Term
|
Definition
A memory controller that supports _______ memory implementation requires that modules be installed in pairs. |
|
|
Term
|
Definition
DDR SDRAM is implemented on a _____-pin module. |
|
|
Term
|
Definition
DRDRAM is implemented on a module known as a ________. |
|
|
Term
|
Definition
What is the name for the CPU/socket format that places the pins on the motherboard instead of the CPU? |
|
|
Term
|
Definition
What are the two most common types of memory packaging for laptops? |
|
|
Term
|
Definition
What type of device holds nearly as much data as a conventional hard disk drive but has no moving parts? |
|
|
Term
|
Definition
A ________ device can be inserted or removed with the system power on. |
|
|
Term
|
Definition
What device can you use to facilitate using one set of console equipment with multiple system units? |
|
|
Term
|
Definition
What device is used to connect a computer to an analog phone line for the purpose of allowing the computer to communicate with a remote device? |
|
|
Term
|
Definition
_______ devices have power and data connectors that use an L-shaped keying mechanism. |
|
|
Term
|
Definition
_________ has a resolution of 1920 by 1200 pixels. |
|
|
Term
|
Definition
Adjusting the ______ rate can eliminate flickering in a monitor. |
|
|
Term
|
Definition
What does Microsoft call the feature of its operating system that supports viewing the Desktop on multiple monitors simultaneously? |
|
|
Term
|
Definition
________ is a video standard that supports digital audio as well. |
|
|
Term
|
Definition
________ ratio is a measurement of the difference between the brightest and darkest colors an LCD is capable of displaying. |
|
|
Term
|
Definition
What type of laptop adapter combines functionality of PCIe and USB 2.0? |
|
|
Term
|
Definition
The two most common laptop memory standards are ______ and ______. |
|
|
Term
|
Definition
PMCIA Type I cards are ______ thick. |
|
|
Term
|
Definition
The S3 power state is called ______. |
|
|
Term
|
Definition
The S4 power state is called ________. |
|
|
Term
|
Definition
What step of the EP print process uses a laser to discharge selected areas of the photosensitive drum, thus forming an image on the drum? |
|
|
Term
|
Definition
The last step in the EP print process is ______. |
|
|
Term
|
Definition
Which voltage is applied to the paper to transfer the toner to the paper in an EP process laser printer? |
|
|
Term
|
Definition
Bubble-jet and laser printers are examples of ______ because they receive their print job instructions one page at a time. |
|
|
Term
|
Definition
Multipart forms are used with this type of printer. |
|
|
Term
|
Definition
The area that contains your icons, Start menu, Recycle Bin, and system tray is called the ______. |
|
|
Term
their button on the taskbar |
|
Definition
Open programs that are minimized can be maximized by clicking on which part of the Desktop? |
|
|
Term
|
Definition
The clock and other active utility icons are located in the ______. |
|
|
Term
|
Definition
A list of all available drives is accessible in the ______ icon. |
|
|
Term
|
Definition
To see what network resources are available for your computer, click on the ______ icon. |
|
|
Term
|
Definition
In Windows 2000 and above, system hardware is centrally managed through which applet? |
|
|
Term
|
Definition
Virtual memory physically resides on which piece of hardware? |
|
|
Term
|
Definition
Two other terms for the virtual memory file are the ______ and the ______. |
|
|
Term
|
Definition
The file that bootstraps Windows 2000 and Windows XP is named ______. |
|
|
Term
|
Definition
The editable file that contains boot options such as alternate operating systems is called ______. |
|
|
Term
|
Definition
The file that is the core of the Windows Vista operating systems is called ______. |
|
|
Term
|
Definition
If you are dual-booting to Windows 2000 and Windows 98, you need the ______ file to load Windows 98. |
|
|
Term
a bootable CD and boot disks |
|
Definition
Media for starting the Windows 2000 installation process include ______ and ______. |
|
|
Term
|
Definition
The first step in the troubleshooting process is to ______. |
|
|
Term
establish a theory of probably cause |
|
Definition
In troubleshooting theory, after identifying the problem, you should ______. |
|
|
Term
|
Definition
In troubleshooting theory, after establishing a theory of probably cause you should ______. |
|
|
Term
establish a plan of action to resolve the problem |
|
Definition
In troubleshooting theory, after testing the theory you should ______. |
|
|
Term
verify full system functionality |
|
Definition
In troubleshooting theory, after establishing a plan of action to resolve the problem, you should ______. |
|
|
Term
document your work and findings |
|
Definition
The last step of the troubleshooting process is to ______. |
|
|
Term
User/installation manuals, the Internet, and training materials. |
|
Definition
Three key resources for troubleshooting information are ______. |
|
|
Term
general protection fault (GPF) |
|
Definition
A ______ error occurs when a program accesses memory that another program is using or when a program accesses a memory address that doesn't exist. |
|
|
Term
|
Definition
A general protection fault (GPF) can be caused by what piece of failing hardware? |
|
|
Term
|
Definition
A general protection fault is usually caused when a program accesses ______ that another program is using or that doesn't exist. |
|
|
Term
|
Definition
Windows 2000 and XP have a utility called ______ that can intercept error codes and help debug them. |
|
|
Term
Blue Screen of Death (BSoD) |
|
Definition
When Windows quits unexpectedly, you may get a ______. |
|
|
Term
|
Definition
If a hardware device is not functioning properly, you may need to reinstall the ______. |
|
|
Term
|
Definition
If all computers on the network are in the same office, then the office is a ______. |
|
|
Term
|
Definition
If you have multiple LANs connected together by a slower-speed connection, you have a ______.
|
|
|
Term
|
Definition
Computers dedicated to providing resources to other computers are called ______. |
|
|
Term
|
Definition
Computers that access resources off of centralized systems are called ______. |
|
|
Term
|
Definition
A printer and shared disk space on the network are examples of ______. |
|
|
Term
|
Definition
A network where there are no dedicated servers is called a ______ network. |
|
|
Term
|
Definition
A network configured as a domain follows the ______ resource model. |
|
|
Term
|
Definition
A network topology where a single cable connects all computers in a line is called a ______. |
|
|
Term
|
Definition
A network topology where all computers are connected to a central device such as a switch is called a ______. |
|
|
Term
|
Definition
Token ring networks are an example of a physical ______, logical ______ topology. |
|
|
Term
|
Definition
The most common physical network topology, and the one easiest to expand, is the ______. |
|
|
Term
Ethernet (or CSMA/CD LAN) |
|
Definition
IEEE 802.3 is also known as ______. |
|
|
Term
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) |
|
Definition
Ethernet uses ______ to send information on the network.
|
|
|
Term
Twisted pair (or UTP), 10Mbps |
|
Definition
A 10BaseT network uses ______ calbing and can transmit data at ______ (speed). |
|
|
Term
application, presentation, session, transport, network, data link, physical |
|
Definition
The seven layers of the OSI model from top down are ______. |
|
|
Term
|
Definition
The OSI layer where file and print services operate at is the ______ layer. |
|
|
Term
|
Definition
The layer of the OSI model that manages the "look" of the data including encryption and compression is the ______ layer. |
|
|
Term
|
Definition
IEEE 802.11 specifies ______ networks. |
|
|
Term
|
Definition
______ proves that a user or system is actually who they say they are. |
|
|
Term
|
Definition
A fingerprint and retinal scan are examples of ______ authentication. |
|
|
Term
|
Definition
CHAP and PAP are examples of ______ protocols. |
|
|
Term
|
Definition
Which component inside the computer case poses the biggest risk of electrocution? |
|
|
Term
|
Definition
The most likely type of injury from attempting to fix a laser printer is what? |
|
|
Term
|
Definition
Class ______ fire extinguishers are for wood and paper fires. |
|
|
Term
|
Definition
Class ______ fire extinguishers are for flammable liquid fires. |
|
|
Term
|
Definition
Class ______ fire extinguishers are for electrical fires. |
|
|
Term
|
Definition
Class ______ fire extinguishers are for fires involving flammable metals. |
|
|
Term
|
Definition
To discharge electricity from a monitor, use a ______. |
|
|
Term
|
Definition
Electrical contacts should be cleaned with what? |
|
|
Term
The attached ribbon cable has a colored stipe down the edge corresponding to the pin-1 side. If no cable is present, the missing pin in the connector is closest to pin 1. The circuit board to which the connector is attached might also be labeled for pin 1. |
|
Definition
How can you tell on which side of a storage device's rectangular connector pin 1 is located? |
|
|
Term
|
Definition
Which RAID level provides no fault tolerance? |
|
|
Term
|
Definition
Which expansion bus type can share a single IRQ among two or more hardware components? |
|
|
Term
Phillips, flat-blade (or standard), and Torx |
|
Definition
What three screwdriver blades are most commonly needed for screws found in computer systems? |
|
|
Term
|
Definition
How many volts of static discharge are required to cause damage to sensitive electronic components? |
|
|
Term
from the manufacturer's website. |
|
Definition
Where can you obtain laptop service manuals? |
|
|
Term
inverter, screen, and backlight |
|
Definition
The three components of an LCD are what? |
|
|
Term
|
Definition
The power supply for the LCD is called what? |
|
|
Term
|
Definition
The part of the LCD that is responsible for displaying information is what? |
|
|
Term
The print ribbon is old and needs to be replaced. |
|
Definition
Consistently light or faded characters on output from a dot-matrix printer likely indicates what? |
|
|
Term
A pin is stuck out in the printhead. |
|
Definition
A small dark line across rows of printing on output from a dot-matrix printer indicates what? |
|
|
Term
a problem with the stepper motor |
|
Definition
Unevenly spaced characters in output from a dot-matrix or bubble-jet printer could indicate what? |
|
|
Term
worn pickup rollers or the wrong type of paper |
|
Definition
A paper jam in a bubble-jet printer is usually caused by what two things? |
|
|
Term
|
Definition
Pin 1 on a laser printer's power connector should supply what voltage? |
|
|
Term
|
Definition
To access the command prompt in Windows XP, type ______ or ______ from the Run box. |
|
|
Term
|
Definition
The command that clears the screen is ______. |
|
|
Term
|
Definition
The command-line command that repeats typed text back to the screen is ______. |
|
|
Term
|
Definition
To change the attribute of a file named KELLUM to mark it as a system file, the command-line syntax would be: |
|
|
Term
|
Definition
In Windows, system hardware is centrally manage through which applet? |
|
|
Term
|
Definition
The file that bootstraps Windows is named ______. |
|
|
Term
|
Definition
The list of hardware and applications that are verified to work with Windows can be found on Microsoft's ______ website. |
|
|
Term
|
Definition
The ______ advanced boot option loads only basic drivers including those for the keyboard and mouse. |
|
|
Term
Internet service provider (ISP) |
|
Definition
Online Internet service is provided by an ______. |
|
|
Term
|
Definition
The fastest speed you will get with dial-up service is ______. |
|
|
Term
144Kbps (two 64Kbps B channels and one 16Kbps D channel) |
|
Definition
Basic Rate ISDN provides how much bandwidth? |
|
|
Term
a unique IP address and a valid subnet mask |
|
Definition
To communicate on a TCP/IP network, which two things do you need? |
|
|
Term
|
Definition
The T in 100BaseT refer to what? |
|
|
Term
|
Definition
This account policy allows you to configure a number of minutes ranging from 1 to 99999. A value of 0 is also allowed here and signifies that the account never unlocks itself, administrator interaction is always required. |
|
|
Term
|
Definition
A ______ is a comprehensive set of fixes consolidated into a single product. |
|
|
Term
|
Definition
A brute force attack is a type of ______ attack. |
|
|
Term
|
Definition
The ping of death and the bugger overflow attack are types of this attack method. |
|
|
Term
|
Definition
This NTFS permission gives the user all the other choices and the ability to change permissions. The user also can take ownership of the directory or any of its contents. |
|
|
Term
|
Definition
|
|