0% found this document useful (0 votes)
62 views24 pages

HNS LV With Answer 1

The document consists of a series of multiple-choice questions related to computer hardware, software, networking, and security concepts. It covers topics such as input and output devices, operating systems, network protocols, and disaster recovery planning. The questions are designed to test knowledge in IT and computer science fundamentals.

Uploaded by

Bogale Alemu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views24 pages

HNS LV With Answer 1

The document consists of a series of multiple-choice questions related to computer hardware, software, networking, and security concepts. It covers topics such as input and output devices, operating systems, network protocols, and disaster recovery planning. The questions are designed to test knowledge in IT and computer science fundamentals.

Uploaded by

Bogale Alemu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

1. Which one of the following is an Input device?

A. Monitor
B. Printer
C. Keyboard
D. Speaker

2. Monitor and System unit can be connected by.


A. PS/2 Bus
B. Video Graphic Adapter cable
C. Network Cable
D. Modem

3. Choose the output device among the given alternatives


A. Mouse
B. Scanner
C. Keyboard
D. Projector

4. An application software that is/are used to perform calculation functions and charts?
A. Microsoft Office Word
B. Microsoft Office Excel
C. Microsoft Office Publisher
D. Microsoft Office Access

5. To access and manage files of your computer, you have to login with _______account.
A. Standard user account
B. Guest user account
C. Limited user account
D. Administrator user account

6. _____controls the way in which the computer system function and provide a means by
which a user can interact with computer.
A. The platform
B. The operating system
C. Application software
D. Motherboard

7. Which of the following is not a type of MS Access database object?


A. Table
B. Form
C. Worksheets
D. Modules
8. Electrostatic Discharge (ESD) would cause the most damage to which component?
A. Monitor
B. Keyboard
C. Expansion board
D. Power supply

9. Which of the following is not an operating system?


A. Windows
B. Linux
C. Oracle
D. DOS

10. Identify among the following the network device used to connect two dis-similar types of
networks.
A. Switch
B. Hub
C. Bridge
D. Gateway

11. The standard internet protocol is: _____.


A. FTP
B. WWW
C. TCP/IP
D. UDP

12. The verification of a login name and password is known as______.


A. Authentication
B. Accessibility
C. Configuration
D. Authorization
13. Servers are computers that provide resources to other computers connected to_____.
A. Client
B. Mainframe
C. Network
D. Workstation

14. Which class of IP address is used in smaller organization?


A. Class A
B. Class B
C. Class C
D. Class D

15. DHCP is the abbreviation of______


A. Dynamic Host Control Protocol
B. Dynamic Host Configuration Protocol
C. Dynamic Hyper Control Protocol
D. Dynamic Hyper Configuration Protocol

16. IP assigned for a client by DHCP server is?


A. For a limited period
B. For unlimited period
C. Not time dependent
D. None of the mentioned

17. ______is used to run a PING command in windows server.


A. Microsoft office
B. Command prompt
C. Computer device
D. Command line
18. In the OSI model, encryption and decryption are functions of the_________layer.
A. Transport
B. Session
C. Presentation
D. Application

19. Client computers need a________to join with server in server-based network.
A. Computer
B. DNS
C. Domain
D. Printer

20. What does a booting mean in the operating system?


A. Restarting computer
B. Installing the program
C. Shutdown computer
D. Using CD

21. ______is a server that can perform no other task besides network services.
A. Printer server
B. Committed server
C. Service server
D. Dedicated server

22. A computer which links several PCs together in a network is called a________.
A. Minicomputer
B. Client
C. Server
D. Mainframe
23. The_________ layer lies between the session layer and the application layer in7 layers OSI
Model.
A. Network layer
B. Transport layer
C. Data link layer
D. Presentation layer

24. Domain name system can obtain the ___________of host if its domain name is known and
vice versa.
A. Station address
B. IP address
C. Port address
D. Checksum

25. If one link fails, only that link is affected. All other links remain active. This topology refers
to:
A. Mesh Topology
B. Star Topology
C. Ring Topology
D. Bus Topology

26. Which of the following cable is used as a high-speed network backbone media?
A. Thin Coaxial Cable
B. Thick Coaxial Cable
C. Unshielded Twisted Pair Cable
D. Fiber Optic Cable
27. What is the recommended maximum length (approximate) for a segment of UTP cable.
A. 500M
B. 1km
C. 100m
D. 180m

28. Which topology creates a very reliable network but requires a large amount of cable and it is
difficult to administer.
A. Ring Topology
B. Star Topology
C. Mesh Topology
D. Bus Topology

29. It is a network device that are used to amplify/ regenerate the weak signal is called.
A. Firewall
B. Repeater
C. Gateway
D. Modem

30. Which of the following commands will display the MAC (Media Access Control) address of
a given computer?
A. nslookup
B. ipconfig/all
C. nbtstat
D. nbtstat
31. One of your print devices is not working properly, so you want to temporarily prevent users
from sending jobs to the printer serving that device. Which of the following actions should
you take?
A. Disconnect the whole system
B. Stop sharing the printer
C. Allow sharing the printer
D. Install the new printer again

32. ________ is a good, cost-effective choice for smaller networks because the layout is simple,
allowing all devices to be connected via a single coaxial or RJ45 cable.
A. Hybrid topology
B. Ring topology
C. Bus topology
D. Star topology

33. Which of the following qualifies as best Disaster Recovery (DR) site?
A. DR site in the same campus
B. DR site in the same city
C. DR site in different country
D. DR site in country

34. _________is working in a helpdesk environment, including topics such as logging and
prioritizing client requests, communicating with personnel to identify the problem and give
solution for the problem.

A. Information help desk


B. Record Client Support Requirements
C. Technical documentation
D. Conduct and facilitate user training

35. What is the best maintenance strategy?


A. Corrective maintenance
B. Predictive maintenance
C. Time based maintenance
D. Preventive maintenance

36. Which of the communication modes support two-way traffic but in only once direction of a time?
A. Simplex
B. Half-duplex
C. Three - quarter's duplex
D. Full duplex

37. Domain Name System can obtain the__________of host if its domain name is known
and vice versa.
A. Station address
B. IP address
C. Port address
D. Checksum

38. Devices on one network can communicate with devices on another network via a______
A. File Server
B. Utility Server
C. Printer Server
D. Gateway

39. Which of the following are advantages of the internet?


A. Provides information on few topic
B. Allows you to easily communicate with other people
C. Provides the latest news and happenings but around a specific areas
D. Make peoples not to focus on their task
40. The equipment needed to allow home computers to connect to the internet is called______
A. Modem
B. Gateway
C. Monitor
D. Peripheral

41. A user can get files from another computer on the internet by using_________
A. HTTP
B. TELNET
C. UTP
D. FTP

42. The first page that you normally view at a website is its__________
A. Home page
B. Master page
C. First page
D. URL

43. The server on the internet is also known as a_________


A. Hub
B. Repeater
C. Gateway
D. Host

44. Computers on the internet owned and operated by education institution form part of
the______
A. com domain
B. gov domain
C. edu domain
D. mil domain

45. In a ____ topology, if there are n devices in a network, each device has n-1 ports for
cables.
A. Mesh
B. Star
C. Bus
D. Ring

46. The process by which Windows Server verifies that the user matches the user account
employed to gain access.
A. Authentication
B. Active Directory
C. Domain Name System
D. Hypervisor

47. The process of keeping addresses in memory for future is called_________.


A. Routing
B. Resolving
C. Caching
D. Checking

48. A plug and play storage device that simply plugs in the port of a computer is________
A. Flash disk
B. CD
C. Hard disk
D. Card
49. Which of the following do attackers commonly target for fetching IP address of a target or
victim user?
A. IP tracker
B. Emails
C. Websites
D. Web pages

50. HTTP is ___________protocol


A. Application layer
B. Transport layer
C. Network layer
D. Datalink Layer

51. What is the purpose of the DHCP?


A. To provide storage for email
B. To translate URLs to IP addresses
C. To translate IPv4 addresses to MAC addresses
D. To provide an IP configuration information to hosts

52. Hardware address is known as__________


A. MAC address
B. IP address
C. Network Interface Card
D. Hardware brand

53. What kind of transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?
A. Unshielded twisted pair
B. Optical fiber
C. Coaxial cable
D. Microwave
54. Which software prevents the external access to a system?
A. Firewall
B. Gateway
C. Router
D. Virus checker

55. When the mail server sends mail to other mail servers it becomes _________ ?
A. Peersevers
B. SMTP client
C. SMTP server
D. File server

56. Which of the following is not an advantage of implementing 5S technique


A. To improve work efficiency
B. To standardize work practices
C. To create a dirty workplace
D. To improve work discipline

57. How can you edit a relationship already established between two tables?
A. Left click the relationship line
B. Double clicks the relationship line
C. Right click and select properties
D. Edit the table by Design view

58. _______is anything that does not have value or does not add value. Waste is something
the customer will not pay for.
A. MUDA
B. MURA
C. Kaizen
D. MURI
59. Which of the following is NOT an advantage of network security?
A. Makes the system slower
B. Minimizes computer freezing and crashes
C. Gives privacy to users
D. Protects system against viruses

60. Which of the following actions compromise security?


A. Vulnerability
B. Attack
C. Threat
D. Exploit

61. A ______ is a formal document created by an organization that contains detailed instructions
on how to respond to unplanned incidents such as natural disasters, power outages, cyber-
attacks and any other disruptive events.
A. Risk management
B. Disaster recovery plan
C. Contingency plan
D. Project proposal

62. The easiest way to set up your router is________.


A. To connect it to your PC via an Ethernet /Console cable
B. To connect it to your ADSL via an Ethernet /Console cable
C. To connect it to your switch an Ethernet /Console cable
D. To connect it to your bridge an Ethernet /Console cable
63. Which NetWare protocol provides link-state routing?
A. RIP - Routing Information Protocol
B. NLSP- NetWare Link Services Protocol
C. SAP- Service Advertisement Protocol
D. NCP - NetWare Core Protocol

64. A second technique to reduce routing table and simplify searching process is called ____.
A. Network-Specific Method
B. Network-Specific Motion
C. Network-Specific Maintaining
D. Network-Specific Membership
65. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates _____
A. Gaps
B. Loops
C. Holes
D. Links

66. Which of the following network support resource pipelining effect?


A. Packet-switched networks
B. Stream-switched networks
C. Circuit-switched networks
D. Message-switched networks

67. Internet access by transmitting digital data over the wires of a local telephone network is
provided by______.
A. Digital leased line
B. Digital signal line
C. Digital subscriber line
D. Digital ISP line
68. The size of an IP in IPv6 is________.
A. 32 bits
B. 48 bits
C. 64 bits
D. 128 bits

69. _____ Command is used to manipulate TCP/IP routing table.


A. Ipconfig
B. Route
C. Traceroute
D. Ping

70. speed Ethernet works on______


A. Coaxial cable
B. UTP-Unshielded twisted pair cable
C. Optical fiber
D. STP-Shielded twisted pair cable

71. Which one is NOT used as input elements in an organization to maintain and establish client
user liaison?
A. Determine support area
B. Develop support method
C. Assign support personnel
D. Ignorance of earlier condition

72. _______ is preparing an organization to be ready to respond effectively in the event of an


emergency.
A. Disaster recovery planning
B. Long term planning
C. Contingency or Scenario planning
D. Corporate planning
73. The role of _______is/are responsible for coordinating, planning, and leading computer-
related activities in an organization.
A. Computer engineer
B. Software developer
C. Network technician
D. IT manager

74. .________ is the type of software testing where a group of users uses the software in totality
before the final launch or deployment of the software.
A. Coding
B. Programming
C. Pilot testing
D. Planning

75. _______ serves as a link between systems personnel and end users, such as a client or
business unit.
A. User logon
B. User Liaison
C. Stakeholder
D. Organization

76. In router settings you can add and configure your routers which will manage Authentication,
Accounting and Bandwidth management (Network Access Servers). Which are considered in
the process?
A. Title, NAS Type/IP, Vendor/Model/Partners/Location, Physical address,
IP/Host…
B. Username, password, admin, URL, logical address, NAT type, LAN type…
C. Server, Ping, ipconfig, cmd, ADSL, domain, run…
D. Classes of IP address subnet mask, gateway, hub…

77. An initial phase system that is subset of the local/regional system's final configuration.
A. Deploy setup
B. Pilot system
C. Start coding
D. Process system
78. _______is the process of deciding what should be achieved, what should be done to achieve
it, how to do it efficiently and economically and who should do it to contribute?
A. Policy development
B. Research overview
C. Observation report
D. Assist technology

79. A diagram showing the reporting and responsibility relationships between staff of an
organisation.
A. Culture and politics of an organization
B. Organizational Structure
C. Entity Relationship
D. PERT Diagram

80. A contract that binds a service provider to give a certain level of service between service
provider and its client.
A. Service level agreement
B. Sponsor
C. Stakeholder
D. Disaster recovery plan

81. An attempt to decrease the probability (may be even to 0) of the event occurring or causing
damage.
A. Prevention
B. Recovery
C. Contingency plan
D. Threat
82. An international organization responsible for setting out of the quality of standards.
A. ISO
B. OSI
C. ILO
D. IMF
83. The practice of rethinking and redesigning the way work is done to better support an
organization's mission and reduce costs.
A. Identification of Business opportunities
B. Business Process Reengineering (BPR)
C. Arranging Organizational system
D. Value stream

84. A project plan may include a number of variables. Which one of the following is NOT a
variable of project plan?
A. Project scope
B. Project Objectives
C. Project Budget
D. Project Upgrade

85. One of the following step-by-step paths is correct about plan and monitor the system pilot.
A. Install Pilot system Monitor implementation of Pilot system  prepare for Pilot
System Evaluate pilot System
B. Monitor implementation of Pilot system Install Pilot system prepare for Pilot
System Evaluate pilot System
C. Prepare for Pilot System Install Pilot system Monitor implementation of
Pilot system  Evaluate pilot System
D. Evaluate pilot System  prepare for Pilot System Monitor implementation of
Pilot system  Install Pilot system

86. In providing excellent customer service which one of the following is inappropriate?
A. Know Your Product/Service
B. Say Thank You
C. Be sluggish
D. Show Respect

87. The correct path for system development life cycle (SDLC).
A. Planning  Analysis  Design  ImplementationMaintenance
B. Planning  Design  Implementation AnalysisMaintenance
C. Planning  Design Analysis  ImplementationMaintenance
D. Planning  Analysis  Design  Maintenance Implementation
88. Suppose your organization is planning to expand in all dimensions. Regarding using of ICT
the organization assigned you to conduct a research regarding the newlyavailable
technologies in the market. Which one of the following hardware and software combination
is most likely be the best to be chosen?
A. A high speed and larger storage capacity Server computer running an operating
system like windows server 2000, Linux, and Ubuntu.
B. A high speed and larger storage capacity Server computer running an
operating system like windows server 2012, Linux 2014 version.
C. An average speed and medium storage capacity Server computer running an
operating system like windows server 2000, Linux , and Ubuntu
D. A medium storage capacity server running an operating system like windows
server 2003

89. In what order do managers typically perform the managerial functions?


A. Organising, Planning, Controlling, Leading
B. Organizing, Leading, Planning, Controlling
C. Planning, Organizing, Leading, Controlling
D. Planning, Organizing, Controlling, Leading

90. What is the business continuity plan (BCP) that focuses on the recovery of a damaged facility
or components back to normal day-to-day operations?
A. Cyber Incident Response Plan
B. Disaster Recovery Plan
C. Crisis Communications Plan
D. Occupant Emergency Plan

91. Which of the following includes the definition of procedures for emergency response?
A. Operations Planning
B. Disaster Recovery Planning
C. Business Continuity Procedure
D. Backup Planning

92. Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic
assignment of IPv6 addresses to a host?
A. ARPv6
B. DHCPv6
C. ICMPv6
D. UDP
93. What is the purpose of ICMP (Internet Control Messaging Protocol) messages?
A. To inform routers about network topology changes
B. To ensure the delivery of an IP packet
C. To provide feedback of IP packet transmissions
D. To monitor the process of a domain name to IP address resolution

94. What are two types of IPv6 unicast addresses?


A. Multicast
B. Loopback
C. Anycast
D. Broadcast

95. Message is sent to all hosts on a remote network. Which type of message is it?
A. Limited broadcast
B. Multicast
C. Directed broadcast
D. Unicast

96. What does a monitoring and evaluation framework include?


A. Objectives, assumptions, indicators, and a summary of activities
B. Objectives and indicators
C. Goal and objectives
D. Goal, objectives, and indicators

97. The purpose of the monitoring and evaluation is:


A. They cut the competition
B. They are for quality assurance
C. They help to improve project performances
D. They are for annual report purpose

98. In which of the following project phases is the project schedule developed?
al
2. B. Planning
3. C. Implementation
4. D. Design
5. Conceptual
6. B. Planning
7. C. Implementation
8. D. Design
9. Conceptual
10. B. Planning
11. C. Implementation
12. D. Desig
A, Conceptual planning Implementation Design
13.
A. Conceptual
B. Planning
C. Implementation
D. Design
99. The time necessary to complete a project is referred to as:
A. Implementation
B. Life cycle
C. Operation cycle
D. Production cycle

100. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
Question Answer Mark

Multiple Choice
1 C-Keyboard 1
2 B-Video Graphic Adapter cable 1
3 D-Projector 1
4 B-Microsoft Office Excel 1
5 D-Administrator user account 1
6 B-The operating system 1
7 C-Worksheets 1
8 C-Expansion board 1
9 D-DOS 1
10 D-Gateway 1
11 C-TCP/IP 1
12 A-Authentication 1
13 C-Network 1
14 C-Class C 1
15 B-Dynamic Host Configuration Protocol 1
16 A-For a limited period 1
17 B-Command prompt 1
18 C-Presentation 1
19 C-Domain 1
20 A-Restarting computer 1
21 D-Dedicated server 1
22 C-Server 1
23 D-Presentation layer 1
24 B-IP address 1
25 B-Star Topology 1
26 D-Fiber Optic Cable 1
27 C-100m 1
28 C-Mesh Topology 1
29 B-Repeater 1
30 B-ipconfig/all 1
31 B-Stop sharing the printer 1
32 C-Bus topology 1
33 C-DR site in different country 1
34 B-Record Client Support Requirements 1
35 D-Preventive maintenance 1
36 B-Half-duplex 1
37 B-IP address 1
38 D-Gateway 1
39 B-Allows you to easily communicate with other people 1
40 A-Modem 1
41 D-FTP 1
42 A-Home page 1
43 D-Host 1
44 C-edu domain 1
45 A-Mesh 1
46 A-Authentication 1
14. The time necessary to
complete a project is
referred to as:
15. A. Implementation time
16. B. Life cycle
17. C. Operations cycle
18. D. Production cycl

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy