Podcast
Questions and Answers
Which protocol is responsible for transferring files over the internet?
Which protocol is responsible for transferring files over the internet?
- HTTP
- TCP
- IP
- FTP (correct)
A peer-to-peer network requires a dedicated server for resource sharing.
A peer-to-peer network requires a dedicated server for resource sharing.
False (B)
What type of memory retains data even when the power is turned off?
What type of memory retains data even when the power is turned off?
Non-Volatile Memory
_____ refers to a networking device that forwards data packets between computer networks.
_____ refers to a networking device that forwards data packets between computer networks.
Match the following network types with their descriptions:
Match the following network types with their descriptions:
Which of the following describes the function of a GPU?
Which of the following describes the function of a GPU?
BIOS is stored in volatile memory.
BIOS is stored in volatile memory.
What does the acronym SATA stand for?
What does the acronym SATA stand for?
A _____ is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area.
A _____ is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area.
Match the following abbreviations to its description:
Match the following abbreviations to its description:
Which type of network is used for connecting devices in a small personal space without wires?
Which type of network is used for connecting devices in a small personal space without wires?
The term 'LIF' stands for 'Large Insertion Force'.
The term 'LIF' stands for 'Large Insertion Force'.
What is the purpose of a CMOS battery on a motherboard?
What is the purpose of a CMOS battery on a motherboard?
The term _____ refers to an automated software program that executes certain commands when it receives a specific input.
The term _____ refers to an automated software program that executes certain commands when it receives a specific input.
Match the following wireless technology with its description:
Match the following wireless technology with its description:
What is the function of 'CHKDSK' command in the Recovery Console?
What is the function of 'CHKDSK' command in the Recovery Console?
In Windows, a single physical hard drive cannot be divided into multiple logical hard drives.
In Windows, a single physical hard drive cannot be divided into multiple logical hard drives.
What hardware component allows a computer to connect to a network?
What hardware component allows a computer to connect to a network?
The acronym _____ refers to disk image also known as _____.
The acronym _____ refers to disk image also known as _____.
Match the following Windows boot-up modes with its descriptions:
Match the following Windows boot-up modes with its descriptions:
Which of the following tools is an extension of the Microsoft Management Console used to manage hardware devices?
Which of the following tools is an extension of the Microsoft Management Console used to manage hardware devices?
A cross-over cable uses the same wiring standard (e.g., T568A) on both ends.
A cross-over cable uses the same wiring standard (e.g., T568A) on both ends.
In a power supply, what is the voltage rating of the yellow wire?
In a power supply, what is the voltage rating of the yellow wire?
The term _____ pertains to the maximum data transfer rate on a network or internet connection.
The term _____ pertains to the maximum data transfer rate on a network or internet connection.
Match the following Windows command-line tools with its functions
Match the following Windows command-line tools with its functions
Which of the following is a disk image?
Which of the following is a disk image?
The minimum RAM requirement of Server 2008 R2 is 1 GB.
The minimum RAM requirement of Server 2008 R2 is 1 GB.
What command-line utility is used to export and import Active Directory object information?
What command-line utility is used to export and import Active Directory object information?
Electrically, a _______ is an electronic component that needs to be discharged before replacement to prevent electric shocks.
Electrically, a _______ is an electronic component that needs to be discharged before replacement to prevent electric shocks.
Match the following USB specifications with its description:
Match the following USB specifications with its description:
What type of server enables large number of users to exchange information near instantaneously and was formerly known as Internet Relay Chat (IRC) Servers.
What type of server enables large number of users to exchange information near instantaneously and was formerly known as Internet Relay Chat (IRC) Servers.
In Windows 7, a LAN connection icon with a yellow color indicator signifies 'No Connectivity'.
In Windows 7, a LAN connection icon with a yellow color indicator signifies 'No Connectivity'.
What is the ideal voltage on the YELLOW wire of a Molex Connector?
What is the ideal voltage on the YELLOW wire of a Molex Connector?
______ allows to define a list of devices and only allow those devices on Wi-Fi network
______ allows to define a list of devices and only allow those devices on Wi-Fi network
Match the classes of IP addressing to the correct IP address:
Match the classes of IP addressing to the correct IP address:
What is the purpose of thermal paste?
What is the purpose of thermal paste?
LoJack is a type of connector for USB devices
LoJack is a type of connector for USB devices
In networking, what term refers to pieces of related information that are transferred through a network?
In networking, what term refers to pieces of related information that are transferred through a network?
The acronym SSD refers to _____
The acronym SSD refers to _____
Match the media types of 10-megabit Ethernet with its correct description:
Match the media types of 10-megabit Ethernet with its correct description:
Flashcards
HTTP
HTTP
A set of rules for transferring files (text, images, video) on the World Wide Web.
WPA 2-PERSONAL
WPA 2-PERSONAL
Protects unauthorized network access using a setup password.
PING
PING
Tests if a host is reachable across an IP network.
Thermal Paste
Thermal Paste
Signup and view all the flashcards
ISO Image
ISO Image
Signup and view all the flashcards
Network Interface Card
Network Interface Card
Signup and view all the flashcards
Router
Router
Signup and view all the flashcards
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
Signup and view all the flashcards
Anti-Virus Software
Anti-Virus Software
Signup and view all the flashcards
Peer To Peer Network
Peer To Peer Network
Signup and view all the flashcards
Network Administrator
Network Administrator
Signup and view all the flashcards
File Server
File Server
Signup and view all the flashcards
Dynamic Host Control Protocol (DHCP)
Dynamic Host Control Protocol (DHCP)
Signup and view all the flashcards
NSLOOKUP
NSLOOKUP
Signup and view all the flashcards
CrystalDiskInfo
CrystalDiskInfo
Signup and view all the flashcards
Software Troubleshooting
Software Troubleshooting
Signup and view all the flashcards
Access Point
Access Point
Signup and view all the flashcards
Latency
Latency
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
NETSTAT
NETSTAT
Signup and view all the flashcards
Study Notes
- CSS stands for Computer Systems Servicing.
- TCP/IP stands for Transmission Control Protocol/Internet Protocol.
- ISA stands for Instruction Set Architecture/Industrial Standard Architecture.
- CMOS stands for Complementary Metal Oxide Semiconductor.
- BIOS stands for Basic Input Output Setup.
- PCB stands for Printed Circuit Board.
- SATA stands for Serial Advanced Technology Attachment.
- IDE stands for Integrated Device Electronic.
- USB stands for Universal Serial Bus.
- GPU stands for Graphical Processing Unit.
- CPU stands for Central Processing Unit.
- GUI stands for Graphical User Interface.
- VGA stands for Video Graphic Array.
- PS/2 stands for Personal System 2.
- LPT stands for Line Print Terminal Parallel Port.
- LIF stands for Low Insertion Force.
- ZIF stands for Zero Insertion Force.
- AVR stands for Automatic Voltage Regulator.
- DDR RAM stands for Double Data Rate RAM.
- SD RAM stands for Synchronous Dynamic RAM.
- DVD ROM stands for Digital Versatile Disk-Read Only Memory.
- PCI stands for Peripheral Component Interconnect.
- PCI-E stands for Peripheral Component Interconnect Express.
- MS-DOS stands for Microsoft Disk Operating System.
- ATX stands for Advanced Technology-Extended.
- FTP stands for File Transfer Protocol.
- HTTP stands for Hypertext Transfer Protocol.
- PAN stands for Personal Area Network.
- WPAN stands for Wireless Personal Area Network.
- WAN stands for Wide Area Network.
- SAN stands for Storage Area Network.
- MAN stands for Metropolitan Area Network.
- HAN stands for Home Area Network.
- CAN stands for Campus Area Network.
- WIFI stands for Wireless Fidelity.
- HDD stands for Hard Disk Drive.
- FDD stands for Floppy Disk Drive.
- SSD stands for Solid State Drive.
- NVMe stands for Non-Volatile Memory Express.
- ROMBIOS stands for Read-Only Basic Input Output Setup.
- AGP stands for Accelerated Graphics Port.
- RAM stands for Random Access Memory.
- DIMM stands for Dual Inline Memory Module.
- SIMM stands for Single Inline Memory Module.
- RIMM stands for Rambus Inline Memory Module.
- API stands for Application Program Interface.
- CLI stands for Command Line Interface.
- HTML stands for Hypertext Markup Language.
- SSID stands for Service Set Identifier.
- RJ45 stands for Registered Jack 45.
- HDMI stands for High Definition Multimedia Interface.
- LED stands for Light-Emitting Diode.
- CRT stands for Cathode Ray Tube.
- LCD stands for Liquid Crystal Display.
- CD stands for Compact Disc.
- DVD stands for Digital Video Disc.
- URL stands for Uniform Resource Locator.
- NTFS stands for New Technology File System.
- FAT stands for File Allocation Table.
- CSU stands for Computer System Unit.
Networking & Security Concepts
- WPA2-Enterprise verifies network users through a server, requiring a more complex setup for additional security.
- Port number identifies a specific process to which a network message is forwarded on a server.
- A bot is an automated software program executing commands upon receiving specific input.
- File System Quota enables administrators to configure storage thresholds on data sets stored on server NTFS volumes.
- Failover in Windows Server allows workload migration between source and target clusters.
- Counter Logs record performance statistics based on objects and instances available in Performance Monitor.
- CHKDSK is a Recovery Console command that examines and repairs volume errors.
- Normal booting indicates a functional computer system.
- Safe Mode in Windows helps users resolve boot-up problems.
- Repair Computer starts recovery options, booting into the recovery partition of the main hard drive.
- A single physical hard drive can be divided into multiple logical hard drives.
- The BIOS is originally stored in Read-Only Memory (ROM) in a standard PC.
- An ISO Image is a complete copy of everything stored on a physical optical disc.
- A Network Interface Card (NIC) connects a computer to a network.
- A router is a networking device that forwards data packets between computer networks.
- IEEE 802.11 is the standard behind the Wi-Fi trademark.
- Local Area Network (LAN) connects devices in one physical location.
- Wide Area Network (WAN) interconnects multiple local area networks.
- Anti-virus software prevents, detects, and removes threats to a computer system.
- Peer-to-peer network connects two or more PCs to share resources without a separate server.
- Provider Address is the IP Address used by a virtual machine to communicate on a physical network.
- WPA2-Personal protects unauthorized network access using a setup password.
- Access Control List (ACL) consists of user matrices and capability tables governing user rights and privileges.
- Information extortion occurs when an attacker steals data and demands compensation for its return.
- Continuous assessment monitors the initial security accreditation of an information system, tracking changes.
- Remote Storage Service in Windows Server migrates data to lower-cost and tape media on file servers.
- A Virtual Cluster Server application group contains a Client Access Point and at least one application-specific resource.
- Ping is a utility tool to test if a host is reachable across an IP network.
- F5 is not appropriate to enter BIOS setup
- Device Manager manages hardware devices and drivers in Microsoft Management Console.
- The yellow wire in a power supply has a +12V rating.
- A Yost cable is also known as a roll-over, Cisco cable, or console cable.
- No connectivity is indicated by a yellow color for the LAN connection icon in Server 2008.
- A Networking Interface Card (NIC) has 2 Light Emitting Diode (LED) lights.
- Port forwarding redirects a communication request from one address and port number to another.
- Wireless Fidelity utilizes radio frequencies as an alternative for wired connections to send signals between devices and a rooter.
- Campus Area Network (CAN) is a network of LANs within a limited geographical area.
- System Area Network (SAN) applies to the interconnection of LANs in a city over 5 to 50 kilometers.
- A Network Administrator monitors network security, operation, and users.
- A File Server is used to store user documents with a large amount of memory and storage space.
- Lightweight Directory Access Protocol (LDAP) is an Active Directory protocol used to access data from a database.
- Thermal paste prevents CPU overheating.
- The maximum cable length for USB 2.0 is 5 meters.
- Firmware is a software program stored in Read-Only Memory (ROM).
- An ISO image is also known as a disc image.
- The minimum RAM requirement for Windows 10 is 1 GB for 32-bit or 2 GB for 64-bit.
- Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA) are two types of interfaces used to communicate between the hard drive and the computer motherboard.
- The World Wide Web (WWW) is a spider-like interconnection of information located on computers in cyberspace.
- A blue connector is common for USB 3.0 Standard-A receptacles and plugs.
- The minimum hard disk drive capacity for Windows 10 is 16 GB for 32-bit OS or 20 GB for 64-bit OS.
- Windows device drivers are stored in the Registry.
- The red wire in a power supply has a voltage rating of +5V.
- A crossover cable has one end wired as T568-A and the other as T568-B.
- A LAN connection with a cross and red indicator in Windows 7 signifies a problem with the LAN driver.
- A Fully Automatic Windows Update downloads and installs the latest versions.
- A Bad Sector is a physically damaged cluster of storage on the hard drive.
- Windows Ultimate is a Windows edition capable of restricting other users from accessing certain programs.
- Device drivers can be found in the System32 folder.
- Ideal Molex connector voltage ranges are Red=5V, Yellow=12V.
- Straight-thru Ethernet cables connect computers to hubs and switches.
- A network interface controller is also known as a LAN card.
- 192.168.0.1 is a Class C IP address.
- Hypertext Transfer Protocol (HTTP) transfers files on the World Wide Web (WWW).
- Windows Folder Sharing traditionally accesses server data using the server message block protocol over TCP/IP.
- LDIFDE.EXE and CSVDE.EXE are command-line utilities to export and import Active Directory object information.
- A Gateway is a node that allows data to flow from one discrete network to another.
- Resistance is measured when performing continuity testing of twisted-pair cables.
- Local backup uses hard drives, discs, flash drives, and external drives housed on site.
- Startup Repair in Windows fixes and scans for computer problems preventing booting.
- Windows Recovery Environment runs commands for troubleshooting an unbootable operating system.
- Capacitors need to be discharged electrically before replacement.
- 802.11n is a current wireless networking standard compatible with older networks.
- A core router operates in the Internet backbone.
- MAC address filtering defines a list of allowed devices on a Wi-Fi network.
- Wireless Personal Area Network connects through short range radio signals, e.g. infrared.
- Wireless Local Area Network allows users to move while maintaining a network connection.
- NetBackup is an enterprise-level backup and recovery suite.
- A Directory Server centrally manages network users and resources.
- Loss refers to an information asset suffering damage, modification, or disclosure.
- The minimum cable length for USB 3.0 using a non-twisted pair is 3 meters.
- M.2 is a storage drive form factor.
- The Real-Time Clock/Non-Volatile RAM (RTC/NVRAM) chip stores BIOS settings.
- An ISO file substitutes for an actual disc, allowing users to run software without loading a CD/DVD.
- Dynamic Host Control Protocol (DHCP) centrally manages IP address distribution in a network.
- The NSLOOKUP command-line tool finds a host or domain name's IP address.
- A CMOS battery failure causes time and date resets.
- CrystalDiskInfo checks the condition of hard drives, with status indications.
- Implementing the Solution is the task after planning to fix a network.
- Software Troubleshooting scans, identifies, diagnoses, and resolves problems in software.
- 10.10.10.1 is a Class A IP address.
- 250 devices can connect to a wireless router.
- An Access Point bridges wireless clients and wired networks.
- Virtual Local Area Network is a logical subnetwork grouping devices from the same switch.
- Latency is the time lapse between data sent and received.
- A Stress test pushes components to their limits.
- Malicious code attacks execute viruses, worms, Trojan horses to destroy or steal information.
- Diskpart is a text-based command for creating bootable flash drives.
- The minimum RAM for Server 2008 R2 is 512MB.
- If standard video is displayed it indicates a video driver has not installed properly in Windows 7.
- A voltmeter reading Zero volt indicates a shorted diode.
- A Real-Time Communication Server enables near-instantaneous information exchange.
- Integrity ensures authorized changes to information and programs.
- NETSTAT displays network connections for TCP and routing tables.
- Communications Protocol defines how software and hardware interact within a network.
- Cable Splicing joins two cable ends together.
- FireWire is an interface standard for high-speed serial communication.
- The Input/Output Controller Hub manages data communications between a CPU and a motherboard.
- LoJack is a UEFI/BIOS setup option that allows security settings to perform tasks for locating the devices.
- A terminal server connects serial devices across a network.
- View Current Activity displays real-time system performance statistics.
- A Network Interface Card (NIC) is a peripheral card with a media access control address.
- Vertical Cross Connect is a main patch panel linking to telecommunication rooms.
- A Raceway protects, routes, and hides cables and wires.
- Universal Serial Bus (USB) C Thunderbolt is a 24-pin USB Connector system with a rotationally symmetrical connector.
- The chipset facilitates communication between the CPU and devices.
- Voltage in BIOS/UEFI is used to overclock computers.
- The Minimum byte capacity of a bootable flash drive for Windows 10 is 8GB.
- Minimum RAM requirement of Sever 2012 R2 is 512MB
- In Windows 7, Windows and Security is located in Settings.
- An IP Address Conflict occurs when two or more devices share the same IP address.
- A hard disk should be replaced for frequent errors while moving files/booting.
- FIXMBR writes a new master boot record on the hard disk drive.
- The ATX12V P1 connector provides 3.3V, 5V, and 12V for the motherboard.
- ANSI/TIA-587 defines structured network cabling standards.
- Connection refers to transferring related information through a network.
- 172.168.10.1 is a Class B IP address.
- An Edge router connects an internal network to an external network.
- Bandwidth describes the maximum data transfer rate of a network.
- A Storage Area Network (SAN) is a high-speed network for hosts and interconnects.
- Customer Premises Equipment (CPE) is a border router for corporate sites.
- Authentication recognizes a user’s identity.
- A Loopback Test verifies communication device operation.
- A Frequency Analyzer monitors and intercepts traffic over the network.
- Infinite Ohms resistance reading indicates an open wire.
- An Application Server occupies computing territory between the database server and end user.
- Access is a privilege or permission for using computer data or resources.
- 10BASE-36 uses broadband coaxial cable with multiple baseband channels for a maximum length of 3,600 meters.
- A Firewall monitors and controls network traffic based on security rules.
- Downtime is when a system is unavailable.
- NSLOOKUP certifies peer name resolution in Active Directory.
- Flash Memory stores as a Solid State Drive (SSD).
- A Boot slid before crimping is used to reduce strain in a patch cable.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.