Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
DOS is a(n) ____-modeoperating system.a. protected c. extendedb. virtual d. real
Q:
The ____ desktop is the default desktop for Red Hat's distribution of Fedora 13.a. Fluxbox c. GNOMEb. KDE d. Windows 7
Q:
Fedora 13 owes its parentage to ____.a. DOS c. MVSb. UNIX d. VM
Q:
Xerox PARC is best known for essentially creating the modern PC ____.a. microprocessor c. graphical user interfaceb. standard output device d. hard drive
Q:
A program with a very small amount of memory usage must have a memory leak.
Q:
From the GUI interface, you cannot use a CLI.
Q:
All modern operating systems support multithreading and multitasking.
Q:
The DOS user interface is a command-line interface (CLI).
Q:
A desktop is the main workspace in a graphical user interface.
Q:
Q:
Identify and describe three categories of printers.
Q:
How is information written to an optical drive?
Q:
What are the advantages of a SATA (Serial Advanced Technology Attachment) interface over a PATA (Parallel Advanced Technology Attachment) interface?
Q:
What is a sound adapter?
Q:
What is an expansion card?
Q:
What is the significance of the connectors and cables for USB 1.1 and USB 2.0 being identical?
Q:
What functions are performed by a computer's BIOS (basic input/output system)?
Q:
How does poor heat dissipation adversely impact a PC?
Q:
What are virtualized systems and how are they used?
Q:
____________________ is the rapid discharge of static electricity from one conductor to another conductor of a different potential.
Q:
A(n) ____________________ is an expansion board that you insert into a computer so that it can be connected to a local area network (LAN).
Q:
A(n) ____________________ uses rigid rotating platters to read and write on magnetic media.
Q:
The ____________________contains a set of instructions designed to perform such tasks as arithmetic (adding, subtracting), logic operations (comparing two numbers), and transferring numbers from one register to another.
Q:
The form ____________________ is the size, configuration, or physical arrangement of a computer case or one of its internal components, such as a system board.
Q:
When connecting a LAN cable to a tower case, place it in the ____ connector.a. DB-15 female c. RJ-45 blackb. green 6-pin d. purple 6-pin
Q:
In addition to the line voltage and capacitors, the flyback transformer, which generates up to ____ volts, is a dangerous part of a CRT monitor.a. 1,000 c. 10,000b. 5,000 d. 20,000
Q:
Each crystal in a(n) ____ display is like a shutter, either allowing light to pass through or blocking the light.a. plasma panel c. LCD panelb. video projector d. CRT monitor
Q:
Like televisions, monitor screen sizes are measured in diagonal ____.a. pixels c. millimetersb. inches d. centimeters
Q:
A digital camera stores images digitally rather than recording them on ____.a. disk c. filmb. scanner d. tape
Q:
In information technology, ____ usually refers to technologies for measuring and analyzing human body characteristics - such as fingerprints - for authentication purposes.a. biometrics c. data miningb. bioinformatics d. cryptography
Q:
____ are designed for the input of text and to control the operation of the computer.a. CRT monitors c. Printersb. Keyboards d. Storage devices
Q:
A(n) ____ adapter permits a mobile user to connect to a LAN through a wireless (radio) connection.a. roaming c. wirelessb. audio d. video
Q:
A cable modem is designed to operate over cable ____ lines.a. antenna c. modemb. TV d. phone
Q:
A(n) ____ drive is a small, portable flash memory device that plugs into any computer with a USB port and functions as a portable drive with up to 256 GB of storage capacity.a. USB c. opticalb. tape d. floppy
Q:
____ drives store data sequentially rather than randomly.a. Floppy c. Tapeb. Optical d. Hard
Q:
A disk drive ____ manages the transfer of data from a motherboard to a disk drive and vice versa.a. mapper c. controllerb. regulator d. manager
Q:
FireWireis a very fast digital input/output system, providing transfer rates of up to ____Mbps.a. 100 c. 480b. 400 d. 750
Q:
You can connect up to ____ USB peripherals with five levels of hubs to a single USB host controller.a. 25 c. 100b. 50 d. 127
Q:
You can identify the ____ ports on the back of a PC by checking for male connectors.a. virtual c. parallelb. serial d. USB
Q:
ROMs, PROMs, EPROMs, and EEPROMs that contain recorded programs are called ____.a. demoware c. firmwareb. middleware d. shareware
Q:
The term ____ refers to read-and-write memory.a. ROM c. EPROMb. PROM d. RAM
Q:
All buses consist of two parts: a data bus and a(n) ____ bus.a. address c. modularb. signal d. parallel
Q:
The microprocessor in a PC has a heat ____ attached to dissipate generated heat.a. source c. gaugeb. transformer d. sink
Q:
____, which is located in the desktop computer case, is the electronic holding area for programs and data.a. The power supply c. Memoryb. The cooling system d. Firmware
Q:
The ____, which is located in the desktop computer case, is the main circuit board for a PC.a. PCI bus c. microprocessorb. motherboard d. ROM chip
Q:
The internal workings of a computer, and especially the hard drive, are extremely susceptible to static electricity.
Q:
Peripheral devices are internal to the PC.
Q:
Like RAM memory, mass storage devices do not retain data when the computer is turned off.
Q:
The size of a bus determines how much data can be transmitted at one time.
Q:
Changes that you make in virtual machines do not affect your physical computer.
Q:
Match each item with a statement below.a. serial port f. registerb. SCSI g. mousec. power supply h. FireWired. capacitors i. buse. phone cable1) Sometimes called IEEE 1394.2) Converts the 110-volt alternating current (AC) in your office or household to the various direct current (DC) levels required by your PC.3) A small amount of high-speed memory.4) Transfers data in or out one bit at a time.5) Also called RJ-11.6) Parallel interface standard used for attaching peripheral devices to PCs.7) A set of circuits on the motherboard through which data is transferred from one part of a computer to another.8) Consists of a metal or plastic housing, a sensor on the bottom of the housing that is rolled on a flat surface, and one or more buttons on top of the housing.9) Electronic components within PC power supplies, monitors, and laser printers that may retain a charge long after power is removed from a circuit.
Q:
Describe what happens when a shared folder is being access over the network and both sharing and NTFS permissions are set and a conflict exists.
Q:
You are setting up permissions to a folder that will be accessed using a Web browser. You want then to have the ability to view the files, folders and subfolders. What permission must you assign?
Q:
List and describe two of the Kerberos configuration options.
Q:
You want to be sure that if somebody is trying to guess one of your user's passwords, the account will be locked out after 4 unsuccessful password entries. Furthermore, you want the account to be locked out for one hour before it automatically unlocks. The count of unsuccessful attempts should be reset after 20 minutes. What account lockout policies should you set and with what values?
Q:
You administer a medium-size network. You want to make sure your users must change their passwords every 60 days, cannot change their password sooner than five days after the last change and must use 8 unique passwords before re-using a password. What account policies would you set and with what values?
Q:
You need to give the five department managers access to a printer on your Windows Server 2008 domain. Briefly describe the process.
Q:
List three important functions provided by a directory service.
Q:
Describe the difference between Local groups and Domain local groups.
Q:
Describe the difference between mapping a drive and mounting a volume.
Q:
a. group f. home directoryb. distribution group g. SMBc. container object h. UIDd. domain i. remote procedure calle. security group j. forest1/an Active Directory container that holds one or more trees2/in Active Directory, this is a grouping of resources into a functional unit for management3/a group of Windows Server 2003/Server 2003 R2 and Server 2008/Server 2008 R2 users that is used to assign access privileges4/a list of Windows Server 2003/Server 2003 R2 and Server 2008/Server 2008 R2 users that is not used for security5/enables services and software on one computer to use services and software on a different computer6/a protocol mainly used for sharing folders, files, and printers7/an entity used to group together resources; examples are organizational unit, domain, or forest in Microsoft Active Directory8/a number that is assigned to a UNIX/Linux user account9/a collection of computers and users where policies set for the group apply to all computers and users10/ a user work area in which the user stores data on a server and typically has control over whether to enable other users to access his or her data
Q:
In Windows, the ___________ sharing permission enables users to read, add, modify, execute, and delete files but not change permissions.
Q:
The account lockout ____________ enables you to set a limit to the number of unsuccessful attempts to log onto an account.
Q:
You use __________ groups to hold user accounts from the same domain as members.
Q:
A _________________ service provides a central listing of resources and the ability to access and manage resources.
Q:
___________ is a software process that enables a client workstation to attach to a shared folder on another workstation and assign it a drive letter.
Q:
Which of the following permissions should you set on a shared printer in Windows to allow a junior administrator to configure the properties of the printer?a. Full Control b. Manage Printers c. Manage Documentsd. Modify
Q:
You need to specify which clients are allowed to access files on a UNIX/Linux system using NFS. What should you do?a. configure the sharing permissions b. edit the smb.conf file c. edit the /etc/hosts.allow filed. edit the /usr/nfsconfig file
Q:
Q:
Which of the following is NOT an event type that can be set up for logging using Server Admin on Mac OS X Server?a. Login and Logout events b. Installation of applications c. Opened filesd. Deleted files
Q:
You need to assign the read and execute permission to a folder named /docs/acctg to other. Which of the following commands does this?a. chmod o +rx /docs/acctg b. chmod /docs/acctg o -rx c. chmod /docs/acctg +rx od. chmod -rx o /docs/acctg
Q:
Which of the following is a valid permission in the Linux file system?a. Full Control b. Modify c. Writed. Change
Q:
You have just successfully created a user named acoulter on your Red Hat Enterprise Linux system. You left the password blank so the user can easily log on and create her own password. The user calls you and informs you she cannot logon. She has tried several times and has used a blank password but still cannot logon. What is likely to be the problem?a. you didn"t add the user to the right group b. the user is not entering the password correctly c. the user has caps lock ond. the account is disabled
Q:
You need to create a user on your Red Hat Enterprise Linux system. What command should you use?a. newuserb. userconf c. useraddd. moduser
Q:
To protect user's passwords on a Linux system, they can be kept in a file only available to the system administrator. What is the name of that file?a. /etc/passwd b. /sys/secpass c. /etc/shadowd. /sys/encryptpass
Q:
Which of the following is NOT included in the Linux password (/etc/passwd) file?a. user name b. user permissions c. UIDd. home directory location
Q:
Which of the following is true about permissions on an NTFS volume?a. newly created files have no permissions set b. a file that is moved to another volume inherits the parent folder's permissions c. a file that is copied from a FAT volume to an NTFS volume has no permissions setd. A file that is copied within the same volume retains its existing permissions
Q:
A user is complaining that he cannot open a file in a shared folder. He is able to open other files in the same shared folder. Which of the following could be the problem?a. his network connection is not working b. he does not have Read share permission to the share c. he has entered the wrong password to gain access to the filed. he has Read sharing permission but has a Deny permission on the file
Q:
Which permission to a folder should you give a user if that user should be able to create files but not read or execute files in that folder?a. Full control b. Modify c. Writed. Read & Execute
Q:
Which account feature can be configured to prevent a user from logging in after incorrectly entering the password a number of times?a. Account disable b. Account expiration c. Account lockoutd. Account reset