Google IT
In punch card systems, a hole represents the number
1
How long do you have to complete each Qwiklab
1 hour
Question 1 Which of these is a valid byte? Check all that apply
11011011 00000000 A byte is composed of eight bits of zeros and ones.
Calculate how many decimal numbers a 4-bit number can represent
16
Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field
16 bits
Which of the following is a correct form of CIDR notation
192.168.1.0/24
Computer A wants to send some data to computer B. Computer A knows that Computer B is not on its local network, so it sends the packet to the router between Network A and Network B. Based on how many network hops have happened, how much will the TTL field be decremented by
2
What will the operator 1 AND 1 return
2
Question 4 What is the highest decimal value we can represent with a byte?
255
There are 4 bytes in an IPv4 address. What is the highest decimal value you can have for one byte?
255
Which one of these are a valid IPv4 address? Check all that apply
255.255.255.0 54.45.43.54 1.1.1.1
How many possible values can we have with 8 bits?
256
How many bits long is a Autonomous System Number (ASN)
32
Which number cannot be represented by eight bits of data
436
Please select all of the valid IP addresses
8.8.8.8, 192.168.1.1
Question 5 The binary value of the ASCII letter "c" is 0110 0011. Using the handy chart that we learned in the lesson, convert this number to its decimal value. You'll need to use some math for this question.
99. The decimal value 99 is same as the binary value 0110 0011. So the numbers that are turned ON are 64, 32, 2, and 1 and added up together. In other words, 64 + 32 + 2 + 1 = 99.
What is the difference between a ROM chip and a RAM chip? Check all that apply.A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.A ROM chip is volatile and will wipe its data in the case of a power failure. A RAM chip is non-volatile and will keep its data in the case of a power failure.
A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.A ROM chip stores permanent data. A RAM chip stores temporary data.
A(n) ____ is a series of steps that solve specific problems
Algorithms
What are the characteristics of virtual memory? Check all that apply.
Allows our computer to have more memory than it physically has.Stores pages that are currently not in use by physical memory Combination of RAM and hard drive space
VPN (Virtual Private Network)
Allows you to connect to a private network, like your work network, over the internet
Question 2 Who is permitted to use non-routable address space
Anyone
character encoding
Assigns our binary values to characters, so that we as humans can read them.
Question 1 Select examples of routing protocols. Check all that apply
Border Gateway Protocol/Routing Information Protocol
What does CIDR stand for
CIDR stands for Classless Inter-Domain Routing
Where are your BIOS settings stored?Flash driveHard driveCMOS chipRAM
CMOS chip
What do you need to do to finish a lab and have your grade posted to Coursera
Click the red "End Lab" button
Ports
Connection points that we can connect devices to that extend the functionality of our computer
Which of these is application software? Check all that apply.
Email client Web browser
Peripherals
External devices we connect to our computer, like a mouse, keyboard, and monitor
Question 1 True or false: The Internet is the World Wide Web
F
True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system
F
rue or false: You should only worry about computer security if you work in a computer security role
F
An ARP broadcast is sent to the special MAC address
FF:FF:FF:FF:FF:FF
What is the file manager in macOS called
Finder
A device that blocks traffic that meets certain criteria is know as a
Firewall
What is the process of taking a single IP datagram and splitting it up into several smaller datagrams called?
Fragmentation
Expansion slots
Give us the ability to increase the functionality of our computer.
If you want to boot into a USB drive, how do you change your boot settings
Go into the BIOS settings and change the boot settings
Which of these are considered I/O devices? Check all that apply.
Hard disk drives Monitors Web cams Speakers(Any devices that receive input or send out output are considered I/O devices.)
What are the four layers of the computer architecture
Hardware, Operating System, Software, User
What is the difference between an interpreted and a compiled language? Check all that apply
Interpreted languages are not broken into machine instructions beforehand.Compiled languages are translated into machine instructions beforehand.
What are the two main parts that make up an operating system?
Kernel and Userspace; The two parts that make up an operating system are the kernel and the user space.
You're having trouble connecting to the Internet, so you call your Internet Service Provider for help. They need to know the permanent unique identifier of your networking device, to help them troubleshoot. What are they asking for?
MAC address
What are the three main desktop operating systems used today? Check all that apply.
Mac, Windows, Lunix
Hardware Layer
Made up of the physical components of a computer.
Are you able to access your work once you click the "End Lab" button
No
What is software called when it can be freely distributed, modified, and shared
Open-source
Which of these functions does the BIOS perform? Check all that apply.Installs drivers
POSTChecks what devices are connected to the computer
Please select all valid TCP control flags
RST, ACK, URG
Where does the CPU store its computations
Registers
What ordering of TCP flags makes up the Three-way Handshake
SYN, SYN/ACK, ACK
What characteristics distinguish a Solid State Drive from a Hard Disk Drive? Check all that apply
Smaller form factor, Non-moving parts
What is the process of taking a large network and splitting it up into many individual and smaller subnetworks called
Subnetting
Which of the following devices are used in networking? Check all that apply
Switches Routers hubs
True or false: If you plug in a 220v appliance into a 120v outlet, the appliance could get damaged
T
Question 2 What is the fundamental protocol that the Internet uses today?
TCP/IP
Question 6 Which of the following protocols is the primary infrastructure that creates the Internet?
TCP/IP
Which mechanisms do we use to transport binary data and memory addresses
The External Data Bus
CPU (Central Processing Unit)
The brain of the computer it does all the calculations and data processing
What is the purpose of an ARP response?
The node that wants to send data sends a broadcast ARP message to the MAC broadcast address which is all F's. When the network interface receives this ARP broadcast, it sends back what's known as an ARP response. This response message will contain the MAC address for the network interface in question.
Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below
The session layer/The presentation layer
TTL stands for
Time to Live
A typical routing table may contain which of the following? Check all that apply
Total hops/Destination network
True or false: It can take some time for the labs to load once you click "start lab
True
True or false: It can take some time for the working instance of Linux and Windows OS to load
True
What is the difference between a traditional BIOS and UEFI? Check all that apply.UEFI has better compatiblity with newer hardware.UEFI has become the default BIOS on new systems.A traditional BIOS has better compatibility with newer hardware.UEFI is meant to become the new standard for BIOS.
UEFI has become the default BIOS on new systems UEFI is meant to become the new standard for BIOS. UEFI has better compatiblity with newer hardware
What is www.google.com an example of?
URL
Question 3 Why did UTF-8 replace the ASCII character-encoding standard
UTF-8 can store a character in more than one byte
What is the last step in booting a computer?
User space is launched.(the last step in booting a computer is launching the user spaces, like a login window, GUI, and more.
Which of these is system software? Check all that apply
Windows OS BIOS
Which of these are a GUI?
Word Application iOS desktop
Which of these are true? Check all that apply.
You can have many processes running for one program.A program is an application that we can run. A process is a program that is executed
Computer
a device that stores and processes data by performing calculations
In the Linux distribution Ubuntu, what command would you use to install an application?run
apt
A ________ is where one network ends and another begins
demarcation point
What protocol communicates data between routers representing the edges of autonomous systems
exterior gateway
Using logical operators, 1 AND 0 = _____.
false
What are the main components of file management? Check all that apply
file system metadata file data
hard drive
holds all of our data which includes all of our music, pictures, applications
software
how we as users directly interact with our computer
What is IT
information technology the use of digital technology, like computers and the internet, to store and process data into useful information
Programs
instructions that tell the computer what to do
What is known as networking in the IT field? Check all that apply.
managing networks building networks designing networks
What was the biggest problem with the earliest version of the Internet in the late 1960s?
networks could not talk to each other
Which Internet Protocol version is 100.0.0.256?
not valid ip address
What is eight bits of data called
octet
System on a Chip (SoC)
packs the cpu,ram, and sometimes even the storge onto a single chip
What cards had holes in them that were historically used to store data?
punch cards
Ram
short term memory
A subnet ID is calculated via a
subnet mask
Wattage
the amount of volts and amps that a device needs
Cryptography
the art of writing or solving codes.
Motherboard
the body or circulatory system of the computer that connects all the pieces together
binary system
the communication that a computer uses, also know as a base-2 numeral system
operating system
the whole package that manages our computers resources and let's us interact with it
What command can you use to create a file using bash
touch
A ____ is an emulation of a physical machine
virtual machine
How long will it take to transfer a file size of 1GB on a USB 2.0 and a USB 3.0 drive?usb 2.0 -> transfer speeds of 480Mb/susb 3.0 -> transfer speeds of 5 Gb/susb 3.1 -> transfer speeds of 10 Gb/s
~17 seconds on a usb 2.0 drive; ~2 seconds on a usb 3.0 drive;; Theoretically, USB 2.0 has a bandwidth of 480 Mb/s, which is roughly 60 MB/s. It would take around 17 seconds to transfer 1024 MB of data.