#8 CPS (Looks like a Practice Test)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Some pieces of equipment require tasks to be completed at exact moments in time. Operating systems such as Windows and macOS complete tasks as resources are made available. An operating system for use on the first example goes by what name?

Real-time operating system

2
New cards

Which of the following manages memory access for an operating system?

kernel

3
New cards

Operating systems can offer ways to encrypt the hard drive data for the sake of data security. macOS calls this feature File Vault. What does Windows call this feature?

BitLocker

4
New cards

_____ uses Port 25 to send emails.

SMPT

5
New cards

Network connecting devices include ________, hubs, and _____

switches, repeaters

6
New cards

What is the standard mouse for a Macintosh

one-button

7
New cards

The two basic types of RAM are _____ and ____

static, dynamic

8
New cards

A_____ is when, as part of a cyber-security attack, the attacker disrupts service to the network.

denial of service attack

9
New cards

Phishing comes in many forms, but not in ______

trojan horses

10
New cards

On a laptop, this almost always takes the place of a mouse

touch pad

11
New cards

Mobile form factors include smart phone, tablet, and ______.

laptop

12
New cards

Printers can come in any of the following formats, except_________.

chain mail printers

13
New cards

Laser printers contain an ink-like substance, called ___, which can be fused on paperto create text and graphics.

toner

14
New cards

The best way to keep the inside of your computer clean is to power down and unplug it, ______.

open the cover, and hand brush the dirt out

15
New cards

A ________is used to protect the computer from sudden spikes in voltages.

surge protector

16
New cards

What signals the processor to temporarily stop a running program to allow a handler to run instead?

IRQ

17
New cards

_____ is a minimal operating system used to prepare a computer for Windows installation, to copy disk images from a network file server, and to initiate Windows Setup.

Windows PE

18
New cards

_____ is a high-speed serial computer expansion bus standard designed to replace the older PCI, PCI-X, and AGP bus standards.

PCIe

19
New cards

'Missing OS' could mean which of the following?

MBR is corrupted

20
New cards

Which of the following key needs to be pressed while interrupting the OS loading process for the purpose of troubleshooting in Windows?

F8

21
New cards

A processor for laptops is typically smaller, but more importantly, in order to run cooler, it uses less _____ than its desktop counterpart.

electricity

22
New cards

As LCDs do not produce light themselves, they need to produce a visible image which is usually provided by a:

backlight

23
New cards

What key combination in Windows brings up a menu where you can change your password?

Press CTRL+ALT+DELETE and then click Change Password

24
New cards

Typically, printer memory is most relevant to a _____ printer because they hold the entire image of each page in memory before printing.

laser

25
New cards

Some printers require _____ to properly align the print device to the paper.

calibration

26
New cards

A customer who just bought a computer from you yesterday calls frantically. He tells you the computer says he performed an illegal operation. What do you tell him?

Choose OK and restart the program

27
New cards

The OS X operating system is based on:

FreeBSD

28
New cards

"Hot Docking" means that:

power can be on to remove\install a device

29
New cards

The Windows operating system holds many configuration settings in the:

registry

30
New cards

To rename file 1.txt to 2.txt in UNIX run the command:

mv 1.txt 2.txt

31
New cards

Which command makes a file read only?

Attrib +r "filename"

32
New cards

What is the data rate of a USB port?

12 Mbps

33
New cards

What is the application used by chat rooms?

IRC

34
New cards

NTFS file systems limit the length of the file names to how many characters?

255

35
New cards

The system of pathways that is used for communication in a computer system is referred to as which of the following terms?

Bus

36
New cards

If one segment goes down on a _____ network, the remaining segments past that point also go down.

bus

37
New cards

One option to consider enabling when moving to _____ Ethernet is jumbo frames.

Gigabit

38
New cards

TFTP uses the _____ protocol

UDP

39
New cards

A(n) _____ is an observable occurrence in an information system that actually happened at some point in time.

event

40
New cards

_____ is a type of virus which can replicate itself.

Worm

41
New cards

Which command can be used to encrypt and decrypt large numbers of files and folders?

Cipher

42
New cards

Which component is NOT part of the Windows Security Center?

computer management

43
New cards

The first hard disk in your computer is having one primary partition and one Extended partition. The extended partition is divided into two logical drives D and E. When you install a second hard drive, you create a primary and extended partition. You create one logical drive only and format it. What would be the drive letter assigned to the first

logical drive on the extended partition of first hard disk?

E

44
New cards

What is the command syntax for assigning "Hidden" attribute to file c:\myfile?

ATTRIB +H C:\MYFILE

45
New cards

Burns are the most common _____-related injury.

electrical shock