Term
Which original components were very susceptible to damage from electrostatic discharge? |
|
Definition
Complementary metal-oxide semiconductor (CMOS). |
|
|
Term
What is considered to be a computer’s main storage? |
|
Definition
Random Access Memory (RAM) |
|
|
Term
What is considered as nonvolatile permanent memory? |
|
Definition
|
|
Term
What is a form of firmware that contains the computer’s startup instructions? |
|
Definition
Basic input/output system (BIOS). |
|
|
Term
What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event? |
|
Definition
|
|
Term
Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)? |
|
Definition
|
|
Term
Which interrupt request (IRQ) line number is normally used for the floppy disk controller? |
|
Definition
|
|
Term
Which is a term used to describe that data is whole or complete? |
|
Definition
|
|
Term
What is considered as a technique or method of checking data integrity? |
|
Definition
|
|
Term
Which is a very simple example of an error detecting code? |
|
Definition
|
|
Term
What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not? |
|
Definition
Storage area network (SAN). |
|
|
Term
What is an advantage of using a storage area network (SAN) architecture? |
|
Definition
|
|
Term
What is the connection type of choice for storage area networks (SAN)? |
|
Definition
|
|
Term
Which storage device can be easily connected to a network and appears as a network drive? |
|
Definition
Network attached storage (NAS). |
|
|
Term
Which storage device has the means of providing data storage reliability using multiple hard drives? |
|
Definition
Redundant array of independent disks (RAID). |
|
|
Term
The hard drives in a redundant array of independent disks (RAID) array are presented to the server as |
|
Definition
|
|
Term
Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained? |
|
Definition
Small computer system interface (SCSI). |
|
|
Term
Which is not a characteristic of high-order languages? |
|
Definition
Source codes that are written closest to machine language. |
|
|
Term
What best describes programming machine code? |
|
Definition
Instructions in a form that is acceptable to the computer |
|
|
Term
Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page? |
|
Definition
HyperText Markup Language (HTML). |
|
|
Term
Which Web application is most likely to succeed Hypertext Markup Language (HTML)? |
|
Definition
|
|
Term
A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a |
|
Definition
common gateway interface (CGI). |
|
|
Term
Which protocol is commonly used for managing the security of a message transmission on the Internet? |
|
Definition
Secure socket layer (SSL). |
|
|
Term
Which program can be used to automatically launch programs on a preset schedule? |
|
Definition
|
|
Term
Which error-checking tool allows you to monitor the file system for errors? |
|
Definition
|
|
Term
Which numbering system characteristic is the leftmost non-zero digit of a numeric value? |
|
Definition
Most significant digit (MSD). |
|
|
Term
What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters? |
|
Definition
|
|
Term
Which type of backup would you use at the end of the week to save all data that you select on your systems? |
|
Definition
|
|
Term
Which type of backup will backup all files that have been altered in the last 24 hours? |
|
Definition
|
|
Term
What is based around a central directory database containing information about all the domain controllers in the network? |
|
Definition
|
|
Term
What is a group of users, servers, and other resources that share a centralized database of account and security information? |
|
Definition
|
|
Term
Where does a copy of the active directory database reside? |
|
Definition
|
|
Term
What kind of server contains the master listing of all active directory objects in the forest? a. Dynamic host configuration protocol (DHCP). |
|
Definition
|
|
Term
What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user? |
|
Definition
|
|
Term
Which type of interface is friendlier for the average user to use? |
|
Definition
|
|
Term
Which of the following is not one of the elements that most graphical user interfaces are composed of? |
|
Definition
|
|
Term
Sitting at a computer and loading a software patch onto it is an example of what type of software patch? |
|
Definition
|
|
Term
Which type of patch would utilize a remote installation services (RIS)? |
|
Definition
|
|
Term
Which components of domain name service (DNS) contain a database of associated names and IP addresses? |
|
Definition
|
|
Term
Which query is made by one name server to another name server? |
|
Definition
|
|
Term
Which software program manages an IP address allocation for a network? |
|
Definition
Dynamic host configuration protocol (DHCP). |
|
|
Term
The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a |
|
Definition
|
|
Term
What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have? |
|
Definition
|
|
Term
According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them? |
|
Definition
|
|
Term
What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location? |
|
Definition
Remote installation services (RIS. |
|
|
Term
Which is not a component of Internet information services (IIS)? |
|
Definition
Simple network management protocol (SNMP). |
|
|
Term
What component of windows unifies and simplifies day to day system management tasks? |
|
Definition
Microsoft management console (MMC). |
|
|
Term
Which type of group manages user’s rights assignments and access permissions? |
|
Definition
|
|
Term
Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer? |
|
Definition
|
|
Term
What defines the rules by which operations can be performed on a particular resource? |
|
Definition
|
|
Term
A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called |
|
Definition
|
|
Term
What permission always overrides all other permissions assigned to a user or group to which the user belongs? |
|
Definition
|
|
Term
When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned? |
|
Definition
Inherited permissions of the folder's it's contained in |
|
|
Term
Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down? |
|
Definition
|
|
Term
In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information? |
|
Definition
|
|
Term
Which type of lists uses pointers to connect each element together? |
|
Definition
|
|
Term
A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a |
|
Definition
|
|
Term
What is the most common type of operation in sequential query language (SQL)? |
|
Definition
|
|
Term
What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent? |
|
Definition
|
|
Term
Which is the most commonly used sequential query language (SQL) data statement? |
|
Definition
|
|
Term
Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity? |
|
Definition
|
|
Term
Which UNIX capability can execute numerous programs at the same time? |
|
Definition
|
|
Term
Which UNIX ability can run on different types of hardware with few relatively minor changes? |
|
Definition
|
|
Term
Which UNIX operating system component interacts directly with the system hardware? |
|
Definition
|
|
Term
Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data? |
|
Definition
|
|
Term
Which UNIX shell is the most compact and is often used for writing shell scripts? |
|
Definition
|
|
Term
Normally, when you create a file with a text editor, the file is set up with |
|
Definition
read and write permission for you and read-only permission for others. |
|
|
Term
To change permissions on a shell script, you use the UNIX command |
|
Definition
|
|
Term
The simplest place to put your function definitions is in your |
|
Definition
|
|
Term
What do you type to quit a UNIX shell? |
|
Definition
|
|
Term
How many characters do most UNIX system administrators and users tend to use for filenames? |
|
Definition
|
|
Term
UNIX™ disks are divided into logical sections called |
|
Definition
|
|
Term
The /dev/dsk and /dev/rdsk directories are subdirectories of which directory? |
|
Definition
|
|
Term
What does the 0 following the c in the device name c0t6d0s7 represent? |
|
Definition
|
|
Term
What does the 7 in the device name c0t6d0s7 represent? |
|
Definition
|
|
Term
What is the basic unit for storing and manipulating a collection of logically related information known as data? |
|
Definition
|
|
Term
Hard links are created using which UNIX command? |
|
Definition
|
|
Term
Which UNIX mechanism enables programs to communicate with one another through the file system? |
|
Definition
|
|
Term
Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time? |
|
Definition
|
|
Term
Which UNIX command displays the current working directory? |
|
Definition
|
|
Term
Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames? |
|
Definition
|
|
Term
Which UNIX command takes any characters from standard input and then echoes them to standard output? |
|
Definition
|
|
Term
Which UNIX command deletes files from within a directory? |
|
Definition
|
|
Term
Which UNIX command looks at an individual file and finds a specified pattern (string)? |
|
Definition
|
|
Term
Which UNIX command changes the group ownership of one or more files? |
|
Definition
|
|
Term
Which UNIX command changes the ownership of one or more files to a new owner? |
|
Definition
|
|
Term
Which UNIX command sets access and modification times for each file to the current time? |
|
Definition
|
|
Term
How many primary groups can a user be a member of? |
|
Definition
|
|
Term
Which UNIX vi mode allows users to execute set commands? |
|
Definition
|
|
Term
Which UNIX vi character represents the end of the file? |
|
Definition
|
|
Term
While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file? |
|
Definition
|
|
Term
In UNIX, which package of programs lets a terminal handle many sessions at once? |
|
Definition
|
|
Term
What is the most common UNIX windows system? |
|
Definition
|
|
Term
Which UNIX default command starts the X windows system? |
|
Definition
|
|
Term
The act of choosing the window you type is called setting the |
|
Definition
|
|
Term
What action puts unneeded windows out of the way without quitting the program inside them? |
|
Definition
|
|
Term
Which UNIX command from the menu bar moves a window to the bottom of the stack of windows? |
|
Definition
|
|
Term
The key to shutting down an xterm window is to know which of your programs is the |
|
Definition
|
|
Term
The first step in quitting an xterm session is to |
|
Definition
quit all non-controlling programs |
|
|
Term
Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man –k command? |
|
Definition
|
|