Exercise & Quiz Test – 22


Question 1

1. A router is a___________
1. Forwards a packet to all outgoing links, except the link upon which the packet originated.
2. Forwards a packet to the next free outgoing link.
3. Forwards a packet to all outgoing links.
4. Determines on which outgoing link a packet is to be forwarded.
5) None of these

Answer & Solution
Answer-4
Question 2

2. What would you need to establish if you wanted to insure that the key in one database table was the same as a key in another database table?
1) Top-level grouping
2) Connectivity
3) Referential integrity
4) Field properties
5) None of these

Answer & Solution
Answer.) 3
Question 3

3. If you wished to limit what you would see on an Excel worksheet, what data function would you use?
1) Sort
2) Filter
3) Conditional format
4) Data analysis
5) None of these

Answer & Solution
Answer.) 2
Question 4

4. What Excel tool allows you to create quickly and automatically summary data from a large data set?
1) Conditional formatting
2) Sorting
3) Pivot tables
4) Field lists
5) None of these

Answer & Solution
Answer.) 3
Question 5

5. A(n) __________ file contains information in an indexed and cross-linked format.
1) executable
2) initialization
3) help
4) library
5) None of these

Answer & Solution
Answer.) 3
Question 6

6. __________ are text files containing OS commands.
1) Initialization files
2) Batch files
3) Executable files
4) Help files
5) None of these

Answer & Solution
Answer.) 2
Question 7

7. Which of the following will not protect you from spam?
1) spam blockers
2) e-mail rules
3) popup blocker
4) filters
5) None of these

Answer & Solution
Answer.) 3
Question 8

8. To read the system messages and warnings, access the __________ in Windows.
1) system manager
2) control panel
3) event viewer
4) message screen
5) None of these

Answer & Solution
Answer.) 3
Question 9

9. If configured correctly, the __________ will prevent interaction with your computer after a specified time period.
1) firewall
2) filter
3) screen saver
4) popup blocker
5) virus

Answer & Solution
Answer.) 3
Question 10

10. The __________ of a threat measures its potential impact on a system.
1) vulnerabilities
2) countermeasures
3) degree of harm
4) susceptibility
5) none of these

Answer & Solution
Answer.) 3