Preview

Foundations Practice Exam: Microsoft Technology Associate Exam

Good Essays
Open Document
Open Document
5236 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Foundations Practice Exam: Microsoft Technology Associate Exam
WFAv2 PE Foundations Practice Exam
Top of Form

Review Missed Questions
Questions
Your Answers
Feedback
1. Which network device directs the flow of information from one node on a network to another by giving each sender/receiver pair the line's entire bandwidth?
A router On a network, a switch directs the flow of information from one node to another. Switches operate faster than traditional network devices, such as hubs, bridges and routers, and are increasingly replacing those devices. A switch can give each sender/receiver pair the line's entire bandwidth, instead of sharing the bandwidth with all other network nodes.

Network Technology Associate v2.0, Lesson 2: Networking Components and Standards, section "Common Network Components." 2. Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. VNC consists of which two components?
The client and the server VNC consists of two components: the server and the viewer. The server listens on a specific port (for example, TCP 5800 on Windows systems) and allows clients to connect. The server also allows authenticated users to log on and see the same display they would see if they were sitting in front of the (server) computer. The viewer allows users to see the remote system's logon environment.

Internet Business Associate v2.0, Lesson 9: Internet Services and Tools for Business, section "Virtual Network Computing (VNC)." 3. Suppose you are looking at a command prompt window that displays network configurations. In the section labeled Ethernet Adapter Local Area Connection, you see IP addresses listed for the following categories:

Link-Local IPv6 Address
IPv4 address
Subnet Mask
Default Gateway

What does the Default Gateway address identify?
The local host on the network Most IP-enabled systems are also configured with a default gateway, which is an IP address that specifies a routing device (for example,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    JG NT2640

    • 333 Words
    • 1 Page

    8. Which of the following terms describe Ethernet addresses that can be used to communicate with more than one device at a time?…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Packet switching b. Circuit switching c. Telephone switching d. Telex switching 9. Internet is a. a local computer network b. a world wide network of computers c. an interconnected network of computers d. a world wide interconnected network of computers which use a common protocol to communicate with one another 10. ____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor 11. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together. A. management B. processing C. utility D. application…

    • 5339 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    When your computer connects to the Internet, it is assigned an Internet Protocol address (IP address), usually a different address each time you connect. If you're experiencing slow or no signal, the…

    • 856 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    In 1979, the American embassy in Iran was invaded by Iranian revolutionaries and several Americans were taken hostage. However, six managed to escape to the official residence of the Canadian Ambassador and the CIA was eventually ordered to get them out of the country. With few options, exfiltration expert Tony Mendez devised a daring plan: to create a phony Canadian film project looking to shoot in Iran and smuggle the Americans out as its production crew. With the help of some trusted Hollywood contacts, Mendez created the ruse and proceed to Iran as its associate producer. However, time was running out with the Iranian security forces closing in on the truth while both his charges and the White House had grave doubts about the operation themselves. Written by Kenneth Chisholm (kchishol@rogers.com)…

    • 870 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    11. If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address? The IP address was automatically assigned by Windows when it failed to lease an address from the DHCP server.…

    • 736 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In a logical network layout, IP addresses are shown to be associated with different parts of the network. One such element of a logical network includes assigned IP addresses to devices such as routers, switches, servers, workstations and other devices utilized on a network. Logical design usually do not show the actual interfaces and physical cables in the diagrams; thus the term "logical".…

    • 634 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Chapter1 P34

    • 898 Words
    • 2 Pages

    Computer specialists tackle computer problems by virtual meetings, which can save time and increase efficiency.…

    • 898 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lan Network

    • 819 Words
    • 4 Pages

    A Router is a device that operates at the network layer (layer 3), routing data between similar or dissimilar networks. A router is more powerful than a bridge or LAN…

    • 819 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Windows 7 Ippv4

    • 312 Words
    • 2 Pages

    When a computer is connected to a LAN network it uses a hardware address and an IP address. This is how one computer recognizes another computer so it may send and receive packets from end to other end. IPv4 consists of 2 identifier parts; Network Identifier and Host Identifier. Network identifier is where your system would specifically be located. Host Identifier is to identify the host of the network. Most networks today use DHCP to configure most IP settings. What DHCP does is it prevents duplication of any given IP address. In some cases an address may be entered in manually.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nuts and bolts of computer networks. Computer networks consist of end systems, packet switches, and communication links. End systems—also called hosts—include desktop PCs, laptops, hand-held network devices (including cell phones, PDAs, and BlackBerries), sensors, and servers (such as Web and mail servers). Just as cities are interconnected by a network of roads and intersections, end systems of a computer network are interconnected by a network of communication links and packet switches. Communication links can be wired or wireless. Distributed applications. A computer network enables distributed applications. A distributed application runs on end systems and exchanges data via the computer network. Distributed applications include Web surfing, e-mail, instant messaging, Internet phone, distributed games, peer-to-peer file sharing, television distribution, and video conferencing. New distributed applications continue to be invented and deployed on the Internet. Packet switching. When one end system sends data to another end system, the sending end system breaks the data into chunks, called packets. Similar to the process of delivering post-office mail, the Internet transports each packet separately, routing a packet to its destination using a destination address that is written into the packet. When a packet switch receives a packet, it uses the packet’s destination address to determine on which link it should forward the packet. Thus, a packet switch performs “packet switching,” forwarding incoming packets to outgoing links packet by packet. Also, packet switches typically “store and forward” packets—that is, before a switch begins to forward a packet on an outgoing link, first it receives and stores the entire packet. Protocol. A protocol defines the format and order of messages exchanged…

    • 8590 Words
    • 35 Pages
    Powerful Essays
  • Satisfactory Essays

    IP address

    • 320 Words
    • 2 Pages

    Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version 6.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Switching Techniques

    • 1531 Words
    • 7 Pages

    Communication networks carry information signals among entities, which are geographically far apart. An entity may be a computer or human being. A printer, a data terminal and so on. The entities are involved in the process of information transfer which may be in the form of a telephone conversation or a file transfer between two computers or message transfer between two terminal etc. so in this presentation we will be looking at how messages are forwarded through the network. Specifically, how and when buffers and switch ports of individual routers are allocated and released and thereby the timing which messages or message components can be forwarded to the next router on the destination path.…

    • 1531 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    shared desktop

    • 733 Words
    • 3 Pages

    During the work for the article author as tech support at the university he used to have RealVNC as our remote desktop software it was simple, a little slow but perfect to access a distant computer and help the user with their problems. You only need to have installed in the remote computer the client and the server in your own. Now I discovered TeamViewer, also a remote desktop software but in some ways pretty amazing.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Remote Access

    • 1553 Words
    • 7 Pages

    Remote access • refers to the ability to access a computer, such as a home computer or an office network computer, from a remote location. • Remote access can be set up using a local area network (LAN), wide area network (WAN) or even a virtual private network (VPN) so that resources and systems can be accessed remotely. • To establish a remote connection, both the local machine and the remote computer/server must have remote-access software. Alternatively, there are service providers that offer remote access via the Internet.…

    • 1553 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Video conferencing is a newer tool available to individuals and businesses, which allows people to communicate between two separate locations, via software that combines video and voice. This can be done as simply as a web camera and having conversations with friends and family. Businesses use this tool to improve many areas of the company. Travel expenditures, time, rentals, hotels, entertainment, etc, are all costs of traveling somewhere to conduct business.…

    • 759 Words
    • 4 Pages
    Good Essays

Related Topics