Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
65 views5 pages

HNS Level I-V Theory NEW 2017-1

The document is an institutional assessment for Hardware and Networking service level IV at Haro Sabu TVET College, consisting of multiple-choice questions covering various topics in computer hardware, networking, and software. It includes questions about input/output devices, operating systems, network protocols, and security measures. The assessment aims to evaluate the knowledge and skills of students in the field of technology.

Uploaded by

Amanuel Takele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views5 pages

HNS Level I-V Theory NEW 2017-1

The document is an institutional assessment for Hardware and Networking service level IV at Haro Sabu TVET College, consisting of multiple-choice questions covering various topics in computer hardware, networking, and software. It includes questions about input/output devices, operating systems, network protocols, and security measures. The assessment aims to evaluate the knowledge and skills of students in the field of technology.

Uploaded by

Amanuel Takele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Haro sabu TVET College

Hardware and Networking service level IV


Institutional Assessment year 2017 E.C
1. Which one of the following is an Input device?
A. Monitor B. Printer C. Keyboard D. Speaker
2. Monitor and System unit can be connected by.
A. PS/2 Bus B. Modem C. Network cable D. VGA cable
3. Choose the output device among the given alternatives
A. Mouse B. Scanner C. Keyboard D. Projector
4. An application software that is/are used to perform calculation functions and charts?
A. Ms Office Word B. Ms office Excel C. Ms office publisher D. Ms office access
5. To access and manage files of your computer, you have to login with _______account.
A. Standard user account B. Guest C. Limited D. Administrator user account
6. _____controls the way in which the computer system function and provide a means by which
a user can interact with computer.
A. The platform B. Application software C. Motherboard D. The operating system
7. Which of the following is not a type of MS Access database object?
A. Table B. form C. worksheet D. modules
8. Electrostatic Discharge (ESD) would cause the most damage to which component?
A. Monitor B. Keyboard C. Expansion board D. power supply
9. Which of the following is not an operating system?
A. Windows B. Linux C. oracle D. DOS
10. Identify among the following the network device used to connect two dis-similar types of
networks. A. Switch B. Hub C. Bridge D. Gateway
11. The standard internet protocol is: _____.
A. FTP B. WWW C. TCP/IP D. UDP
12. The verification of a login name and password is known as______.
A. Authentication B. Accessibility C. configuration D. Authorization
13. Servers are computers that provide resources to other computers connected to_____.
A. Client B. Mainframe C. Workstation D. Network
14. Which class of IP address is used in smaller organization?
A. Class A B. Class B C. Class C D. Class D
15. DHCP is the abbreviation of______
A. Dynamic Host Control Protocol C. Dynamic Hyper Control Protocol
B. Dynamic Host Configuration Protocol D. Dynamic Hyper Configuration Protocol
16. IP assigned for a client by DHCP server is?
A. For a limited period B. For unlimited Period C. Not time dependent D. None
17. ______is used to run a PING command in windows server.
A. Microsoft office B. command prompt C. Computer device D. Command line
18. In the OSI model, encryption and decryption are functions of the_________layer.
A. Transport B. Session C. Presentation D. Application
19. Client computers need a________to join with server in server-based network.
A. Computer B. DNS C. Domain D. Printer
20. What does a booting mean in the operating system?
A. Restarting computer B. Installing the program C. shutdown computer D. using CD
21. ______is a server that can perform no other task besides network services.
A. Printer server B. Committed server C. Dedicated server D. Service server
22. A computer which links several PCs together in a network is called a________.
A. Minicomputer B. Client C. Server D. Mainframe
23. The____ layer lies between the session layer and the application layer in7 layers OSI Model.
A. Network layer B. Transport layer C. Data link layer D. Presentation layer
24. DNS can obtain the ______of host if its domain name is known and vice versa.
A. Station address B. IP address C. port address D. Checksum
25. If one link fails, only that link is affected. All other links remain active. This topology refers
to: A. Mesh Topology B. star topology C. Ring topology D. Bus topolog
26. Which of the following cable is used as a high-speed network backbone media?
A. Thin Coaxial Cable B. Thick coaxial cable C. UTP cable D. Fiber optic cable
27. What is the recommended maximum length (approximate) for a segment of UTP cable.
A. 500m B. 1km C. 100m D. 180m
28. Which topology creates a very reliable network but requires a large amount of cable and it is
difficult to administer. A. Ring topology B. Star C. Mesh D. Bus topology
29. It is a network device that are used to amplify/ regenerate the weak signal is called.
A. Firewall B. Repeater C. Gateway D. Modem

30. Which of the following commands will display the MAC (Media Access Control) address of
a given computer? A. nslookup B. ipconfig/ all C. D. nbstat D. All
31. One of your print devices is not working properly, so you want to temporarily prevent users
from sending jobs to the printer serving that device. Which of the following actions should
you take?
A. Disconnect the whole system C. Allow sharing the printer
B. Stop sharing the printer D. Install the new printer again
32. ________ is a good, cost-effective choice for smaller networks because the layout is simple,
allowing all devices to be connected via a single coaxial or RJ45 cable.
A. Hybrid topology B. Ring topology C. Bus topology D. star topology
33. Which of the following qualifies as best Disaster Recovery (DR) site?
A. DR site in the same campus C. DR site in different country
B. DR site in the same city D. DR site in country
34. _________is working in a helpdesk environment, including topics such as logging and
prioritizing client requests, communicating with personnel to identify the problem and give
solution for the problem.
A. Information help desk C. Technical documentation
B. Record client support requirements D. conduct and facilitate user training
35. What is the best maintenance strategy?
A. Corrective maintenance B. Preventive maintenance C. Time based maintenance
36. Which of the communication modes support two-way traffic but in only once direction of a time?
A. Simplex B. Half duplex C. Three quarter’s duplex D. Full duplex
37. Devices on one network can communicate with devices on another network via a______
A. File Server B. utility server C. Printer server D. Gateway
38. Which of the following are advantages of the internet?
A. Provides information on few topic
B. Allows you to easily communicate with other people
C. Provides the latest news and happenings but around a specific areas
D. Make peoples not to focus on their task
39. The equipment needed to allow home computers to connect to the internet is called______
A. Modem B. Gateway C. monitor D. Peripheral
40. A user can get files from another computer on the internet by using_________
A. HTTP B. telnet C. UTP D. FTP
41. The first page that you normally view at a website is its__________
A. Home page B. Master page C. First page D. URL
42. The server on the internet is also known as a_________
A. Hub B. Repeater C. Gateway D. Host
43. Computers on the internet owned and operated by education institution form part of the__
A. com domain B. gov edu C. edu domain D. mil domain
44. In a ____ topology, if there are n devices in a network, each device has n-1 ports for
cables. A. Mesh B. star C. Bus D. Ring
45. The process by which Windows Server verifies that the user matches the user account
employed to gain access.
A. Authentication B. Active Directory C. Domain name system D. Hypervisor
46. The process of keeping addresses in memory for future is called_________.
A. Routing B. Resolving C. caching D. Checking
47. A plug and play storage device that simply plugs in the port of a computer is________
A. Flash disk B. CD C. Hard disk D. Car
48. Which of the following do attackers commonly target for fetching IP address of a target or
victim user? A. IP tracker B. Emails C. websites D. Web pages
49. HTTP is ___________protocol
A. Application layer B. Transport layer C. Network layer D. Data link layer
50. What is the purpose of the DHCP?
A.To provide storage for email B. To translate IPv4 addresses to MAC addresses
B.To translate URLs to IP addresses D. To provide an IP configuration information to hosts
51. Hardware address is known as__________
A. MAC address B. IP address C. NIC D. Hardware brand
52. What kind of transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?
A. Unshielded twisted pair B. optical fiber C. coaxial cable D. Microwave
53. Which software prevents the external access to a system?
A. Firewall B. Gateway C. Router D. Virus checker
54. When the mail server sends mail to other mail servers it becomes _________ ?
A. Peer servers B. SMTP client C. SMTP server D. File server
55. Which of the following is not an advantage of implementing 5S technique
A. To improve work efficiency C. To create a dirty workplace
B. To standardize work practices D. To improve work discipline
56. How can you edit a relationship already established between two tables?
A. Left click the relationship line C. Right click and select properties
B. Double clicks the relationship line D. Edit the table by design view
57. _______is anything that does not have value or does not add value. Waste is something
the customer will not pay for. A. MUDA B. MURA C. Kaizen D. MURI
58. Which of the following is NOT an advantage of network security?
A. Makes the system slower C. Protects system against viruses
B. Minimizes computer freezing and crashes D. Gives privacy to users
59. Which of the following actions compromise security?
A. Vulnerability B. Attack C. Threat D. Exploit
60. A ______ is a formal document created by an organization that contains detailed instructions
on how to respond to unplanned incidents such as natural disasters, power outages, cyber-
attacks and any other disruptive events.
A. Risk mgt B. Disaster recovery plan C. Contingency plan D. Project proposal
61. The easiest way to set up your router is________.
A. To connect it to your PC via an Ethernet /Console cable
B. To connect it to your ADSL via an Ethernet /Console cable
C. To connect it to your switch an Ethernet /Console cable
D. To connect it to your bridge an Ethernet /Console cable
62. Which NetWare protocol provides link-state routing?
A. RIP - Routing Information Protocol
B. NLSP- NetWare Link Services Protocol
C. SAP- Service Advertisement Protocol
D. NCP - NetWare Core Protocol
63. A second technique to reduce routing table and simplify searching process is called ____.
A. Network-Specific Method C. Network-Specific Maintaining
B. Network-Specific Motion D. Network-Specific Membership
64. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates _____
A. Gaps B. Loops C. Holes D. Links
65. Which of the following network support resource pipelining effect?
A. Packet-switched networks C. Circuit switched networks
B. Stream-switched networks D. messages switched networks
66. Internet access by transmitting digital data over the wires of a local telephone network is
provided by_____
A. Digital leased line B. Digital signal line C. Digital subscriber line D. Digital ISP line
67. The size of an IP in IPv6 is________. A. 32 bits B. 48 bits C. 64 bits D. 128 bits
68. _____ Command is used to manipulate TCP/IP routing table.
A. Ipconfig B. Route C. Traceroute D. Ping
69. speed Ethernet works on______ A. Coaxial cable B. UTP C. Optical fiber D. STP
70. Which one the following user can prohibited from changing the most widows computer
A. Standard/limited B. Administrator C. Guest D. None
71. Which types of Cable susceptible for electromagnetic interface
A. Fiber optics B. Coaxial cable C. Twisted pair cable D. USB cable
72. Which one of the following is uses token pass
A. Ring B. Mesh C. Bus D. None
73. Which one of the following is used to block unwanted information
A. Firewall B. Proxy server C. Router D. Access
74. Which one of the following is used to prevent internal and against external threat
A. Proxy server B. Firewall C. Router D. NIC
75. Which one of the following is used for help and support
A. F1 B. F2 C. F3 D. F4
76. Which one of the following is not technology of internet
A. Modem B. DSL C. Telecommunication D. Router
77. Which types of softer used user to specific task
A. Application software B. System software C. utility software D. All
78. Which types of topology uses UTP cable and coaxial cable
A. Bus B. Mesh C. Ring D. Star
79. Which device is used to connect different LAN
A. Bridge B. Switch C. Hub D. None
80. Which one of the following is allow used to connect multiple device
A. Repeater B. Modem C. Router D. None
81. computer date and time is found on/in
A. Scroll Bar B. Menu Bar C. status bar D. Task bar
82. Loopback address
A. 127.0.0 B. 127.0.0.1 C. 192.168. 1.1 D. 255.255.255.0
83. _________The organization that develops OSI
A. ISO B. ISP C. NGO D. None
84. Most of the telephone line cable uses the____ connector
A. RF B. BNC. C. RJ 11 D. RJ 45
85. 255.255.255.254 host ID
A. 30 B. 16 C. 24 D. 4
86. Which one of the following is reliable communication
A. TCP B. UDP C. FTP D. HTTP
87. _________the brain of the computer
A. ALU B. control unit C. central processing unit D. Register
88. Resolve name to internet protocol
A. DHCP B. DNS C. AD D. None
89. Which one of the following is dynamic configuration for client
A. DNS B. DHCP C. TCP. UDP
90. 49. IPV6 uses_______bit address
A. 128 B. 32. C. 64 D. 48

GOOD LUCK!
1. The time necessary to
complete a project is referred
to as:
2. A. Implementation time
3. B. Life cycle
4. C. Operations cycle
5. D.

You might also like