Study Guide Exam 220-1101 Flashcards
What is another name for hard disk mirroring?
RAID 1
Which service helps manage corporate applications on mobile devices?
Mobile application management (MAM)
To secure a laptop from theft, use a _____.
Cable lock (or physical laptop lock)
FTP uses ports ___ and ___, and Telnet uses port ____.
20, 21, 23
Class C private IP addresses are in the ____ range.
192.168.0.0 to 192.168.255.255
In order to communicate on a network, TCP/IP hosts must have a unique _____ and valid _______.
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is
IP address, subnet mask
Name one of the common rotational speeds of a magnetic hard drive.
5400 rpm, 7200 rpm, 10,000 rpm, and 15,000 rpm
What is the function of the corona assembly?
The corona assembly gets the toner from the photosensitive drum onto the paper. p209
What is a network dedicated to storage devices called?
Storage area network (SAN)
How do you fix a swollen battery on a mobile device?
Replace it
Two common types of laptop displays are ___ and ___.
LCD, OLED
The method that translates between private nonroutable IP addresses and public IP addresses is ____.
network address translation (NAT)
Two common types of internal expansion slots for laptops are ____ and ____.
Mini PCIe, M.2
The last step in the EP imaging process is____.
cleaning
If one end of an Ethernet patch cable is configured as T568B, the other end needs to be configured as _____.
T568B
To save heat, processors can use ____ to slow down and consume less energy.
Throttling
A ____ server can block objectionable content from users.
proxy
A proxy is a server or program that’s part of the gateway or another computer that separates a local network from outside networks. You can think of it as an intermediary between your computer and the web pages you access on the Internet. Proxies are useful because they can protect your computer from malware and unwanted access from third-party users.
What is jitter?
Variable latency on a network
____ are examples of print communication languages.
Printer Control Language (PCL), PostScript (PS), and Graphics Device Interface (GDI)
The component of a laptop’s video system responsible for sending the video signal is the ___.
Video card
What technology allows pairing of mobile devices and, on occasion, the ability to transfer files between them?
Bluetooth
When using the troubleshooting best practice methodology, what should you always consider?
Corporate policies, procedures, and impacts
What are three SSD communications interfaces?
NVMe, SATA, PCIe
SATA - serial AT attachment
What is the name of the network type that is segmented using a managed switch?
VLAN - virtual local area network, VLAN allows a network administrator to set up separate networks by configuring a network device, such as a router, without adjusting cabling. A VLAN allows a network to be divided, set up, and changed by a network administrator to organize and filter data accordingly.
VLANs are also critical because they improve overall network efficiency by grouping devices that most frequently communicate. VLANs offer protection in bigger networks by enabling a greater degree of control over the equipment. VLANs for enhanced traffic control are mostly set up by bigger organizations for repartition devices.
With EP imaging process laser printers, the laser discharges the charged photosensitive drum to ____________________ VDC.
−100
What is the maximum speed of USB 3.0?
5 Gbps
Class A IP addresses will have a first octet of between ____ and ___.
1 and 126
The IP (Internet Protocol) is the fundamental protocol for communications on the Internet. It specifies the way information is packetized, addressed, transferred, routed, and received by networked devices.
An IP address is a number identifying of a computer or another device on the Internet. It is similar to a mailing address, which identifies where postal mail comes from and where it should be delivered. IP addresses uniquely identify the source and destination of data transmitted with the Internet Protocol.
Class Address range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or research and development purposes.
ATX and ITX are examples of what?
motherboard form factors
Which type of DNS TXT record authenticates an email server via IP address?
SPF
Which protocol in TCP/IP is responsible for resolving IP addresses to MAC addresses?
ARP (Address Resolution Protocol)
Using an employee’s physical ID to authenticate to a printer is called what?
badging
A simple hardware device that allows for longer cable runs is called a(n) ________.
Repeater or extender
Name six types of data that get synchronized between a mobile device and a desktop.
Contacts, applications, email, pictures, music, videos, calendar, bookmarks, documents, location data, social media data, E-books, and passwords
If when the computer is turned on, the fan spins but no devices seem to have power, which component is most likely at fault?
Power supply
What two things are combined in a hybrid drive?
A magnetic drive and a solid-state drive
The _ protocol is used to retrieve mail and operates on port _.
IMAP, 143 or POP3, 110
What is a name for a legacy system that manages industrial processes such as manufacturing or HVAC?
SCADA
To use a wireless network, clients must connect to what type of device?
wireless access point or wireless router
Two analog video connectors are ___ and ___.
VGA and DVI-A
Which TCP ports are used for unsecure and secure IMAP?
Port 143 and port 993, respectively
Which metric should be used to ensure that the PSU can power all components?
Wattage rating
The language of communication spoken between computers on a network is called a _______.
protocol
What is the term for cloud service where the provider offers applications?
software as a service (SaaS)
A device that combines firewall, IPS, and antimalware software in one is called what?
Unified Threat Management (UTM)
The database containing information the DHCP server gives to clients is called what?
scope
Which system component is most likely to overheat?
CPU
Order these from slowest to fastest: SAS-3, IDE, SATA 3.0
IDE (100 Mbps), SATA 3.0 (6 Gbps), SAS-3 (12 Gbps)
The add-on card that allows your computer to project on a monitor is called what?
Video card
The diagnostic routine built into the BIOS is called the _______.
Power-on self-test (POST)
Copying data, such as calendars, contacts, photos, and music, between a computer and a mobile device is referred to as what?
Synchronization
What should you apply between the CPU and heat sink to avoid overheating?
thermal compound, thermal paste, thermal pads, or thermal gel
If the video on a laptop is not working, what should you should plug in?
An external monitor
If you want to plug your laptop into a power outlet in your car, you need a _________ power adapter.
DC
What type of cloud is completely owned by a company like Google but used by business clients?
Public
Mini PCIe cards have ____ connectors.
52-pin card edge
Which troubleshooting device can help determine problems during the boot process?
POST card
What is the difference between USB 3.1 and USB-C?
USB 3.1 is a standard, and USB-C is a connector type.
Wireless networks use ____ to identify themselves.
SSIDs
The part of the LCD that is responsible for providing enough light is called the ____.
backlight
A DVD-R SS, DL has how much capacity?
8.5 GB
The wireless networking standard 802.11n operates at ____ (frequency) and supports _____ (speed).
2.4 and 5GHz, up to 600 Mbps
The e in eSATA stands for ______.
external
Unevenly spaced characters in output from an impact or inkjet printer could indicate what?
A problem with the stepper motor
What two categories of materials will 3D printers use to create images?
Filament and resin
The process that an inkjet printer goes through after installing a new print cartridge is called ________.
printhead alignment
____ is a term that refers to a 32-bit Intel CPU architecture.
x86
________ is essentially software implemented in hardware.
Firmware
What tool can be used to discover wireless network traffic?
A Wi-Fi analyzer or wireless locator
Class B private IP addresses are in the ____ range.
172.16.0.0 to 172.31.255.255
When configuring an Internet email account on a mobile device, what are the standard pieces of information required?
Username and password, outbound mail server and port (often based on secure SMTP), and inbound mail server and port (often based on secure POP3 or secure IMAP4)
Two examples of 4G technology are _____ and ______.
WiMAX, LTE
What are the three components of an LCD?
Inverter, screen, and backlight
Firewalls filter packets based on a set of rules called _____.
an ACL (access control list)
DNS server records for IPv4 and IPv6 hosts are ____ and ____.
A and AAAA
CPU cache is most commonly implemented using what type of memory?
Static RAM (SRAM)
What is the fifth step in the best practice troubleshooting methodology?
Verify full system functionality and, if applicable, implement preventive measures
If all computers on the network are in the same office, then the office is a ______.
local area network (LAN)
What connector type provides power to an IDE hard drive?
Molex
What is the name of the consumable in a 3D printer that comes on a spool and needs to be replaced periodically?
filament
What causes image smudging from a laser printer?
The fuser isn’t heating the toner and fusing it into the paper.
Which voltage is applied to the paper to transfer the toner to the paper in an EP process laser printer?
+600VDC
Two types of devices used to keep computer components cool are __________ and __________.
heat sinks, cooling fans
The most secure encryption protocol for 802.11 is ____.
WPA3
A firewall configuration where every computer is denied access except certain computers on a list is called a ___list.
White (or allow)
The series of print jobs waiting to use the printer is called the _________.
print queue
Two connector types used with twisted pair cabling are ____ and ____.
RJ-11 and RJ-45
What in the name of a Blu-ray disc indicates that it can be rewritten multiple times?
BD-RE
A paper jam in an inkjet printer is usually caused by what two things?
Worn pickup rollers or the wrong type of paper
What step of the EP imaging process uses a laser to discharge selected areas of the photosensitive drum, thus forming an image on the drum?
exposing
How many more pins does a dual-link DVI-D connector have than a single-link DVI-D connector?
6
Where can you obtain laptop service manuals?
From the manufacturer’s website
The ability to access extra cloud resources quickly is called what?
Rapid elasticity
Inkjet and laser printers are examples of _______ because they receive their print job instructions one page at a time.
page printers
When a Bluetooth network is created with a printer on the fly, what type of network is it?
ad hoc
DDR3 SODIMMs have ____ pins.
204
Thunderbolt is a combination of which two technologies?
DisplayPort and PCIe
Peripheral Component Interconnect
____ is the form factor designed for laptop expansion devices and small hard drives.
mSATA
The seven steps in the EP printing process, in order, are ______.
processing, charging, exposing, developing, transferring, fusing, and cleaning
The wireless networking standard 802.11a operates at ____ (frequency) and supports _____ (speed).
5 GHz, 54 Mbps
WPA2 employs what security method?
AES-CCMP
STP designed for use outdoors or underground is called what?
Direct burial
A 10BaseT network uses _____ cabling and can transmit data at _______ (speed).
twisted pair (or UTP), 10 Mbps
The address fe80::/10 is an example of an IPv6 _____ address.
link-local
The roaming list on a mobile device is established by what?
The PRL (preferred roaming list)
DDR4 and DDR5 DIMMs have how many pins?
288
What type of hypervisor is also referred to as a bare-metal hypervisor?
Type 1
Ethernet uses _____ to send information on the network.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
When Windows quits unexpectedly, you may get a _________.
Blue Screen of Death (BSOD)
Unexpected shutdowns, system lockups, or continuous reboots are most often caused by which hardware components?
Motherboard, CPU, or RAM
TCP/IP is based on the ______ model.
United States Department of Defense (DoD)
Vertical white lines on the output of a laser printer are caused by what?
Foreign matter (more than likely toner) caught on the transfer corona wire
_________________ drives can be inserted and removed without turning off the system.
Hot-swappable
A hot swap describes the act of removing components from or plugging them into a computer system while the power remains switched on.
The cable type with the longest range is _____.
fiber-optic
The network connectivity device that can connect multiple networks to each other is a ______.
router
The four common types of broadband are _______.
DSL (Digital Subscriber Line), cable, satellite, and fiber-optic
Technology that allows for electricity to be supplied over network cables is called ______.
Power over Ethernet (PoE)
The CPU feature that allows for multiple operating systems to run at once is called what?
Virtualization (or virtual technology)
What type of device provides network connections through an electrical outlet?
What type of device provides network connections through an electrical outlet?
What is the third step in the best practice troubleshooting methodology?
Test the theory to determine the cause
Three connector types for fiber-optic cable are ___, ___, and ___.
ST, SC, LC
Name three of the standard DC voltages supplied by a power supply.
+3.3VDC, +5VDC, −5VDC, +12VDC, or −12VDC
A ____ server provides IP configuration information to clients on the network.
DHCP (Dynamic Host Configuration Protocol)
Name three of the available memory-card formats
SD, micro-SD, mini-SD, xD, and CF
DHCP uses ports ____ and _____.
UDP port 67 and UDP port 68
Name two ways you can manually configure your laser printer’s IP address?
Through the control panel on the printer and using management software on your computer
A RADIUS server is an example of what type of server?
Authentication
If a laptop will not power up on battery power, you should try _____.
plugging it into an AC adapter
RAID 5 requires a minimum of how many hard drives?
3
Where is the Wi-Fi antenna typically found in a laptop?
In the display
What is a configured range of available IP addresses on a DHCP server called?
Scope
Smoke or a burning smell is most likely the fault of which component?
Power supply
TCP is a _______ protocol that operates at the ____ layer of the OSI model.
connection-oriented, transport
A passive connectivity device that amplifies a signal is called a ______.
repeater or active hub
Which TCP ports are most commonly used for unsecure and secure SMTP over SSL?
Port 25 and port 465, respectively
Name three types of internal hard drive cables.
SATA, IDE (PATA), and SCSI
What is the name of the Apple proprietary connector used on the iPhone 12?
Lightning
Where is the boot sequence stored in the computer?
BIOS/UEFI settings
Which RAID level provides no fault tolerance?
RAID 0
The ___ protocol is used to send mail and operates on port ___.
SMTP, 25
APIPA addresses are in the ____ range with a subnet mask of ___.
169.254.0.0 to 169.254.255.255, 255.255.0.0
When troubleshooting and identifying the problem, what two things should you do?
Gather information from the user and inquire regarding environmental or infrastructure changes
Multipart forms are used with this type of printer.
impact
Name three places network scan services can send files?
Scan to email, scan to network folder (with SMB), scan to cloud
What are the two socket types that require little to no force during CPU installation?
Zero Insertion Force (ZIF) and Land Grid Array (LGA)
The first step in the EP printing process is ______.
processing
What does RAID 0 not provide that other RAID levels do?
Fault tolerance
A ______ is a device primary used for storage on a network.
fileshare (or file server)
As opposed to a WLAN, a Bluetooth network is referred to as a ____.
wireless personal area network (WPAN)
How many pins are on a standard (Type-A) HDMI connector?
19
What technology is built into hard drives to detect problems?
S.M.A.R.T.
What hardware tool is used to trace cables through a wall?
Toner and probe
What tool is used to test a network card, without using a network cable?
Loopback adapter or plug
The macOS proprietary crash screen is called what?
Pinwheel
The service that formats jobs for the printer is called the ________.
print spooler
__________ and __________ modules both have 288 pins but are distinguished by the location of their keying notch.
DDR4, DDR5
What is the first step in the best practice troubleshooting methodology?
Identify the problem
A DB-9 connector is found on which type of cable?
Serial
A card with expansion slots on it that installs into a motherboard is known as a(n) __________ card.
riser
The functional components of a chipset are known as __________and __________.
Northbridge and Southbridge
UTP cable has a maximum segment length of _____.
100 meters
To communicate on a TCP/IPv4 network, which two things do you need?
A unique IP address and a valid subnet mask
Which TCP ports are used for unsecure and secure POP3?
110 and 995, respectively
Consistently light or faded characters on output from an impact printer likely indicates what?
The print ribbon is old and needs to be replaced.