1. The concept of ‘zero administration’ is associated with
a) desktop computers
b) minicomputers
c) PDAs and Organizers
d) Portable Computers
e) Network Computers
2. Collecting personal information and effectively posing and another individual is a crime known as
a) spoofing
b) identity theft
c) hacking
d) personality theft
e) spooling
3. A relational database model uses _________ to contain and organize information.
a) records and fields
b) image, audio, documents
c) columns and rows
d) foreign key
e) data dictionary
4. ___________ are used to refer to Java methods or variables that belongs to other classes.
a) simple names
b) keywords
c) external names
d) qualified names
e) method calls
5. Which connectionless protocol is used for its low overhead and speed?
a) ARP
b) TCP & ARP
c) CMP
d) UDP
e) TCP
6. Which spread spectrum technology does the 802.11b standard define for operation?
a) IR, FHSS & DSSS
b) DSSS
c) DSSS & FHSS
d) FHSS
e) IR
7. Data transmission technologies vary. Which one does Ethernet use?
a) CSMA/CS
b) CSMA/CA or CSMA/CS
c) CSMA/CD
d) CSNA/CD
e) CSMA/CA
8. Applications communicate with kernel by using
a) Unit cells
b) Shell Script
c) System Calls
d) Shell
e) C Programs
9. In which of the following office applications can you not name a file at the same time you create it
a) access
b) powerpoint
c) paint
d) word
e) excel
10. Personal computers can be connected together to form a
a) server
b) supercomputer
c) network
d) enterprise
e) none of these
Answers:
1. a) desktop computers
2. b) identity theft
3. c) columns and rows
4. a) simple names
5. d) UDP
6. b) DSSS
7. c) CSMA/CD
8. c) System Calls
9. c) paint
10. c) network
Thanks.