1/199
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
If users use passwords containing non-alphabetic characters or a combination of upper and letter case letters, this ...
... promotes computer security.
The system administrator is responsible for each of the following tasks except...
... Securing a website.
System administrators will be expected to provide support in the form of documentation and training to the organization's users.
True
Which of the following is the largest storage capacity?
4 Gigabytes
A security administrator would be responsible for administering which of the following?
A firewall
An IT person in general would not be expected to handle which of the following tasks?
Monitor employees files and web browsing behavior to ensure compliance with organizational IT policies
You can store a number between 0 and 255 in 1 bit
False
A computer system consists of the hardware, software and ...
... Users.
Detecting that a computer is running slowly because of a computer virus infection would be an example of which type of IT skill?
Troubleshooting
Web developers and web administrators share most of the same tasks
False
If a device performs the IPOS cycle, we should consider it to be a computer no matter what the device is.
True
The only difference between a handheld unit such as a tablet device or a smart phone differs from a laptop or desktop computer is that the laptop/desktop has full sized peripheral devices and the handheld unit uses touch screens
False
Which of the following could be called a peripheral device?
Printer
As an IT person, one should be someone who enjoys learning in your own
True
Most people who work in IT have 4-year It degrees
False
Which of the following skills would an IT person employ to find and fix a problem with the operating system?
System troubleshooting
The system administrator of a company would not be responsible for installing software on individual employees computers
False
An IT person would probably be expected to study each of the following topics except for ...
The IT person would be expected to study them all.
A smart phone should not be considered a computer
False
Although an IT student may not learn a variety of programming languages it is likely that the IT student will learn to program
True
As computer technology has improved and thus become more complex, the ability to use the computer has been made easier
True
Organization typically only have one system administrator who will be responsible for all aspects of administering the computer systems
False
Volatility is a property of which of the following?
Memory
Which of the following behaviors might be considered as unethical from the position of a system administrator?
All of the above
Which of the following types of files would come closest to about 1 Minute in size?
A small black and white image file
Computers today are more easily identifiable than computers in the past.
False
The concept of translating a program from a more readable language like Python or Java into the computer's native machine language is called
... complication
It is the user who initiates when and what a computer should do.
True
The system unit houses the CPU and memory chips, all placed on ...
... a motherboard
System administrators should know more than one operating system
True
The operating system is software
True
Where is swap space located?
Hard disk
In a batch processing system, the operating system would have to schedule the next process to execute.
True
During a context switch, what is being switched?
All of the above
Which of the following forms or process management did MS-DOS use?
Single tasking
The process and the program are the same; the two terms can be used interchangeably
False
While any device can issue an interrupt, it is the operate system that handles interrupts
True
Which of the following forms of scheduling will cause processes to wait the minimum amount of time?
Shortest job first
When the CPU moves from one process to another in multitasking, this is known as ...
... a context switch.
The process of swapping is triggered under which circumstance?
A page fault
The portion of the operating system that must be resident in memory at all times is...
... the kernel.
What does an interrupt interrupt?
the CPU during its fetch-execute cycle
Which form of processing would run one process at a time, but when that process requires I/O, the CPU would switch temporarily to another process?
multitasking
Which portion of the operating system can be personalized by the user
shell
Which of the following is true in competitive multitasking
The CPU switches between processes when a timer forces a context switch.
A multithreaded operating system is more efficient than a multitasking operating system when executing threads.
True
Concurrent processing means that the operating system executes processes in an overlapped fashion, which of the following is not a form of concurrent processing?
batch processing
The foreground process is the one that the user can directly interact with.
True
. If two processes are deadlocked, what is your best move to free them from deadlock?
kill one of the processes
With virtual memory, only portions of the running program are stored in memory.
True
The use of permissions to control who/what cannot access and use system resources is part of which of these operating system roles?
Protection
Cooperative multitasking are the same thing
False
If a process generates an address that is part of another process' area of memory, this is known as ...
... a memory violation
Bourne is an example of a Linux ...
... shell
The GUI is both easier to use and provides the user with greater flexibility in issuing instructions while the command line provides the user with the opportunity to write more detailed commands and so is more powerful.
False
In order for the operating system to be able to communicate with a specific piece of hardware, one must install the appropriate ...
device driver
Which of the following forms of processing does not provide any form of interaction with the user but instead requires I/O be handled before/after program execution?
GRUB is an example of ...
boot loader program
When two threads need to "meet up" in order to share data, this is known as ...
... rendezvous
Which of these hardware devices can force the processor to move from one process to another in multitasking?
Program Counter
To determine where a given page is stored in memory, the operating system uses...
... the page table
A virtual machine is hardware
False
If an entry in a page table is listed as not valid, then accessing that page will cause ...
page fault
Two threads will always share the same ...
program code
You can separately mount and unmount each individual partition
True
The time it takes the read/write head to move across the disk to the proper track is called...
... seek time
If a hard disk contains 4 platters, how many read/write heads will the hard disk contain?
8
In a linked list, to reach the 5th block, how many links do you have to follow?
4
File name extensions are primarily used ...
... by the operating system to know what software to use to open the file.
Which of the following tasks would not be possible for a system administrator to do in the file system?
All of the above are possible.
The zip and tar programs can be used to create...
... archives
We view the file system from a physical perspective while the operating system manipulates it from a logical perspective.
False
Files are broken into fixed sized units called ...
blocks
All files have names although the extension is not required.
True
With file blocks distributed across the file system instead of being stored in consecutive disk blocks, accessing the file requires traversing the blocks creating what one might call a ...
... linked list
Mounting ...
... makes a partition available
The surface of a hard disk is broken into which types of regions?
Tracks and sectors
A hard link in a file
False
In file compression, lossy compression ...
... reduces the file size by discarding some of the data.
Disk access time is slower than memory access time.
True
The process of identifying a user through a username and password is known as ...
... authetication
Accounts are not just set up for human users.
True
A strong password requires all of the following except ...
... it should be generated randomly
The earliest version of Windows that required user accounts was Windows 3.1
False
In order to discover your password, someone might call you on the phone and try to trick you into divulging it to them, for instance by acting as someone from your organization's IT group. This is often called ...
... social engineering
What operating system task is access control lists used for?
Protection
The first message broadcast on the Internet, in its earliest incarnation, was in which year?
1969
TCP/IP's link layer is roughly equivalent to the OSI model's...
... physical and data link layers
Switches use which of the following addresses to send a message to the proper device?
MAC addresses
If a computer were to go off line in a network, which of the following topologies would most likely be impacted by this?
ring
In a 3-D nearest neighbor network, a computer would directly connect to how many neighbors?
3
In a circuit switched network, the pathway between devices is established before communication commences and is retained for the duration of the communication
True
Last mile technology is used to express the idea that ...
... some households still use low bandwidth telephone lines to access the Internet.
In order to determine if another computer is available and accessible over your network, you might use which program to test it?
ping
The Internet uses packet switching while local area networks use circuit switching.
False
To use the telephone network for computer communication, one must ...
... convert the analog information stored in the computer into a digital form.
IPv4 offers approximately how many unique IP addresses?
4 billion
The number of computers on the original ARPAnet was...
4
Which level of the OSI model performs routing?
network
At which level of the OSI model are data units decomposed into packets?
Data Link