Hard-soft final study Flashcards

1
Q

The first GUI was developed at ________________________ in the 1970s.

A

Xerox’s Palo Alto Research Center (PARC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What computer generation uses microprocessors?

A

Fourth-generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What device incorporates many transistors and electronic circuits on a single chip of silicon?

A

Integrated Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What computer generation introduced integrated circuits, which cut costs and launched the minicomputer industry?

A

Third-generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With ______ technology, engineers could place the equivalent of more than 5,000 transistors on a single chip, which was enough to create processing unit

A

Large-scale integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What computer generation used vacuum tubes and had to be programmed in difficult-to-use machine languages?

A

First-generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is concerned with the behavior and effects of electrons as they pass through devices that can restrict their flow in various ways?

A

Electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is based on binary? It contains only the numbers 0 and 1.

A

Machine Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What computer generation introduced transistors and high-level programming languages, such as COBOL and FORTRAN?

A

Second-generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the device that contains the entire arithmetic logic unit and control unit of a computer?

A

Microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a solid-state device acts like a vacuum tube, but it is a ‘sandwich’ of differing materials?

A

Semiconductor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the technology that enables today’s computer industry?

A

Electronics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Main frame computers which share resources between many users utilize ___________, control devices equipped with a video display and keyboard, for timeshared systems.

A

Terminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In _____________________ designs, the various components connect according to nonproprietary, published standards.

A

Open architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A/n ________________ is a small, second-generation electronic device that can control the flow of electricity in an electronic circuit.

A

Transistor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The _____________________ was the earliest electronic device that powered all electronic devices until the advent of solid-state devices.

A

Vacuum tube

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__________________ technologies enable many people to use a computer simultaneously.

A

Timesharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ________________________ is the list of operations a processor is designed to carry out.

A

Instruction set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

With first generation computers, such as ENIAC,instructions were entered by _______.

A

rewiring the entire machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Memory that is older and has a row of legs down each side of the chip is known as a ________ chip

A

DIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The manufacturing process used to etch transistors onto the silicon wafer that will become the CPU is referred to as the _______________________ .

A

Process size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ________ chip requires a battery to remember the settings when the computer is turned off.

A

CMOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The power supply converts _________

A

AC current to DC current.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Power supplies provide _____, ____, and _____ volts

A

3.3, 5 and 12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Over time, DRAM chips lose their charge. The process of rewriting the information is called:

A

refreshing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the delay in RAM response time called?

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Is flash memory volatile or non-volatile?

A

non-volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The 6-pin PCI Express connector is used to supply power to _________.

A

video cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Most of the memory on the motherboard is ________.

A

DRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What keeps DIMMs in the memory slot?

A

tabs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The 20-pin connector in older motherboards has been replaced by the _____________.

A

24-pin connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

One of the biggest problems with modern CPUs is ________.

A

heat generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What memory type has the slowest access?

A

virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The ________ describes how much work or how much power can be supplied to various devices.

A

watt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Undersizing the power supply can save both energy and money.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Configuration settings for the CPU, memory, hard disk, and other hardware components are stored in a ________ chip called the ________.

A

ROM, CMOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

If the total value of committed memory exceeds the amount of physical RAM, then the ________________ is being used instead of physical RAM.

A

page file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the two partition types called?

A

primary, extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What Windows utility do you use to manage partitions?

A

disk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A Remote Assistance session is initiated by __________________.

A

the novice sending an assistance invitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

You can use _________to quickly identify the use of physical memory in your system

A

Task manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

With ______________, the demand for memory and the low amount of physical RAM means that the system must be constantly moving data from RAM, to disk, and back.

A

thrashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A process that has hung could show 100% CPU use. If the process does not complete after a period of time and does not respond, _______________.

A

end the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

__________data includes all of the files required to boot and run the computer; it includes the operating system files, the registry, drivers, and any configuration files.

A

System state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

_________ is a simple way of backing up and restoring the operating system.

A

Automated System Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the maximum number of disk partitions in Windows?

A

Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What does it indicate if the processor utilization statistic is consistently around 40-45%?

A

Nothing; this is an acceptable CPU utilization rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The NTFS file system contains a file called the master file table or MFT. There is at least one entry in the MFT for every file on an NTFS file system volume, including the MFT itself. _________________ is the name of the similar table in FAT.

A

File Allocation Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

On a 32-bit system, meory will be less than 4 GB, even if you have 4 GB of memory installed.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

_______________, also called ____________________, takes snapshots of files and folders and protects against accidental deletion or modification of user data files

A

Previous Versions, Shadow Copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Automatic file backup protects ____________.

A

user files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

___________ is the process of electronically subdividing the physical hard drives.

A

Partitioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How can you remedy the situation when the amount of memory being used is close to the amount of RAM installed?

A

Add RAM, Increase Page File size, Quit some running programs

54
Q

Which components are commonly examined when you need to improve system performance?

A

Processor (CPU) , Hard disk, Memory , Network

55
Q

A high disk queue length number indicates that the system has requested data from the hard disk, or has tried to save data to the hard disk, but that request could not be fulfilled immediately.

A

False

56
Q

What creates an image-based snapshot of the entire computer? It backs up everything on the system

A

Complete PC Backup

57
Q

FAT32 should be used for disks smaller than __________ GB.

A

4

58
Q

You can create a partition or a volume without formatting.

A

True

59
Q

Both basic disks and dynamic disks are confined to one disk and their size is fixed.

A

False

60
Q

When you format a disk, you identify the ________________ and identify the cluster size used to store data.

A

file system type

61
Q

A _____________ is an empty folder on the existing volume that points to another partition

A

mountpoint

62
Q

Each physical disk can have up to ____________ primary partitions.

A

4

63
Q

A ________________ is a single accessible storage area within a file system.

A

volume

64
Q

A ___________________ is a means for organizing and storing data and information on a storage device

A

filesystem

65
Q

A _____________ is a logical division of a storage device associated with a hard disk drive.

A

partition

66
Q

_______________ is the process of preparing a partition to use a specific file system.

A

Formatting

67
Q

_________ is a new formatting option available in Windows 7, which is specifically designed for removable flash devices.

A

ExFAT

68
Q

A volume is defined as a single partition.

A

False

69
Q

Assigning the boot system to a different partition than application and data files can help many computers run more smoothly and minimize damage in a system crash.

A

True

70
Q

The_________partition identifies the partition that contains the operating system (or the program that loads the operating system) used to start the computer

A

active

71
Q

Unallocated space is space on a partition that _______________.

A

has not been assigned to a volume

72
Q

The _____________ command (at the Command prompt) will reformat a FAT32 volume into a NTFS volume.

A

convert

73
Q

Use ______________ to create, format, and manage partitions and volumes.

A

Disk Management

74
Q

Some operating systems can’t run on a large partition. Creating a smaller, separate partition for your operating system can help it run properly.

A

True

75
Q

Reformatting removes the existing file system and replaces it with the new file system type.

A

True

76
Q

Password Policy settings in the ___________________ control characteristics about a password such as how long it must be, how often it must be changed, or whether complex passwords are required.

A

Local Security Policy

77
Q

Some portable computers allow you to set a password on a _________________.

A

hard disk

78
Q

A ____________ attaches to legitimate files and are spread when the files are opened.

A

virus

79
Q

The safest way to allow non-administrators to have Remote Desktop access, is to: _______________.

A

add them to the list of authorized users for Remote Desktop

80
Q

_____________ uses an encryption protocol to establish a secure communication channel between two hosts, or between one site and another site.

A

Virtual private network (VPN)

81
Q

The most common use of a ______________ is to restrict web access to certain sites, such as youTube or other sites that have been deemed unsuitable by management.

A

proxy server

82
Q

_____________ is the process of accepting credentials to log onto a system.

A

Authentication

83
Q

What information does the firewall use to allow or prevent communication?

A

Access Control Lists

84
Q

Which of the following is required when accessing shared folders or Remote Desktop on a network computer?

A

Password for the account must be configured

85
Q

________________ settings in the Local Security Policy control characteristics about a password such as how long it must be, how often it must be changed, or whether complex passwords are required.

A

Password Policy

86
Q

By default, the Windows firewall allows all outgoing Web traffic and responses but blocks all incoming traffic. You must configure exceptions to allow incoming traffic.

A

True

87
Q

Encryption cannot be used together with ____________.

A

compression

88
Q

In an antivirus program, ________________ moves the infected file to a secure folder where it cannot be opened or run normally.

A

quarantine

89
Q

A ______________ is a program that appears to be a useful program but which perform secret or malicious acts.

A

trojan

90
Q

You can unlock a locked account by editing the account properties in ____________.

A

Local Users and Groups

91
Q

A _____________ can be configured to control Internet access based on user account and time of day.

A

proxy server

92
Q

If you are having difficulty removing the malware, try booting into ___________, then run the scanning software to locate and remove the malware.

A

Safe Mode

93
Q

A _______________________ is a server (a computer system or an application) that acts as an intermediary between the host and the internet.

A

proxy server

94
Q

If set, the __________________ password is required to enter the CMOS program to make changes to BIOS settings.

A

administrator

95
Q

A _____________________ can be used to cache recently accessed web content to improve performance.

A

proxy server

96
Q

____________ is the amount (percentage) of time the processor spends doing non-idle tasks.

A

Processor utilization

97
Q

_________________ automatically takes snapshots (called restore points) of your system. You can use these restore points to roll back your computer to a specific point-in-time configuration.

A

System Restore

98
Q

If the amount of memory being used is close to the amount of RAM installed, you might need to __________________.

A

add RAM,

quit some running programs to free up memory

99
Q

When physical memory is low, data in RAM that is currently not being used by the CPU can be moved to the RAM cache to free up memory for other processes.

A

False

100
Q

Regional settings control how ______________ are formatted.

A

times, dates, numbers and currency

101
Q

By ______________, you can identify the component that is overloaded or not responding appropriately.

A

monitoring system performance statistics

102
Q

A _______________ session is initiated by sending an invitation. The invitation includes information that allows the remote user and computer to make the connection, exchange messages, and take control if necessary.

A

Remote Assistance

103
Q

Windows Vista, 7 and 8 are much faster at finding lost or misplaced files anywhere on the hard drive because it is not searching the complete hard drive but instead is looking through an index created by Vista. You can customize what is indexed by using _________________.

A

using the Indexing Options in the Control Panel,

using Search settings in Folder Options to customize how searches are performed

104
Q

The ______________________ tells you the number of read and write requests that are typically waiting to be processed

A

average disk queue length

105
Q

A CPU that supports Hyper-Threading will show two utilization graphs for each processor.

A

True

106
Q

________________ is a representation of time that the disk subsystem is busy reading from and writing to disk.

A

% Disk Time

107
Q

Automated System Recovery (ASR) is a simple way of backing up and restoring the operating system, system files and user data files.

A

False

108
Q

A ____________occurs when a component is unable to keep up with demand and subsequently slows down other processes or functions.

A

bottleneck

109
Q

With Windows Remote Desktop, the host computer must be running Windows ___________ or higher.

A

Windows XP

110
Q

__________is the process of moving data from RAM to disk and back. Before the CPU can work with data required by a process, that data must be placed into RAM.

A

Paging

111
Q

The amount of committed memory (commit charge) identifies how much memory has been assigned to ___________.

A

running processes.

112
Q

In Task Manager, the available (free) memory value identifies how much memory is _____________.

A

unassigned

113
Q

Windows Backup System state data includes the ________________.

A

operating system files, registry, drivers and configuration files

114
Q

If the total value exceeds the amount of physical RAM, then the __________ is being used instead of physical RAM.

A

pagefile

115
Q

Hardware components required to display boot information are: ________________

A

CPU, Memory and Video

116
Q

By default, Windows is configured to reboot whenever ______________.

A

a critical system error occurs (Blue Screen of Death)

117
Q

If you have recently made a change to a system that caused it to fail, such as installing new device drivers or new software, but have not successfully logged on since making the change, which startup mode/s would most easily allow you to solve the problem?

A

Safe Mode and Last Known Good

118
Q

With Microsoft’s plug and play technology, new peripherals will always be found and the drivers installed. If the devices are not found, you should suspect that __________________.

A

the device is faulty,
the device is not connected to the computer,
the device is not powered on,
that a new internal device needs to be recognized by the BIOS

119
Q

At the beginning of the startup process, The processor loads the BIOS program. The first BIOS process to run is the power on self test (POST). POST does the following:

A

Verifies the integrity of the BIOS code,
Looks for the BIOS on the video card and loads it,
Looks for BIOS programs on other devices,
such as hard disk controllers and loads those,
Tests system devices,
such as verifying the amount of memory on the system

120
Q

Which statement is/are NOT true for typical printer troubleshooting techniques?

A

Check document permissions

121
Q

Recovery Console is a boot option with Windows XP.

A

True

122
Q

What printer action should you take to confirm that the problem is with the workstation or the connection?

A

Perform a test print from the printer

123
Q

Using System Restore Point can be dangerous because, not only will it remove recent system changes, meaning that applications, device drivers, and patches will no longer be applied, but it can also delete recent user data files.

A

False

124
Q

The _________________ is responsible for locating the system (active) partition and loading the volume boot record (VBR).

A

Master Boot Record

125
Q

What are the two programs that Windows might use for the boot loader program (depending on the operating system version)?

A

NTLDR, BOOTMGR

126
Q

If there is a problem in loading the VBR, the VBR does not specify a boot loader program, or the boot loader specified in the VBR (volume boot record) is missing or corrupt, you may receive several error notices.
Which of the notices below is NOT an error related to the boot loader process (corrupt boot sector)?

A

MBR corrupt message,

You hear a series of diagnostic beeps

127
Q

User preferences and all device drivers are loaded during the POST process.

A

False

128
Q

If you can boot into Windows, check ______________ to see if there is a problem with a driver.

A

device manager

129
Q

Which is/are NOT a symptom of a corrupt MBR or partition table?

A

Invalid system disk

130
Q

Which is/are not on of the general stages of the startup process, as defined by your text?

A

Device Manager Configuration,
Device Order Selection,
Enable networking