General Flashcards

1
Q

Contiguous files are created by

A

Contiguous files are files which have not been broken into pieces before moving. Not sure…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the expected data rate of 2 usb interfaces

A

usb 1 low speed 1.5 mpbs high 12 mpbs

usb 2 480mpbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A laser printer starts to print smudgy vertical lines on the paper as well as the desired images is suffering from..

A

ask ed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Default subnet masks ranges.

A

class - a 1-126
clas b 128-191
clas c. 192-223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a driver

A

A driver provides software interface to hardware devices. Enabling operating systems to access hardware functions without needed to know precise details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The dos command ‘ipconfig/all’

A

receals the current network configuration of the pc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You never attempt to service this

A

Hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a site licence allows the user to.

A

Install software within several computers on a website within a specific site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ntfs filing sustem cannot be used by

A

Windows 95

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which chip sots between the cpu and the ram on a modern motherboard

A

Northbridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On which interface would you not expect to find a disc drive in a typical pc architecture

A

PCI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Agp stands for

A

Accelerated graphics port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

main differences between FAT and NTFS

A

ntfs can recover disk-related errors automatically, fat32 cannot
ntfs is better for larger hard disks.
better security because you can use permissions and encryption to restrict access to files. so this may be good for businesses and offices.

Fat33 doesn’t have this security, so if you have a fat32 permission any user you has access to your computer hand read any file on it. fat32 also has size limitation. No partition fan be greater than 32gb and I cannot store a file larger than 4gb.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

main differences between FAT and NTFS

A

ntfs can recover disk-related errors automatically, fat32 cannot
ntfs is better for larger hard disks.
better security because you can use permissions and encryption to restrict access to files. so this may be good for businesses and offices.

Fat32 doesn’t have this security, so if you have a fat32 permission any user you has access to your computer hand read any file on it. fat32 also has size limitation. No partition fan be greater than 32gb and I cannot store a file larger than 4gb.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

pci stands for

A

peripheral component interconnect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless keyboard; what protocol?

A

bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This memory type does not fit in a laptop.

A

240 pin fully buffered dimm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of a driver?

A

Tells the operating system how to interact with the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Smallest storage access init on an IDE hard drive

A

Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A laptop keeps losing time and date

A

Faulty cmos battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the laser printing process

A

Cleaning, charging, writing, developing, transferring, fusing.

22
Q

default subnet mask for a class b ip address.

A

255.255.0.0

23
Q

Quickest way to check anti-virus is running?

A

Check notification area

24
Q

What expansion bus types do most modern motherboards support

A

PCI-E PCI AND AGP

25
Q

Which of the following interfaces won’t be in a disc drive in a oc.

A

PCI

26
Q

this file extension does not apply to a library file used by an executable program

A

.exe

27
Q

The NTFS filing cannot be used by

A

Windows 95

28
Q

What can cause chip creep

A

Heating and cooling of the cpu

29
Q

Contiguous files created buy

A

Disk defragmeter

30
Q

Which of the following storage units on a hard drive is the largest

A

Partition

31
Q

Laser printer with prints smudgy white lines suffers from

A

Dirty drum

32
Q

Desktop dvd drive is faulty. Resolve?

A

Use a can of compressed air and blow out dust from the drive

33
Q

Which of the following will you need to remove a hard disk?

A

screwdriver

34
Q

How to get a quick overall view of the system process such as cpu and available ram?

A

Task manager

35
Q

Zip in relation to a cpu stands for..

A

Zero insertion force

36
Q

What utility can be used to test remote compute connectivity

A

Ping

37
Q

Beep code.

A

Impossible to know without referring to motherboard manual.

38
Q

NTLDR is missing. press any key to restart. Resolve?

A

Boot the computer using the OS CD. Select recovery console option. Restore the file by copying it from the operating system installation cd.

39
Q

iso layer responsible for handling ip address

A

network layer

40
Q

What interrupt is traditionally used by real time clock

A

IIRQ8

41
Q

Connecting a second serial ata disk to a system. How to make sure the new disk is recognised by the computer and cooperates with the first disk.

A

Nothing. Sata disks don’t have jumper settings.

42
Q

A newly installed driver for my network card makes it not work. Resolve?

A

Driver rollback.

43
Q

printers. how they work

A

electro graphic laser. it makes a laser beam scan back and forth accriss a drum inside the printer, building up a pattern of static electricity. The static electricity attracts onto the page ink called toner. Then the fuser units bonds the toner to the paper.
dot matrix. computer printing which uses a print head that moves back and forth or up and down. It prints by impacting the page and striking an ink-soaked cloth ribbon against the paper, like on a type writer.
bubble jet. it drops small droplets of ink onto paper to create an image. the dots are very small and precise. the bubble is created by tiny resistors that create heat to vaporise ink to create a bubble. this then causes a droplet to form and eject from the print head.
dye sublimation. uses heat tk transfer dye onto materials such as plastic card, paper and fabric.

44
Q

An ethernet switch will give superior performance to an ethernet hub in all lan situations. Agree or disagree? What are the differences between a hub and a switch in an ethernet lan.

A

Disagree. The collision domain is only 2 of a switch whereas for a hub all the hosts within the domain share the same collision domain. Collisions slow the system, especially when they are uneccessary. If the traffic is light a hib may deliver the same performance but in high traffic situations such as a switch will almost always perform better.

a hub is a networking device that allows one to connect multiple pcs to a single network. hubs are based on ethernet, firewire or usb connections.

a switch is a control unit that turns the flow of electricity on or off in a circuit. it may also be used to route information patterns in streaming electronic data sent over network.

a switch performs better than a hub. if the network involves four or more computers then a switch is better suited. especially in high traffic situations such as when heavy music sharing with .flac or heavy duty multiplayer games.

hubs operate using a broadcast model and switches operate using a virtual circuit model. this means that when two computers within a hub network need to communicate, they pass through every computer within the network whereas switches are capable determining the destination of each computer and communicating directly. therefore on busy networks switches perform better.

hub costs a lot less than a switch generally being less than 20£.

45
Q

describe computer viruses. what are they? there sources? how to determine their presence? how to rid of them.

A

a computer virus is a self-replicating code planted illegally in a computer to cause harm or steal data through various methods.

Also in emails. Take Internet off until you clean it so it doesn’t spread.

Viruses usually contain keyloggers that record keystrokes in order to gain access to passwords and gain access to bank accounts.

In order to avoid viruses, you’d need a reputable anti-virus program such as avast. These work by being able
detect viruses within the computer and ensuring that they are deleted. They also offer preventative measures t scanning files as they are downloaded for potential viruses. In order for the anti-virus software to work best, it needs to be updated through avast regularly.

fault logging.
virus checking.
clear policies and communication. good security practice.
creating backups before commencing operations.

45
Q

How can a business which depends heavily on its small cooperate network safeguard its data?

A

Backup. Regularly backing up data is important as if a computer hard drive crashes and data is lost or if a virus deletes some data within the pc if a backup of that data has been made and put on an external harddrive then It will be safe. There are many programs that habitually backup your data safely such as Timemachine on Mac computers.
Encryption. Is the practice of encoding and decoding data. When data has been encrypted it means that an algorithm has been applied so the data is jumbled and cannot be read. Only a decryptions key can make the data realise its original form. Encryption can then secure sensitive data from threats such as malware and unauthorised access. This especially important if business hold sensitive data as without proof of encryption methods when data is lost business could be in ground to be sued based on the data protection act.

Another encryption methods exists within browsers. HTTps ensures data will be transferred within a secure protocol.

Antivirus.They checks within a list of known viruses within a pc, it looks for any worms and malware that could affect the data or accessibility of the pc. It also performs a heuristic check which cross-references common behaviours of virus to any similar instances of behaviours within your pc. This way, new unknown viruses can be found.

Anti spyware. These remove and block spyware. These make changes to computers setting without any alerts on the PC which could cause it to run slower of affect security setting on certain programs. Anti-spyware combats this by having a list of known spyware and finding them throughout the computer and also by scanning all incoming network data for this too.

Firewall. This is a system designed to prevent unauthorised access to or from private networks. This would be very useful for networks with multiple computers as it prevents users from accessing unauthorised Internet sites based on specified security criteria. A firewall technique such as a proxy server can also be implemented for more control intercepting messages entering and leaving the network.

46
Q

What information is needed to replace or upgrade ram?

A

The type of memory such as the manufacturer in certain cases l
Ddr2,3, sdram, speed, max memory capacity of the machine, how the memory is fitted? do they need to match. How would you change the ram?

Which ddr is important due to how it will fit in the ram slots within the motherboard. Speed is also important as if you choose a ram speed that is more than your pc it will be clocked down or may not work at all.

You will need an esd strap, an electro static discharge strap, unplugging tbe machine, dismantling the case, finding and removing the memory, checking it has been recognised in bios, successful booting and reporting in windows.

47
Q

What is post and how can it be used to diagnose a problem?

A

This stands for power on self test.It is a series of basic hardware testing routines that are usually burnt into the Bioss chip by the manufacturer. These routines include cpu and ram checks, keyboard checks, graphic card checks. If either of those fails the user wouldn’t be able to interact with the system. So POST enables the user to realise why their system has failed. This is done through beep codes, each manufacturer has their own, but to give an example. One manufacturer may determine a long continuous beep to mean that the cpu has failed, 3 short beeps could mean the graphic card has failed.

48
Q

client/server and peer to peer describe networking architecture.

A

peer to peer has no central server. it shares its file equally with others. there is no central storage of authentication of users.

there are separate dedicated servers and clients in a client/server network. through client workstations, users can access most files stored in the server. the server will determine which users can access the filed on the network.

peer to peer is usually installed in homes or small businesses. it can support up to ten clients before it suffers performance problems.

peer to peer isn’t vert secure. the computer that contains the shared resources does check who is accessing them. so anyone with the password which can easily get into the wrong hands due to someone on the network mismanaging it.

client server have centralised security datavseses thag control access to shared resources kn servers.

peer to peer is much harder to backup.
client server is a lot more costly.
client server would be a lot better but would need a qualified person to manage it. if you are a small business who share a printer and occasional files. peer to peer would be good.

49
Q

Your friend has asked for help with her system. The system will not boot. The power led’s are lit on both the base unit and the monitor. There is a few seconds of silence then the machine emits 1 long and 8 short beeps but nothing appears on the screen. You know that her system has the AMI BIOS chip. Advise your friend on what is happening, the likely cause of the problem and steps which could be taken to further diagnose or resolve the problem.

A

The sound that is being made is the motherboard communicating the boot-up problem to the user. Each motherboard manufactuer will have differing beep codes. As we know the the subject’s system has an AMI Bios chip. We can look up the beep codes. This tells us that the display/retrace test has failed. This means that the system is having trouble displaying anything, this can be narrowed down to the graphics card. It appears that the subject’s graphic card is faulty. Firstly, we can take apart her system and ensure that the video card is inserted properly as the problem could be that it was knocked out the slot from bad handling of the computer. However, this beep code does not solely refer to the graphics card. When a computer boots, it runs a POST test that ensures all the components within the system are running properly. This means that the problem could be any component. With this in mind, I would question the subject of any recent hardware changes she would have made. This would narrow down the component in question. If she has not purchased any hardware, then we will need to test each component. This will be a little more difficult without the computer booting and there are software which test computer hardware and firmware as the only option is swapping out different components until finding a component which makes the computer run. I would first swap out the video card, then the RAM and go on from there as I believe that they are the most likely to become faulty.

50
Q

operating system comparison.

differences?

A

windows 7.
windows 8

The difference in these and the usability heavily depend on the user. Has the user had experience with windows 8 before, the metro interface means that there is another learning curve the user has to learn. If the user doesn’t welcome this change they could become frustrated. Windows 8 has a faster boot time and superior task manager and security features, it also has native support for usb3x 3d, iso and img. Windows 7 interface is better as it is more intuitive it follows the conventions of older models.

Windows 8 has been hit and miss. windows 7 it may be better suited towards businesses where there is a mix of technical expertise ranging from low the high as it is easy and recognisable, windows 8 would be great for personal use