Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

3D0X2 Vol2

URE

QuestionAnswer
(201) Which original components were very susceptible to damage from electrostatic discharge? Complementary metal-oxide semiconductor (CMOS).
(201) What is considered to be a computer’s main storage? Random access memory (RAM).
(201) What is considered as nonvolatile permanent memory? Read only memory (ROM).
(201) What is a form of firmware that contains the computer’s start up instructions? Basic input/output system (BIOS).
(202) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event? Interrupt.
(202) Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)? Priority interrupt.
(202) Which interrupt request (IRQ) line number is normally used for the floppy disk controller? 6
(202) Which is a term used to describe that data is whole or complete? Data integrity.
(202) What is considered as a technique or method of checking data integrity? Parity.
(202) Which is a very simple example of an error detecting code? Parity bit.
(203) What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not? Storage area network (SAN).
(203) What is an advantage of using a storage area network (SAN) architecture? Ease of replacing server.
(203) What is the connection type of choice for storage area networks (SAN)? Fibre Channel.
(203) Which storage device can be easily connected to a network and appears as a network drive? Network attached storage (NAS).
(204) Which storage device has the means of providing data storage reliability using multiple hard drives? Redundant array of independent disks (RAID).
(204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as one single hard drive.
(204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained? Small computer system interface (SCSI).
(205) Which is not a characteristic of high-order languages? Source codes that are written closest to machine language.
(205) What best describes programming machine code? Instructions in a form that is acceptable to the computer.
(206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page? HyperText Markup Language (HTML).
(206) Which Web application is most likely to succeed Hypertext Markup Language (HTML)? Extensible HTML (XHTML).
(206) A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a common gateway interface (CGI).
(206) Which protocol is commonly used for managing the security of a message transmission on the Internet? Secure socket layer (SSL).
(207) Which program can be used to automatically launch programs on a preset schedule? Task scheduler.
(207) Which error-checking tool allows you to monitor the file system for errors? Check disk.
(208) Which numbering system characteristic is the leftmost non-zero digit of a numeric value? Most significant digit (MSD).
(209) What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters? Recovery strategies.
(210) Which type of backup would you use at the end of the week to save all data that you select on your systems? Normal.
(210) Which type of backup will backup all files that have been altered in the last 24 hours? Daily.
(211) What is based around a central directory database containing information about all the domain controllers in the network? Active Directory.
(211) What is a group of users, servers, and other resources that share a centralized database of account and security information? Domain
(211) Where does a copy of the active directory database reside? Domain controllers.
(211) What kind of server contains the master listing of all active directory objects in the forest? Global catalog.
(211) What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user? Group policy objects.
(212) Which type of interface is friendlier for the average user to use? Graphical user interface.
(212) Which of the following is not one of the elements that most graphical user interfaces are composed of? Programs.
(212) Sitting at a computer and loading a software patch onto it is an example of what type of software patch? Attended.
(212) Which type of patch would utilize a remote installation services (RIS)? Unattended.
(213) Which components of domain name service (DNS) contain a database of associated names and IP addresses? Name servers.
(213) Which query is made by one name server to another name server? Non-recursive query.
(214) Which software program manages an IP address allocation for a network? Dynamic host configuration protocol (DHCP).
(214) The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a scope.
(214) What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have? One.
(214) According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them? 30 days.
(215) What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location? Remote installation services (RIS.
(216) Which is not a component of Internet information services (IIS)? Simple network management protocol (SNMP).
(217) What component of windows unifies and simplifies day to day system management tasks? Microsoft management console (MMC).
(217) Which type of group manages user’s rights assignments and access permissions? Security.
(217) Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer? Interactive.
(218) What defines the rules by which operations can be performed on a particular resource? Permissions.
(218) A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called sharing.
(218) What permission always overrides all other permissions assigned to a user or group to which the user belongs? No access.
(218) When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned? Inherited permissions of the folder it’s contained in.
(219) Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down? System attendant.
(219) In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information? Servers.
(220) Which type of lists uses pointers to connect each element together? Linked.
(220) A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a view.
(220) What is the most common type of operation in sequential query language (SQL)? Queries.
(220) What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent? Transaction.
(220) Which is the most commonly used sequential query language (SQL) data statement? Select.
(220) Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity? Logging.
(221) Which UNIX capability can execute numerous programs at the same time? Multitasking.
(221) Which UNIX ability can run on different types of hardware with few relatively minor changes? Portability.
(221) Which UNIX operating system component interacts directly with the system hardware? Kernel.
(221) Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data? File system.
(221) Which UNIX shell is the most compact and is often used for writing shell scripts? Bourne shell.
(221) Normally, when you create a file with a text editor, the file is set up with read and write permission for you and read-only permission for others.
(221) To change permissions on a shell script, you use the UNIX command chmod
(221) The simplest place to put your function definitions is in your profile.
(222) What do you type to quit a UNIX shell? Exit.
(223) How many characters do most UNIX system administrators and users tend to use for filenames? 14
(223) UNIX™ disks are divided into logical sections called partitions.
(223) The /dev/dsk and /dev/rdsk directories are subdirectories of which directory? Root.
(223) What does the 0 following the c in the device name c0t6d0s7 represent? Controller.
(223) What does the 7 in the device name c0t6d0s7 represent? Partition.
(223) What is the basic unit for storing and manipulating a collection of logically related information known as data? Files.
(223) Hard links are created using which UNIX command? ln.
(223) Which UNIX mechanism enables programs to communicate with one another through the file system? Name pipes.
(223) Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time? Character devices.
(224) Which UNIX command displays the current working directory? pwd.
(224) Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames? cd.
(224) Which UNIX command takes any characters from standard input and then echoes them to standard output? cat.
(224) Which UNIX command deletes files from within a directory? rm.
(225) Which UNIX command looks at an individual file and finds a specified pattern (string)? grep.
(225) Which UNIX command changes the group ownership of one or more files? chgrp.
(225) Which UNIX command changes the ownership of one or more files to a new owner? chown.
(225) Which UNIX command sets access and modification times for each file to the current time? touch
(226) How many primary groups can a user be a member of? One.
(227) Which UNIX vi mode allows users to execute set commands? Command.
(227) Which UNIX vi character represents the end of the file? $.
(227) While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file? w.
(228) In UNIX, which package of programs lets a terminal handle many sessions at once? UNIX™ windows system.
(228) What is the most common UNIX windows system? X windows.
(228) Which UNIX default command starts the X windows system? xinit.
(228) The act of choosing the window you type is called setting the input focus.
(229) What action puts unneeded windows out of the way without quitting the program inside them? Iconifying.
(229) Which UNIX command from the menu bar moves a window to the bottom of the stack of windows? Lower.
(229) The key to shutting down an xterm window is to know which of your programs is the controlling program.
(229) The firststep in quitting an xterm session is to quit all non-controlling programs.
(230) Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man –k command? catman.
Created by: cryonosis
Popular Military sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards