Term
37. (207) The computing part of the computer is the central processing unit, also called the a. control unit. b. minicomputer. c. microprocessor. d. arithmetic logic unit. |
|
Definition
|
|
Term
38. (207) What two main components make up the central processing unit? a. Control unit and read-only memory. b. Control unit and arithmetic logic unit. c. Arithmetic logic unit and read-only memory. d. Arithmetic logic unit and random access memory. |
|
Definition
b. Control unit and arithmetic logic unit. |
|
|
Term
39. (207) What is the type of memory that retains data after power is removed or lost? a. Volatile. b. Nonvolatile. c. Secured. d. Unsecured. |
|
Definition
|
|
Term
40. (207) Which landline transmission medium is the primary carrier of voice communications? a. Twisted pair cable. b. Fiber optic cable. c. Coaxial cable. d. Twinax cable. |
|
Definition
|
|
Term
41. (207) An optical communications system is comprised of a a. transmitter, cable, and receiver. b. transmitter, cable, and logic analyzer. c. transmitter, transmission medium, and logic analyzer. d. transmitter, transmission medium, and protocol analyzer. |
|
Definition
a. transmitter, cable, and receiver. |
|
|
Term
42. (207) Which of the following is not one of the three advantages to using wireless technology? a. Ease of installation. b. Lower Cost. c. Safety. d. Mobility. |
|
Definition
|
|
Term
43. (207) The ability to move about without being tethered by wires in wireless technology is called a. mobility. b. ease of installations. c. war driving. d. motion capture technology. |
|
Definition
|
|
Term
44. (207) Which of the following is not one the four security threats to Wireless Local Area Network? a. Rogue Access Points. b. Direct Connections. c. War Drivers. d. Hackers. |
|
Definition
|
|
Term
45. (207) Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network? a. Auditor. b. Employee. c. War Driver. d. Hacker. |
|
Definition
|
|
Term
46. (207) What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today’s wireless networks? a. Institute of Electrical Electronics Engineers. b. International Organization for Standardization. c. Internet assigned numbers authority. d. National Science Foundation network. |
|
Definition
a. Institute of Electrical Electronics Engineers. |
|
|
Term
47. (208) How many peripherals can a Universal Serial Bus handle at once? a. 127. b. 128. c. 227. d. 228. |
|
Definition
|
|
Term
48. (208) How many devices can connect to a FireWire bus? a. 63. b. 64. c. 65. d. 66. |
|
Definition
|
|
Term
49. (209) What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property? a. Current. b. Voltage. c. Resistance. d. Inductance. |
|
Definition
|
|
Term
50. (210) What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks? a. Hub. b. Bridge. c. Switch. d. Router. |
|
Definition
|
|
Term
51. (210) What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment? a. 90/10 rule. b. 80/20 rule. c. 70/30 rule. d. 60/40 rule. |
|
Definition
|
|
Term
52. (210) This type of bridge is used to convert one Data Link layer protocol to another. a. Cross route. b. Transparent. c. Translational. d. Source route. |
|
Definition
|
|
Term
53. (211) What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery? a. Store-and-forward. b. Cross-over. c. Fragment-free. d. Adaptive. |
|
Definition
|
|
Term
54. (211) What forwarding method is also known as runtless switching? a. Store-and-forward. b. Cut-through. c. Fragment-free. d. Adaptive. |
|
Definition
|
|
Term
55. (212) What layer of the open system interconnection model do routers operate? a. Layer 2. b. Layer 3. c. Layer 4. d. Layer 5. |
|
Definition
|
|
Term
56. (212) What do routing algorithms initialize and maintain to aid the process of path determination? a. Routing times. b. Routing tables. c. Longest routes. d. Shortest routes. |
|
Definition
|
|
Term
57. (212) Which of these is an example of an Exterior Gateway Protocol? a. Open Shortest Path First. b. Border Gateway Protocol. c. Routing Information Protocol. d. Enhanced Gateway Routing Protocol. |
|
Definition
b. Border Gateway Protocol. |
|
|
Term
58. (212) Dynamic routing automatically calculates the best path between how many nodes? a. 2. b. 3. c. 4. d. 5. |
|
Definition
|
|
Term
59. (213) What encryption device may you rarely see due to its lower maximum data rate? a. TSEC/KIV–7. b. TSEC/KIV–19. c. TSEC/KG–84. d. TSEC/KG–194. |
|
Definition
|
|
Term
60. (213) What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits? a. TSEC/KIV–7. b. TSEC/KIV–7HS. c. TSEC/KIV–7HSA. d. TSEC/KIV–19. |
|
Definition
|
|
Term
61. (213) What encryption device is capable of loading up to 500 keys? a. AN/CYZ–10 /DTD. b. AN/CYZ–20 /DTD. c. Secure DTD1000 System. d. Secure DTD2000 System. |
|
Definition
|
|
Term
62. (213) The classification of a fill device is a. classified when taken out of a safe. b. classified as SECRET when the key has been unloaded. c. unclassified when put back in the safe after a key has been loaded into it. d. classified as soon as a key is loaded, and holds the classification of the loaded key. |
|
Definition
d. classified as soon as a key is loaded, and holds the classification of the loaded key. |
|
|
Term
63. (214) A modem is a device that modulates a. analog data onto an analog carrier for transmission over an analog medium. b. analog data onto a digital carrier for transmission over a digital medium. c. digital data onto an analog carrier for transmission over an analog medium. d. digital data onto a digital carrier for transmission over an analog medium. |
|
Definition
c. digital data onto an analog carrier for transmission over an analog medium. |
|
|
Term
64. (214) Analog modems are used over the voice band range of a. 10 Hz to 20 MHz. b. 20 Hz to 20 kHz. c. 30 Hz to 40 MHz. d. 40 Hz to 40 kHz. |
|
Definition
|
|
Term
65. (214) The main function of the Data Service Unit is to a. provide buffering and data flow control. b. manage timing errors and signal regeneration. c. provide the proper electrical termination for the transmission line. d. adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment. |
|
Definition
d. adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment. |
|
|
Term
66. (215) Software is generally divided into a. systems software and applications software. b. operating systems software and systems software. c. operating systems software and applications software. d. systems software, operating systems software, and applications software. |
|
Definition
d. systems software, operating systems software, and applications software. |
|
|
Term
67. (215) Which one is not a category of the operating system’s task categories? a. User interface. b. Memory management. c. Troubleshoot interface. d. Processor management. |
|
Definition
c. Troubleshoot interface. |
|
|
Term
68. (215) The path between the operating system and virtually all hardware not on the computer’s motherboard goes through a special program called a a. director. b. deliver. c. driver. d. sender. |
|
Definition
|
|
Term
69. (215) The core operating-system function is the management of the computer system which resides with the a. shell. b. kernel. c. device manager. d. processor manager. |
|
Definition
|
|
Term
70. (215) Applications are software programs designed to perform what type of tasks? a. specific. b. general. c. special. d. broad. |
|
Definition
|
|
Term
71. (215) What are two anti-virus programs that the Air Force uses? a. Norton and Horton. b. Horton and McAfee. c. Norton and McAfee. d. McAfee and Lotus Pro. |
|
Definition
|
|
Term
72. (216) Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts? a. Workgroup. b. Domain. c. Active Directory. d. User Group. |
|
Definition
|
|
Term
73. (216) Which system provides support for features such as Windows System Resource Manager and Metadirectory Services? a. AERO. b. Enterprise Edition. c. Standard Edition. d. Datacenter Edition. |
|
Definition
|
|
Term
74. (216) One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it? a. Web Edition. b. Datacenter Edition. c. NT. d. AERO. |
|
Definition
|
|
Term
75. (217) What was the first disk operating system developed to operate on a wide range of computer systems? a. C-Plus. b. UNIX. c. Fortran. d. Windows. |
|
Definition
|
|
Term
76. (217) What is the name of the standard all-purpose shell most commonly used? a. Restricted shell. b. Bourne shell. c. Korn shell. d. C shell. |
|
Definition
|
|
Term
77. (217) What directory is always identified by the slash symbol (/) and is in the “a” partition? a. root. b. user. c. binary. d. device. |
|
Definition
|
|
Term
78. (217) Which pathnames begin at the current working directory? a. Absolute. b. Relative. c. Complex. d. Simple. |
|
Definition
|
|
Term
(207) What is the type of memory that does not retain data after power is removed or lost? a. Volatile. b. Nonvolatile. c. Secured. d. Unsecured. |
|
Definition
|
|
Term
In common usage, this type of memory is read-write memory. This type of memory can have data read from it, and data can be written into each memory location.
A. RAM B. ROM |
|
Definition
|
|
Term
This type of memory can normally only be read.
A. RAM B. ROM |
|
Definition
|
|
Term
What are physical areas of disk allocated with specific sizes to file systems, enable a hard drive to organized in a manner helpful to the user?
A. Partition B. File C. Program |
|
Definition
Parition Are established during system configuration. |
|
|
Term
What are the 7 traditional directories provided with unix? |
|
Definition
|
|
Term
This directory contains executable files for the most commonly used UNIX commands?
A. Root b. Bin C. Dev D. Tmp |
|
Definition
|
|
Term
This directory contains device drivers sucha as printers, disks, terminals, and modems.
A. Root b. Bin C. Dev D. Tmp |
|
Definition
|
|
Term
This directory is used by the system for temporary storage fils.
A. Root b. Bin C. Dev D. Tmp |
|
Definition
|
|
Term
This directory contains common files used by all users.
A. Root b. Etc C. Usr D. lib |
|
Definition
|
|
Term
This directory contains miscellaneous files.
A. Root b. Etc C. Usr D. lib |
|
Definition
|
|
Term
This directory contains library files.
A. Root b. Etc C. Usr D. lib |
|
Definition
|
|