click below
click below
Normal Size Small Size show me how
3D0X2 Vol2
URE
Question | Answer |
---|---|
(201) Which original components were very susceptible to damage from electrostatic discharge? | Complementary metal-oxide semiconductor (CMOS). |
(201) What is considered to be a computer’s main storage? | Random access memory (RAM). |
(201) What is considered as nonvolatile permanent memory? | Read only memory (ROM). |
(201) What is a form of firmware that contains the computer’s start up instructions? | Basic input/output system (BIOS). |
(202) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event? | Interrupt. |
(202) Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)? | Priority interrupt. |
(202) Which interrupt request (IRQ) line number is normally used for the floppy disk controller? | 6 |
(202) Which is a term used to describe that data is whole or complete? | Data integrity. |
(202) What is considered as a technique or method of checking data integrity? | Parity. |
(202) Which is a very simple example of an error detecting code? | Parity bit. |
(203) What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not? | Storage area network (SAN). |
(203) What is an advantage of using a storage area network (SAN) architecture? | Ease of replacing server. |
(203) What is the connection type of choice for storage area networks (SAN)? | Fibre Channel. |
(203) Which storage device can be easily connected to a network and appears as a network drive? | Network attached storage (NAS). |
(204) Which storage device has the means of providing data storage reliability using multiple hard drives? | Redundant array of independent disks (RAID). |
(204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as | one single hard drive. |
(204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained? | Small computer system interface (SCSI). |
(205) Which is not a characteristic of high-order languages? | Source codes that are written closest to machine language. |
(205) What best describes programming machine code? | Instructions in a form that is acceptable to the computer. |
(206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page? | HyperText Markup Language (HTML). |
(206) Which Web application is most likely to succeed Hypertext Markup Language (HTML)? | Extensible HTML (XHTML). |
(206) A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a | common gateway interface (CGI). |
(206) Which protocol is commonly used for managing the security of a message transmission on the Internet? | Secure socket layer (SSL). |
(207) Which program can be used to automatically launch programs on a preset schedule? | Task scheduler. |
(207) Which error-checking tool allows you to monitor the file system for errors? | Check disk. |
(208) Which numbering system characteristic is the leftmost non-zero digit of a numeric value? | Most significant digit (MSD). |
(209) What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters? | Recovery strategies. |
(210) Which type of backup would you use at the end of the week to save all data that you select on your systems? | Normal. |
(210) Which type of backup will backup all files that have been altered in the last 24 hours? | Daily. |
(211) What is based around a central directory database containing information about all the domain controllers in the network? | Active Directory. |
(211) What is a group of users, servers, and other resources that share a centralized database of account and security information? | Domain |
(211) Where does a copy of the active directory database reside? | Domain controllers. |
(211) What kind of server contains the master listing of all active directory objects in the forest? | Global catalog. |
(211) What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user? | Group policy objects. |
(212) Which type of interface is friendlier for the average user to use? | Graphical user interface. |
(212) Which of the following is not one of the elements that most graphical user interfaces are composed of? | Programs. |
(212) Sitting at a computer and loading a software patch onto it is an example of what type of software patch? | Attended. |
(212) Which type of patch would utilize a remote installation services (RIS)? | Unattended. |
(213) Which components of domain name service (DNS) contain a database of associated names and IP addresses? | Name servers. |
(213) Which query is made by one name server to another name server? | Non-recursive query. |
(214) Which software program manages an IP address allocation for a network? | Dynamic host configuration protocol (DHCP). |
(214) The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a | scope. |
(214) What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have? | One. |
(214) According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them? | 30 days. |
(215) What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location? | Remote installation services (RIS. |
(216) Which is not a component of Internet information services (IIS)? | Simple network management protocol (SNMP). |
(217) What component of windows unifies and simplifies day to day system management tasks? | Microsoft management console (MMC). |
(217) Which type of group manages user’s rights assignments and access permissions? | Security. |
(217) Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer? | Interactive. |
(218) What defines the rules by which operations can be performed on a particular resource? | Permissions. |
(218) A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called | sharing. |
(218) What permission always overrides all other permissions assigned to a user or group to which the user belongs? | No access. |
(218) When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned? | Inherited permissions of the folder it’s contained in. |
(219) Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down? | System attendant. |
(219) In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information? | Servers. |
(220) Which type of lists uses pointers to connect each element together? | Linked. |
(220) A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a | view. |
(220) What is the most common type of operation in sequential query language (SQL)? | Queries. |
(220) What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent? | Transaction. |
(220) Which is the most commonly used sequential query language (SQL) data statement? | Select. |
(220) Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity? | Logging. |
(221) Which UNIX capability can execute numerous programs at the same time? | Multitasking. |
(221) Which UNIX ability can run on different types of hardware with few relatively minor changes? | Portability. |
(221) Which UNIX operating system component interacts directly with the system hardware? | Kernel. |
(221) Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data? | File system. |
(221) Which UNIX shell is the most compact and is often used for writing shell scripts? | Bourne shell. |
(221) Normally, when you create a file with a text editor, the file is set up with | read and write permission for you and read-only permission for others. |
(221) To change permissions on a shell script, you use the UNIX command | chmod |
(221) The simplest place to put your function definitions is in your | profile. |
(222) What do you type to quit a UNIX shell? | Exit. |
(223) How many characters do most UNIX system administrators and users tend to use for filenames? | 14 |
(223) UNIX™ disks are divided into logical sections called | partitions. |
(223) The /dev/dsk and /dev/rdsk directories are subdirectories of which directory? | Root. |
(223) What does the 0 following the c in the device name c0t6d0s7 represent? | Controller. |
(223) What does the 7 in the device name c0t6d0s7 represent? | Partition. |
(223) What is the basic unit for storing and manipulating a collection of logically related information known as data? | Files. |
(223) Hard links are created using which UNIX command? | ln. |
(223) Which UNIX mechanism enables programs to communicate with one another through the file system? | Name pipes. |
(223) Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time? | Character devices. |
(224) Which UNIX command displays the current working directory? | pwd. |
(224) Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames? | cd. |
(224) Which UNIX command takes any characters from standard input and then echoes them to standard output? | cat. |
(224) Which UNIX command deletes files from within a directory? | rm. |
(225) Which UNIX command looks at an individual file and finds a specified pattern (string)? | grep. |
(225) Which UNIX command changes the group ownership of one or more files? | chgrp. |
(225) Which UNIX command changes the ownership of one or more files to a new owner? | chown. |
(225) Which UNIX command sets access and modification times for each file to the current time? | touch |
(226) How many primary groups can a user be a member of? | One. |
(227) Which UNIX vi mode allows users to execute set commands? | Command. |
(227) Which UNIX vi character represents the end of the file? | $. |
(227) While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file? | w. |
(228) In UNIX, which package of programs lets a terminal handle many sessions at once? | UNIX™ windows system. |
(228) What is the most common UNIX windows system? | X windows. |
(228) Which UNIX default command starts the X windows system? | xinit. |
(228) The act of choosing the window you type is called setting the | input focus. |
(229) What action puts unneeded windows out of the way without quitting the program inside them? | Iconifying. |
(229) Which UNIX command from the menu bar moves a window to the bottom of the stack of windows? | Lower. |
(229) The key to shutting down an xterm window is to know which of your programs is the | controlling program. |
(229) The firststep in quitting an xterm session is to | quit all non-controlling programs. |
(230) Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man –k command? | catman. |