Study Guide Exam 220-1101- Wiley Learning Flashcards
Name three of the standard DC voltages supplied by a power supply.
+3.3VDC, +5VDC, −5VDC, +12VDC, or −12VDC
What is jitter?
Variable latency on a network
What causes image smudging from a laser printer?
The fuser isn’t heating the toner and fusing it into the paper.
What is the name of the Apple proprietary connector used on the iPhone 12?
Lightning
What two categories of materials will 3D printers use to create images?
Filament and resin
FTP uses ports ___ and ___, and Telnet uses port ____.
20, 21, 23
What is the term for cloud service where the provider offers applications?
software as a service (SaaS)
When Windows quits unexpectedly, you may get a _________.
Blue Screen of Death (BSOD)
What are three SSD communications interfaces?
NVMe, SATA, PCIe
NVMe - non-volate Memory Express, is a device specification introduced by Intel in 2007. It standardizes the way that non-volatile memory devices, such as SSDs, can connect to a computer’s PCI Express (PCIe) bus.
Traditionally, SSDs are connected to the computer using a disk drive interface, such as SATA. However, SATA was designed for older data storage devices, such as HDDs (hard disk drives), and its data transfer speed is limited. Beginning in about 2005, when SSDs first became popular with consumers, the fastest SSDs were reading data quicker than SATA could transfer it. Manufacturers began producing SSDs that could be installed in a PCIe slot, but their interfaces varied widely. The NVMe standard allows any of these devices to be attached to a computer without requiring separate, and possibly conflicting, operating system device drivers.
Traditionally, SSDs are connected to the computer using a disk drive interface, such as SATA. However, SATA was designed for older data storage devices, such as HDDs (hard disk drives), and its data transfer speed is limited. Beginning in about 2005, when SSDs first became popular with consumers, the fastest SSDs were reading data quicker than SATA could transfer it. Manufacturers began producing SSDs that could be installed in a PCIe slot, but their interfaces varied widely. The NVMe standard allows any of these devices to be attached to a computer without requiring separate, and possibly conflicting, operating system device drivers.
SATA - Short for serial AT attachment, SATA 1.0 was first released in August 2001 and is a replacement for the parallel ATA interface used in IBM compatible computers. SerialATA can deliver 1.5 Gbps (approximately 187 MBps) of performance to each drive within a disk array. It is backward-compatible with ATA and ATAPI devices, and offers a thin, small cable solution, as seen in the “SATA Data Cable” picture. This cable helps makes cable routing easier and offers better airflow in the computer compared to the earlier ribbon cables used with ATA drives.
SATA also supports external drives through External SATA more commonly known as eSATA. eSATA offers many more advantages compared to other solutions. For example, it is hot-swappable, supports faster transfer speeds with no bottleneck issues like USB and FireWire, and supports disk drive technologies (e.g., S.M.A.R.T.).
However, eSATA does have some disadvantages, such as not distributing power through the cable like USB, which means drives require an external power source. The eSATA cable also supports a maximum length of up to 2 meters. Because of these disadvantages don’t plan on eSATA becoming the only external solution for computers.
PCie - Originally known as 3rd Generation I/O (3GIO), PCI Express, or PCIe, was approved in July 2002 as a serial computer expansion bus standard. PCI Express was designed as a high-speed replacement for the aging PCI and AGP standards and is available in different formats. The data transmitted over PCI Express is sent over wires (called lanes) in full duplex mode (both directions at the same time). Each lane can transfer speeds around 250 MB/s and each slot can be scaled from 1 to 32 lanes. With 16 lanes, PCI Express supports a bandwidth of up to 4,000 MB/s.
STP designed for use outdoors or underground is called what?
Direct burial
If one end of an Ethernet patch cable is configured as T568B, the other end needs to be configured as _____.
T568B
DDR3 SODIMMs have ____ pins.
204
Multipart forms are used with this type of printer.
impact
Which service helps manage corporate applications on mobile devices?
Mobile application management (MAM)
Class C private IP addresses are in the ____ range.
192.168.0.0 to 192.168.255.255
The series of print jobs waiting to use the printer is called the _________.
print queue
The ___ protocol is used to send mail and operates on port ___.
SMTP, 25
SMPT - Simple Mail Transfer Protocol, SMTP is an Internet standard for the sending of e-mail messages over port 25. While it is mostly used for transfer from one mail server to another, some client mail applications use SMTP for relaying messages; whereas receiving happens via POP or IMAP.
Thunderbolt is a combination of which two technologies?
DisplayPort and PCIe
Displayport - is a digital audio and video interface created by VESA. Its connections come in two varieties: standard, (shown in the picture) and the smaller Mini DisplayPort. Despite the difference in size, both connection types transmit identical signals. These cables are used to a display device like a computer monitor or projector to a computer.
Two common types of internal expansion slots for laptops are ____ and ____.
Mini PCIe, M.2
PCI - peripheral component interconnect
M.2 - is a connection type specification for computer expansion cards, introduced in 2014. The two major types of M.2 devices are the SATA M.2 and the significantly faster (and more expensive) PCIe M.2.
M.2 is often used for storage devices, such as SSDs, and high-performance non-volatile memory storage, such as Intel Optane.
The functional components of a chipset are known as __________and __________.
Northbridge and Southbridge
A ______ is a device primary used for storage on a network.
fileshare (or file server)
_________________ drives can be inserted and removed without turning off the system.
Hot-swappable
The roaming list on a mobile device is established by what?
The PRL (preferred roaming list)
The most secure encryption protocol for 802.11 is ____.
WPA3
WI-FI protected access 3
In order to communicate on a network, TCP/IP hosts must have a unique _____ and valid _______.
TCP - Transmission Control Protocol, TCP is a standard that dictates how to establish and maintain a connection through which two programs may exchange data. Invented in 1978 and driven by Bob Kahn and Vint Cerf, TCP is a core component in the TCP/IP protocol, which dictates how information is sent over the Internet.
The IP (Internet Protocol) is the fundamental protocol for communications on the Internet. It specifies the way information is packetized, addressed, transferred, routed, and received by networked devices.
IP address, subnet mask
Subnet mask - a subnet mask is data used for bitwise operations on a network of IP addresses that is divided into two or more groups. This process, known as subnetting, divides an IP network into blocks of logical addresses. Subnetting can improve security and help to balance overall network traffic.
A common example of a subnet mask for class C IP addresses is 255.255.255.0, the default subnet mask for many computers and network routers. When applied to subnet, a subnet mask shows the routing prefix.
Three connector types for fiber-optic cable are ___, ___, and ___.
ST, SC, LC
The macOS proprietary crash screen is called what?
Pinwheel
If you want to plug your laptop into a power outlet in your car, you need a _________ power adapter.
DC
The component of a laptop’s video system responsible for sending the video signal is the ___.
Video card
What is another name for hard disk mirroring?
RAID 1
__________ and __________ modules both have 288 pins but are distinguished by the location of their keying notch.
DDR4, DDR5
DDR4 - double data rate four, DDR4 is a type of system memory known as SDRAM and was released in September 2014 as the successor to DDR3. DDR4 has bus clock speeds that range from 800 to 1600 MHz and range in storage capacity from 4 to 128 GB per DIMM. DDR4 is also more efficient at 1.2 V compared to DDR3’s 1.5 to 1.65 V range.
Inkjet and laser printers are examples of _______ because they receive their print job instructions one page at a time.
page printers
CPU cache is most commonly implemented using what type of memory?
Static RAM (SRAM)
SRAM is computer memory that requires a constant power flow to hold information. Power consumption varies widely based on how frequently the memory is accessed. Although quicker than DRAM, SRAM is more expensive and holds less data per unit volume. Therefore, it is more commonly used in cache and video card memory only.
Wireless networks use ____ to identify themselves.
SSIDs
SSID - service set identifier, SSID is a 32 alphanumeric identification given to devices on a wireless network. A device wanting to connect to a wireless network with an SSID enabled must have the same SSID to communicate. When connecting to a home network, you may see multiple SSIDs from your neighbor’s wireless routers.
When a Bluetooth network is created with a printer on the fly, what type of network is it?
ad hoc
TCP is a _______ protocol that operates at the ____ layer of the OSI model.
TCP - Transmission Control Protocol, TCP is a standard that dictates how to establish and maintain a connection through which two programs may exchange data. Invented in 1978 and driven by Bob Kahn and Vint Cerf, TCP is a core component in the TCP/IP protocol, which dictates how information is sent over the Internet.
connection-oriented, transport
Consistently light or faded characters on output from an impact printer likely indicates what?
The print ribbon is old and needs to be replaced.
To save heat, processors can use ____ to slow down and consume less energy.
Throttling
WPA2 employs what security method?
WPA2 (Wi-Fi Protected Access II) provides security and encryption for data transmissions and general computer connectivity. It is a more secure replacement for the original WPA. WPA2 was made available in 2004 and all network devices from 2006 and on are required to be WPA2 certified. Devices before 2006 may or may not be compatible with WPA2.
AES-CCMP
What is the third step in the best practice troubleshooting methodology?
Test the theory to determine the cause
What type of hypervisor is also referred to as a bare-metal hypervisor?
Type 1
A ____ server can block objectionable content from users.
proxy
Which type of DNS TXT record authenticates an email server via IP address?
SPF
A device that combines firewall, IPS, and antimalware software in one is called what?
Unified Threat Management (UTM)
What is the name of the consumable in a 3D printer that comes on a spool and needs to be replaced periodically?
filament
Two connector types used with twisted pair cabling are ____ and ____.
RJ-11 and RJ-45
Class B private IP addresses are in the ____ range.
172.16.0.0 to 172.31.255.255
What is a name for a legacy system that manages industrial processes such as manufacturing or HVAC?
SCADA
What is the fifth step in the best practice troubleshooting methodology?
Verify full system functionality and, if applicable, implement preventive measures
A firewall configuration where every computer is denied access except certain computers on a list is called a ___list.
White (or allow)
If when the computer is turned on, the fan spins but no devices seem to have power, which component is most likely at fault?
Power supply
As opposed to a WLAN, a Bluetooth network is referred to as a ____.
wireless personal area network (WPAN)
When troubleshooting and identifying the problem, what two things should you do?
Gather information from the user and inquire regarding environmental or infrastructure changes
What connector type provides power to an IDE hard drive?
Molex
Mini PCIe cards have ____ connectors.
52-pin card edge
What does RAID 0 not provide that other RAID levels do?
Fault tolerance
Name three places network scan services can send files?
Scan to email, scan to network folder (with SMB), scan to cloud
The language of communication spoken between computers on a network is called a _______.
protocol
What are the two socket types that require little to no force during CPU installation?
Zero Insertion Force (ZIF) and Land Grid Array (LGA)
What two things are combined in a hybrid drive?
A magnetic drive and a solid-state drive
Unexpected shutdowns, system lockups, or continuous reboots are most often caused by which hardware components?
Motherboard, CPU, or RAM
__________ is essentially software implemented in hardware.
Firmware
A paper jam in an inkjet printer is usually caused by what two things?
Worn pickup rollers or the wrong type of paper
Two types of devices used to keep computer components cool are __________ and __________.
heat sinks, cooling fans
A DB-9 connector is found on which type of cable?
Serial
Two analog video connectors are ___ and ___.
VGA and DVI-A
DNS server records for IPv4 and IPv6 hosts are ____ and ____.
A and AAAA
Name three types of internal hard drive cables.
SATA, IDE (PATA), and SCSI