1/44
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Some pieces of equipment require tasks to be completed at exact moments in time. Operating systems such as Windows and macOS complete tasks as resources are made available. An operating system for use on the first example goes by what name?
Real-time operating system
Which of the following manages memory access for an operating system?
kernel
Operating systems can offer ways to encrypt the hard drive data for the sake of data security. macOS calls this feature File Vault. What does Windows call this feature?
BitLocker
_____ uses Port 25 to send emails.
SMPT
Network connecting devices include ________, hubs, and _____
switches, repeaters
What is the standard mouse for a Macintosh
one-button
The two basic types of RAM are _____ and ____
static, dynamic
A_____ is when, as part of a cyber-security attack, the attacker disrupts service to the network.
denial of service attack
Phishing comes in many forms, but not in ______
trojan horses
On a laptop, this almost always takes the place of a mouse
touch pad
Mobile form factors include smart phone, tablet, and ______.
laptop
Printers can come in any of the following formats, except_________.
chain mail printers
Laser printers contain an ink-like substance, called ___, which can be fused on paperto create text and graphics.
toner
The best way to keep the inside of your computer clean is to power down and unplug it, ______.
open the cover, and hand brush the dirt out
A ________is used to protect the computer from sudden spikes in voltages.
surge protector
What signals the processor to temporarily stop a running program to allow a handler to run instead?
IRQ
_____ is a minimal operating system used to prepare a computer for Windows installation, to copy disk images from a network file server, and to initiate Windows Setup.
Windows PE
_____ is a high-speed serial computer expansion bus standard designed to replace the older PCI, PCI-X, and AGP bus standards.
PCIe
'Missing OS' could mean which of the following?
MBR is corrupted
Which of the following key needs to be pressed while interrupting the OS loading process for the purpose of troubleshooting in Windows?
F8
A processor for laptops is typically smaller, but more importantly, in order to run cooler, it uses less _____ than its desktop counterpart.
electricity
As LCDs do not produce light themselves, they need to produce a visible image which is usually provided by a:
backlight
What key combination in Windows brings up a menu where you can change your password?
Press CTRL+ALT+DELETE and then click Change Password
Typically, printer memory is most relevant to a _____ printer because they hold the entire image of each page in memory before printing.
laser
Some printers require _____ to properly align the print device to the paper.
calibration
A customer who just bought a computer from you yesterday calls frantically. He tells you the computer says he performed an illegal operation. What do you tell him?
Choose OK and restart the program
The OS X operating system is based on:
FreeBSD
"Hot Docking" means that:
power can be on to remove\install a device
The Windows operating system holds many configuration settings in the:
registry
To rename file 1.txt to 2.txt in UNIX run the command:
mv 1.txt 2.txt
Which command makes a file read only?
Attrib +r "filename"
What is the data rate of a USB port?
12 Mbps
What is the application used by chat rooms?
IRC
NTFS file systems limit the length of the file names to how many characters?
255
The system of pathways that is used for communication in a computer system is referred to as which of the following terms?
Bus
If one segment goes down on a _____ network, the remaining segments past that point also go down.
bus
One option to consider enabling when moving to _____ Ethernet is jumbo frames.
Gigabit
TFTP uses the _____ protocol
UDP
A(n) _____ is an observable occurrence in an information system that actually happened at some point in time.
event
_____ is a type of virus which can replicate itself.
Worm
Which command can be used to encrypt and decrypt large numbers of files and folders?
Cipher
Which component is NOT part of the Windows Security Center?
computer management
The first hard disk in your computer is having one primary partition and one Extended partition. The extended partition is divided into two logical drives D and E. When you install a second hard drive, you create a primary and extended partition. You create one logical drive only and format it. What would be the drive letter assigned to the first
logical drive on the extended partition of first hard disk?
E
What is the command syntax for assigning "Hidden" attribute to file c:\myfile?
ATTRIB +H C:\MYFILE
Burns are the most common _____-related injury.
electrical shock