Chapter 1: Hardware Quiz Flashcards
Which if the following is a standard firmware interface for PCs, designed to replace BIOS.
A. UEFI
B. NVRAM
C. CMOS
D. CHS
A. UEFI
UEFI (Unified Extensible Firmware Interface) is a standard firmware interface for PCs, designed to replace BIOS
Which if the following is memory that does not lose its content when power is lost to the machine.
A. CMOS
B. NVRAM
C. CHS
D. SDRAM
B. NVRAM
NVRAM is memory that does not lose its content when power is lost to the machine.
Which if the following is also called the drive geometry?
A. EEPROM
B. SDRAM
C. CHS
D. CMOS
C. CHS
Cylinders, heads, and sectors (CHS) is also called the drive geometry, because together these three numbers determine how much data the disk can hold
Which of the following NOT an example of an optical drive?
A. CD
B. CD-R
C. DVD
D. ROM
D. ROM
Read only memory (ROM) is memory that cannot be written to and usually resides on a chip on the board
Where do you change the boot sequence?
A. BIOS/UEFI settings
B. Control Panel
C. Jumper settings
D. Command prompt
A. BIOS/UEFI settings
This can be set by accessing the BIOS or UEFI settings.
What value represents the relationship between the speed of the CPU and that of the motherboard bus?
A. divisor
B. multiplier
C. gradient
D. correlation
B. multiplier
When the proper CPU speed is known, you must make sure the relationship between the speed of the CPU and that of the motherboard bus is correct. This is done with a value called the multiplier
Which of the following is required to take the most advantage of drive encryption technologies?
A. Lo jack
B. Secure boot
C. TPM chip
D. POST card
C. TPM chip
When the device has a Trusted Platform Module (TPM) chip present on the motherboard, additional security and options become available.
Which of the following allows you to remotely locate, lock, and delete the data on a mobile device when it is stolen?
A. Lo jack
B. TPM chip
C. POST card
D. Secure Boot
A. Lo jack
Lo-jack is a product made by Absolute Software that allows you to remotely locate, lock, and delete the data on a mobile device when it is stolen. It is a small piece of software that embeds itself on the computer and is difficult to detect.
Which of the following is a standard adopted by many venders that requires the operating system to check the integrity of all system files before allowing the boot process to proceed?
A. PXE boot
B. Secure Boot
C. POST boot
D. Bootcheck
B. Secure Boot
Secure Boot is a standard adopted by many venders that requires the operating system to check the integrity of all system files before allowing the boot process to proceed. By doing so it protects against the alteration or corruption of these system files
What is the name for the set of diagnostic steps the computer undertakes when you first boot it up?
A. PXE
B. CHS
C. POST
D. PRE
C. POST
Every computer has a diagnostic program built into its BIOS called the power-on self-test (POST). When you turn on the computer, it executes this set of diagnostics.