Elective Placement Opportunities in Uganda

“Knowledge for change” is UK & Uganda based Charity

Knowledge for change( K4C)

We offer tailored placements based on the interests of students and responding to the needs on the ground. We offer placements for a variety of disciplines:

– Midwifery
– Adult Nursing
– Physiotherapy
– Occupational Therapy
– Bio Medical Sciences
– Social and Community Work

For more information visit our to our website  http://knowledge4change.org.uk/

Continue reading Elective Placement Opportunities in Uganda

we just hope nothing happens like riots or war towards or after presidential elections in Uganda…. Leader of opposition was arrested by president yesterday last day of his campaigns… Sounds incredible.
Lets wait for what will happen…

What is prosperity to you…..???

To me I have come up with a simple formula to explain it clearly: Money + Happiness + Sustainability = Prosperity. So I think prosperity is a balance between money and happiness – a balance that must be sustainable for the longer haul. You must feel good about what you are doing to make money; have the passion to continue it for years if not decades; the work must be ethical, environmentally sound, and beneficial to others; and the work must offer lasting value, not be a get-rich-quick scheme.

So now if the President of Uganda says “PROSPERITY FOR ALL”….. does he mean it??? OR he wants votes

feel free to leave your comment, like and share

cisco exam answers/chapter + final

Exam Viewer – DHomesb Final Exam – CCNA Discovery (Version 4.0)


Below you will find the assessment items as presented on the exam as well as the scoring rules associated with the item.
Use of the exam information in the Exam Viewer is subject to the terms of the Academy Connection Website Usage Agreement between you and Cisco. The purpose of the Exam Viewer is to support instruction while not compromising exam security for other Cisco Networking Academies or students. This material should not be distributed outside a proctored and controlled setting. If misuse is found, action will be taken to limit access to assessment content. Please remember to logout and close your browser window after using the Exam Viewer.
1
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
Scoring Rule For: correctness of response
2 points for Option 2
0 points for any other option
Max Value = 2

2
Which media is used to carry electrical pulses that represent digital data?
copper cable
fiber optic cable
wireless
radio
Scoring Rule For: correctness of response
2 points for Option 1
0 points for any other option
Max Value = 2

3
What are two advantages of purchasing a preassembled computer? (Choose two.)
The cost is comparatively lower.
High-performance graphics and gaming applications are supported.
There is a negligible waiting period for assembly.
This type of computer is useful for knowledgeable consumers with special needs.
The user can specify high-performance components.
Scoring Rule For: correctness of response
Option 1 and Option 3 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

4
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer
Scoring Rule For: correctness of response
Option 2 and Option 3 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

5
A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
CLI
GUI
kernel
third party software
shell
Scoring Rule For: correctness of response
Option 1 and Option 2 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

6
Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
clean install
multi-boot
upgrade
virtualization
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

7
Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)
default gateway
IP address
MAC address
DNS server address
subnet mask
Scoring Rule For: correctness of response
Option 2 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

8

Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
broadcast
multicast
simulcast
unicast
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

9
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
Scoring Rule For: correctness of response
2 points for Option 1
0 points for any other option
Max Value = 2

10
What is one function of network devices in the distribution layer of a hierarchical network design?
They control the traffic between independent local networks.
They control the traffic between individual hosts.
They control the traffic between multiple companies.
They switch data packets as fast as possible.
Scoring Rule For: correctness of response
2 points for Option 1
0 points for any other option
Max Value = 2

11
What network device contains a table of all locally connected networks and the interfaces used to connect to them?
hub
switch
router
access point
NIC
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

12
Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

13
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F
Scoring Rule For: correctness of response
Option 1 and Option 2 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

14
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.
Scoring Rule For: correctness of response
Option 4 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

15
What is an advantage of selecting an operating system that has a GPL license over one with a commercial license?
The GPL license-based operating system ensures that everyone can participate in the enhancement of the product.
The GPL license-based operating system implements a structured development life cycle.
The GPL license-based operating system prevents modification of the source code.
The GPL license-based operating system provides structured support.
Scoring Rule For: correctness of response
2 points for Option 1
0 points for any other option
Max Value = 2

16
A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
broadcast
unicast
local
multicast
Scoring Rule For: correctness of response
2 points for Option 1
0 points for any other option
Max Value = 2

17
What are two functions of MAC addresses in a LAN? (Choose two.)
to allow the transfer of frames from source to destination
to determine which host has priority to transfer data
to indicate the best path between separate networks
to associate with a specific network IP address
to uniquely identify a node on a network
Scoring Rule For: correctness of response
Option 1 and Option 5 are correct..
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

18
What is the purpose of an ISP?
to act as a standards body
to connect multiple computers with a single-site LAN
to provide the connections and support to access the Internet
to manage and maintain server farms for a large organization
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

19
When is a dial-up connection used to connect to an ISP?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a satellite dish is used
when a regular telephone line is used
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

20
What is the most common reason that ISPs provide symmetrical transfer services?
to address data transfer needs of home users
to download significantly more than upload
to host servers on the Internet
to work with applications that require less bandwidth
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

21
How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

22
Which connection requires a straight-through cable?
PC port to PC port
PC port to router interface
switch port to router port
switch port to switch port
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

23
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
Scoring Rule For: correctness of response
2 points for Option 2
0 points for any other option
Max Value = 2

24
Which statement is true about UTP cable termination?
Cables with RJ-45 connectors are always preterminated.
An RJ-45 connector is used on only one end of the UTP cable.
Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier installation of the RJ-45 connector.
The RJ-45 connector should be pushed over the wire jacket for a smooth connection.
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

25

Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
split pair
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

26
For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
subnet mask
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

27
Which three addresses belong to the category of private IP addresses? (Choose three.)
10.0.0.1
128.0.0.1
150.0.0.1
172.16.0.1
192.168.31.19
172.168.31.1
Scoring Rule For: correctness of response
Option 1, Option 4, and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 3

28
What is the default subnet mask for an IP address of 198.133.219.4?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

29
Which three statements are characteristics of DHCP services? (Choose three.)
The DHCP server assigns the IP addresses and ensures that they are unique.
A PC that uses a static IP address obtains IP configuration from the DHCP server.
The integrated router acts as a DHCP server for internal hosts on local networks.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
DHCP clients on medium and large networks receive the IP configuration from the ISP.
The DHCP server assigns a lease time that specifies the length of time the assigned IP address is valid.
Scoring Rule For: correctness of response
Option 1, Option 3, and Option 6 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 3

30

Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP
Scoring Rule For: correctness of response
2 points for Option 5
0 points for any other option
Max Value = 2

31
Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
TCP
UDP
Scoring Rule For: correctness of response
Option 4 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

32

Refer to the exhibit. After connectivity has been established, an Internet user needs to upload a text file. Using the TCP/IP model, one protocol will be required at the application layer and another at the internetwork layer. Which two protocols will be used at those two layers for the upload? (Choose two.)
DHCP
FTP
IP
TCP
UDP
Scoring Rule For: correctness of response
Option 2 and Option 3 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

33
What is the function of the DNS server?
It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

34
Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection?
DNS
FTP
POP
HTTP
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

35
TCP/IP data transmission between the source and destination host is encapsulated in four steps:

A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.

What is the correct sequence of these steps?

A, B, C, D
A, D, B, C
B, D, A, C
D, C, A, B
D, C, B, A
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

36
What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
Bluetooth
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

37
In a WLAN, what is the name given to the area formed by connecting several wireless cells together using a distribution system?
ad hoc network
access point (AP)
Basic Service Set (BSS)
Extended Service Set (ESS)
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

38

Refer to the exhibit. What is the purpose of assigning a network name of University?
It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

39

Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of University.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.
Scoring Rule For: correctness of response
2 points for Option 1
0 points for any other option
Max Value = 2

40
A small company owns one older AP that provides a maximum data rate of 11 Mb/s. The company wants to add a newer AP that will provide a faster data rate but be compatible with the existing AP. What two wireless standards are referenced in this scenario? (Choose two.)
802.11
802.11a
802.11b
802.11d
802.11g
Scoring Rule For: correctness of response
Option 3 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required.
Max Value = 2

41
Which wireless authentication method uses the same key for the AP and the client?
EAP
Open
PSK
WEP
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

42

Refer to the exhibit. What is the effect of setting the security mode to WPA on the Linksys integrated router?
The WPA security mode uses the Passphrase option.
The WPA security mode generates a dynamic key each time a client establishes a connection with the AP.
The WPA security mode prevents attackers from intercepting data.
The WPA security mode uses preconfigured keys to encrypt and decrypt data.
Scoring Rule For: correctness of response
2 points for Option 2
0 points for any other option
Max Value = 2

43

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access
Scoring Rule For: correctness of response
2 points for Option 4
0 points for any other option
Max Value = 2

44
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

45
Which statement is true about packet filtering?
It recognizes and filters specific types of attacks.
It permits access based on IP address.
It is performed from a host network device.
It translates an internal address or group of addresses into a public address that is sent across the network.
Scoring Rule For: correctness of response
2 points for Option 2
0 points for any other option
Max Value = 2

46
A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error
Scoring Rule For: correctness of response
2 points for Option 3
0 points for any other option
Max Value = 2

47
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing

hasEML = false;

ReplyReply AllJSifyForm(“1655568049bottom_forward”);Move…allangarycnna4untitled

YAHOO.mc.oMoveHandlebottom = new MoveButton(“bottom_move1655568049”, “bottom_move_select1655568049”);YAHOO.mc.oReplyHandlebottom = new SplitButton(“1655568049bottom_reply”, “1655568049bottom_reply_all”);

Select Message EncodingASCII (ASCII)Greek (ISO-8859-7)Greek (Windows-1253)Latin-10 (ISO-8859-16)Latin-3 (ISO-8859-3)Latin-6 (ISO-8859-10)Latin-7 (ISO-8859-13)Latin-8 (ISO-8859-14)Latin-9 (ISO-8859-15)W. European (850)W. European (CP858)W. European (HPROMAN8)W. European (MACROMAN8)W. European (Windows-1252)Armenia (ARMSCII-8)Baltic Rim (ISO-8859-4)Baltic Rim (WINDOWS-1257)Cyrillic (866)Cyrillic (ISO-8859-5)Cyrillic (KOI8-R)Cyrillic (KOI8-RU)Cyrillic (KOI8-T)Cyrillic (KOI8-U)Cyrillic (WINDOWS-1251)Latin-2 (852)Latin-2 (ISO-8859-2)Latin-2 (WINDOWS-1250)Turkish (ISO-8859-9)Turkish (WINDOWS-1254)Arabic (ISO-8859-6, ASMO-708)Arabic (WINDOWS-1256)Hebrew (856)Hebrew (862)Hebrew (WINDOWS-1255)Chinese Simplified (GB-2312-80)Chinese Simplified (GB18030)Chinese Simplified (HZ-GB-2312)Chinese Simplified (ISO-2022-CN)Chinese Simplified (WINDOWS-936)Chinese Trad.-Hong Kong (BIG5-HKSCS)Chinese Traditional (BIG5)Chinese Traditional (EUC-TW)Japanese (SHIFT_JIS)Japanese (EUC-JP)Japanese (ISO-2022-JP)Korean (ISO-2022-KR)Korean (EUC-KR)Thai (TIS-620-2533)Thai (WINDOWS-874)Vietnamese (TCVN-5712)Vietnamese (VISCII)Vietnamese (WINDOWS-1258)Unicode (UTF-7)Unicode (UTF-8)Unicode (UTF-16)Unicode (UTF-32)| Full Headers

showMsg(“message1655568049”); #message1655568049 { visibility:visible; overflow-y:auto; } gLaunchProfile.start(‘RT_GB’);

Search Mail

Search the Web

gLaunchProfile.stop(‘RT_GB’, false);#yui-main { background-color:#D6DEEC }gLaunchProfile.stop(‘RT_RP’, false);gLaunchProfile.start(‘RT_BP’);gLaunchProfile.start(‘LD_JS_BP’);YAHOO.mc.intl = “us”;YAHOO.mc.IM_TOGGLE_STRINGS = {“im_settings_helpurl” : “http://help.yahoo.com/l/us/yahoo/mail/classic/chat/”,”im_settings_help_toggle” : “1”,”im_enable_mobile_l10n”: “1”,”im_sign_in”: “true”,”im_time_format_am” : “AM”,”im_time_format_pm” : “PM”,”im_date_time_format” : “{d}/{M}/{yy} {h}:{mm} {A}”};if (YAHOO.mc.page.generic) {YAHOO.mc.page.generic.initComposeMenu();}YAHOO.mc.page.TriggerULT=true;YAHOO.util.Event.onDOMReady(function () {sessionMgr.initSession();sessionMgr.loadFromBookmarks();});var adPrefetch = true;var isAdPrefetched = false;if (document.getElementById(“JSMailOptionsLink”)) {document.getElementById(“JSMailOptionsLink”).href = optionObj[“JSMailOptionsLink”];}if (document.getElementById(“chk_pop_options”) || document.getElementById(“chk_pop_error”) || document.getElementById(“option_bad_folder”) || document.getElementById(“folders_options_spam”) || document.getElementById(“folders_options_sent”) || document.getElementById(“spam_edit_options”)) {YAHOO.util.Event.addListener(YAHOO.mc.optionsID, “click”, displayOptions, optionObj);}YAHOO.namespace(“fcue”); YAHOO.mc.FCUE_METADATA = {imInit:”1″,imSent:””,fcElap:”1239025064779″,fcEcap:”2″,fcNag:””,inEcap:””,inElap:”1246446426172″};YAHOO.mc.noCues = false;YAHOO.mc.msgrLoaded = false;YAHOO.mc.loadMsgr = function () {clearTimeout(YAHOO.mc.msgrLoadID);if (hasIM && !YAHOO.mc.msgrLoaded) {YAHOO.mc.msgrLoaded = true;YAHOO.util.Get.script(“http://mail.yimg.com/d/combo?/mg/5_4_13/js/im_blue_all.js&/mg/5_4_13/js/us_strings.js&/mg/5_4_13/js/msgr.js”);}};YAHOO.util.Event.on(window, “load”, YAHOO.mc.loadMsgr);YAHOO.mc.msgrLoadID = setTimeout(YAHOO.mc.loadMsgr, 5000);YAHOO.mc.YM_MessageActionULT = false;YAHOO.util.Event.on(“flag0”, “click”, YAHOO.mc.flag.flagMsg);YAHOO.util.Event.on(“encode_select1655568049”, “change”, function(e) {if (!asyncMode) {document.changeEncForm1655568049.submit();} else {YAHOO.mc.asyncManager.get(document.changeEncForm1655568049.action, “showMessage”, document.changeEncForm1655568049);}});YAHOO.util.Event.on(“domainkeys”, “click”, function(e) {YAHOO.util.Event.preventDefault(e);window.open(YAHOO.util.Event.getTarget(e).href, “remote”, “width=640,height=480,top=100,left=100,resizable=yes”);});YAHOO.mc.flagKey = {FLAG_TITLE : “Clear flag”,UNFLAG_TITLE : “Flag this message”};YAHOO.util.Event.on(“printIcon”, “click”, function(e) {YAHOO.util.Event.preventDefault(e);var pWin = window.open(YAHOO.util.Event.getTarget(e).href, “Print”, “menubar=1,resizable=1,scrollbars=yes,dependent=yes,width=800,height=600”);pWin.focus();});YAHOO.mc.shortcuts.init();YAHOO.util.Event.on([“1655568049top_forward”, “1655568049bottom_forward”], “click”, forwardAsAttachment);function forwardAsAttachment(e) {if (YAHOO.mc.shortcuts.ctrlKey) {var elTarget = YAHOO.util.Event.getTarget(e);createElement(“input”, “fA”, “1”, elTarget.form);}}YAHOO.mc.delConfMsg = “Are you sure you want to permanently delete this message?”;frmWarnMsg = “Warning! You are about to send information to someone other than Yahoo! If you do not want anyone outside of Yahoo! to have this information, click “Cancel” now.”;frmWarnMsg += “nRemember: Yahoo! will NEVER ask you for your password in an unsolicited phone call or an unsolicited email.”;pwdWarnShown = “false”;pwdWarnMsg = “Warning! You are about to enter a password in a form that will not be sent to Yahoo!.”;pwdWarnMsg += “nRemember: Yahoo! will NEVER ask you for your password in an unsolicited phone call or an unsolicited email.”;lnkWarnMsg = “Warning! It appears that you are about to access a website that has non-standard web address format.”;lnkWarnMsg += ” Such sites may contain harmful entities such as viruses.”;lnkWarnMsg += ” We recommend you use extreme caution.”;theMainWindow = {showFormWarning: function (msgFrm) {return confirm(frmWarnMsg);},showPasswordWarning: function (msgFrm) {if (pwdWarnShown == “false”) {pwdWarnShown = “true”;alert(pwdWarnMsg);}},showLinkWarning: function(msgFrm) {return confirm(lnkWarnMsg);}}; gLaunchProfile.stop(‘LD_JS_BP’, false);resizeLeftPane();gLaunchProfile.start(‘RT_AD_FOOT’);