Wiley Flashcards
Computer operating systems can be open source, meaning the OS can be examined and modified by ______.
Anyone
A multitasking method that depends on the application itself to be responsible for using and then freeing access to the processor is known as ______.
Cooperative multitasking
Because the operating system is essential for running all other programs, it is usually the first piece of software loaded during the ______.
Boot process
The ability of a single application to have multiple requests in to the processor at one time is known as what?
Multithreading
Can you mix 64-bit software with 32-bit hardware?
No
What is the minimum amount of memory recommended for Windows Vista Home Premium?
1 GB
What is the minimum amount of free hard drive space recommended for installing a Windows 7 32-bit version?
16 GB
In Windows, a primary mouse click is typically a single click of which mouse button?
Left
The Taskbar contains two major items, the Start menu and the ______.
System Tray
A ______ is a copy of your system configuration at a given point in time.
Restore point
Which Control Panel applet is used to configure screensavers, colors, display options, and monitor devices?
Display
What is the name of the desktop interface available in Windows Vista?
Aero
The ability to support so many languages is provided through the use of the ______ standard.
Unicode
A group of computers that are tightly connected or associated and share a common domain name will have a single authority that manages security for all the computers know as the ______.
Domain Controller
In Windows 7, Vista, and XP, every user is automatically given a user ______ when they log on to the workstation that contains information about their settings and preferences.
Profile
True/False: Remote Assistance is enabled by default.
True
The ______ command indicates whether the host can be reached and how long it took for the host to send a return packet.
Ping
Which option is used with NETSTAT to display all connections and listening ports?
-a
What switch is used with IPCONFIG to obtain a new IP address from a DHCP server?
/renew
The ______ utility can be used to schedule a shutdown (complete or a restart) locally or remotely.
Shutdown.exe
With Windows 7, there are 32-bit and 64-bit versions for each of the editions you must know for the exam except ______.
Starter
What feature of WIndows 7 and Windows Vista is intended to prevent unintentional/unauthorized changes to the computer by either prompting for a permission to continue or requiring the administrator password before continuing?
User Account Control (UAC)
The ______ feature of Windows 7/Vista allows you to use drive encryption to protect files, including those needed for startup and logon.
BitLocker
In Windows 7, the ______ feature allows you to use free space on a removable drive to speed up a system by caching content.
ReadyBoost
Windows 7 includes the ______ antispyware program.
Windows Defender
Windows 7 has a quick way to access files you’ve been working on through their association with the application that has been using them. This feature is known as ______.
Jump Lists
A simplified way to setup a home network was added to Windows 7. It is known as ______.
HomeGroup
In Windows 7, ______ allow you to logically (as opposed to physically) group files and folders that are not in the same location and make them appear as if they are.
Libraries
Microsoft Windows ______ allows you to migrate user file settings related to the applications, desktop configuration, and accounts.
User State Migration Tool (USMT)
During the startup of Windows 7, what holds information about OSs installed on the computer, such as the location of the OS files?
Boot Configuration Data (BCD)
What is the maximum number of CPUs supported by Windows Vista Home Premium?
One
Which edition of Windows Vista supports BitLocker and is not available through the retail channel?
Enterprise
In Windows Vista, what is the name for mini programs that can be palced on the Sidebar, allowing them to run quickly and personalize the PC?
Gadgets
In Windows Vista, the ______ provides a single interface for firewall settings, automatic updating, malware protection, and other security settings.
Windows Security Center
True/False: In Windows Vista, you can turn off the UAC feature.
True; while turning UAC off is not recommended, you can do so by choosing Start > Control Panel > user Accounts and clicking Turn User Account Control On or Off
To what versions of Windows Vista can Windows XP Professional be upgraded?
Windows Vista Business and Windows Vista Ultimate
What file in Windows serves as the hardware abstraction layer?
HAL.DLL
Windows Firewall has been a component of Windows ever since ______.
Windows XP Service Pack 2
The default setting for Enforce Password History is 0. How high can this value go?
24
What Control Panel applet in Windows Vista can be used to configure the device on which the operating system is installed to function as a true tablet?
Tablet PC Settings applet
Setup Manager is not an unattended installation method in and of itself but is used to create ______ files.
Answer
What type of operating system installation installs the most commonly used components of the software but not all of the components?
Typical
Older Windows Server Operating Systems have a feature called Remote Installation Service (RIS), which allows you to perform several network installations at one time. Beginning with Windows Server 2003 SP2, RIS was replaced by ______.
Windows Deployment Service (WDS)
______ is the process of dividing part or all of a hard drive into sections, or partitions, for use by the computer.
Partitioning
On each hard drive, the ______ contains the partition information for the hard drive and includes the beginning and end of each partition that has been defined on the drive.
Master Boot Record (MBR)
Windows XP includes a utility known as the ______ that will transfer most of your files and individual application settings from an old computer to a new one.
File and Settings Transfer Wizard
With Windows XP, what file starts the loading of an OS on the computer?
NTLDR
With Windows XP, to access Safe Mode, you must press what key when the OS menu is displayed during the boot process?
F8
True/False: Windows XP Home edition does not have Remote Desktop, only Remote Desktop Connection.
True; Therefore, Windows XP Home computers can connect to other computers but cannot be connected to by other computers.
What Control Panel applet is unique to Windows XP and can be used to add or remove network connections?
Network Connections
Ideally, your system should have a minimum of ______ physical barriers.
3
______ is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, a card, or any other security device.
Tailgating
______ is a common physical access method that involves digging through dumpsters or recycle bins looking for more information that is highly sensitive in nature (such as passwords written down after a change and before the user has the new one memorized).
Dumpster diving
______ devices such as hand scanners and retinal scanners use physical characteristics to identify the user.
Biometric security
What is the name of file or glass add-ons that are placed over a monitor and prevent the data on the screen from being readable when viewed from the sides?
Privacy filter
A firewall operating as a ______ passes or blocks traffic to specific addresses based on the type of application.
Packet filter
The concept of ______ is a simple one: When assigning permissions, give users only the permissions they need to do their work and no more.
Least Privilege
______ is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization.
Social engineering
What is a type of malicious software that acts on behalf of a third part (rather than self-replicating, like viruses and worms, it is spread to machines by users who inadvertently ask for it)?
Spyware
______ is a form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.
Phishing
If you’re running into a software problem on a computer, the first step (after understanding what the problem is and getting any relevant error messages written down) should always be to ______.
Reboot
True/False: When trying solutions to fix a problem, make only one change to the computer at a time.
True. This allows you to determine the exact cause.
What is BSOD?
Blue Screen of Death; another way of describing the blue-screen error condition that occurs when Windows fails to boot properly or quits unexpectedly.
When troubleshooting in Safe Mode, you can uninstall a driver you think is causing the problem. Another option is to boot into the ______ configuration.
last known good
What is the name of the file that is the Windows OS kernel?
NTOSKRNL.EXE
A RAID array was not detected during the installation of Windows 7. What is a likely reason?
A likely possibility is that the correct drivers for the version of Windows being used is not located.
Device ______ are software programs that tell the operating system how to work with the hardware.
Drivers
True/False: In Windows 7/Vista, the User Account Control (UAC) feature has the sole purpose of keeping the user from running programs that could pose a potential threat by escalating privileges to that of Administrator.
True
True/False: When a file fails to open, it is often due to compatibility.
False. When a file fails to open, it is often due to corruption.
What command must you use to install the Recovery Console?
WINNT32 /CMDCONS
If all computers on the network are in the same office, then the office is a ______.
local area network (LAN)
Computers dedicated to providing resources to other computers are called ______.
servers
A network where there are no dedicated servers is called a ______ network.
peer-to-peer
A network topology where all computers are connected to a central device such as a switch is called a .
Star
Ethernet uses ______ to send information on the network.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
The layer of the OSI model that manages the “look” of the data including encryption and compression is the ______ layer.
Presentation
The layer of the OSI model responsible for establishing and maintaining communications between computers is the ______ layer.
Session
The OSI layer responsible for error-checking is ______ .
Transport
The cable type with the longest range is ______.
fiber optic
As opposed to a WLAN, a Bluetooth network is referred to as a ______.
wireless personal area network (WPAN)
The network connectivity device that can connect multiple networks to each other is a ______.
router
The OSI model layer responsible for putting frames on the wire is called the ______ layer.
Physical
The seven layers of the OSI model from top down are ______.
Application Presentation Session Transport Network Data Link Physical
The language of communication spoken between computers on a network is called a ______.
protocol
TCP/IP is based on the ______ model.
United States Department of Defense (DoD)
TCP is a ______ protocol that operates at the ______layer of the OSI model.
connection-oriented, Transport
Which protocol in TCP/IP is responsible for resolving IP addresses to MAC addresses?
ARP (Address Resolution Protocol)
To communicate on a network, TCP/IP hosts must have a unique ______ and valid ______.
IP address, subnet mask
Class A IP addresses will have a first octet of between ______and ______.
1 and 126
FTP uses ports ______and ______, and Telnet uses port ______.
20, 21, 23
A ______ server provides IP configuration information to clients on the network.
DHCP (Dynamic Host Configuration Protocol)
Class B private IP addresses are in the ______ range.
172.16.0.0 to 172.31.255.255
Class C private IP addresses are in the ______ range.
192.168.0.0 to 192.168.255.255
APIPA addresses are in the ______range with a subnet mask of ______.
169.254.0.0 to 169.254.255.255, 255.255.0.0
The ______ protocol is used to send mail and operates on port ______.
SMTP, 25
The address fe80::/10 is an example of an IPv6 ______ address.
link-local
The ______ protocol is used to retrieve mail and operates on port ______.
IMAP, 143
POP3, 110
A 10BaseT network uses ______ cabling and can transmit data at ______ (speed).
twisted-pair (or UTP), 10Mbps
What are the four common types of broadband?
DSL (Digital Subscriber Line), cable, satellite, and fiber-optic
The wireless networking standard 802.11a operates at ______ (frequency) and supports ______ (speed).
5GHz, 54Mbps
The wireless networking standard 802.11n operates at ______ (frequency) and supports ______ (speed).
2.5 and 5GHz, up to 600 Mbps
What is the most secure encryption protocol for 802.11?
WPA2
Wireless networks use ____ to identify themselves.
SSIDs
Name two examples of 4G technology.
WiMAX, LTE
Firewalls filter packets based on a set of rules called ______.
an ACL (access control list)
UTP cable has a maximum segment length of ______.
100 meters
The server that translates between private nonroutable IP addresses and public IP addresses is ______.
Network Address Translation (NAT)
WPA2 employs what security method?
AES-CCMP
What type of laptop adapter combines functionality of PCIe and USB 2.0?
ExpressCard
How thick are PCMCIA Type I cards?
3.3 millimeters
If you want to plug your laptop into a power outlet in your car, what kind of power adaptor do you need?
DC
Type III PC Cards are ______ thick, and the most common Type III device is a ______ .
10.5 millimeters, hard drive
What kind of connector do MiniPCI Type III cards use?
124-pin card edge
Where can you obtain laptop service manuals?
From the manufacturer’s website
What are the three components of an LCD?
Inverter, screen, and backlight
What is the part of the LCD that is responsible for providing enough light?
Backlight
What is the component of a laptop’s video system that is responsible for sending the video signal?
Video card
MiniPCIe cards have ______ connectors.
52-pin card edge
What step of the EP print process uses a laser to discharge selected areas of the photosensitive drum, thus forming an image on the drum?
Writing
The last step in the EP print process is ______.
Cleaning
Which voltage is applied to the paper to transfer the toner to the paper in an EP process laser printer?
+600VDC
Bubble-jet and laser printers are examples of ______ because they receive their print job instructions one page at a time.
page printers
Multipart forms are used with this type of printer.
dot-matrix
With EP process laser printers, the laser discharges the charged photosensitive drum to ______ VDC.
–100
What is the function of the corona assembly?
The corona assembly gets the toner from the photosensitive drum onto the paper.
What is the first step in the EP printing process?
Processing
What are the seven steps in the EP printing process, in order?
Processing Charging Exposing Developing Transferring Fusing Cleaning
______ are examples of print communication languages.
Printer Command Language (PCL), PostScript (PS), and Graphics Device Interface (GDI)
Which component inside the computer case poses the biggest risk of electrocution?
The power supply
Class ______ fire extinguishers are for flammable liquid fires.
B
Class ______ fire extinguishers are for fires involving flammable metals.
D
To discharge electricity from a monitor, use a ______.
high-voltage probe
What is the name of the safety sheet supplied with all chemicals?
Material Safety Data Sheet (MSDS)
What are the three common types of screws used in computers?
Straight-slot, Phillips, and Torx
Computer components can be damaged with a shock of ______ volts.
100
To see an electrical discharge, the transfer must be of ______ volts or more.
10,000
What device uses a one megaohm resistor to slowly bleed charge away?
An antistatic wrist strap
To whom must accidents at the workplace be immediately reported?
The employer
When lifting computer equipment, always lift with your ______
legs
You should ______ batteries to properly dispose of them.
recycle
When talking about a computer problem with a customer, you should avoid using ______.
jargon, acronyms, and slang
What should you do if you are going to be late to a customer appointment?
Contact (call) the customer
When working on a customer’s computer, you should always ______ and ______ expectations.
set, meet (or exceed)
Consistently light or faded characters on output from a dot-matrix printer likely indicates what?
The print ribbon is old and needs to be replaced.
Unevenly spaced characters in output from a dot-matrix or bubble-jet printer could indicate what?
A problem with the stepper motor.
A paper jam in a bubble-jet printer is usually caused by what two things?
Worn pickup rollers or the wrong type of paper
Pin 1 on a laser printer’s power connector should supply what voltage?
+5v
What are three ways you can manually configure your laser printer’s IP address?
Through the control panel on the printer, using Telnet, and using management software on your computer.
The process that a bubble-jet printer goes through after installing a new print cartridge is called ______.
print head alignment
Vertical white lines on the output of a laser printer are caused by what?
Foreign matter (more than likely toner) caught on the transfer corona wire
What causes image smudging from a laser printer?
The fuser isn’t heating the toner and fusing it into the paper.
When Windows quits unexpectedly, you may get a ______.
Blue Screen of Death (BSoD)
The diagnostic routine built into the BIOS is called the ______.
power-on self test (POST)
Name the two most common types of devices used to keep computers cool.
Heat sinks and cooling fans
The line of print jobs is called the ______.
print queue
The service that formats jobs for the printer is called the ______.
print spooler
If a laptop will not power up on battery power, what should you should?
Plugging it in to an AC adapter
If the video on a laptop is not working, you should plug in what?
An external monitor
To communicate on a TCP/IP network, which two things do you need?
A unique IP address and a valid subnet mask
What is the command-line utility used to look at inbound and outbound TCP/IP connections on your computer?
NETSTAT
Which RAID level provides no fault tolerance?
RAID 0
The functional components of a chipset are known as ______ and ______.
Northbridge, Southbridge
ATX and ITX are examples of what?
Motherboard form factors
______ is essentially software implemented in hardware.
Firmware
Name two advanced methods used to keep computer components cool.
Possible answers include: liquid cooling, heat pipes, Peltier cooling devices, phase-change cooling, liquid nitrogen and helium, and undervolting.
External cache is most commonly implemented using what type of memory?
Static RAM (SRAM)
Which modules both have 240 pins but are distinguished by the location of their keying notch?
DDR2, DDR3
What are the two socket types that require little to no force during CPU installation?
Zero Insertion Force (ZIF) and Land Grid Array (LGA)
What should you apply between the CPU and heat sink to avoid overheating?
Thermal compound
What type of conventional CPU cooling method is relatively quiet and affords the greatest drops in temperature?
Water or liquid cooling
If the fan on the power supply is an exhaust-oriented fan, then the fan on the front fan should be ______ oriented, while the rear supplemental fan should be ______ oriented.
intake, exhaust
How many devices can a 16-bit SCSI bus support?
16
How many pins might you find on the data interface of a given SCSI device?
25, 50, 68, or 80
What was the ATA-5 technology that first required the 80-wire ribbon cable called?
UltraDMA/66 or UDMA/66
IDE and EIDE are now collectively referred to as ______ and have been superseded by ______.
PATA, SATA
Name three of the available memory-card formats
SD, xD, MMC, CF, MS, SM, etc.
Name one of the standard DC voltages supplied by a power supply.
+3.3VDC, +5VDC, -5VDC, +12VDC, or -12VDC
What is the name given to the IDE/EIDE family of drive interfaces to differentiate them from the newer SATA specifications?
PATA
How much faster is the 1X transfer rate of a DVD drive when compared to that of a CD drive?
Nine times faster
Name three interfaces commonly used to attach external hard drives to a computer system.
USB, FireWire, and eSATA
What is the capacity of a standard Blu-ray disc?
25GB
RCA and TOSLINK connectors are used with copper and fiber, respectively, for what input/output technology family?
Digital audio
Thunderbolt is a combination of which two interfaces?
DisplayPort and PCIe
What should you do for a mechanical mouse that causes the cursor to move erratically on the screen?
Clean it.
The e in eSATA stands for ______, but the E in EIDE stands for ______.
external, enhanced
What input technology allows the touch of a finger or stylus to simultaneously move the cursor and make a selection?
Touchscreen
What multimedia technology daisy-chains devices back to a host and uses a messaging protocol to communicate musical information among devices?
MIDI
Which expansion bus type can share a single IRQ among two or more hardware components?
PCI
A card with expansion slots on it that installs into a motherboard is known as a card.
riser
______ is the preferred I/O bus architecture for high-end graphics adapters, especially among gaming enthusiasts.
PCI Express (PCIe)
Which two types of expansion slot are closely related and highly limited and specialized as to what can be installed in them?
Audio Modem Riser (AMR), Communications and Networking Riser (CNR)
A ______ contrast ratio indicates that an LCD monitor reduces the power to the backlight to display darker images.
dynamic
What is the digital version of YPbPr called?
YCbCr
Three major types of LCD screens are dual scan, passive matrix, and ______.
active matrix
How many pins are on a standard (Type-A) HDMI connector?
19
How many more pins does a dual-link DVI-D connector have than a single-link DVI-D connector?
6
When you ______ a CRT monitor, you reduce the built-up magnetic field, improving the display quality.
degauss
The three main classifications of video display devices are CRT, LCD, and ______
projector
The analog-only portion of a DVI-A connector has a flat ground blade surrounded by how many pins?
4
______ has a resolution of 1920 pixels by 1200 pixels.
WUXGA
Adjusting the ______ rate can eliminate flickering in a monitor.
refresh
Name three custom computer configurations.
Possible answers are graphic and CAD/CAM design workstations, audio/video editing workstations, virtualization workstations, gaming PCs, home theater PCs, thin clients, home server PCs.
What special modifications apply to graphics and CAD/CAM workstations?
CPU enhancements, video enhancements, and maximized RAM
What special modifications apply to A/V editing workstations?
Video enhancements, specialized audio, and specialized drives
What special modifications apply to virtualization workstations?
CPU enhancements and maximized RAM
What special modifications apply to gaming PCs?
CPU enhancements, video enhancements, specialized audio, and enhanced cooling
What special modifications apply to home theater PCs?
Video enhancements, specialized audio, special chassis, and TV tuner
What special modifications apply to thin clients?
None, but they must be able to run basic applications and the local operating system.
What special modifications apply to home server PCs?
Media streaming capabilities, file sharing services, print sharing services, gigabit NIC, and RAID
With respect to A/V editing workstations, what does NLE stand for?
Nonlinear editing
Name the two most popular families of graphics APIs recommended for adapters used in A/V editing.
CUDA and OpenGL
What are the terms used to describe proprietary and nonproprietary programming code?
Closed source/vendor specific and open source, respectively
Which component in a mobile device can detect yaw?
A gyroscope
Mobile devices that contain a magnetometer support apps that act as what kind of device?
A compass
Which TCP ports are most commonly used for insecure and secure SMTP?
Port 25 and port 465, respectively
What term refers to a mobile device adding geographical information to media such as photographs taken with the device?
Geotagging
Capacitive touchscreens do not require _____, but resistive touchscreens do because their outer panels flex to make contact with their inner panels.
calibration
Name two methods that a mobile device can use to detect its current location.
Possible answers are cellular network, WiFi network, GPS.
What technology allows pairing of mobile devices and, on occasion, the ability to transfer files between them?
Bluetooth
When configuring an Internet email account on a mobile device, what are the standard pieces of information required?
Username and password, outbound mail server and port (often based on secure SMTP), and inbound mail server and port (often based on secure POP3 or secure IMAP4)
What feature available on almost all mobile devices can ensure that, after a configurable amount of time, a security challenge must be met in order to access the device?
Passcode lock