Hardware and Operating Systems Essentials - D386

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/153

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

154 Terms

1
New cards

What is an example of a server operating system?

Red Hat Enterprise Linux

2
New cards

What is an example of a Microsoft-based mobile operating system?

Surface Duo

3
New cards

What is a fundamental building block of an operating system that keeps track of each process in memory, including whether to run it or wait for some event?

Process control management

4
New cards

Which operating system uses the Bourne-Again shell (bash) scripting tool?

Linux

5
New cards

What is an example of a system call used by the POSIX API for POSIX-based systems running UNIX, Linux, and macOS?

Read ()

6
New cards

Which part of a hard disk drive is responsible for storing actual data?

Platters

7
New cards

What is a disadvantage of solid-state drives (SSD) when compared to hard disk drives (HDD)?

Longevity

8
New cards

How do computers avoid burdening the main central processing unit (CPU) with programmed I/O (PIO)?

By offloading to a direct-memory-access (DMA) controller

9
New cards

Which problem is managed by implementing a file system?

Logical structure for organizing and storing files on a storage device

10
New cards

What is the primary function of the file system interface?

To provide a way for the system to access and use files

11
New cards

There are a number of different types of components of a motherboard. Which motherboard component is used for support of slower onboard peripherals?

Southbridge

12
New cards

Which chipset is a set of circuitry that provides support to the slower onboard peripherals?

Southbridge

13
New cards

Which cache memory is the smallest but fastest?

L1

14
New cards

Which memory type is stored on a drive and is referred to as a paging file?

Virtual RAM

15
New cards

Which memory type is characterized by its independence from the CPU's external clock?

Asynchronous DRAM

16
New cards

Which memory type shares a common clock signal with the computer's system-bus clock?

Synchronous DRAM

17
New cards

Which cloud feature allows different types of clients and devices to access the resources?

Broad network access

18
New cards

Which virtual machine tool involves testing out an application where files are not saved to the drive or memory and never affect the physical machine?

Virtual sandbox

19
New cards

What is another term for a type 1 hypervisor?

Bare metal hypervisor

20
New cards

A user is working on a critical mission project and needs to access a system and network during peak and off-peak hours. Which non-functional requirement (NFR) addresses the likelihood the system will be accessible to the user at a specified time within an organization's network?

Availability

21
New cards

Which automatic configuration process occurs when a Windows-based dynamic host configuration protocol (DHCP) client is unable to reach a DHCP server?

Automatic private IP addressing (APIPA)

22
New cards

Which Windows tool is referred to as a centralized authentication server?

Domain Controller

23
New cards

Which device offers passive protection against attacks on network- and cloud-based resources?

Intrusion detection system (IDS)

24
New cards

Which networking solution helps to distribute the traffic across multiple servers capable of fulfilling the same tasks?

Load balancing

25
New cards

Which server makes requests for resources on behalf of a client?

Proxy server

26
New cards

What is the top of the reconfigurable computing software pyramid?

Scripting

27
New cards

Which type of programming language is compiled?

Java and C/C++

28
New cards

Which component implements decision-making in the programming logic in an application?

Branching

29
New cards

Which scripting or programming language is considered to be an object-oriented programming language?

C++

30
New cards

Which scripting or programming tool makes use of cmdlet (Command let) that performs a specific function?

PowerShell

31
New cards

Which type of network topology is cheap and easy to install but difficult to reconfigure?

Bus

32
New cards

Which type of network hardware works at layer 2 and provides centralized connectivity?

Switches

33
New cards

Which type of twisted pair cable can transmit data at speeds up to 10 Mbps?

Category 3

34
New cards

Which topology provides multiple pathways between end nodes?

Mesh

35
New cards

Which type of network connects computers and other networking devices in a single large building?

Local area network (LAN)

36
New cards

Which type of virus intends to make itself difficult to detect or analyze?

Armored virus

37
New cards

Which type of virus exploits those applications that make use of a mini-basic programming language?

Macro virus

38
New cards

Which type of virus changes form to avoid detection?

Polymorphic virus

39
New cards

Which type of malware is referred to as a group of zombies?

Botnet

40
New cards

A video production company needs massive storage but wants to minimize energy usage. Which network-attached storage (NAS) configuration will meet the goal?

Installing lower rotational speed disks

41
New cards

The marketing department needs a central storage solution that automatically scales with their increasing storage needs. Which storage solution would meet their requirement?

Network-attached storage (NAS)

42
New cards

A user runs two different applications that need 4GB of random access memory (RAM) each. The operating system (OS) also needs 4GB. What is the minimum amount of RAM the user's computer should have?

12GB

43
New cards

A computer scientist has a computer with 32GB of random access memory (RAM), with the OS requiring 2GB. They want to run multiple instances of a classification algorithm that use 7GB of RAM each. What is the maximum number of instances that can be run on the computer?

4

44
New cards

An application is being configured to only make requests to a database on another computer. Which role will the application play in this scenario?

Client

45
New cards

A printer is being configured on a network to print documents for users. Which role should the printer be configured for?

Server

46
New cards

A computer support technician is deploying a workstation that will be used for editing spreadsheets and web browsing. Which network role should the computer be configured for?

Client

47
New cards

A hiring manager is interviewing a candidate to be part of a front-end development team. Which skill would be relevant to their job function?

TypeScript

48
New cards

Which back-end database management system could an IT company use in cloud-based solutions for its customers?

Mongo

49
New cards

Which tool would be appropriate for an organization handling document-based data?

Mongo Database (MongoDB)

50
New cards

A project team's requirements often evolve during the development process, and they need to modify the project as it progresses. Why would this team choose to use a tech stack in this scenario?

Flexibility

51
New cards

An IT manager is implementing a simple web server for a small-business customer. Which basic tool should the manager implement for this customer?

Apache

52
New cards

An IT tech has been tasked with identifying a front-end framework that the IT team may adopt. Which framework fits the team's needs?

Vue

53
New cards

A development team adopts Kafka for streaming purposes. Which protocol should be in place to support this application?

Transmission Control Protocol (TCP)

54
New cards

Which layer does a type 2 hypervisor operate on in a virtual environment?

Host operating system

55
New cards

Which cloud computing characteristic provides a company with the ability to automatically scale down processing resources as needed?

Elasticity

56
New cards

Which type of isolation do all virtualized containers employ?

Process

57
New cards

What is a characteristic of virtualized containers?

Containers share the same host operating system.

58
New cards

Which solution solves a user's need for dual booting different operating systems to test software?

Configure a virtual machine for the user

59
New cards

Which type of cloud architecture requires costly up-front capital investment?

Private cloud

60
New cards

What is the function of the operating system?

It acts as an intermediary between computer users and computer resources.

61
New cards

Which systems are types of operating systems?

Real-Time Systems

3 multiple choice options

62
New cards

Which set of components make up the central processing unit (CPU)?

Arithmetic logic unit and control unit

3 multiple choice options

63
New cards

Which attribute of DRAM must a technician or developer consider ahead of time?

Refresh signal

3 multiple choice options

64
New cards

What is the purpose of a computer operating system?

It functions as a resource manager.

65
New cards

What is a feature of cloud-based operating systems?

They are primarily stateless.

66
New cards

Why do applications designed to work on one operating system not work on a different operating system?

Unique system calls

67
New cards

Which requirement should be understood when configuring a RAID 5 system for a client?

A minimum of three drives are required.

68
New cards

What is one reason why programmed I/O does not work well when the I/O device is a hard disk or a graphics display?

A complete instruction fetch-execute cycle must be performed to transfer each I/O data word.

69
New cards

Which type of storage devices are characterized by the fastest access times and data transfer rates?

Solid-state drives

70
New cards

Which kind of software are Mac OS X and Windows 10 programs?

Operating system (OS)

71
New cards

What is the next step to be performed to address storage drive issues after identifying recent changes and breaking down large problems?

Perform a system backup.

72
New cards

A client is utilizing servers, data storage, data backup, and software development platforms over an internet connection. Which computing approach is being applied?

Cloud computing

73
New cards

Which type of memory packaging can support quad, triple, and dual channels?

DDR2 SODIMM

74
New cards

A client recently experienced a hard drive failure and lost stored data. The client does not want to rely on a backup but does want to secure their data. Which RAID configuration does this client need?

RAID 1

75
New cards

Which component is responsible for creating and running a virtual machine instance on a host?

Hypervisor

76
New cards

What facilitates a guest system's ability to run applications designed for a different operating system?

Emulator

77
New cards

Which ability describes a security feature in virtualization?

Isolating the operating system when running multiple concurrent VMs

78
New cards

What is a temporary holding area for data and programs?

RAM

79
New cards

What is a key similarity between RAM and memory cards?

They are solid-state.

80
New cards

What is a key reason to implement a RAID 0 disk configuration?

To improve overall disk performance

81
New cards

Which operating system allows for its source code to be modified and redistributed?

Android

82
New cards

Which processors process in both 32 and 64 bits?

x86-64 processors

83
New cards

Which size data path do today's DIMMS use?

64-bit

84
New cards

Which type of processor memory is located on the processor itself?

Level 1 cache

85
New cards

What can a dual in-line memory module (DIMM) use to contain data as well as amplify a signal before writing the data to a module?

Registers

86
New cards

Which type of DRAM do modern laptops all use?

SO-DIMM

87
New cards

Which feature of a solid-state drive's flash memory ensures that the logical block addressing does not always address the same physical block's drive?

Wear leveling

88
New cards

A client has recently purchased a CPU that references the amount of L1 cache in the list of features. What is this referring to?

The amount of memory residing directly on the processor die

89
New cards

Which type of non-functional requirement (NFR) deals with how well a system and its data are protected against attacks?

Security

90
New cards

Which type of non-functional requirement (NFR) ensures that an updated database can return back in the event of update failures?

Reliability

91
New cards

Which non-functional requirement (NFR) deals with human factors, consistency, and documentation?

Usability

92
New cards

Which IDE is a Microsoft-product and can be used to develop websites, web apps, and mobile apps?

Visual Studio

93
New cards

Which feature of an IDE provides a list of variables that are already declared in the program as the developer starts typing?

Autocomplete

94
New cards

Which IDE can you use to write programs for Python, Java, and C++ languages?

Eclipse

95
New cards

Which system hardening technique involves securing a data-based system's ports, data, permissions, and functions?

Server hardening

96
New cards

Which malware program can replicate quickly and spread from one computer to another by itself?

Computer worm

97
New cards

Which type of topology has all nodes connected to a central device?

Star

98
New cards

Which network device is considered passive in terms of how it connects to other devices?

Hub

99
New cards

Which type of network connects devices within the ranges of 30 feet or less?

Personal area network (PAN)

100
New cards

Which networking device can be programmed to make decisions to send packets from an input port to an output port based on IP addresses?

Router