Final

  1. Primary storage is provided by devices call memory?located on the motherboard and on some adaptor cards
    RAM
  2. The ____ or system timer is dedicated to timing the activities of the chips on the motherboard.
    system clock
  3. In the world of computers, the term ____ refers to the computer’s physical components, such as the monitor, keyboard, motherboard, and hard drive.
    hardware
  4. To perform a computing task, software uses hardware for four basic functions: ____.
    input, processing, storage, and output
  5. Data and instructions are stored on special ROM (read-only memory) chips on the board and are called the ____.
    bios
  6. Most ____ drives consist of a sealed case containing platters or disks that rotate at a high speed.
    hard
  7. The printer produces output on paper, often called ____ copy.
    hard
  8. Everything in a computer is ____.
    Binary
  9. SB ____ drives are compact, easy to use, and currently hold up to 64 GB of data.
    Flash
  10. A ____ bus port can be used by many different input/output devices, such as keyboards, printers, scanners, and digital cameras.
    Univeresal serial
  11. The ____ card, also called a graphics card, provides one or more ports for a monitor
    Video
  12. A device that is not installed directly on the motherboard is called a(n) ____ device.
    peripheral

  13. The ____ card provides a port for a network cable to connect the PC to a network.




































    The ____ card provides a port for a network cable to connect the PC to a network.

    Network
  14. The ____ is a group of microchips on the motherboard that control the flow of data and instructions to and from the processor.
    chipset
  15. A(n) ____ drive is considered standard equipment on most computer systems today because most software is distributed on CDs or DVDs.
    optical
  16. A 1 or 0 in this system is called a ____.
    bit
  17. The term ____ refers to the set of instructions that directs the hardware to accomplish a task.
    software
  18. Most input/output devices communicate with components inside the computer case through a wireless connection or through cables attached to the case at a connection called a(n) ____.
    port
  19. A(n) ____ is a set of rule and standards that any two entities use for communication.
    protocol
  20. The most important component of the computer’s electrical system is the ____, which is usually near the rear of the case.
    power supply
  21. ____ are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card, or modem.
    Device drivers









  22. A(n) ____ is software that controls a computer.



    operating system
  23. The ____ dialog box in Windows Vista appears each time a user attempts to perform an action that can be done only with administrative privileges.
    User Account Control
  24. The ____ is usually on the right side of the taskbar and displays open services.
    system tray
  25. Windows identifies file types primarily by the ____.
    file extension
  26. From the ____ window, you can change the read-only, hidden, archive, and indexing attributes of the file.
    Properties
  27. A ____ interface is an interface that uses graphics as compared to a command-driven interface
    graphical user
  28. An applet has a ____ file extension.
    .cpl
  29. A ____ is one or more characters following the last period in a filename, such as .exe, .txt, or .avi.
    file extension
  30. The OS ____ is responsible for interacting with hardware.
    kernel
  31. Vista has a new 3D user interface called the ____ user interface.
    Aero
  32. The ____ interface between the subsystems in user mode and the HAL.
    executive services
  33. A ____ makes it possible to boot a computer into one of two installed OSs.
    dual boot
  34. A(n) ____ is a low-end inexpensive laptop with a small 9- or 10-inch screen and no optical drive.
    netbook
  35. A ____ is a single task, such as the task of printing a file, that the process requests from the kernel.
    thread
  36. In 1986, ____ was introduced and quickly became the most popular OS among IBM computers and IBM-compatible computers using the Intel 8086 processors.
    MS-DOS
  37. A(n) ____ is the portion of an OS that relates to the user and to applications.
    shell
  38. The ____ is normally located at the bottom of the Windows desktop, displaying information about open programs and providing quick access to others.
    taskbar
  39. A(n) ____ is a list of items that is used to speed up a search.
    index
  40. Windows offers two ways to sync files: ____.
    Briefcase and Offline Files










  41. Image Upload 1

    The ____ is a measure of resistance to electricity.

    Ohm
  42. The ____ form factor is a major variation of ATX and addresses some technologies that have emerged since the original development of ATX.
    MicroATX
  43. A ____ color or stripe down one side of a cable marks this side of the cable as pin 1.
    Red
  44. Older hard drives use a(n) ____-conductor IDE ribbon cable.
    80
  45. A ____ of the house current might cause symptoms of electrical power problems.
    Brownout
  46. Motherboards that support PCI Express and have the 24-pin P1 connector are sometimes called ____ boards
    Enhanced ATX
  47. Some video cards use a(n) ____ that helps to hold the card securely in the slot.
    latch
  48. The first ATX power supplies and motherboards used a single power connector called the ____ connector that had 20 pins.
    p1
  49. The ____ provides backup power in the event that the AC fails completely.
    uninterruptible power supply
  50. ____ connections inside the computer case can cause a system to appear dead or reboot itself.
    • Image Upload 3
    • Loose









  51. A(n) ____ is a general-purpose tool that can measure several characteristics of electricity in a variety of devices

    multimeter
  52. A ____ is an electronic device that can hold an electrical charge for a period of time and can smooth the uneven flow of electricity through a circuit.
    capacitor
  53. A system might have up to ____ types of ribbon cables.
    three
  54. A power ____ is a box inside a computer case that supplies power to the motherboard and other installed devices.
    Supply
  55. ___ is running a processor, motherboard, or video card at a higher frequency than the manufacturer recommends and is not considered a best practice.
    Overclocking
  56. One ____ is the work or energy required to produce one watt of power in one second.
    joule









  57. A ____ case sits upright on the floor or a desk and can be as high as two feet and has room for several drives.

    Tower
  58. A(n) ____ might solve the problem of intermittent errors caused by noise in the power line to the PC.
    line conditioner
  59. For an older motherboard, instead of screws you’ll see ____ that keep the board from resting directly on the bottom of the computer case.
    spacers
  60. The ____ form factor was designed by Intel in 2003 for flexibility and can be used by everything from large tower systems to those ultrasmall-systems that sit under a monitor.
    BTX
  61. On the motherboard, the ____ controls power to the motherboard and must be connected for the PC to power up.
    Power SW
  62. Sometimes documentation marks pin 1 as a ____ pin in the diagram, rather than round like the other pins.
    square
  63. For Windows XP, Ntldr is responsible for loading the OS, and is, therefore, called the ____.
    boot loader program
  64. A(n) ____ boot involves turning on the power with the on/off switch.
    Hard
  65. Earlier Pentiums used a ____ socket, with pins aligned in uniform rows around the socket.
    pin grid array
  66. The ____ have a lever that is used to lift the processor up and out of the socket.
    zero insertion force sockets
  67. Access to a computer can be controlled using a ____ password.
    Startup
  68. The process of upgrading or refreshing the ROM BIOS chip is called ____ BIOS.
    Flashing
  69. Some cases have ____, also called spacers, which are round plastic or metal pegs that separate the motherboard from the case, so that components on the back of the motherboard do not touch the case.
    standoffs
  70. Throughput is sometimes called ____.
    bandwidth
  71. The ____ menu in BIOS setup allows you to configure automatic power-saving features for your system, such as suspend mode or a sleep state.
    power
  72. With any installation, remember the importance of using a ground strap (ground bracelet) to ground yourself when working inside a computer case to protect components against ____.
    ESD
  73. Most likely when you first install a hard drive or an operating system, you will want to have the BIOS attempt to first boot from a ____.
    CD
  74. Later sockets used a ____, with pins staggered over the socket to squeeze more pins into a small space.
    staggered pin grid array
  75. At the beginning of the boot drive (usually drive C) is the OS ____ record.
    Boot
  76. The ____ and the chipset determine which processors a board can support.
    processor socket
  77. ____ buses have been improved several times; there are currently three major categories and within each category, several variations of the bus.
    PCI









  78. A ____ is the most complicated component in a computer.

    North Bridge
  79. The slower end of the hub in the Intel i800 chipsets, called the ____, contains the I/O controller hub.
    South Bridge
  80. The most popular method of cooling overclocked processors is a(n) ____.
    liquid cooling system
  81. Laptops use a smaller version of a DIMM called a(n) ____.
    SODIMM
  82. Processors can sense their operating temperatures and report that information to ____.
    Bios









  83. ____ hold counters, data, instructions, and addresses that the ALU is currently processing.

    Registors
  84. RAM on motherboards today is stored on ____.
    Dimm's
  85. Installing more than one processor on a motherboard creates a ____.
    multiprocessor platform
  86. Intel’s current families of processors for the desktop include four major groups: ____.
    the Core, the Pentium, the Celeron, and the Atom families
  87. If you have Rambus memory, what do you put in memory slots that are unused?
    Crimms
  88. Intel’s ____ allows each logical processor within the processor package to handle an individual thread in parallel with other threads being handled by other processors within the package.
    Hyper-Threading
  89. The CMOS battery failure can be reported by startup BIOS during the ____.
    POST
  90. ____ loses its data rapidly, and the memory controller must refresh it several thousand times a second.
    DRAM
  91. A ____ is a heat sink carrying an electrical charge that causes it to act as an electrical thermal transfer device.
    peltier









  92. If a power-on password has been forgotten, you can use the BIOS ____ to reset the password

    jumper group
  93. Intel and AMD both recommend a ____ air guide as part of the case design.
    chassis
  94. ____ is used for a memory cache and is contained within the processor housing
    SRAM
  95. The cooler sits on top of the processor and consists of a fan and a heat ____, which are fins that draw heat away from the processor.
    SINK
  96. Using the ____ technology, the Intel processor, chipset, and wireless network adapter are all interconnected as a unit, which improves laptop performance.
    Centrino
  97. The current set of standards that is used by BIOS, hardware, and the OS to manage power is ____.
    Advanced Configuration and Power Interface
  98. The temperature inside the case should not exceed ____ degrees C.
    38





















  99. A Rambus memory module is called a(n) ____.

    RIMM
  100. Each side, or surface, of one hard drive platter is called a
    Head
  101. The first sector on the disk, called the boot sector or ____ record, contains the information about how the disk is organized and the file system used.
    Boot
  102. The ____-conductor IDE cable has half the number of pins as it has wires.
    80
  103. With ____, two hard drives are configured as a single volume.
    Spanning
  104. When using an 80-conductor cable-select cable, the drive nearest the motherboard is the ____.
    Master









  105. A technology that configures two or more hard drives to work together as an array of drives is called ____.

    Raid
  106. During the ____ formatting process, you specify the size of the partition and what file system it will use.
    High-level
  107. ____ on a circuit board inside the drive housing is responsible for writing and reading data to these tracks and sectors and for keeping track of where everything is stored on the drive.
    Firmware
  108. ____ is a system BIOS feature that monitors hard drive performance, disk spin up time, temperature, distance between the head and the disk, and other mechanical activities of the drive in order to predict when the drive is likely to fail.
    S.M.A.R.T
  109. If you are mounting a hard drive into a bay that is too large, a ____ kit can help you securely fit the drive into the bay.
    universal bay









  110. A ____ drive has one, two, or more platters, or disks, that stack together and spin in unison inside a sealed metal housing that contains firmware to control reading and writing data to the drive and to communicate with the motherboard.

    magnetic hard
  111. A drive ____ is a duplication of everything written to a hard drive.
    Image
  112. ____ transfers data directly from the drive to memory without involving the CPU.
    DMA









  113. With ____, you can connect and disconnect a drive while the system is running.

    hot-swapping
  114. The total number of ____ on the drive determines the drive capacity.
    Sectors
  115. The ATA interface standards are developed by Technical Committee T13 and published by
    ANSI
  116. External ____ is up to six times faster than USB or FireWire.
    SATA
  117. ____ is a standard for communication between a subsystem of peripheral devices and the system bus.
    SCSI
  118. Windows Vista technology that supports a hybrid drive is called ____.
    ReadyDrive
  119. The top and bottom of each disk of a magnetic hard drive have a(n) ____ that moves across the disk surface as all the disks rotate on a spindle.
    read/write head
  120. Chips sometimes loosen because of temperature changes; this condition is called ____.
    chip creep
  121. IEEE 1394 uses ____ data transfer, meaning that data is transferred continuously without breaks.
    isochronous
  122. Devices and their device drivers are managed using ____.
    Device Manager
  123. If you are trained to open a monitor case to replace a fuse, unplug the monitor and wait at least ____ minutes before opening the case so that capacitors have completely discharged.
    60
  124. Problems with a device can sometimes be solved by updating the ____ or firmware.
    Device Driver
  125. A ____ device is an input device that inputs biological data about a person, which can be input data to identify a person’s fingerprints, handprints, face, voice, eye, and handwritten signature.
    biometric
  126. ____ systems and peripherals have the U.S. Green Star, indicating that they satisfy certain energy-conserving standards of the U.S. Environmental Protection Agency (EPA).
    Energy Star
  127. To protect the data on a USB storage device while removing it, double-click the ____ icon in the notification area before removing the device.
    Safely Remove Hardware
  128. Ports on the motherboard can be disabled or enabled in ____ setup
    Bios
  129. ____ supports speeds up to 400 Mbps and is sometimes called FireWire 400.
    IEEE 1394a
  130. ____ can use cables up to 100 meters (328 feet), and uses a 9-pin rectangular connector.
    1394b
  131. If you have an available eSATA external port, you can use a protective hard drive ____ that will house and protect a hard drive outside the computer case.
    Dock
  132. A(n) ____ monitor (also called a progressive monitor) draws the entire screen in one pass.
    noninterlaced
  133. A ____ plug is a tool used to test a serial, parallel, USB, network, or other port.
    Loop-Back
  134. A serial port is provided by the motherboard or might be provided by an adapter card called a(n) ____ card.
    I/O controller
  135. FireWire and i.Link are common names for another peripheral bus officially named ____.
    IEEE 1394
  136. BIOS manages ____ lines that are used by a device to hail the CPU asking for data to be processed.
    IRQ









  137. The ____ assignments refer to the system resources a parallel port will use to manage a print job.

    LPT









  138. A ____ is an input device that uses a monitor or LCD panel as the backdrop for input options.

    touch screen
  139. For laptops, you can adjust the brightness of the display using ____ keys.
    Function









  140. A double-sided, double-layer DVD can hold ______ GB of data.

    17
  141. Computers store data digitally and ultimately as a stream of only two numbers: ____.
    • Image Upload 5
    • 0 and 1
  142. A video ____ card lets you capture this video input and save it to a file on your hard drive.
    Capture
  143. For EIDE, there are four choices for drive installations:
    primary master, primary slave, secondary master, and secondary slave
  144. When burning a CD, DVD or BD, the hard drive needs some temporary holding space for the write process and should have at least ____ of free space.
    1 GB









  145. A ____ card can turn your computer into a television

    TV tuner
  146. ____ is a set of standards that are used to represent music in digital form.
    MIDI
  147. ____ drives are a great method of keeping backups of data stored on your hard drive.
    External hard
  148. A ____ provides slots for memory cards and can be an internal or external device.
    media reader
  149. ____ are recessed areas on the surface of an optical disc.
    pits
  150. When installing an optical drive, for a PATA interface set the jumper on the ____ of the drive.
    Rear
  151. If a disc gets stuck in the drive, use the ____ to remove it.
    emergency eject hole
  152. To prevent a CD, DVD, or BD from automatically playing when AutoPlay is enabled, hold down the ____ key when inserting a disc.
    Shift
  153. n order to read each sector on the spiral of a CD at a constant ____, the disc spins faster when the read-write head is near the center of the disc.
    linear velocity
  154. MP3 sound files have a(n) ____ file extension.
    .mp3
  155. ____ are smooth and level areas on an optical disc.
    Lands
  156. After the sound is recorded and digitized, many sound cards convert and compress the digitized sound to ____ format.
    MP3









  157. A CD can hold about ____ of data

    700 MB
  158. ____ is a common compression standard for storing photos.
    JPEG









  159. A single-sided, single-layer DVD can hold ______ GB of data

    4.7
  160. To keep boot sector viruses at bay, in ____ you can disable the ability to write to the boot sector of the hard drive.
    BIOS setup
  161. As you solve computer problems, always keep in mind that you don’t want to make things worse, so you should use the ____ invasive solution.
    least
  162. To dispose of ____ do physical damage to the device then put in the trash.
    Storage media such as hard drives, CDs, DVDs and BDs
  163. To find out what to do if you are accidentally exposed to a dangerous solution, look on the instructions printed on the can or check out the material ____ sheet.
    safety data
  164. ____ are intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software.
    Copyrights
  165. A ____ explains how to properly handle substances such as chemical solvents
    Material Safety Data Sheet









  166. If you want to recover lost data on a hard drive, don’t ____ the drive.

    write anything to
  167. The ____ was designed in part to protect software copyrights by requiring that only legally obtained copies of software be used.
    Federal Copyright Act of 1976
  168. When someone purchases software from a software vendor, that person has only purchased a ____ for the software, which is the right to use it.
    license
  169. The rule ____ is the most powerful.
    divide and conquer
  170. Proper ____ is essential to keeping a system cool.
    air circulation
  171. Dispose of ____ in the regular trash.
    Alkaline batteries, including AAA, AA, A, C, D, and 9-volt
  172. User manuals and ____ for a device or software often list symptoms of problems with possible solutions and troubleshooting tips.
    installation manuals
  173. ____, caused by lifting heavy objects, is one of the most common injuries that happen at work
    Back injury
  174. Most CRT monitors today are designed to discharge after sitting unplugged for ____ minutes.
    60 minutes
  175. Good ____ helps you take what you learned into the next troubleshooting situation, train others, develop effective preventive maintenance plans, and satisfy any audits or customer or employer queries about your work.
    documentation
  176. ____ from cigarettes can accumulate on fans, causing them to jam, which in turn will cause the system to overheat
    Tar
  177. Dispose of ____ by returning them to the original dealer or by taking them to a recycling center.
    Button batteries used in digital cameras
  178. Good ____ help(s) you think more clearly.
    Notes
  179. The right to copy the work, called a ____, belongs to the creator of the work or others to whom the creator transfers this right.
    copyright
  180. The ____ command creates a subdirectory under a directory.
    MD
  181. When a hard drive is first sensed by Windows, it is assigned the ____ disk status.
    Basic
  182. The ____ command is used to copy the information from the old computer to a server or removable media.
    scanstate
  183. To make sure the drive is healthy, you need to search for and repair file system errors using the Windows ____ utility.
    Chkdsk
  184. A Windows domain is a type of ____ network, which is a network where resources are managed by a centralized computer.
    client/server
  185. Besides backing up user data or system files, you can also back up the entire hard drive using Windows Vista ____.
    Complete PC Backup
  186. When you back up the system state, the registry is also backed up to the folder ____.
    %SystemRoot%\repair\RegBack
  187. To convert a FAT32 volume to an NTFS volume, first back up all important data on the drive and then use this command at a command prompt: ____, where D: is the drive to be converted.
    convert D: /FS:NTFS
  188. Upgrading to a better edition of Vista can easily be accomplished by using the ____ feature.
    Windows Anytime Upgrade
  189. If you are having problems with a hard drive, volume, or mounted drive, check ____ for events about the drive that might have been recorded there.
    Event Viewer
  190. A ____ computer is software that simulates the hardware of a physical computer.
    virtual
  191. A Windows ____ is a logical group of computers and users that share resources, where administration, resources, and security on a workstation are controlled by that workstation.
    workgroup
  192. During a normal Windows XP installation, setup causes the system to reboot ____ times.
    3
  193. ____ creates restore points at regular intervals and just before you install software or hardware.
    System Protection
  194. A(n) ____ server is used to hold the setup files on a Windows CD or DVD on the network and then at each PC, you can execute the Setup program on the server.
    distribution
  195. A ____ is a copy of the entire volume on which Windows is installed to another bootable media such as CDs or USB drive.
    drive image
  196. The user folder for an account contains a group of subfolders called the user ____.
    profile namespace
  197. A snapshot of the system settings and configuration is called a ____.
    restore point
  198. The Windows utility ____ is used to remove configuration settings, such as the computer name that uniquely identifies the PC.
    sysprep.exe









  199. A dynamic disk requires ____ MB of storage for the disk management database.

    1
  200. After you boot into Safe Mode, you can use the ____ commands to verify system files and clean the hard drive.
    SFC, Chkdsk, and Defrag
  201. Use the ____ command to repair the file system and recover data from bad sectors.
    chkdsk C: /r
  202. Use the Windows Vista ____ tool to deal with an immediate hardware or software problem.
    Problem Reports and Solutions
  203. You can use the Windows RE command prompt window to restore registry files using those saved in the ____ folder
    c:\windows\system32\config\regback
  204. The ____ tool can be used to direct information about drivers to a file, including information about digital signatures.
    Driver Query
  205. The key that loads services and drivers can be found in the ____ location.
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services









  206. You can quickly identify a problem with memory or eliminate memory as the source of a problem by using the ____ tool.

    Vista Memory Diagnostics
  207. n the Recovery Console, the command ____ deletes a directory.
    RD
  208. For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by
    the computer manufacturer
  209. Use the ____ tool to test memory.
    Memory Diagnostics
  210. For essential hardware devices, use the ____ to verify and replace system files
    System File Checker
  211. When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded.
    Windows kernel
  212. The ____ is used when Windows 2000/XP does not start properly or hangs during the load.
    Recovery Console
  213. During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder.
    \Windows.old
  214. Press ____ at startup to display the Advanced Boot Options menu.
    F8
  215. The Vista Advanced Boot Options menu appears when a user presses ____ as Vista is loading.
    F8
  216. The ____ Configuration is updated after you log on normally to Vista
    Last Known Good
  217. The error ____ is caused by a driver or service making an illegal access to memory.
    Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL









  218. The command ____ searches for and replaces corrupted system files.

    sfc /scannow
  219. Enter the command ____ to see a list of all services currently installed, which includes device drivers.
    listsvc
  220. Apple Computer calls 802.11b ____.
    AirPort









  221. A ____ is a device that manages traffic between two networks.

    router
  222. A ____ is the gateway a computer uses to access another network if it does not have a better option.
    default gateway
  223. ____ is a standard for short-range wireless communication and data synchronization between devices.
    Bluetooth
  224. If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong ____ server on the network.
    proxy
  225. Because electrical interference can be a problem with VoIP phones, each network cable connected to a VoIP phone needs a(n) ____ clamp attached.
    ferrite
  226. When a Remote ____ session is opened, all local users are logged off.
    Desktop
  227. When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the ____.
    VoIP provider
  228. Networking happens in ____.
    Layers









  229. A ____ IP address is assigned for the current connection only.

    dynamic
  230. ____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN.
    Encryption
  231. Remote ____ can help you support users and their computers from a distance.
    Assistance
  232. To connect to the Internet, a network first connects to an ____.
    Internet Service Provider
  233. To find out what your DNS server knows about the domain name www.microsoft.com, use the ____ command.
    nslookup www.microsoft.com
  234. The ____ for a cellular network is a fixed transceiver and antenna.
    base station
  235. The ____ command can display TCP/IP configuration information and refresh the IP address.
    ipconfig
  236. A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer’s IP address is on the same or a different network.
    subnet mask
  237. Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet.
    Desktop
  238. The solution for securing private data traveling over a public network is a ____.
    virtual private network
  239. The command to flush the DNS cache kept on the computer is ____.
    ipconfig /flushdns









  240. A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.

    administrator









  241. ____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.

    BIOS
  242. Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password
    Reset
  243. A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
    Strong
  244. A $ at the end of the folder name creates a(n) ____ share.
    Hidden
  245. The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost.
    Cipher









  246. A network ____ map is one of the most powerful and versatile methods of communicating over a network.

    Drive
  247. You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or ____.
    Network Service
  248. A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.
    User









  249. A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.

    multipartite









  250. A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

    Backdoor
  251. The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
    ISO 17799 and ISO 27002









  252. A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.

    digital certificate
  253. Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
    permissions
  254. ____ is any annoying and unwanted program that might or might not mean you harm.
    Grayware
  255. To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
    Effective Permissions
  256. The term ____ applies to a kit or set of tools used originally on UNIX computers.
    rootkit
  257. Certificates are managed using the ____ console.
    Certificate Manager
  258. If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.
    HKLM\System\CurrentControlSet\Control\SafeBoot
  259. The best way to change inherited permissions is to change the permissions of the ____.
    parent object
  260. When you print to the Microsoft XPS Document Writer printer, it creates a(n) ____ file.
    .xps
  261. Printer ____ is updated by replacing the printer’s DIMM that contains the code or by downloading the update from the manufacturer’s Web site.
    firmware
  262. Do not use less than ____-LB paper in any type of printer, unless the printer documentation specifically says that a lower weight is satisfactory.
    20









  263. Check ____ for recorded events that have to do with the printer or the port it is using.

    Event Viewer
  264. A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology called ____.
    REt
  265. A ____ printer connects directly to a computer by way of a USB port, parallel port, serial port, wireless connection (Bluetooth, infrared, or Wi-Fi), IEEE 1394 (FireWire) port, SCSI port, PC Card, or ExpressCard connection.
    Local









  266. Automatically printing on both sides of the page is called ____ printing.

    duplex









  267. In a laser printer, the fuser should last for about ____ pages

    45,000
  268. ___ printers work by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning.
    Laser
  269. Manufacturers of high-end printers provide ____ kits, which include specific printer components, step-by-step instructions for performing maintenance, and any special tools or equipment you need to do maintenance.
    printer maintenance









  270. A dedicated device or computer called a print ____ can control several printers connected to a network

    Server









  271. A printer ____ page generally prints some text, some graphics, and some information about the printer, such as the printer resolution and how much memory is installed.

    Test
  272. A(n) ____ printer uses solid dyes embedded on different transparent films.
    dye-sublimation
  273. ____ is a language used to communicate how a page is to print and was developed by Adobe Systems.
    PostScript










  274. Image Upload 6

    ____ printers tend to smudge on inexpensive paper, and they are slower than laser printers.

    Inkjet
  275. Several print jobs can accumulate in the queue, which you can view in the Vista Printers window or the XP Printers and Faxes window in a process called ____.
    Spooling









  276. ____ printers use wax-based ink that is heated by heat pins that melt the ink onto paper. The print head containing these heat pins is as wide as the paper.

    Thermal
  277. To know the IP address of a network printer, direct the printer to print a ____ page.
    configuration
  278. To find out how many pages a printer has printed so that you know if you need to do the maintenance, you need to have the printer give you the ____ count since the last maintenance.
    Page
  279. When cleaning a printer, to prevent the inkjet nozzles from drying out, don’t leave the ink cartridges out of their cradle for longer than ____ minutes.
    30
Author
hornstein590
ID
120968
Card Set
Final
Description
Final questions
Updated