ANSWERS ALREADY PASSED
A large heating and air conditioning company provides each employee with a small computing
device that the employees use to track work and accept payments.
Which term refers specifically to this type of device?
*Peripheral computer
*Microcomputer
*Minicomputer
*Handheld computer ✔✔Handheld computer
What is the major function of a computer operating system?
*Data management
*Application program management
*Network management
*Computer resource management ✔✔Computer resource management
Within a productivity suite, which method of selecting static data from one application and
copying it to another application requires the use of temporary memory?
,*File transfer
*Object embedding
*Object linking
*Copy and paste ✔✔Copy and paste
What are the basic components, in addition to computers, that are required for a local network to
function?
*Ethernet cards, a common protocol, ethernet cables, and a hub
*Ethernet cards, a modem, a router, and a network database
*Internet connection, a network interface controller, and a cabling system
*Internet connection, a network operating system, and a network administrator ✔✔Ethernet
cards, a common protocol, ethernet cables, and a hub
Which type of device is an ethernet card?
*Network interface controller (NIC)
*Network firewall hardware
*Network operating system (NOS)
*Network server hardware ✔✔Network interface controller (NIC)
, What is the purpose of a MAC address?
*To uniquely identify an internet URL
*To uniquely identify a computer motherboard
*To uniquely identify an email client
*To uniquely identify a computer on a network ✔✔To uniquely identify a computer on a
network
Which topology implements a network where if the central hub fails, all nodes attached to the
hub will also fail?
*A mesh topology
*A linear bus topology
*A star topology
*A ring topology ✔✔A star topology
A local drafting firm has a secured local area network that uses Ethernet cables to connect to
client computers.
After ensuring that the computer is connected to the network, what must a user provide to in
order to be authenticated?