECT ANSWER>>>>security
If your debit card has been compromised and you wait more than two
days, but fewer than two months after you learn about the loss, you
can be liable for up to ---------- CORRECT
ANSWER>>>>$500.00
A security system separating 2 networks or even computers on the
same network is called a . - CORRECT ANSWER>>>>firewall
Which of the following Internet services tends to provide the most
consistent speeds? - CORRECT ANSWER>>>>DSL
Contact your ISP if your actual Internet speed is than advertised. -
CORRECT ANSWER>>>>slower
Letting computer users drag images and documents across their
computers' monitors made the
User Interface very popular - CORRECT ANSWER>>>>Graphical
Page 3 of 289
, The word modem stands for . - CORRECT
ANSWER>>>>modulator-demodulator
The BitTorrent protocol is often called file sharing. - CORRECT
ANSWER>>>>peer-to- peer
WWW stands for -------------------CORRECT ANSWER>>>>World
Wide Web
Select the domain name. - CORRECT ANSWER>>>>www.cnet.com
Broadband is measured in . - CORRECT ANSWER>>>>Mbps
The volume of data that can be carried on an Internet transmission
media in an amount of time is
called . - CORRECT ANSWER>>>>bandwidth
Which might be a choice for Internet service in your area? -
CORRECT ANSWER>>>>cable
Internet
What group determines the standards for the World Wide Web? -
CORRECT ANSWER>>>>The World Wide Web Consortium
(W3C)
The highest level in the domain name hierarchy is known as the -
CORRECT ANSWER>>>>Top Level Domain
Pictures or videos taken and shared on Snapchat are called .-
CORRECT
ANSWER>>>>snaps
Page 4 of 289