0% found this document useful (0 votes)
71 views

LONG-QUIZ

Hhhhh

Uploaded by

murillojerson82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views

LONG-QUIZ

Hhhhh

Uploaded by

murillojerson82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer System Servicing

Grade 12

NAME_________________________________ 13. Which of the following is an example of a client-server


model?
a. FTP
Write the letter of the correct answer on the ¼ b. DNS
c. TELNET
sheet of paper.
d. All of the above
14. Networks where end user workstations are tied to LAN
servers to share resources and application processing.
a. Client/server networks
Multiple choice test: b. Internetworked enterprise
c. Information super highway
1. A typical ____ program creates some remote objects, d. Business applications of telecommunications
makes references to these objects accessible, and 15. Network in which each computer is either acts as server
waits for clients to invoke methods on these objects. or a client is called?
a. Server a. Dedicated server network
b. Client b. Peer-to-peer network
c. Thread c. Metropolitan area network
d. Concurrent d. Local area network
2. What objects that acts as a gateway for client side? 16. Each server in a computer dedicated server network is
a. Skeleton known as?
b. Stub a. Dedicated server
c. Remote b. Dedicated receiver
d. Server c. Dedicated client
3. What do you call the gateway for the server-side d. Dedicated sender
object? 17. Which of the following items are not necessary for
a. Skeleton client/server?
b. Stub a. Assure that tools will connect with middleware.
c. remote b. Understand the requirements
d. server c. Determine network bandwidth capabilities
4. a central computer which is powerful than other d. Include the use of a file server
computers in the networks is called as? 18. Characteristic of a file server is which of the following?
a. Client a. Manages file operations and is shared on a
b. Server network
c. Hub b. Manages file operations and is limited to one PC
d. Switch c. Acts as a fat client and is shared on a network
5. Machine that places the request to access the data is d. Acts as a fat client and is limited to one PC
generally called as? 19. Client/server security includes which of the following?
a. Server machine a. Physical security
b. Client machine b. Change control security
c. Request machine c. Measures taken to secure all systems
d. None of the above d. All of the above
6. The application of the client and server model are 20. Which of the following is true concerning the
a. World wide web mainframe?
b. Network printing a. It is the same thing as client/server
c. Email b. Requires someone to decide which code should
d. All of the above be on the workstation or the server
7. The client-server model is an approach to computer c. Mission-critical system have tended to remain
network programming developed at _____ there
a. AT%T bell lab d. All of the above
b. Xerox PARC 21. A server cannot serve on which of the following levels?
c. Intel Lab a. Client layer
d. None of the above b. Business layer
8. File transfer protocol (FTP) is built on ____ architecture c. Database layer
a. Peer to peer d. All of the above
b. Client server 22. The three different application logic components are
c. Both a and b which of the following?
d. None of the above a. Presentation, client, and storage
9. The time taken by a packet to travel from client to b. Presentation, client, and storage
server and then back to the client is called? c. Presentation, processing, and storage
a. STT d. Presentation, processing, and network
b. RTT 23. A database server is responsible for which of the
c. PTT following?
d. Total time a. Database storage
10. What architecture FTP is built on? b. Data processing logic
a. Client-server c. Data presentation logic
b. P2P d. All of the above
c. Both of the above 24. What is a server?
d. None of the above a. A computer that hosts data and other resources
11. The local operating system on the server machine for clients
passes the incoming packets to the b. A network where data is hosted and pulled by
a. Server stub clients
b. Client stub c. A computer that does all of the work for another
c. Client operating system computing, serving its very need
d. None of the above d. A satellite computer that requests data from a
12. Alex is required to provide information on how many central computer in a network
people are using the network at any one time. Which 25. Which best describes a server?
network will enable him to do so? a. A computer that stores data
a. Star b. Central computer provides clients with
b. Ethernet functionality
c. Token-ring c. A computer that store software
d. Server-based d. A computer within a network
Computer System Servicing
Grade 12

26. What does a server store? 39. Which of the following component of HTTP response
a. Client data indicates HTTP version?
b. Back up files a. Status/response code
c. Software and client data b. HTTP version
d. Software c. Response header
27. Which best describes a client? d. Response body
a. A computer connected to a client-server network 40. Which of the following component of HTTP response
b. A client belongs to the server contains metadata for the HTTP response message as
c. Something that serves the server key value pairs?
d. Something that is connected to the main a. Status/response code
computer b. HTTP version
28. Why is a client reliant on a server? c. Response header
A. The client might get abducted without the server d. Response body
B. Client retrieves saved data and software from the 41. Which of the following HTTP method should be used to
server get status of method availability in restful web service?
C. The server prevents the client form breaking down a. GET
D. The client’s does not power on without the server b. HEAD
29. Which is an advantage of client-server networks? c. PUT
a. Client-server networks are easy to maintain d. OPTIONS
b. The client relies on the server 42. Which of the following header of HTTP response
c. Client-server networks are cheap to build provides the date and time of the resource when is was
d. Clients are kept secure by the server last modified?
30. Which is an advantage of client-server networks? a. Date
a. Files/internet connections/hardware can be b. Last modified
shared c. Cache control
b. The networks are always fast and reliable d. Expires
c. The network never stops functioning 43. Which of the following is a best practice for designing a
d. A client’s is back up every minute secure restful web service?
31. Which is a disadvantages of a client-server network? a. Validate XML/JSON check for well formed input
a. When server isn’t on clients don’t power up passed to a web service
b. Dependent on server if it goes down, clients stop b. Throw generic error messages- a web services
working method should use HTTP error messages
c. Clients can’t connect wirelessly to the server c. Both of the above
d. Clients are more expensive than servers d. None of the above
32. Which best describes a peer to peer network? True or False Test: 44-45
a. To peers connected together
b. To piers connected together 44. You can use the pin utility to prove that the printer is
c. Devices connected together without a server connected to the network, powered on, and online.
d. Two devices connected together without a client a. True
33. What are the advantages of a peer to peer network? b. False
a. More stylish 45. When you install a printer that is connected directly to
b. Faster the windows server 2003 system, the installation process
c. Relatively cheap, low maintenance does not create a logical printer device for it.
d. More effective a. True
34. Which is a disadvantage of a peer to peer network? b. False
a. Central management is more difficult 46. Which of the following is considered a standard NTFS
b. No central management, can be slow permission?
c. Peer to peer networks are expensive a. List folder contents
d. Peer to peer networks are difficult to maintain b. Read extended attributes
35. Stored procedures have which of the following c. List folder/read data
advantages? d. Create folder/append data
a. It takes a longer time to write them as compared 47. Which of the following task can be performed with the
to writing visual basic. full control share permission but not the changes share
b. Network traffic increases permission?
c. Data integrity improves as multiple applications a. Changing the name of the file
access the same stored procedure. b. Changing file permissions
d. Result in thicker client and thinner database server c. Changing the contents of the file
36. Client/server security includes which of the following? d. Deleting the file
a. Physical security 48. You want a user to take ownership of a file or folder
b. Change control security that she did not create. Which of the following groups
c. Measures taken to secure all system do you not a dd here to?
d. All of the above a. Administrators group
37. Which of the following is true concerning the b. Backup operators’ group
mainframe? c. Create/owner special identity
a. It is the same thing as client/server d. Server operators’ group
b. Requires someone to decide which code should 49. How many processors does the 64-bit version of
be on the workstation or the server windows server 2003 data center edition support?
c. Mission critical systems have tended to remain a. 4
there b. 8
d. All of the above c. 32
38. Which of the following is correct about web services? d. 64
a. A web service is a collection of open protocols 50. Which of the following backup types does not alter the
and standards used for exchanging data between archive bit on a newly created file?
applications or systems a. Full
b. Software applications written in various b. Incremental
programming languages and running on various c. Symmetrical
platforms can use web services to exchange data d. Differential
among them over computer networks like the
internet
c. Both of the above
d. None of the above

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy