Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
The cyber-persona layer of cyberspace includes which of the following components?
What command prompt is used for privileged exec mode?
T/F Devices that have the same switch within the same broadcast domain?
How many binary digits does each octet of a dotted decimal IP address contain?
Which of the following components are part of the physical-network layer of cyberspace? Select all that apply.
Most of the support behind the development of early computer networks came from the U.S. DoD and which of the following?
Visiting a website includes these two layers of the OSI model working together:
T/F Devices connected to a router reside in a separate broadcast domain?
What command prompt is used for user exec mode?
What does a switch use to forward packets to the correct ports?
T/F Virtual interfaces are by default in the down state.
Rashan's company has multiple servers from which remote users download files. What should Rashan implement on his servers to make them appear as a single server so that they receive similar amounts of requests?
Eduardo accesses a managed switch from his desktop computer on the far side of the campus. What type of access management enables this connection?
Range names cannot be the same as a cell reference, such as C10 or $D$8
Which of the following answers refer to the 2G/3G mobile telecommunications standards? (Select 2 answers)
You cannot use a named range in a formula that references another worksheet
For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP).
Excel recognizes a construct like 3+4= as a legitimate formula
Once you name a range, you can change the size of the range using the Name Manager
In Excel, what is the result of =1 + 3 * 2 / 2 - 1?