Computer Hardware and BIOS Flashcards
Peripheral Component Interconnect Express (abbr. as PCIe) is a high-speed, serial expansion bus designed as a replacement for:
- PCI
- PCI-X
- AGP
A standardized specification of a Drive, motherboard, Memory (including its dimensions, supported power supply types, and layout of components) is known as
Form Factor
A proprietary line of low-power consumption small form factor motherboard types for industrial and embedded PC applications, is known as:
Information Technology Extended (ITX)
Name 3 characteristic features of conventional PCI
- 32- and 64-bit BUS
- Parallel Interface
- Max throughput of up to 533MB/sec
What is the main power connector used in modern ATX power supplies?
24-Pin Connector
Name 3 dedicated expansion slots/ports on the PC motherboard enable(s) connecting an M.2 device
- B key slot
- M key slot
- B+M key slot
After replacing a modular hardware component inside the computer case, the updated information about specific parameters of the new device is stored in:
- CMOS RAM (Flash memory Chip)
What are 3 ways to reset BIOS configuration to factory settings?
- Jumper on the Motherboard
- Reseating the CMOS Battery (older PCs)
- Via BIOS Settings
The CMOS battery allows for maintaining the BIOS configuration settings stored in CMOS RAM (T/F)
True
Name 6 characteristics of UEFI
- Replacement for BIOS
- DRM Support
- Mouse Support
- GUI Mode
- Secure Boot
- Network Access
There are 2 levels of permissions in BIOS
What are they and their level of priority?
- Supervisor (Highest)
- User (Lowest)
What is the purpose of a Supervisor Password on BIOS/UEFI?
Restricts users from making changes to the BIOS/UEFI Settings
What is the purpose of a User Password on BIOS/UEFI?
Prevents unauthorized access to a computer at boot. Password must be entered to allow booting of the OS
What does TPM stand for?
Trusted Platform Module
What are 3 characteristics of TPM?
- Chip embedded into computer motherboard
- International standard for a secure cryptoprocessor
- Designed to secure hardware through cryptographic functions