A large heating and air conditioning Handheld computer
company provides each employee with a
small computing device that the
employees use to track work and accept
payments.
Which term refers specifically to this type
of device?
*Peripheral computer
*Microcomputer
*Minicomputer
*Handheld computer
What is the major function of a computer Computer resource management
operating system?
*Data management
*Application program management
*Network management
*Computer resource management
Within a productivity suite, which method of Copy and paste
selecting static data from one application
and copying it to another application
requires the use of temporary memory?
*File transfer
*Object embedding
*Object linking
*Copy and paste
, What are the basic components, in Ethernet cards, a common protocol, ethernet cables, and a hub
addition to computers, that are required
for a local network to function?
*Ethernet cards, a common protocol,
ethernet cables, and a hub
*Ethernet cards, a modem, a router, and a
network database
*Internet connection, a network interface
controller, and a cabling system
*Internet connection, a network operating
system, and a network administrator
Which type of device is an ethernet card? Network interface controller (NIC)
*Network interface controller (NIC)
*Network firewall hardware
*Network operating system (NOS)
*Network server hardware
What is the purpose of a MAC address? To uniquely identify a computer on a network
*To uniquely identify an internet URL
*To uniquely identify a
computer motherboard
*To uniquely identify an email client
*To uniquely identify a computer on a
network
Which topology implements a network A star topology
where if the central hub fails, all
nodes attached to the hub will also
fail?
*A mesh topology
*A linear bus topology
*A star topology
*A ring topology
A local drafting firm has a secured A password
local area network that uses Ethernet
cables to connect to client computers.
After ensuring that the computer is
connected to the network, what must a user
provide to in order to be authenticated?
*An encryption key
*A MAC address
*A digital signature
*A password
Many websites keep track of a user's Tracking cookies
actions and information. They store much
of this information on the user's computer
in a private folder on the hard drive.
What are these very small files called?
*Tracking URLs
*Tracking data
*Tracking cookies
*Tracking packages