Network Study Guide Ch 1-4

Document Sample
Network Study Guide Ch 1-4 Powered By Docstoc
					                                    NETWORK+ CERTIFICATION
                                  STUDY GUIDE OF CH1-4 OF DEAN


____    1. An organization that shares devices, saves ____.
           a. money                                       c. time
           b. space                                       d. All of the above.
____    2. Networks enable multiple users to share devices and data that, collectively, are referred to as the
           networks' ____.
           a. devices                                     c. data files
           b. resources                                   d. peripherals
____    3. The peer-to-peer network is an example of a ____ network.
           a. metropolitan                                c. local area
           b. wide area                                   d. tiny area
____    4. Which is not true about peer-to-peer networks?
           a. They do not require a special operating system.
           b. One computer has more authority than the others.
           c. Most computers are general-purpose personal computers that are not designed to handle
               heavy processing loads.
           d. None of the above.
____    5. Which is not true about networks?
           a. They increase productivity.
           b. They allow you to manage hardware and software on multiple computers from one central
               location.
           c. They enable multiple users to share devices and data.
           d. None of the above.
____    6. Peer-to-peer networks are not ____.
           a. less expensive to maintain                  c. flexible
           b. less expensive to set up                    d. None of the above.
____    7. Peer-to-peer networks are ____.
           a. often used in environments where technical expertise is scarce
           b. very secure
           c. practical for connecting a large number of computers
           d. All of the above.
____    8. LANs involving many ____ are usually server-based.
           a. computers                                   c. peripherals
           b. systems                                     d. All of the above.
____    9. On a server-based network, special computers known as ____, process data for and facilitate
           communications between the other computers on the network.
           a. primary computers                           c. servers
           b. domains                                     d. workstations
____   10. Which would not qualify as a network-operating system?
           a. UNIX                                        c. Windows 98
           b. Novell NetWare                              d. None of the above.
____   11. The term ____ refers to a networking model in which clients use a central server to share applications,
           devices, and data.
           a. client/server architecture                  c. sharing architecture
           b. master/slave design                         d. All of the above.
____ 12. Which is not true?
         a. Clients on a network cannot run applications from their local hard disks.
         b. Typically, clients on a client/server network do not communicate directly with each other.
         c. Clients on a network can save data to their local hard disks.
         d. None of the above.
____ 13. The ____ is an example of a very intricate and extensive WAN that spans the globe.
         a. Network Operating System                     c. Intranet
         b. Internet                                     d. Metropolis




____ 14. The figure above depicts a(n) ____.
         a. complex network                              c. simple network
         b. simple WAN                                   d. intranet
____ 15. The figure above depicts a(n) ____.
         a. complex network                                 c. simple network
         b. simple WAN                                      d. complex WAN
____ 16. The device that enables a workstation to connect to the network is called a(n) ____.
         a. access card                                     c. server
         b. client                                          d. network interface card
____ 17. Which is true?
         a. A NIC that works in one workstation will work in another.
         b. A workstation must be connected to a network.
         c. A client can act as a server.
         d. All of the above.
____ 18. The physical layout of a computer network is called the ____.
         a. topology                                        c. mapping
         b. architecture                                    d. configuration
____ 19. ____ ensure(s) that data are transferred whole, in sequence, and without error from one node on the
         network to another.
         a. Data packets                                    c. Protocol
         b. Addressing                                      d. File services
____ 20. ____ are distinct units of data that are transmitted from one computer on a network to another.
         a. Data packets                                    c. Frames
         b. Datagrams                                       d. All of the above.
____ 21. Which is not an example of transmission media?
         a. wire                                            c. radio waves
         b. coaxial cable                                   d. None of the above.
____ 22. ____ refer to the capability of a server to share data files, applications, and disk storage space.
         a. File services                                   c. Protocol
         b. Transmission media                              d. Transmission services
____ 23. A server that provides file services is called a(n) ____.
         a. file server                                     c. network server
         b. filer                                           d. system server
____ 24. Communications servers are also referred to as ____ servers.
         a. file                                            c. print
         b. access                                          d. gateway
____ 25. ____ servers allow external users to use network resources and devices just as if they were logged in to a
         workstation in the office.
         a. Communications                                  c. Remote
         b. Access                                          d. Gateway
____ 26. In Windows NT, the communications software is known as ____.
         a. Network Access Server                           c. Remote Access Server
         b. Communications Access Server                    d. Mail Access Server
____ 27. In NetWare, the communications software is known as ____.
         a. Network Access Server                           c. Remote Access Server
         b. Communications Access Server                    d. NetWare Access Server
____ 28. Mail services typically do not include ____.
         a. routing capabilities                            c. document management
         b. notification                                    d. None of the above.
____ 29. Mail services require a significant commitment of technical support and administration resources due to
         their ____.
         a. instability                                     c. heavy use
         b. routing capabilities                            d. access ability
____ 30. Distributing processing activity evenly across a network so that no single device becomes overwhelmed,
         is handled by the ____ service.
         a. traffic monitoring                              c. hardware diagnosis
         b. load balancing                                  d. communications
____ 31. The ____ service determines when a network component fails.
         a. network                                         c. hardware diagnosis
         b. load balancing                                  d. communications
____ 32. The Computing Technology Industry Association established the ____ certification.
         a. A+                                              c. MCSE
         b. Net+                                            d. CNE
____ 33. If you want to become a PC technician, you should attain the ____ certification.
         a. A+                                              c. MCSE
         b. Net+                                            d. CNE
____ 34. If you want to specialize in Novell networking product support and administration, you should attain the
         ____ certification.
         a. A+                                              c. MCSE
         b. Net+                                            d. CNE
____ 35. Which is not true about finding a job in networking?
         a. Companies in the computer industry typically do not mind receiving resumes and letters
                through e-mail.
           b. When looking at an ad, you should only apply for positions for which you have all the
                qualifications required.
           c. Visit a college career center, even if you are not a registered university or college student.
           d. None of the above.
____ 36.   The Open Systems Interconnection (OSI) reference model divides networking architecture into ____
           layers.
           a. six                                            c. five
           b. eight                                          d. seven
____ 37.   IEEE is an international society composed of ____ professionals.
           a. engineering                                    c. computer hardware
           b. networking                                     d. programming
____ 38.   ____ is not involved in setting standards for ISDN communications.
           a. ANSI                                           c. EIA
           b. ITU                                            d. None of the above.
____ 39.   ____'s goal is to establish international technological standards to facilitate global exchange of
           information and barrier-free trade.
           a. ISO                                            c. IEEE
           b. ITU                                            d. EIA
____ 40.   About ____ of ISO's nearly 12,000 standards apply to computer-related products and functions.
           a. 1,000                                          c. 10,000
           b. 500                                            d. 250
____ 41.   The ____ regulates international telecommunications.
           a. FCC                                            c. ISO
           b. ITU                                            d. EIA
____ 42.   In the ____ ISO began to work on the OSI model.
           a. early 1970s                                    c. early 1980s
           b. late 1970s                                     d. late 1980s
____ 43.   The OSI model is a theoretical representation of what happens between ____ nodes on a network.
           a. two                                            c. five
           b. three                                          d. multiple
____ 44.   The OSI Model ____.
           a. describes how software programs interact with other software programs
           b. describes how software programs interact with humans
           c. prescribes the type of hardware that should support each layer
           d. None of the above.
____ 45.   The Physical layer does not ____.
           a. set the data transmission rate                 c. monitor data error rates
           b. provide error correction services              d. None of the above.
____ 46.   The primary function of the ____ layer is to divide data it receives from the Network layer into distinct
           frames that can then be transmitted by the Physical layer.
           a. Communication                                  c. Data Link
           b. Transform                                      d. Transport
____ 47.   Ethernet is an example of a ____ layer technology.
           a. Communication                                  c. Data Link
           b. Transform                                      d. Transport
____ 48.   ____ refers to the process of decreasing the size of the data units when moving data from a network
           segment that can handle larger data units to a network segment that can handle only smaller data units.
           a. Reallocation                                    c. Reassembly
           b. Segmentation                                    d. Minimizing
____ 49.   ____ is the process of reconstructing the segmented data units.
           a. Sequencing                                      c. Resegmenting
           b. Rebuilding                                      d. Reassembly
____ 50.   Which is not performed in the Network layer?
           a. segmentation                                    c. sequencing
           b. reassembly                                      d. None of the above.
____ 51.   The ____ layer is primarily responsible for ensuring that data are transferred from point A to point B
           reliably, in the correct sequence, and without errors.
           a. Network                                         c. Transport
           b. Communication                                   d. Session
____ 52.   Flow control is handled in the ____ layer.
           a. Transport                                       c. Session
           b. Network                                         d. Application
____ 53.   Transport layer services break arbitrarily long packets into ____.
           a. the maximum size that the type network in use can handle
           b. the minimum size that the type network in use can handle
           c. a standard size that is used by all protocols
           d. a size smaller than standard size so it may fit all frames
____ 54.   If you insert a NIC but fail to seat it deeply enough in the computer's circuit board, your computer will
           experience network problems at the ____ layer.
           a. Data Link                                       c. Transport
           b. Physical                                        d. Network
____ 55.   The Data Link layer accomplishes the jobs of finding out if information has been dropped and asking for
           a retransmission, by the ____ process.
           a. token ring                                      c. error checking
           b. protocol                                        d. framing
____ 56.   Error checking and control information ensure that a(n) ____ arrives without any problems.
           a. token                                           c. checksum
           b. protocol                                        d. frame
____ 57.   The "C" in TCP stands for ____.
           a. Computer                                        c. Communication
           b. Cohesion                                        d. Control
____ 58.   The Session layer is sometimes called the "____" of network communications.
           a. coach                                           c. workhorse
           b. leader                                          d. traffic cop
____ 59.   The ____ layer sets the terms of communication by deciding which node will communicate first and how
           long a node can communicate.
           a. Data Link                                       c. Transport
           b. Session                                         d. Network
____ 60.   Which is not a function of the Session layer?
           a. Data encryption.
           b. Establishing and keeping alive the communications link for the duration of the session.
           c. Monitoring the identification of the session participants.
           d. None of the above.
____ 61.   The ____ layer protocols code and decodes graphics and file format information.
           a. Presentation                                    c. Application
           b. Communication                                d. Session
____ 62.   One of the services provided by the Application layer is ____.
           a. file transfer                                c. segmentation
           b. decoding                                     d. sequencing
____ 63.   Services for message handling for electronic mail are found in the ____ layer.
           a. Network                                      c. Session
           b. Application                                  d. Both B and C.
____ 64.   If you are running Microsoft Word on a network and choose to open a file, your request for that data is
           transferred from Microsoft Word to the network by the ____ layer.
           a. Data Link                                    c. Transport
           b. Application                                  d. Network
____ 65.   The Transport layer passes the data blocks, one at a time, to the ____ layer.
           a. Session                                      c. Data Link
           b. Network                                      d. Presentation
____ 66.   Today ____ types of Ethernet technology are used on LANs.
           a. two                                          c. four
           b. three                                        d. five
____ 67.   Which is not a field that composes the Token Ring frame?
           a. Start Delimiter                              c. Access Control
           b. Frame Control                                d. End Delimiter
____ 68.   The MAC sublayer lies within the ____ layer.
           a. Data Link                                    c. Network
           b. Physical                                     d. Transport
____ 69.   The part of the MAC address that is unique to a particular vendor is called the ____.
           a. Device ID                                    c. Block ID
           b. Starting Delimiter                           d. MAC ID
____ 70.   Which is not true?
           a. The Network+ certification exam includes questions about IEEE 802 specification.
           b. The LLC provides a common interface and supplies reliability and flow control services.
           c. The MAC appends the physical address of the destination computer onto the data frame.
           d. None of the above.
____ 71.   Protocols that span more than one LAN segment are ____.
           a. global                                       c. segmented
           b. routable                                     d. integrated
____ 72.   A network that uses more than one protocol is called a(n) ____ network.
           a. multiprotocol                                c. global
           b. routable                                     d. diverse
____ 73.   Protocols define the standards for communication between ____.
           a. network segments                             c. LANs
           b. operating systems                            d. network devices
____ 74.   Which is the most commonly used protocol?
           a. SNA                                          c. NetBIOS
           b. TCP/IP                                       d. IPX/SPX
____ 75.   ____'s roots lie with the U.S. Department of Defense.
           a. SNA                                          c. NetBIOS
           b. TCP/IP                                       d. IPX/SPX
____ 76.   Which is not true about TCP/IP?
           a. It is routable.
           b. It is flexible.
           c. It does not require significant configuration.
           d. None of the above.
____ 77.   Which is not true about TCP/IP?
           a. It is expensive.
           b. It can communicate between a multitude of dissimilar platforms.
           c. It is the de facto standard on the Internet.
           d. None of the above.
____ 78.   The TCP/IP Application layer does not correspond to which layer of the OSI Model?
           a. Transport                                       c. Presentation
           b. Application                                     d. Session
____ 79.   The TCP/IP Transport layer corresponds to which layer(s) of the OSI Model?
           a. Transport                                       c. Application
           b. Transport and Network                           d. Session and Transport
____ 80.   The TCP/IP Internet layer corresponds to which layer(s) of the OSI Model?
           a. Transport and Data Link                         c. Network
           b. Transport and Network                           d. Network and Session
____ 81.   The TCP/IP Network Interface layer corresponds to which layer(s) of the OSI Model?
           a. Data Link                                       c. Network
           b. Network and Physical                            d. Data Link and Physical
____ 82.   The original version of the IP subprotocol is ____.
           a. IPv1                                            c. IPv4
           b. IPv2                                            d. IPv6
____ 83.   The component of an IP datagram header that indicates the maximum time in seconds, that a datagram
           can remain on the network before it is discarded is called ____.
           a. time to destination                             c. time to be active
           b. time to remain                                  d. time to live
____ 84.   If a protocol is connectionless, it does not ____.
           a. have a way to connect and must rely on other components
           b. guarantee delivery of data
           c. function on any of the network layers
           d. None of the above.
____ 85.   The IP datagram contains a checksum component that verifies the integrity of the ____.
           a. routing information on the IP header            c. time to live information
           b. data in the datagram                            d. protocol
____ 86.   The Identification component of an IP diagram header does not ____.
           a. identify the message to which a datagram belongs
           b. tell IP how to process the incoming datagram by indicating the data's speed, priority, or
                reliability
           c. enable the receiving node to reassemble fragmented or segmented messages
           d. assist in segmentation and reassembly of packets
____ 87.   Which is not true about UDP?
           a. It offers no assurance that packets will be received in the correct sequence.
           b. Its lack of sophistication makes it less efficient than TCP.
           c. Its header contains only four source fields.
           d. It offers no assurance that packets will be received at all.
____ 88.   Which is true about ICMP?
           a. It provides error control.
           b. It reports which networks are not reachable.
            c. It reports which packets' TLL has expired.
            d. Both B and C.
____ 89.    To make ARP more efficient, computers save recognized address mappings in a(n) ____.
            a. temporary variable                            c. file
            b. host                                          d. cache
____ 90.    In addition to core Transport and Internet layer protocols, TCP/IP encompasses several ____ layer
            protocols that work over TCP or UDP and IP, translating user requests into a format the network can read.
            a. Network                                       c. Internet
            b. Application                                   d. Network Interface
____ 91.    Each IP address is a unique ____-bit number.
            a. 32                                            c. 8
            b. 16                                            d. 24
____ 92.    An IP address contains ____ types of information.
            a. three                                         c. four
            b. two                                           d. eight
____ 93.    Networks recognize ____ types of addresses.
            a. five                                          c. three
            b. one                                           d. two
____ 94.    The numbers 128 through 191 in the first octet of an IP address indicate that the address is a ____.
            a. Class A                                       c. Class C
            b. Class B                                       d. Class D
____ 95.    A secondary number, known as a subnet ____, is also assigned as part of the TCP/IP configuration
            process.
            a. segment                                       c. mask
            b. part                                          d. identifier
____ 96.    Together, the host name and domain name constitute the ____ domain name.
            a. single                                        c. global
            b. fully qualified                               d. total
____ 97.    Like TCP/IP, IPX/SPX is a routable protocol because it carries network ____ information.
            a. platform                                      c. protocol
            b. addressing                                    d. layer
____ 98.    IPX/SPX was originally developed by ____.
            a. Xerox                                         c. IBM
            b. Novell                                        d. the U.S. Department of Defense
____ 99.    A(n) ____ is a logical address assigned to a specific process running on a computer.
            a. MAC                                           c. dynamic address
            b. node                                          d. socket
____ 100.   The NCP, SAP, and RIP subprotocols correspond to the ____ layer(s) in the OSI Model.
            a. Application                                   c. Application and Presentation
            b. Presentation                                  d. Application and Session
____ 101.   The SPX subprotocol corresponds to the ____ layer in the OSI Model.
            a. Session                                       c. Transport
            b. Presentation                                  d. Network
____ 102.   The IPX subprotocol corresponds to the ____ layer in the OSI Model.
            a. Session                                       c. Transport
            b. Presentation                                  d. Network
____ 103.   The NetBIOS subprotocol corresponds to the ____ layer in the OSI Model.
            a. Session                                       c. Transport
            b. Presentation                                  d. Network
____ 104.   Which is true?
            a. Socket addresses are appended to IPX addresses.
            b. In addition to the network and node addresses, processes running on IPX-enabled
                workstations are identified by socket addresses.
            c. Novell has reserved socket 456h for its diagnostics process.
            d. None of the above.
____ 105.   NetBIOS was originally designed for ____.
            a. Xerox                                         c. IBM
            b. Novell                                        d. U.S. Department of Defense
____ 106.   Which is not true about NetBEUI?
            a. It requires extensive configuration.          c. It provides excellent error correction.
            b. It is fast and efficient.                     d. None of the above.
____ 107.   In order to transmit data between network nodes while using NetBIOS, a network administrator must
            assign a(n) ____ to each station.
            a. logical address                               c. IP address
            b. MAC                                           d. NetBIOS name
____ 108.   Information can be transmitted via one of ____ signaling method(s).
            a. one                                           c. four
            b. two                                           d. five
____ 109.   ____ is a term used by networking professionals to describe the nondata information that must
            accompany data in order for a signal to be properly routed and interpreted by the network.
            a. Noise                                         c. Overhead
            b. Garbage                                       d. Commenting
____ 110.   Which is not true about modulation?
            a. A modem modulates analog signals into digital signals at the transmitting end, then
                demodulates digital signals into analog signals at the receiving end.
            b. The carrier wave does not represent information.
            c. Modulation may be used to issue multiple signals to the same communications channel
                and prevent the signals from interfering with one another.
            d. None of the above
____ 111.   A football coach calling out orders to his team through a megaphone is using ____ communication.
            a. half-duplex                                   c. simplex
            b. duplex                                        d. one-directional
____ 112.   An apartment's intercom system that requires you to press a "talk" button in order to allow your voice to
            be transmitted over the wire uses ____ communication.
            a. half-duplex                                   c. simplex
            b. duplex                                        d. bidirectional
____ 113.   Modern Ethernet networks use ____ communication.
            a. half-duplex                                   c. simplex
            b. duplex                                        d. Both A and B.
____ 114.   A form of transmission that allows multiple signals to travel simultaneously over one medium is known
            as ____.
            a. channeling                                    c. subchanneling
            b. modulating                                    d. multiplexing
____ 115. The figure shown above is an example of ____ multiplexing.
          a. time                                      c. wavelength division
          b. statistical                               d. fiber-optic




____ 116. The figure shown above is an example of ____ multiplexing.
          a. time                                           c. wavelength division
          b. statistical                                    d. fiber-optic
____ 117. ____ is a measure of the difference between the highest and lowest frequencies that a medium can
          transmit.
          a. throughput                                     c. amplitude
          b. wavelength                                     d. bandwidth
____ 118. Which is not true about a baseband system?
          a. It involves analog pulses.
          b. Every device shares the same channel.
          c. Ethernet is an example of a baseband system.
          d. Both A and B.
____ 119. A device that regenerates a signal is called a(n) ____.
          a. amplifier                                      c. regenerator
          b. repeater                                       d. attenuator
____ 120. The maximum number of nodes per segment depends on the ____.
          a. bandwidth                                      c. attenuation
          b. desired throughput                             d. regeneration ability
____ 121. Which does not help to limit the impact of noise on a network?
          a. Using antinoise algorithms to protect data from being corrupted by noise.
          b. Using metal conduits to protect cabling.
          c. Installing cabling well away from powerful electromagnetic forces.
          d. None of the above.
____ 122. The figure shown above is an example of ____ cable.
          a. coaxial                                        c. single shielded
          b. fiber-optic                                    d. twisted-pair
____ 123. Which is not true about twisted-pair cable?
          a. It is less expensive than coaxial cable.
          b. It carries signals farther than coaxial cable before amplification of the signals becomes
             necessary.
          c. It supports higher throughput than coaxial cable.
          d. None of the above.
____ 124. IEEE designates Thicknet as ____ Ethernet.
          a. 10Base2                                        c. 10Base10
          b. 10Base5                                        d. 10BaseT




____ 125. The figure shown above is an example of a(n) ____.
          a. BNC T-connector                             c. AUI connector
          b. N-series connector                          d. BNC barrel connector
____ 126. Thinnet connects the wire to network devices with ____.
          a. BNC T-connectors                            c. BNC barrel connectors
          b. AUI connectors                              d. N-series connectors
____ 127. IEEE designates Thinnet as ____ Ethernet.
          a. 10Base2                                     c. 10Base10
          b. 10Base5                                     d. 10BaseT
____ 128. ____ crosstalk can occur when signals from an adjacent cable interfere with another cable's transmission.
          a. Adjacent                                    c. Alien
          b. Remote                                      d. Cable
____ 129. ____ contains four wire pairs and can carry data at a rate as high as 10 Mbps, with a possible bandwidth
          of 16 MHz.
          a. CAT2                                          c. CAT5
          b. CAT3                                          d. CAT5e
____ 130. The maximum segment length on a 10BaseT network is ____ meters.
          a. 10                                            c. 100
          b. 50                                            d. 1000
____ 131. A(n) ____ network is one that spans an entire organization and often services the needs of many diverse
          users.
          a. global                                        c. wide-area
          b. enterprise                                    d. intra-
____ 132. Which cannot support full-duplexing?
          a. 10BaseT                                       c. 100BaseT4
          b. 100BaseTX                                     d. None of the above.
____ 133. Which is not true about fiber cable?
          a. It conducts electricity.
          b. It can carry signals for longer distances than can coax or twisted-pair cable.
          c. It is widely accepted by the high-speed networking industry.
          d. None of the above.
____ 134. Which is not a disadvantage of fiber cable?
          a. It is expensive.
          b. It can transmit data in only one direction at a time.
          c. It is difficult to splice.
          d. None of the above.
____ 135. ST and SC are popular connectors for ____ cabling.
          a. Thinnet                                       c. Thicknet
          b. fiber                                         d. twisted-pair
____ 136. The maximum segment length on a 100BaseTX network is ____ meters.
          a. 50                                            c. 200
          b. 100                                           d. 1000
____ 137. Structured cabling is based on a hierarchical design that divides cabling into ____ subsystems.
          a. four                                          c. eight
          b. six                                           d. ten
____ 138. Vertical connectors between floors are known as ____.
          a. spans                                         c. patches
          b. lifts                                         d. risers
____ 139. A patch cable is a section of ____ cabling.
          a. twisted-pair                                  c. coaxial
          b. fiber-optic                                   d. All of the above.
____ 140. A ____ cable is a patch cable in which the terminations at both ends are identical.
          a. standard                                      c. normal
          b. straight-through                              d. pin-to-pin
____ 141. The area above the ceiling tile or below the subflooring is the ____.
          a. riser                                         c. plenum
          b. stratum                                       d. bend
____ 142. Which is not true?
          a. Indirect infrared transmission is secure.
          b. In indirect infrared transmission signals bounce off walls, ceilings, and any other objects
                in their path.
            c. Infrared pathways can carry data at rates that rival fiber-optic cable's throughput.
            d. None of the above.
____ 143.   ____ is the best wireless solution for networks that must transmit data through or around walls, ceilings,
            and other obstacles.
            a. Radiofrequency                                c. Indirect infrared
            b. Direct infrared                               d. Both A and C.
____ 144.   The RF technology, ____, concentrates significant RF energy at a single frequency.
            a. uniband                                       c. one-band
            b. single-band                                   d. narrowband
____ 145.   The RF technology, ____, uses a lower-level signal distributed over several frequencies simultaneously.
            a. broadband                                     c. spread spectrum
            b. multiband                                     d. wideband
____ 146.   Which would you least like to use if the environment requires that cable bend around tight corners or
            through small spaces?
            a. STP                                           c. UTP
            b. fiber-optic                                   d. None of the above.
          STUDY GUIDE OF CH1-4 OF DEAN
                    Answers


 1.   D
 2.   B
 3.   C
 4.   B
 5.   D
 6.   C
 7.   A
 8.   A
 9.   C
10.   C
11.   A
12.   A
13.   B
14.   B
15.   A
16.   D
17.   C
18.   A
19.   C
20.   D
21.   D
22.   A
23.   A
24.   B
25.   A
26.   C
27.   A
28.   D
29.   C
30.   B
31.   C
32.   B
33.   A
34.   D
35.   B
36.   D
37.   A
38.   C
39.   A
40.   B
41.   B
42.   C
43.   A
44.   D
45.   B
46.   C
47.   C
48.   B
49.   D
50.   C
51.   C
52.   A
53.   A
54.   B
55.   C
56.   D
57.   D
58.   D
59.   B
60.   A
61.   A
62.   A
63.   B
64.   B
65.   B
66.   C
67.   B
68.   A
69.   C
70.   D
71.   B
72.   A
73.   D
74.   B
75.   B
76.   C
77.   A
78.   A
79.   A
80.   C
81.   D
82.   C
83.   D
84.   B
85.   A
86.   B
87.   B
88.   D
 89.   D
 90.   B
 91.   A
 92.   B
 93.   D
 94.   B
 95.   C
 96.   B
 97.   B
 98.   A
 99.   D
100.   C
101.   C
102.   D
103.   A
104.   D
105.   C
106.   A
107.   D
108.   B
109.   C
110.   A
111.   C
112.   A
113.   B
114.   D
115.   B
116.   C
117.   D
118.   A
119.   B
120.   C
121.   D
122.   A
123.   B
124.   B
125.   B
126.   A
127.   A
128.   C
129.   B
130.   C
131.   B
132.   C
133.   A
134.   D
135.   B
136.   B
137.   B
138.   D
139.   A
140.   B
141.   C
142.   A
143.   A
144.   D
145.   C
146.   B

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:5345
posted:3/7/2008
language:English
pages:18