Computer System Servicing NCII | SET A (copy)

5.0(1)
studied byStudied by 38 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Blue

What is the common color of the USB 3.0 connector for standard receptacle and plug

2
New cards

FLASH MEMORY

What type of memory is used in solid state drive as a storage.

3
New cards

ROM Read Only Memory

It is originally where the bios stored in standard PC.

4
New cards

ISO image

_____ is the complete copy of everything stored on a physical optical disk

5
New cards

20 GB (16.4 bytes)

What are the minimum requirements for hard disk drive capacity in window 10?

6
New cards

REGISTRY

Where do windows Device driver store

7
New cards

Positive 5 Volts

What is the volt rating of the red wire of the power supply?

8
New cards

CROSSOVER

_____is a network cable where one end is T568A while other is T568B.

9
New cards

Problem with Driver

In windows 7 where LAN connection has a cross and red indicator signifies that there is _____.

10
New cards

Network Interface Card (NIC)

Which is the following hardware components can connect over a computer network?

11
New cards

ROUTER

It is a networking device that forwards data packets between computer networks.

12
New cards

IEEE.802.11

WIFI is the trademark phrase which means.

13
New cards

Local Area Network

_____is the collection devices connected together in one physical location.

14
New cards

Wide Area Network

A type of network that interconnects multiple local area networks.

15
New cards

Anti- Virus Software

A computer program used to prevent, detect, and remove possible threats.

16
New cards

Peer to Peer

______is a two or more PC connected and share resources without going through a separate server computer.

17
New cards

Provider Address

What IP address is used by the virtual machine to communicate over the physical network?

18
New cards

WPA2 PERSONAL

What type of version protects unauthorized network access by utilizing a set of passwords?

19
New cards

Access control disk

Consist of the user matrices and capability tables that govern the rights and privilege of user.

20
New cards

INFORMATION EXTORTION

It occurs when an attacker or trusted insider steal data form from a computer system and demands compensation for its return

21
New cards

Continues Assessment

It monitors the initial security accreditation of an information system for tracking of changes.

22
New cards

Remote storage services

What service in window server that enables administrator to migrate data to a lower cost and take media on file server?

23
New cards

Virtual cluster server

What application group contains a client access point and with at least one application specific resource?

24
New cards

PING COMMAND

A utility tool that tests whether a particular host is reachable across an IP network.

25
New cards

F2, F12, F1, F5

Which of the following keys is not appropriate to enter BIOS setup?

26
New cards

Safe mode

What enable user windows that correct any problems preventing from booting up normally?

27
New cards

Repair computer

What start up recovery option in a computer that essentially boot into the recovery partition of a main hard drive?

28
New cards

Logical hard drive

It is a single physical hard drive that can divide into multiple _____ hard drive

29
New cards

SATA OR ATA

What are the two types of interfaces used to communicate between the hard drive and computer motherboard?

30
New cards

WWW (World Wide Web)

What is spider-like inter connection in millions of pieces of information located on computers around cyber space?