Hard-soft final study Flashcards
The first GUI was developed at ________________________ in the 1970s.
Xerox’s Palo Alto Research Center (PARC)
What computer generation uses microprocessors?
Fourth-generation
What device incorporates many transistors and electronic circuits on a single chip of silicon?
Integrated Circuit
What computer generation introduced integrated circuits, which cut costs and launched the minicomputer industry?
Third-generation
With ______ technology, engineers could place the equivalent of more than 5,000 transistors on a single chip, which was enough to create processing unit
Large-scale integration
What computer generation used vacuum tubes and had to be programmed in difficult-to-use machine languages?
First-generation
What is concerned with the behavior and effects of electrons as they pass through devices that can restrict their flow in various ways?
Electronic
What is based on binary? It contains only the numbers 0 and 1.
Machine Language
What computer generation introduced transistors and high-level programming languages, such as COBOL and FORTRAN?
Second-generation
What is the device that contains the entire arithmetic logic unit and control unit of a computer?
Microprocessor
What is a solid-state device acts like a vacuum tube, but it is a ‘sandwich’ of differing materials?
Semiconductor
What is the technology that enables today’s computer industry?
Electronics
Main frame computers which share resources between many users utilize ___________, control devices equipped with a video display and keyboard, for timeshared systems.
Terminals
In _____________________ designs, the various components connect according to nonproprietary, published standards.
Open architecture
A/n ________________ is a small, second-generation electronic device that can control the flow of electricity in an electronic circuit.
Transistor
The _____________________ was the earliest electronic device that powered all electronic devices until the advent of solid-state devices.
Vacuum tube
__________________ technologies enable many people to use a computer simultaneously.
Timesharing
The ________________________ is the list of operations a processor is designed to carry out.
Instruction set
With first generation computers, such as ENIAC,instructions were entered by _______.
rewiring the entire machine
Memory that is older and has a row of legs down each side of the chip is known as a ________ chip
DIP
The manufacturing process used to etch transistors onto the silicon wafer that will become the CPU is referred to as the _______________________ .
Process size
The ________ chip requires a battery to remember the settings when the computer is turned off.
CMOS
The power supply converts _________
AC current to DC current.
Power supplies provide _____, ____, and _____ volts
3.3, 5 and 12
Over time, DRAM chips lose their charge. The process of rewriting the information is called:
refreshing
What is the delay in RAM response time called?
Latency
Is flash memory volatile or non-volatile?
non-volatile
The 6-pin PCI Express connector is used to supply power to _________.
video cards
Most of the memory on the motherboard is ________.
DRAM
What keeps DIMMs in the memory slot?
tabs
The 20-pin connector in older motherboards has been replaced by the _____________.
24-pin connector
One of the biggest problems with modern CPUs is ________.
heat generation
What memory type has the slowest access?
virtual memory
The ________ describes how much work or how much power can be supplied to various devices.
watt
Undersizing the power supply can save both energy and money.
False
Configuration settings for the CPU, memory, hard disk, and other hardware components are stored in a ________ chip called the ________.
ROM, CMOS
If the total value of committed memory exceeds the amount of physical RAM, then the ________________ is being used instead of physical RAM.
page file
What are the two partition types called?
primary, extended
What Windows utility do you use to manage partitions?
disk management
A Remote Assistance session is initiated by __________________.
the novice sending an assistance invitation
You can use _________to quickly identify the use of physical memory in your system
Task manager
With ______________, the demand for memory and the low amount of physical RAM means that the system must be constantly moving data from RAM, to disk, and back.
thrashing
A process that has hung could show 100% CPU use. If the process does not complete after a period of time and does not respond, _______________.
end the process
__________data includes all of the files required to boot and run the computer; it includes the operating system files, the registry, drivers, and any configuration files.
System state
_________ is a simple way of backing up and restoring the operating system.
Automated System Recovery
What is the maximum number of disk partitions in Windows?
Four
What does it indicate if the processor utilization statistic is consistently around 40-45%?
Nothing; this is an acceptable CPU utilization rate
The NTFS file system contains a file called the master file table or MFT. There is at least one entry in the MFT for every file on an NTFS file system volume, including the MFT itself. _________________ is the name of the similar table in FAT.
File Allocation Table
On a 32-bit system, meory will be less than 4 GB, even if you have 4 GB of memory installed.
True
_______________, also called ____________________, takes snapshots of files and folders and protects against accidental deletion or modification of user data files
Previous Versions, Shadow Copies
Automatic file backup protects ____________.
user files
___________ is the process of electronically subdividing the physical hard drives.
Partitioning
How can you remedy the situation when the amount of memory being used is close to the amount of RAM installed?
Add RAM, Increase Page File size, Quit some running programs
Which components are commonly examined when you need to improve system performance?
Processor (CPU) , Hard disk, Memory , Network
A high disk queue length number indicates that the system has requested data from the hard disk, or has tried to save data to the hard disk, but that request could not be fulfilled immediately.
False
What creates an image-based snapshot of the entire computer? It backs up everything on the system
Complete PC Backup
FAT32 should be used for disks smaller than __________ GB.
4
You can create a partition or a volume without formatting.
True
Both basic disks and dynamic disks are confined to one disk and their size is fixed.
False
When you format a disk, you identify the ________________ and identify the cluster size used to store data.
file system type
A _____________ is an empty folder on the existing volume that points to another partition
mountpoint
Each physical disk can have up to ____________ primary partitions.
4
A ________________ is a single accessible storage area within a file system.
volume
A ___________________ is a means for organizing and storing data and information on a storage device
filesystem
A _____________ is a logical division of a storage device associated with a hard disk drive.
partition
_______________ is the process of preparing a partition to use a specific file system.
Formatting
_________ is a new formatting option available in Windows 7, which is specifically designed for removable flash devices.
ExFAT
A volume is defined as a single partition.
False
Assigning the boot system to a different partition than application and data files can help many computers run more smoothly and minimize damage in a system crash.
True
The_________partition identifies the partition that contains the operating system (or the program that loads the operating system) used to start the computer
active
Unallocated space is space on a partition that _______________.
has not been assigned to a volume
The _____________ command (at the Command prompt) will reformat a FAT32 volume into a NTFS volume.
convert
Use ______________ to create, format, and manage partitions and volumes.
Disk Management
Some operating systems can’t run on a large partition. Creating a smaller, separate partition for your operating system can help it run properly.
True
Reformatting removes the existing file system and replaces it with the new file system type.
True
Password Policy settings in the ___________________ control characteristics about a password such as how long it must be, how often it must be changed, or whether complex passwords are required.
Local Security Policy
Some portable computers allow you to set a password on a _________________.
hard disk
A ____________ attaches to legitimate files and are spread when the files are opened.
virus
The safest way to allow non-administrators to have Remote Desktop access, is to: _______________.
add them to the list of authorized users for Remote Desktop
_____________ uses an encryption protocol to establish a secure communication channel between two hosts, or between one site and another site.
Virtual private network (VPN)
The most common use of a ______________ is to restrict web access to certain sites, such as youTube or other sites that have been deemed unsuitable by management.
proxy server
_____________ is the process of accepting credentials to log onto a system.
Authentication
What information does the firewall use to allow or prevent communication?
Access Control Lists
Which of the following is required when accessing shared folders or Remote Desktop on a network computer?
Password for the account must be configured
________________ settings in the Local Security Policy control characteristics about a password such as how long it must be, how often it must be changed, or whether complex passwords are required.
Password Policy
By default, the Windows firewall allows all outgoing Web traffic and responses but blocks all incoming traffic. You must configure exceptions to allow incoming traffic.
True
Encryption cannot be used together with ____________.
compression
In an antivirus program, ________________ moves the infected file to a secure folder where it cannot be opened or run normally.
quarantine
A ______________ is a program that appears to be a useful program but which perform secret or malicious acts.
trojan
You can unlock a locked account by editing the account properties in ____________.
Local Users and Groups
A _____________ can be configured to control Internet access based on user account and time of day.
proxy server
If you are having difficulty removing the malware, try booting into ___________, then run the scanning software to locate and remove the malware.
Safe Mode
A _______________________ is a server (a computer system or an application) that acts as an intermediary between the host and the internet.
proxy server
If set, the __________________ password is required to enter the CMOS program to make changes to BIOS settings.
administrator
A _____________________ can be used to cache recently accessed web content to improve performance.
proxy server
____________ is the amount (percentage) of time the processor spends doing non-idle tasks.
Processor utilization
_________________ automatically takes snapshots (called restore points) of your system. You can use these restore points to roll back your computer to a specific point-in-time configuration.
System Restore
If the amount of memory being used is close to the amount of RAM installed, you might need to __________________.
add RAM,
quit some running programs to free up memory
When physical memory is low, data in RAM that is currently not being used by the CPU can be moved to the RAM cache to free up memory for other processes.
False
Regional settings control how ______________ are formatted.
times, dates, numbers and currency
By ______________, you can identify the component that is overloaded or not responding appropriately.
monitoring system performance statistics
A _______________ session is initiated by sending an invitation. The invitation includes information that allows the remote user and computer to make the connection, exchange messages, and take control if necessary.
Remote Assistance
Windows Vista, 7 and 8 are much faster at finding lost or misplaced files anywhere on the hard drive because it is not searching the complete hard drive but instead is looking through an index created by Vista. You can customize what is indexed by using _________________.
using the Indexing Options in the Control Panel,
using Search settings in Folder Options to customize how searches are performed
The ______________________ tells you the number of read and write requests that are typically waiting to be processed
average disk queue length
A CPU that supports Hyper-Threading will show two utilization graphs for each processor.
True
________________ is a representation of time that the disk subsystem is busy reading from and writing to disk.
% Disk Time
Automated System Recovery (ASR) is a simple way of backing up and restoring the operating system, system files and user data files.
False
A ____________occurs when a component is unable to keep up with demand and subsequently slows down other processes or functions.
bottleneck
With Windows Remote Desktop, the host computer must be running Windows ___________ or higher.
Windows XP
__________is the process of moving data from RAM to disk and back. Before the CPU can work with data required by a process, that data must be placed into RAM.
Paging
The amount of committed memory (commit charge) identifies how much memory has been assigned to ___________.
running processes.
In Task Manager, the available (free) memory value identifies how much memory is _____________.
unassigned
Windows Backup System state data includes the ________________.
operating system files, registry, drivers and configuration files
If the total value exceeds the amount of physical RAM, then the __________ is being used instead of physical RAM.
pagefile
Hardware components required to display boot information are: ________________
CPU, Memory and Video
By default, Windows is configured to reboot whenever ______________.
a critical system error occurs (Blue Screen of Death)
If you have recently made a change to a system that caused it to fail, such as installing new device drivers or new software, but have not successfully logged on since making the change, which startup mode/s would most easily allow you to solve the problem?
Safe Mode and Last Known Good
With Microsoft’s plug and play technology, new peripherals will always be found and the drivers installed. If the devices are not found, you should suspect that __________________.
the device is faulty,
the device is not connected to the computer,
the device is not powered on,
that a new internal device needs to be recognized by the BIOS
At the beginning of the startup process, The processor loads the BIOS program. The first BIOS process to run is the power on self test (POST). POST does the following:
Verifies the integrity of the BIOS code,
Looks for the BIOS on the video card and loads it,
Looks for BIOS programs on other devices,
such as hard disk controllers and loads those,
Tests system devices,
such as verifying the amount of memory on the system
Which statement is/are NOT true for typical printer troubleshooting techniques?
Check document permissions
Recovery Console is a boot option with Windows XP.
True
What printer action should you take to confirm that the problem is with the workstation or the connection?
Perform a test print from the printer
Using System Restore Point can be dangerous because, not only will it remove recent system changes, meaning that applications, device drivers, and patches will no longer be applied, but it can also delete recent user data files.
False
The _________________ is responsible for locating the system (active) partition and loading the volume boot record (VBR).
Master Boot Record
What are the two programs that Windows might use for the boot loader program (depending on the operating system version)?
NTLDR, BOOTMGR
If there is a problem in loading the VBR, the VBR does not specify a boot loader program, or the boot loader specified in the VBR (volume boot record) is missing or corrupt, you may receive several error notices.
Which of the notices below is NOT an error related to the boot loader process (corrupt boot sector)?
MBR corrupt message,
You hear a series of diagnostic beeps
User preferences and all device drivers are loaded during the POST process.
False
If you can boot into Windows, check ______________ to see if there is a problem with a driver.
device manager
Which is/are NOT a symptom of a corrupt MBR or partition table?
Invalid system disk
Which is/are not on of the general stages of the startup process, as defined by your text?
Device Manager Configuration,
Device Order Selection,
Enable networking