You are on page 1of 3

Module Title: Care for Network and Computer Hardware exam for DBA L-II

NAME _______hanan mohammd____________________________ ID. No.007 ___________data


base______

I. Choose the Correct answer from the given alternatives.

1. The computer network limited to a small geographic area such as a school or office
building is:
A. LAN B. MAN C. WAN
2. A computer designed to be used by one person to perform work-related tasks is
A. Server B. Workstation C. Modem
3. Which hardware device that connects two or more computer networks and selectively
forwards data from one network to another?
A. Modem B. Router C. switch D. Server
4. 4. Which utility finds for unnecessary files such as Temporary Internet files and the
Recycle bin and then deletes them?
A. Defragmentation C. Add/Remove Programs.
B. Disk Cleanup
5. Which devices to provide protection for computer hardware from electrical problems?
A. UPS C. Voltage stabilizer
B. Surge protectors D. All of the above
6. __________ is an agreement which sets out the level of service and maintenance to be
provided.
A. A Service Level Agreement B. Quality C. Compatibility
7. What are the technical specifications of the hardware device need to be evaluated?
A. Speed of the CPU C. size of memory (RAM)
B. software capabilities D. all of the above
8. A few reasons and benefits a user should expect to see when upgrading a hardware device:
A. Capacity increase B, Performance increase C, Compatibility D, All of the
above
9. A program or piece of code that is loaded and run itself onto your computer is:
A. Virus B. worm C. SPAM D. phishing

10. Which threats are flooding the Internet with many copies of the same message?
A. Virus B. worm C. SPAM D. phishing
11. ___________ is a device or program that allows listen on traffic traveling between
networked computers.
A. Viruses B. Packet Sniffers C. Phishing D.SPAM
12. ________is a system in which computers are connected to share information and
resources
A. Network threat B. Network Security C. Computer Network D. Protocol
13 What is the process of converting data into codes and ciphers?
A. Password B. Authorization C. encryption
14, a software program that displays advertising on your computer is:
A. Adware B. Spyware C.SPAM D. Trojan Horses
II. Match column ‘A’ to column ‘B’

__c____1. Wide Area Network ____e__8. Network Interface


___a___2. Server A. performs arithmetic and logical operations
__d____3. Peripheral devices B. the electrical power is delivered above the set conditions
__e____4. Memory C. covers a wide geographic area
_a_____5.ALU D. added to a host computer
___g___6.Video controller E. Connects the computer to a network
___b___7.surge F. Where the information is stored
G. A board in the computer that controls the monitor
III. Fill the blank space

1. _____balk out________________ when the total loss of electrical power or in other


words there is no power.
2. ______bloc out_________________ the electrical power is delivered below the set
conditions for the computer hardware.
3. ___________up geared ________________________ often involves removing an old hardware device and
replacing it with a new hardware device.

You might also like