1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
1. The PCIe connectors on an ATX Version 2.2 power supply come in what two different configurations, depending on the version of PCI express involved?
6-pin and 8-pin
2. The two services that Windows must provide for an ExpressCard are?
Card Service and Socket Service
3. What are the two most common form factors used today for computer cases, power supplies, and motherboards?
ATX and mATX
4. What are two different ways by which a laptop could utilize the cellular network connection of a mobile device?
Tethering and Hotspot
5. What two different types of firmware may be used on motherboards?
BIOS and UEFI
6. If the PC-Doctor software is installed on a computer's hard drive, what two different ways can the program be started?
By pressing a function during the startup sequence or through the start menu shortcut.
7. Sometimes a board may have an extra PCIe power connector. This connector comes in what two different pin numbers?
8-pin and 6-pin
8. What are two resources that may be useful in disassembling a laptop computer?
The user manual and the service manual
9. What two devices in a computer should be considered "black boxes", and should never be opened, due to risks involving charged capacitors?
The power supply and the monitor
10. What two laptop manufacturers provide their service manuals online free of charge?
Dell and Lenovo
11. A Mini PCIe slot can have how many pins?
52 and 54 pins
12. The Haswell and Broadwell chipsets work with what two different types of RAM?
DDR3 and DDR4
13. What are the two different methods for partitioning hard drives?
Master Boot Record (MBR) and GUID Partition Table (GPT).
14. What are two names for the database that holds digital signatures provided by OS manufacturers, such as Microsoft and Red Hat?
Key-Enrollment Key and Key-Exchange Key
15. What two different passwords can be set to lock down a computer from unauthorized access?
User and Supervisor
16. Modern desktop motherboards and laptop motherboards all utilize what what two types of DRAM respectively?
Modern Desktops: DIMM and Laptops: SO-DIMM
17. What are the two different ways of measuring access timing for memory?
RAS Latency and CAS Latency
18. What are the two names used by Intel and AMD respectively that refer to the Execute Disable Bit (EDB) technology?
Intel: Executive Disable and AMD: Enhanced Virus Protection
19. What two different DIMM technologies below can be used in a quad channel configuration?
DDR3 and DDR4
20. What two technologies below are hybrid processors that can handle 32 bit and 64 bit operating systems natively?
AMD64 and EM64T
How much data can an LTO Ultrium 5 tape hold, native and compressed?
Compressed: 3.0 TB and Native: 1.5 TB
22. What two SD standards utilize the FAT file system?
SD and SDHC
23. What two different file systems can be used on a Compact Disc (CD)?
UDF and CDFS
24. What two optical disc drive standards allow for rewritable discs?
DVD-RAM and BD-RE
25. What two optical disc drive standards support writing discs with a total capacity of 8.5GB?
DVD+R DL and DVD-R DL
26. VGA mode includes what two resolutions for troubleshooting monitors?
800x600 and 640x480
27. What are the two common classes of LCD monitors?
Twisted Nematic (TN) and In-Plane Switching (IPS)
28. What two colored RCA connectors in a component video cable are used for audio?
Red and White
29. What two wireless technologies share the same radio frequency range?
802.11b and Bluetooth
30. When using an HDMI to DVI adapter, what two DVI port types will the adapter work with?
DVI-D and DVI-I
31. In Windows, what two terms describe the active partition on an MBR drive, and the location where the Windows operating system is stored, respectively?
Boot Partition and System Partition
32. Text files that are called initialization files often utilize what two file name extensions?
.inf and .inl
33. What are two methods that can be used to free up disk space on a hard drive?
Drive compression and uninstalling software not in use
34. What file systems supported by Windows can be used for volumes and drives that don't hold the Windows installation?
NTFS, FAT32, and exFAT
35. What status indicators apply only to dynamic disks?
Healthy (at Risk) and Foreign Drive
36. Unicast addresses include what types of addresses? (Choose all that apply).
Global address and link-local address
37. What functions might be provided by a SOHO router besides the normal duty of routing packets between networks? (Choose all that apply).
Firewall and wireless access point
38. What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively?
Telenet and SSH
39. What two protocols are used to deliver mail messages?
IMAP4 and POP3
40. What two terms are used to describe the User Datagram Protocol (UDP)?
Connectionless Protocol and Best Effort Protocol
In the T568B wiring scheme, what two color pairs are used for transmit and receive on a 100BaseT network?
White/Orange. Orange & White/green, Green
42. What two commands are used to display TCP/IP configuration on Windows and Unix / Linux / Mac OS X operating systems, respectively?
ipconfig and ifconfig
43. What two different types of coaxial cable have been used for cable TV?
RG-6 and RG-59
44. What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors?
T568A and T568B
45. What two terms describe the type of network cable that is used for connecting a computer to a switch or another network device?
Patch cable and Straight-through cable.
46. In order to ensure that a Mac has no startup items, what two directories should you check for items?
/System/Library/StartupItems and /Library/StartupItems
47. Linux utilizes what two different wildcard characters at the command line?
? and *
48. What are some of the ways you can use BitLocker Encryption?
Computer authentication using TPM, User authentication usuing a USB flash drive, and Computer and user authentication using a PIN and TPM
49. What are two examples of HTPC software?
Plex and Kodi
50. What are valid recommendations for for a high-end audio/video editing workstation?
Install a motherboard capable of using memory running at 1600 MHz or better and install a sound card
51. What inputs would be considered to be part of a biometric device?
Retina, fingerprint, and voice
2. What is a typical use of a Type 2 hypervisor?
As honeypots to lure hackers by developers to test applications
53. What methods exist to lock down a workstation running Windows, such as when stepping away from the screen?
Press Windows key + L or Press Ctrl+Alt+Delete and click lock this computer
54. What products are considered to be set-top boxes?
Chromecast, Amazon Fire TV, Roku
55. What software program is an example of password management software?
KeePass
56. What terms are used to describe a machine that does not have an operating system and merely provides an interface between the user and the server?
Ultra-thin client or zero client (Dumb Terminal)
57. What two commands are used to change the permissions and ownership of a file or directory in Linux?
Chmod and Chown
58. What two types of thermal printer exist?
Thermal transfer and direct thermal
59. What wireless methods exist for connecting to a printer?
Bluetooth, Wi-Fi Infrastructure Mode, and Wi-Fi Ad-Hoc Mode
60. When creating a strong password, what are some valid criteria the password should meet?
The password should be at least eight characters long, you should not use adjacent keys on the keyboard (asdf), and you should combine uppercase and lowercase letter, numbers , and symbols