100% found this document useful (1 vote)
2K views3 pages

COC Question

This document contains a 34 question assessment for level 3 trainees in the information communication technology department at Halaba Poly Technic College. The questions cover topics related to networking including network topologies, protocols, troubleshooting techniques, and network operating systems. The assessment is meant to be completed in 50 minutes.

Uploaded by

fikru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views3 pages

COC Question

This document contains a 34 question assessment for level 3 trainees in the information communication technology department at Halaba Poly Technic College. The questions cover topics related to networking including network topologies, protocols, troubleshooting techniques, and network operating systems. The assessment is meant to be completed in 50 minutes.

Uploaded by

fikru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

HALABA POLY TECHNIC COLLEGE

Department of Information Communication Technology


SCHOOL ASSESSMENT FOR LEVEL THREE TRAINEE’S
Time allowed 50 min
Sector: - Servicing
Name ID.No Level

1. A family of technologies that are used to transmit digital data over telephone lines
A. Fiber B. DSL C. Palmtop D. Copper
2. Internet Relay Chat (IRC) is
A. A protocol used for internet chat and other communications
B. A protocol for e-mail messages on the internet
C. A protocol used by e-mail clients to retrieve messages from remote servers
D. Protocol for e-mail messages on the internet
3. A way of connecting computers using central devices such Hub or Switch
A. Star topology B. Bus topology C. Tree topology D. Ring
topology
4. As a small team leader how will you delegate responsibility to your team members
A. A based on the strength and weakness of members
B. Based on my relationship to them
C. Based on their religions
D. Based on their ethnicity
5. Having a root node and all other nodes are connected to it
A. Bus-Ring Topology B. Tree topology C. Star-bus topology D. Hybrid topology
6. The highest reliability is found in one of the following topology
A. Star topology B. Mesh topology C. Ring topology D. Bus topology
7. Generally, whenever a user tells you that the LAN connection is failed, what is the first thing to
check?
A. Ping a known IP address to see if the network cable and connectivity is good.
B. Run IPCONFIG to see if the network hardware is functioning.
C. Check the network adapter drivers to see that they are configured properly.
D. Check for the presence of link lights on the back of the network adapter
8. Which of the following is a marketing function that can be performed by channel intermediaries?
A. Promoting products B. Recruiting workers C. Training employees D. Monitoring Union activities
9. A system that used to enhance efficiency and customer service quality is
A. Technical documentation C. Customer gift
B. B. planned and organized workflow D. Employee attendance
10. We don’t want our packet get lost in transit. Which OSI layer is responsible to orderly
delivery of packet?
A. Transportation B. Data link C. Network D. Physical
11. An administrator pings the default gateway at 10.10.10.1 and sees the output as request
time out. At which layer the problem?
A. Network B. Data link C. Application D. Access layer
12. The need of team communication is
A. To minimize misunderstandings
B. To increase conflict
C. To discuss problems
D. To increase any disagreements, differences or criticisms
13. A server feature that allows a group of servers function as a single unit, sharing storage
resources and jobs, as well as providing fail-over fault tolerance is
A. Sender clustering C. Windows System Resource Manager (WSRM)
B. Hot and Money D. Microsoft meta- directory services
14. In one of the OSI layers signals are transmitted electrically?
A. Presentation layer B. Transport layer C. Physical layer D. Data link layer
15. A suitable preventive action on quality is recommended based on organization
A. Quality standard B. Quality approval C. Quality assurance D. Quality check

16. Which transmission media has the highest transmission speed in a network?
A. Coaxial cable B. Optical fiber C. Electrical cable D. Twisted pair cable

17. Your company has an Active Directory domain that runs Windows Server 2008 R2. The Sales
OU contains an OU for computers, an OU for Groups, and an OU for users. You perform nightly
backups. An administrator deletes the Group OU. You need to restore the Groups OU without
affecting users and computers in the sales OU. What should you do?
A. Perform an authoritative restore of the Sales OU.
B. Perform a non-authoritative restore of the Groups OU
C. Perform an authoritative restore of the Groups OU.
D. Perform a non-authoritative restore of the sales OU.
18. Is a technique for collecting information that uses a questionnaire to measure the
magnitude of a problem?
A. User survey B. Prioritization C. Schedule D. Delegation
19. A connector used for fiber optic is?
A. RJ-45 B. MT-RJ C.RJ-11 D. BNC
20. Mesh topologies are mostly used in the
A. WAN B. MAN C. SAN D. LAN
21. Who is the beginning point for kaizen process
A. Finance team B. Reporting Team C. Process owner D. Managing Director
22. Geographical placement of network device in a computer system environment
A. Administrative topology
B. Environmental topology
C. Physical topology
D. Logical topology
23. On a windows XP machine, which of the following settings should be configured to allow
dragging of files without holding the mouse button?
A. Scroll Lock B. Stick Keys C. Mouse keys D. click Lock
24. Information security can be configured to meet the objective
A. Recognito B. Confidentiality C. Admiration D. Certification
25. Among the following the one is a Nonfunctional requirement for a networking
A. Core system B. Testability C. Design D. Analysis
26. When you maintain and troubleshoot a computer the final stage will be
A. Formatting B. Assembling C. Testing D. Documenting
27. All network nodes are connected to each other
A. Star topology B. Ring topology C. Mesh topology D. Bus topology
28. Used to connect router to computer using console serial port
A. Straight through cable B. USB cable C. Rollover cable D. Crossover cable
29. Among the following the one is Network Operating system
A. Windows server 2008
B. Windows 7
C. Windows Xp
D. Windows vista
30. Which protocol is used by the trace route command to send and receive echo-requests and echo-
replies?
A. ICMP B. TCP C. SNMP D. Telenet
31. On which layer, packet routing is done?
A. Data link B. Transport C. Network D. Application
32. Leaders in business area should have
A. Refrain from calculated risk
B. Abstain from creativity and improvement
C. Efficiency organize and utilize work forces
D. Show partiality to different employee of the workgroup
33. Among the following one provides authentication and access control for shared resources
A. Computer security B. Confidentiality C. Certification D. Network Security
34. The one is a session layer protocol
A. TCP B. HTTP C. FTP D. NetBIOS

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy