Mini Bio

J-Hao / Singapore / 17+ / Mass Comm-er / watch tv / sleeping / jogging / enjoying life / ...

Tag Board

to be updated soon.

Links

. .-.to be updated soon.-. .

Wednesday, November 17, 2010

1
As an assignment, a computer science student needs to present data in binary
format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F

2
Refer to the exhibit. What is the effect of setting the security mode to WEP on the
Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the
AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a
connection with the AP.
The WEP security mode identifies the WLAN.

3
Which two statements correctly describe MAC addresses? (Choose two.)
MAC addresses are used to identify a specific NIC.
MAC addresses contain a network number and unique host identification.
MAC addresses are physical addresses.
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses are Layer 3 addresses.

4
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer

5
Which protocol is used by a client to retrieve an e-mail from a remote server using a
TCP/IP connection?
DNS
FTP
POP
HTTP

6
Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only
network applications.
Network applications are installed on a network server.
Network applications are accessible by one computer at a time.

7
Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
split pair

8
Refer to the exhibit. A new switch is connected to an existing switch that has a fully
populated MAC table. PC1 requires the destination MAC address of PC3 in order to
send a message. Which device or devices will see the ARP sent by PC1?
only PC3
PC2 and PC3
PC3 and PC4
PC2, PC3 and PC4

9
The area covered by a single AP is known as what?
ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

10
A small company owns one older AP that provides a maximum data rate of 11 Mb/s.
The company wants to add a newer AP that will provide a faster data rate but be
compatible with the existing AP. What two wireless standards are referenced in this
scenario? (Choose two.)
802.11
802.11a
802.11b
802.11d
802.11g

11
Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
ISPs obtain address blocks from registry organizations.

12
Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the
data out Fa0/1, what destination MAC address will the router place in the frame?
0050.0FA9.CB47
0050.E208.A761
0200.5455.4E01
0200.545D.25F7

13
What is an advantage of selecting an operating system that has a commercial
license over one with a GPL license?
The commercial license-based operating system ensures full access to the source
code for everyone.
The commercial license-based operating system ensures that everyone can
participate in the enhancement of the product.
The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.

14
A user is unable to send e-mail. To begin troubleshooting this problem, the network
technician uses the browser on the PC and tries to access some popular Internet
websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error

15
A network technician is required to provide access to the Internet for a large
company. What is needed to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server

16
Refer to the exhibit. Host A sends a message to a group of four computers out of the
ten computers on this network. Which type of message does host A send?
broadcast
multicast
simulcast
unicast

17
What are two advantages of purchasing a preassembled computer? (Choose two.)
The cost is comparatively lower1 `.
High-performance graphics and gaming applications are supported.
There is a negligible waiting period for assembly.
This type of computer is useful for knowledgeable consumers with special needs.
The user can specify high-performance components.

18
Which protocol is used by a client to browse the web server?
FTP
HTTP
POP
SMTP

19
Which three address ranges can be used to depict private IP addresses? (Choose
three.)
10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255
192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255

20
TCP/IP data transmission between the source and destination host is de-
encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D

21
Which two causes of networking problems are related to the physical layer? (Choose
two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask

22
For an IP address, what component decides the number of bits that is used to
represent the host ID?
default-gateway
host number
network number
subnet mask

23
All hosts within a domain receive the same frame that originates from one of the
devices. The domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast

24
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.

25
What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It examines incoming e-mail messages to identify the unsolicited ones.

26
What is the function of the DNS server?
It maps the IP address to the MAC address.
It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.

27
Your school network blocks all websites related to online gaming. What type of
security policy is being applied?
identification and authentication
remote access
acceptable use
incident handling

28
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.


29
Which statement accurately describes what network devices do in the distribution
layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.

30
Refer to the exhibit. Assume that the exhibited output is from a host that is
connected to a Linksys integrated router. What is the first thing that should be
checked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the

31
Which statement is true about packet filtering?
It recognizes and filters specific types of attacks.
It permits access based on IP address.
It is performed from a host network device.
It translates an internal address or group of addresses into a public address that is
sent across the network.

32
Which part of the electromagnetic spectrum is commonly used by wireless LANs?
Bluetooth
infrared
Industrial Scientific and Medical (ISM)
radio frequency (RF)


33
What is the most common reason that ISPs provide symmetrical transfer services?
to address data transfer needs of home users
to download significantly more than upload
to host servers on the Internet
to work with applications that require less bandwidth

34
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

35
Which type of computer uses an integrated monitor and keyboard?
pocket PC
laptop
mainframe
server
workstation

36
A learner wants to interact with the operating system of a computer. Which two
methods can be used for this? (Choose two.)
CLI
GUI
kernel
third party software
shell

37
Select the connection that would require a straight-through cable.
a switch to a hub
a router to a switch
a switch to a switch
a router to a router

38
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are
used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins that are
used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.



39
Within a local network, which two items must be unique on a computer for it to
successfully connect to the network? (Choose two.)
IP address
subnet mask
computer name
default gateway address
operating system version

40
What data communication technology uses low-power radio waves to transmit data?
copper cable
fiber optic cable
wireless
radio

41
Refer to the exhibit. A wireless DHCP client is unable to access the web server.
Given the output that is shown in the exhibit, what two things should the network
technician verify first to troubleshoot this problem? (Choose two.)
the wireless client configuration for DHCP
the default gateway
the firewall configuration
the SSID
the physical connectivity between the server and the client

42
What is the purpose of the ipconfig /release command?
It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has
learned.
It shows the current IP configuration on the client.

43
Which two statements are characteristics of DHCP services? (Choose two.)
A DHCP client determines the lease time for using the IP address that is supplied by
the DHCP server.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
DHCP clients send a DHCP Discover message to the destination IP address of
255.255.255.255.
The DHCP server maps the IP addresses to host names.
The integrated router acts as a DHCP server for internal hosts on local networks.

44
What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer

45
When is the use of a DSL modem necessary?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a high-speed digital connection is required over the regular telephone line
when a satellite dish is used

46
Refer to the graphic. What feature can be installed on the Linksys integrated router to convert
private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
NAT
WEP

47
Which installation option should be chosen when the current operating system is too damaged to
work properly?
upgrade
multi-boot
clean install
virtualization

48
Refer to the exhibit. Which statement is true based on the information that is shown in the
exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of University.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.



49
Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
UDP
SMTP
TFTP
TCP

50
Which statement is true about UTP cable termination?
Cables with RJ-45 connectors are always preterminated.
An RJ-45 connector is used on only one end of the UTP cable.
Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier
installation of the RJ-45 connector.
The RJ-45 connector should be pushed over the wire jacket for a smooth connection.

51
What is the meaning of the term crosstalk?
interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device

52
What information within a data packet does a router use, by default, to make forwarding
decisions?
the destination MAC address
the destination IP address
the destination host name
the destination service requested

- CCNA final exam
by Dj Z @
3:43 PM

Friday, September 26, 2008

I guess beside towards peggy or for projects, I hardly throw my anger around? I admit that i'm moody and emotional over the past year. But I really am.

I didn't expect anyone to adapt to me. I didn't expect the rest to come cuddling and comforting me.. That's why I chose to walk away when I'm down or didn't feel like talking. I don't like to wear a fake smile. That's not me. i don't want to be fake, especially towards my friends. To me, i rather treat friends with my true feelings, because I believe that if they are really my friends, they will be understanding. If I really want to be happy, I'd rather walk away to calm down first before facing the rest again.

I ever told PH this:
"To friends, if I keep quiet, they will understand.
But to the others, they don't, I have to 'PR' and tt means I have to talk and smile. But it wouldn't be from my heart"

So which do you prefer?




I chose to hang out with the rest but I walk away still. It's because I just needed company, but on top of that, I wanted to be alone too.
Yea. I'm weird. But that's just me. I guess i like to hang out with friends.. like sit down by the bay and enjoy the see breeze.. but we just don't talk.. just quietly enjoying the night scene.. that's what i like.


I have to apologise though as I know I have this problem of "Even when I talk about my problems to you, it will somehow end up being about you". I'm self-centred. Ever since my father passed away when I was young. I'm that way.



I'm sorry. If you expected me to just joke around and please everyone, even when i'm feeling down. I'm sorry, i can't. That's not me. I'd rather avoid.

"I don’t want people around who take up so much of my energy." Aren't you being self-centered too? Well.. I don't blame you. It's just human. Everyone have their own selfish side.


I'm different from you. You have a wide circle of friends. Even if today you refused to talk to me again. You still have numerous best friends out there to accompany you... Brian, PH, Candy, Rui Ming, Nadia, Kat, Melody, AiMan, Mehul, Mok, your dad and family... To me, I only have you. Yes, I do talk to the rest too.. But I only trust you. Even if I confide in sheereen and HT.. there's a limit to what I tell them too. Maybe that's why I always turn to you to rant whenever I'm down. I thought you will understand.

I mean just look at that time when you and Brian almost broke up. How many people stood by your side? me, peg, ivy, rm, kat, ph, mehul, mok. Even RM and Kat got so aggitated...
How about me? I guess only you cared then. (Ok.. maybe peggy tried to care for me too, but well, i rejected it.) So you see the difference?



Honestly, after poly ended. I only have sheereen, hui tze and you left whom i trust and confide in. Now that sheereen and hui tze are gone, and well you.. I guess I have received my retribution eh?


By the way, I do care for you too. In fact, candy and i met up with brian to talk about you and his relationship just 2 days ago on wed night.

- meh...
by Dj Z @
1:55 AM

Thursday, August 28, 2008

i think this will remain as my private blog. so for friends who are fortunate enough to know of this blog, you can either count yourself lucky or unlucky.. for this blog will be used for me to be emo... ha.

anyway. i celebrated her 19th birthday. i'm happy that she love the snowglobe i gave her. hope she will rmb me as a cheerful and nice friend.. not one that has hurt her so much before.

thank you.


but..

i still love you.

- hmm...
by Dj Z @
2:17 AM

Saturday, July 26, 2008

but i guess if there comes a day when u really don't know who to choose between the both of us. I guess i will back out then, for he's better than me in many ways, and I believe that he can give you the happiness that you deserve more than I can.

I really like you. Your innocence, your kind-heartedness, your care for friends and your sweet little smile.

But the more I like you, the more i hate to let go. I know communication between the both of us have gone from bad to worse. I guess that kind of chemistry we had has been transferred to your other friend. I really wish we could be go back in time, to the days when we were more than just friends, when we could chat about almost everything in the world.

People told me to fight for my happiness, people told me to let go.

I didn't mean to say stuff to hurt you.

Your nonchalant style of reaction once leaves me in a confusion. i don't know if I should take a step forward, or slowly fade away.

I really appreciate the friendship that we have. And I do cherish it, even till today. But how about you? I guess ever since the other guy stepped into your life. Our friendship was never the same again. Less stuff exchanged, less stuff to talk about.

I guess i can feel that kind of lost you felt in the past, when I don't sms you or choose to 'ignore' you. It really sucks... big time. Every single time my phone vibrates or rings, all I hope to see are your replies. But somehow the replies I'm getting nowadays are not yours. I feel lost, but you are busy. I understand. But sometimes, it still bothers me when you will reply to other people's messages immediately when you receive them, while you will only reply to mine like an hour later or even half the day. I won't question you, cause this is your privacy, your discretion, and I totally respect it. have I lost that significance and importance in your life already? Have you really found someone else whom is also significant already? I don't know. I don't dare to think. "Don't think too much".. that's all I'm always told.

I'm sorry that I appear to be more emotional nowadays. I mean.. it's partly because of you.. but it's also because of work too. I'm just so sick and tired of school, i can hardly find any joy in it. Pardon me for all the complaints and emo msg that I send. I know it bothers you. Like what ira says: "nobody likes emo people", which I totally agree. And i believe that other guy can give you the funny bone that you are looking for.

Your everything still attracts me.

Even if one day I decided to let you go, I will not look for another girl. Not for the next 3 years, when I'm doing my IAP and serving my NS too. Till then, I guess you are the girl of my life still.

- i still love you.
by Dj Z @
3:04 AM

Thursday, July 03, 2008

sometimes the more you want to get something, the higher the chance you will lose it.

oh well, life goes on i guess.

i wish you well with whoever u will meet in the future. I guess we won't meant to be from the start.


friends forever.

- letting go
by Dj Z @
2:16 AM

Wednesday, June 11, 2008

I saw you there last night
Standing in the dark
You were acting so in love
With your hand upon his heart
But you were just friends
At least that's what you said
Now I know better from his fingers in your hair
I'll forgive you for what you've done
If you say that I'm the one
I've had other options too
But all I want is you
Girl, your body fits me like a glove
And you showered me with words of love
While you were just friends
At least that's what you said
Now I know better from his fingers in your hair
I'll forgive you for what you've done
If you say that I'm the one
It's not my style to lay it on the line
But you don't leave me with a choice this time
Why weren't you true
You know I, I trusted you
When you were just friends
At least that's what you said
Now I know better from his fingers in your hair
I'll forgive you for what you've done
If you say that I'm the one
You were just friends
Now I know better from his fingers in your hair
I'll forgive you for what you've done
If you say that I'm the one

- I'm a SINner
by Dj Z @
4:35 PM

Tuesday, April 29, 2008

28/4 passed by in a flash.

Every single second of it, I was holding on to a hope.

A hope that you will appear and I can give you a hug.

But as every second passed, my hope starts to fade.

Until that very last second, I put my hope away.


I appreciate the efforts the rest have done for me.

But how I wish you were also there for me..

For without your presence, i guess it's simply not complete.


I want to cry, but reality holds me back.

For I know that no matter how much tears i shed, you will never look back.

- 我们都长大了。
by Dj Z @
1:03 AM

Get awesome blog templates like this one from BlogSkins.com