Google IT

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In punch card systems, a hole represents the number

1

How long do you have to complete each Qwiklab

1 hour

Question 1 Which of these is a valid byte? Check all that apply

11011011 00000000 A byte is composed of eight bits of zeros and ones.

Calculate how many decimal numbers a 4-bit number can represent

16

Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field

16 bits

Which of the following is a correct form of CIDR notation

192.168.1.0/24

Computer A wants to send some data to computer B. Computer A knows that Computer B is not on its local network, so it sends the packet to the router between Network A and Network B. Based on how many network hops have happened, how much will the TTL field be decremented by

2

What will the operator 1 AND 1 return

2

Question 4 What is the highest decimal value we can represent with a byte?

255

There are 4 bytes in an IPv4 address. What is the highest decimal value you can have for one byte?

255

Which one of these are a valid IPv4 address? Check all that apply

255.255.255.0 54.45.43.54 1.1.1.1

How many possible values can we have with 8 bits?

256

How many bits long is a Autonomous System Number (ASN)

32

Which number cannot be represented by eight bits of data

436

Please select all of the valid IP addresses

8.8.8.8, 192.168.1.1

Question 5 The binary value of the ASCII letter "c" is 0110 0011. Using the handy chart that we learned in the lesson, convert this number to its decimal value. You'll need to use some math for this question.

99. The decimal value 99 is same as the binary value 0110 0011. So the numbers that are turned ON are 64, 32, 2, and 1 and added up together. In other words, 64 + 32 + 2 + 1 = 99.

What is the difference between a ROM chip and a RAM chip? Check all that apply.A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.A ROM chip is volatile and will wipe its data in the case of a power failure. A RAM chip is non-volatile and will keep its data in the case of a power failure.

A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.A ROM chip stores permanent data. A RAM chip stores temporary data.

A(n) ____ is a series of steps that solve specific problems

Algorithms

What are the characteristics of virtual memory? Check all that apply.

Allows our computer to have more memory than it physically has.Stores pages that are currently not in use by physical memory Combination of RAM and hard drive space

VPN (Virtual Private Network)

Allows you to connect to a private network, like your work network, over the internet

Question 2 Who is permitted to use non-routable address space

Anyone

character encoding

Assigns our binary values to characters, so that we as humans can read them.

Question 1 Select examples of routing protocols. Check all that apply

Border Gateway Protocol/Routing Information Protocol

What does CIDR stand for

CIDR stands for Classless Inter-Domain Routing

Where are your BIOS settings stored?Flash driveHard driveCMOS chipRAM

CMOS chip

What do you need to do to finish a lab and have your grade posted to Coursera

Click the red "End Lab" button

Ports

Connection points that we can connect devices to that extend the functionality of our computer

Which of these is application software? Check all that apply.

Email client Web browser

Peripherals

External devices we connect to our computer, like a mouse, keyboard, and monitor

Question 1 True or false: The Internet is the World Wide Web

F

True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system

F

rue or false: You should only worry about computer security if you work in a computer security role

F

An ARP broadcast is sent to the special MAC address

FF:FF:FF:FF:FF:FF

What is the file manager in macOS called

Finder

A device that blocks traffic that meets certain criteria is know as a

Firewall

What is the process of taking a single IP datagram and splitting it up into several smaller datagrams called?

Fragmentation

Expansion slots

Give us the ability to increase the functionality of our computer.

If you want to boot into a USB drive, how do you change your boot settings

Go into the BIOS settings and change the boot settings

Which of these are considered I/O devices? Check all that apply.

Hard disk drives Monitors Web cams Speakers(Any devices that receive input or send out output are considered I/O devices.)

What are the four layers of the computer architecture

Hardware, Operating System, Software, User

What is the difference between an interpreted and a compiled language? Check all that apply

Interpreted languages are not broken into machine instructions beforehand.Compiled languages are translated into machine instructions beforehand.

What are the two main parts that make up an operating system?

Kernel and Userspace; The two parts that make up an operating system are the kernel and the user space.

You're having trouble connecting to the Internet, so you call your Internet Service Provider for help. They need to know the permanent unique identifier of your networking device, to help them troubleshoot. What are they asking for?

MAC address

What are the three main desktop operating systems used today? Check all that apply.

Mac, Windows, Lunix

Hardware Layer

Made up of the physical components of a computer.

Are you able to access your work once you click the "End Lab" button

No

What is software called when it can be freely distributed, modified, and shared

Open-source

Which of these functions does the BIOS perform? Check all that apply.Installs drivers

POSTChecks what devices are connected to the computer

Please select all valid TCP control flags

RST, ACK, URG

Where does the CPU store its computations

Registers

What ordering of TCP flags makes up the Three-way Handshake

SYN, SYN/ACK, ACK

What characteristics distinguish a Solid State Drive from a Hard Disk Drive? Check all that apply

Smaller form factor, Non-moving parts

What is the process of taking a large network and splitting it up into many individual and smaller subnetworks called

Subnetting

Which of the following devices are used in networking? Check all that apply

Switches Routers hubs

True or false: If you plug in a 220v appliance into a 120v outlet, the appliance could get damaged

T

Question 2 What is the fundamental protocol that the Internet uses today?

TCP/IP

Question 6 Which of the following protocols is the primary infrastructure that creates the Internet?

TCP/IP

Which mechanisms do we use to transport binary data and memory addresses

The External Data Bus

CPU (Central Processing Unit)

The brain of the computer it does all the calculations and data processing

What is the purpose of an ARP response?

The node that wants to send data sends a broadcast ARP message to the MAC broadcast address which is all F's. When the network interface receives this ARP broadcast, it sends back what's known as an ARP response. This response message will contain the MAC address for the network interface in question.

Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below

The session layer/The presentation layer

TTL stands for

Time to Live

A typical routing table may contain which of the following? Check all that apply

Total hops/Destination network

True or false: It can take some time for the labs to load once you click "start lab

True

True or false: It can take some time for the working instance of Linux and Windows OS to load

True

What is the difference between a traditional BIOS and UEFI? Check all that apply.UEFI has better compatiblity with newer hardware.UEFI has become the default BIOS on new systems.A traditional BIOS has better compatibility with newer hardware.UEFI is meant to become the new standard for BIOS.

UEFI has become the default BIOS on new systems UEFI is meant to become the new standard for BIOS. UEFI has better compatiblity with newer hardware

What is www.google.com an example of?

URL

Question 3 Why did UTF-8 replace the ASCII character-encoding standard

UTF-8 can store a character in more than one byte

What is the last step in booting a computer?

User space is launched.(the last step in booting a computer is launching the user spaces, like a login window, GUI, and more.

Which of these is system software? Check all that apply

Windows OS BIOS

Which of these are a GUI?

Word Application iOS desktop

Which of these are true? Check all that apply.

You can have many processes running for one program.A program is an application that we can run. A process is a program that is executed

Computer

a device that stores and processes data by performing calculations

In the Linux distribution Ubuntu, what command would you use to install an application?run

apt

A ________ is where one network ends and another begins

demarcation point

What protocol communicates data between routers representing the edges of autonomous systems

exterior gateway

Using logical operators, 1 AND 0 = _____.

false

What are the main components of file management? Check all that apply

file system metadata file data

hard drive

holds all of our data which includes all of our music, pictures, applications

software

how we as users directly interact with our computer

What is IT

information technology the use of digital technology, like computers and the internet, to store and process data into useful information

Programs

instructions that tell the computer what to do

What is known as networking in the IT field? Check all that apply.

managing networks building networks designing networks

What was the biggest problem with the earliest version of the Internet in the late 1960s?

networks could not talk to each other

Which Internet Protocol version is 100.0.0.256?

not valid ip address

What is eight bits of data called

octet

System on a Chip (SoC)

packs the cpu,ram, and sometimes even the storge onto a single chip

What cards had holes in them that were historically used to store data?

punch cards

Ram

short term memory

A subnet ID is calculated via a

subnet mask

Wattage

the amount of volts and amps that a device needs

Cryptography

the art of writing or solving codes.

Motherboard

the body or circulatory system of the computer that connects all the pieces together

binary system

the communication that a computer uses, also know as a base-2 numeral system

operating system

the whole package that manages our computers resources and let's us interact with it

What command can you use to create a file using bash

touch

A ____ is an emulation of a physical machine

virtual machine

How long will it take to transfer a file size of 1GB on a USB 2.0 and a USB 3.0 drive?usb 2.0 -> transfer speeds of 480Mb/susb 3.0 -> transfer speeds of 5 Gb/susb 3.1 -> transfer speeds of 10 Gb/s

~17 seconds on a usb 2.0 drive; ~2 seconds on a usb 3.0 drive;; Theoretically, USB 2.0 has a bandwidth of 480 Mb/s, which is roughly 60 MB/s. It would take around 17 seconds to transfer 1024 MB of data.


संबंधित स्टडी सेट्स

Chapter 53: Assessment of Kidney and Urinary Function

View Set

Sociology Chapter 10 Test Review

View Set

Urinary System Career Specialties

View Set

Verbs ending in -gar, -car and -zar in the preterite yo form.

View Set