-
Which original components were very susceptible to damage from electrostatic?
CMOS
-
what is considered to be a comps main storage?
RAM
-
what is considered as nonvolatile permanent memory?
ROM
-
what is a form of firmware that contains the comps startup instructions?
BIOS
-
What is defined as an asynchronous signal from a computer hardware device indicating theneed for attention from a central processing unit (CPU) or a synchronous event?
Interrupt
-
Which controller component interprets an electronic signal, prioritizes it, and requests theattention of the central processing unit (CPU)?
Priority Interrupt
-
which IRQ line number is normally used for the floppy disk controller?
6
-
which is a term used to describe that data is whole or complete?
Data Integrity
-
what is considered as a technique or method of checking data integrity?
Parity
-
which is a very simple example of an error detecting code?
parity bit
-
what is away of utilizing a group of storage devices as if they were physically connected to a server when they are not?
SAN
-
what is an advantage of using a SAN architecture?
Ease of replacing server
-
what is the connection type of choise for SAN?
Fibre Channel
-
which storage device can be easily connected to a network and appears as a network drive?
NAS
-
which storage device has the means of providing data storage reliability using multiple hard drives?
RAID
-
the hard drives in a RAID array are presented to the server as?
one single hard drive
-
which technology is often used in RAID array that can be daisy chained?
SCSI
-
which is not a characteristic of high order languages?
source codes that are written closest to machine language
-
what best describes programming machine code?
instructions in a form that is acceptable to the comp
-
which selection is a set of markup symbols or codes inserted in a file inteded for display on a web browser page?
HTML
-
which web app is most likely to succeed HTML?
XHTML
-
a standard web app used to pass a web users request to a servers app program and to exchange data back to the user is called a ?
data encryption standard (DES)
-
which proocol is commonly used for managing the security of a message transmission on the internet?
SSL
-
which program can be used to automatically launch programs on a preset schedule?
task scheduler
-
which error checking tool allows you to monitor the file system for errors?
check disk
-
which numbering system characteristic if the leftmost non-zero digit of a numeric value?
Most significant digit (MSD)
-
what should each org have that spells out which systems are prioritized in what order for the basis of protecting those sytems form disasters?
List of critical devices
-
which type of backup would you use at the end of the week to save all data that you select on your system?
Normal
-
which type of backup will back up all files that have been altered in the last 24hrs?
daily
-
what is based around a central directory database containing information about all the domain controllers in the network?
Active Directory
-
what is agroup of users, server, and other resources that share a centralized dtabase of account and security info?
forest
-
wher does acopy of the AD database reside?
domain controllers
-
what kind of server contains the master listing of all AD objects in the forest?
global catalog
-
what is aset of rules that can be set to affect AD leaf objects to control what can be done by a user?
group policy objects
-
which type of interface is friendlier for the average user to use?
GUI
-
which of the following is not one of the elements that most GUI's are composed of?
programs
-
sitting at a computer and loading a software patch onto it is an example of what type of software patch?
attended
-
whic type of patch would utilize a remote installation services (RIS)?
Unattended
-
which components of DNS contain a dtabase of associated names and IP addresses?
name servers
-
which query is made by one name server to another name server?
non recursive
-
which software program manages an IP address allocation for a network?
DHCP
-
the group of IP addresses that a DHCP server manages is known as a ?
scope
-
what is the min number of scopes a DHCP server can have?
one
-
according to the AF DHCP policies, how long is the lease that a non critical workstation will have applied to them?
30 days
-
what type of service allows network admins to install upgrades on any number of client comps at one type from a centralized location?
Remote Installation Service (RIS)
-
whic is not a component of IIS?
SNMP
-
what component of windows unifies and simplifies day to day system management tasks?
MMC
-
which type of group manages users rights assignments and access permissions?
security
-
which special identity can represent users currently logged onto a particular computer and accessing a given resource located on that computer?
interactive
-
what defines the rules by which operations can be preformed on a particular resource?
permissions
-
a feature of networking that enables individuals to designate resources they want other users to be able to acces through a network is called?
sharing
-
what permission always overrides all other permissions assigned to a user or groupu to which the user belongs?
no access
-
when a new folder or file is created on a new technology file system (NTFS) partition, what permissions are auto assigned?
inherited permissions of the folder its contained in
-
which exchange service is the first service launched when microsoft exchange starts and the last to stop when it is shut down?
system attendant
-
In Exchange System Manager, which container holds configuration objects such as Queues,Mailbox stores and Public Folder stores and protocols information?
servers
-
which type of list uses pointers to connect each element together?
linked
-
a set of data elements (values) organized useing a model of horizontal rows and vertical columns whos data is calculated in response to a query is called a ?
view
-
what is the most common type of operation in SQL?
queries
-
what type of SQL statement would you use to make the changes you were working on permenant?
transaction
-
which is the m ost commonly used SQL data statement?
select
-
which SQL server feature tracks changes and is used to ensure data integrity?
logging
-
which unix capability can execute numerous programs at the same time?
multitasking
-
which unix ability can run on different types of hardware with a few relatively minor changes?
portability
-
which unix operating sytem component interacts directly with the sytem hardware?
kernel
-
which unix component provides a logical way to organize, store, retrieve, manipulate, and manage data?
file system
-
which unix shell is the most compact and is often used for writing shell scripts?
bourne shell
-
normally, when you create a file with a text editor, the file is set up with ?
read and write for you and read only for others
-
to change permissions on a shell script, you use the unix command?
chmod
-
the simplest place to put your function definitions is in your?
profile
-
what do you type to quit a unix shell?
exit
-
how many characters do most unix system admins and users tend to use for filenames?
14`
-
unix disks are divided into logical sections called?
partitions
-
the /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
root
-
what does the 0 following the c in the device name c0t6d0s7 represent?
controller
-
what does the 7 in the device name c0t6d0s7 represent?
partition
-
what is the basic unit for storing and manipulating a collection of logically related information known as dtat?
files
-
hard links are created using which unix command?
ln
-
which unix mechanism enables programs to communicate with one another through the file sytem?
named pipes
-
which unix mechanism provides for communication with system device drivers through the file system one character at a time?
character devices
-
which unix command displays the current working directory?
pwd
-
which unix command allows you to move to different directories within a file system using absolute or relative pathnames?
ls-s
-
which unix command takes any characters from standard input and then echoes them to standard output?
cat
-
which unix command deletes files from within a directory?
rm
-
which unix command looks at an individual file and finds a specified pattern (string)?
grep
-
which unix cmd changes the grp ownership of one or more files?
chgrp
-
which unix cmd changes the ownership of one or more files to a new owner?
chown
-
which unix cmd sets access and modification times for each file to the current time?
touch
-
how many primary grps can a user be a member of?
one
-
which unix vi mode allows users to execute set cmds?
command
-
which unix vi character represents the end of the file?
$
-
while using unix vi to edit a file, what would you enter to save the buffer contents and stay in the same file?
w
-
in unix, which pakcage of programs lets a terminal handle many sessions at once?
unix windows system
-
what is the most common unix windows system?
x windows
-
which unix default cmd starts the x window system?
xinit
-
the act of choosing the window you type is called setting the ?
input focus
-
what action puts unneeded windows out of the way without quitting the program inside them?
iconifying
-
which unix cmd from the menu bar moves a window to the bottom of the stack of windows?
lower
-
the key to sutting down an xterm window is to know which of your programs is the?
controlling program
-
the first step to quiting and xterm session is to?
quit all non-controlling programs
-
which unix cmd does the system admin need to use to create the manual atabase prior to users being able to acces the man -k cmd?
catman
|
|