Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

study for final exam

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
_________ proves who someone is who they say the are   Authentication  
🗑
What is another term for junk mail?   Spam  
🗑
______ hides in executable files.   Virus  
🗑
what is the language used to communicate with printers developed by Adobe?   Post Script  
🗑
how long does the fuser usually last in a laser printer?   45,000 pages  
🗑
when cleaning a printer, if you take the inkjet nozzles out, how long can you leave them out without problems?   30 mins  
🗑
printer _______is updated by downloading the update from the manufacturer website.   firmware  
🗑
what do you check for recorded events regarding the printer?   event viewer  
🗑
when talking about the number of bits that can be transmitted over a network at a time is?   Bandwidth  
🗑
what is the actual speed of the network called?   throughput  
🗑
what high speed network technology that can be used in other mediums?   broadband  
🗑
what offers moderate protection when connected to a private network?   private profile  
🗑
what lets you read info from the internet namespace by requesting info about dns resolutions from a dns server?   nslookup  
🗑
what is a computer called that intercepts requests that a client makes of a server?   proxy server  
🗑
what type of attack eaves drops on data in transit and may even change the data?   man in the middle  
🗑
what is used to communicate over the internet?   voip  
🗑
level of success of internet communications?   quality of service  
🗑
when using nslookup, when you know the ip address, what type of lookup is that?   reverse  
🗑
when you make-up a word that contains a word with several spaces allowed:   passphrase  
🗑
when you try to get people to give out private info:   social engineering  
🗑
when you put a dollar sign at the end of a file name creates a?   hidden share  
🗑
what is the command you use to encrypt, decrypt when the key is lost:   cipher  
🗑
for a standalone computer that is not kind of domain, the efs creates a ___ digital cert to use for the encryption:   self signed  
🗑
certificates are managed by a?   certificate management console  
🗑
when you cant access an encrypted file, you may be able to recover the file using:   recovery certificate  
🗑
latency measured by the round trip to a destination and back   true  
🗑
when you have an on-demand broadband connection, does it require a username and pass every time you want to connect?   yes  
🗑
what type of networking technology uses a dedicated line from your isp to your business or home?   fiber optic  
🗑
if you want to know what the dns server knows about a domain name, what is the command you use?   nslookup  
🗑
if you have 4 dotted decimals like 255.255.0.0, what is this called?   subnet mask  
🗑
what does ping mean ?   sends an echo request to a remote computer  
🗑
if you have malware that loads before the boot process is complete, what is this called?   rootkit  
🗑
what is the most common virus that is spread by e-mail called?   macro virus  
🗑
if a client server application is used, you have software and hardware firewalls, will all that stuff allow access for that client server application?   false  
🗑
in windows when you control security to folders, permissions are assigned to users or groups?   True  
🗑
allowing users full control of a folder is always required by the job?   false  
🗑
if you set permissions manually for a sub-folder, does that override inherited permissions?   yes  
🗑
A notebook considered a blackbox to computer technicians?   no or false  
🗑
when connecting to a network, windows assume static ip addressing?   false  
🗑
If security features are enabled on a motherboard, what controls these things?   bios  
🗑
Which card inserted into a laptop looks like a credit card?   pc card  
🗑
When all work is saved to the harddrive but the system receives a trickle of power, is called?   hybrid sleep  
🗑
if there is a brightness problem on a laptop, normally governed by what piece of hardware?   backlight  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: npenley
Popular Computers sets