CDC's URE's 2

  1. Which original components were very susceptible to damage from electrostatic?
  2. what is considered to be a comps main storage?
  3. what is considered as nonvolatile permanent memory?
  4. what is a form of firmware that contains the comps startup instructions?
  5. What is defined as an asynchronous signal from a computer hardware device indicating theneed for attention from a central processing unit (CPU) or a synchronous event?
  6. Which controller component interprets an electronic signal, prioritizes it, and requests theattention of the central processing unit (CPU)?
    Priority Interrupt
  7. which IRQ line number is normally used for the floppy disk controller?
  8. which is a term used to describe that data is whole or complete?
    Data Integrity
  9. what is considered as a technique or method of checking data integrity?
  10. which is a very simple example of an error detecting code?
    parity bit
  11. what is away of utilizing a group of storage devices as if they were physically connected to a server when they are not?
  12. what is an advantage of using a SAN architecture?
    Ease of replacing server
  13. what is the connection type of choise for SAN?
    Fibre Channel
  14. which storage device can be easily connected to a network and appears as a network drive?
  15. which storage device has the means of providing data storage reliability using multiple hard drives?
  16. the hard drives in a RAID array are presented to the server as?
    one single hard drive
  17. which technology is often used in RAID array that can be daisy chained?
  18. which is not a characteristic of high order languages?
    source codes that are written closest to machine language
  19. what best describes programming machine code?
    instructions in a form that is acceptable to the comp
  20. which selection is a set of markup symbols or codes inserted in a file inteded for display on a web browser page?
  21. which web app is most likely to succeed HTML?
  22. a standard web app used to pass a web users request to a servers app program and to exchange data back to the user is called a ?
    data encryption standard (DES)
  23. which proocol is commonly used for managing the security of a message transmission on the internet?
  24. which program can be used to automatically launch programs on a preset schedule?
    task scheduler
  25. which error checking tool allows you to monitor the file system for errors?
    check disk
  26. which numbering system characteristic if the leftmost non-zero digit of a numeric value?
    Most significant digit (MSD)
  27. what should each org have that spells out which systems are prioritized in what order for the basis of protecting those sytems form disasters?
    List of critical devices
  28. which type of backup would you use at the end of the week to save all data that you select on your system?
  29. which type of backup will back up all files that have been altered in the last 24hrs?
  30. what is based around a central directory database containing information about all the domain controllers in the network?
    Active Directory
  31. what is agroup of users, server, and other resources that share a centralized dtabase of account and security info?
  32. wher does acopy of the AD database reside?
    domain controllers
  33. what kind of server contains the master listing of all AD objects in the forest?
    global catalog
  34. what is aset of rules that can be set to affect AD leaf objects to control what can be done by a user?
    group policy objects
  35. which type of interface is friendlier for the average user to use?
  36. which of the following is not one of the elements that most GUI's are composed of?
  37. sitting at a computer and loading a software patch onto it is an example of what type of software patch?
  38. whic type of patch would utilize a remote installation services (RIS)?
  39. which components of DNS contain a dtabase of associated names and IP addresses?
    name servers
  40. which query is made by one name server to another name server?
    non recursive
  41. which software program manages an IP address allocation for a network?
  42. the group of IP addresses that a DHCP server manages is known as a ?
  43. what is the min number of scopes a DHCP server can have?
  44. according to the AF DHCP policies, how long is the lease that a non critical workstation will have applied to them?
    30 days
  45. what type of service allows network admins to install upgrades on any number of client comps at one type from a centralized location?
    Remote Installation Service (RIS)
  46. whic is not a component of IIS?
  47. what component of windows unifies and simplifies day to day system management tasks?
  48. which type of group manages users rights assignments and access permissions?
  49. which special identity can represent users currently logged onto a particular computer and accessing a given resource located on that computer?
  50. what defines the rules by which operations can be preformed on a particular resource?
  51. a feature of networking that enables individuals to designate resources they want other users to be able to acces through a network is called?
  52. what permission always overrides all other permissions assigned to a user or groupu to which the user belongs?
    no access
  53. when a new folder or file is created on a new technology file system (NTFS) partition, what permissions are auto assigned?
    inherited permissions of the folder its contained in
  54. which exchange service is the first service launched when microsoft exchange starts and the last to stop when it is shut down?
    system attendant
  55. In Exchange System Manager, which container holds configuration objects such as Queues,Mailbox stores and Public Folder stores and protocols information?
  56. which type of list uses pointers to connect each element together?
  57. a set of data elements (values) organized useing a model of horizontal rows and vertical columns whos data is calculated in response to a query is called a ?
  58. what is the most common type of operation in SQL?
  59. what type of SQL statement would you use to make the changes you were working on permenant?
  60. which is the m ost commonly used SQL data statement?
  61. which SQL server feature tracks changes and is used to ensure data integrity?
  62. which unix capability can execute numerous programs at the same time?
  63. which unix ability can run on different types of hardware with a few relatively minor changes?
  64. which unix operating sytem component interacts directly with the sytem hardware?
  65. which unix component provides a logical way to organize, store, retrieve, manipulate, and manage data?
    file system
  66. which unix shell is the most compact and is often used for writing shell scripts?
    bourne shell
  67. normally, when you create a file with a text editor, the file is set up with ?
    read and write for you and read only for others
  68. to change permissions on a shell script, you use the unix command?
  69. the simplest place to put your function definitions is in your?
  70. what do you type to quit a unix shell?
  71. how many characters do most unix system admins and users tend to use for filenames?
  72. unix disks are divided into logical sections called?
  73. the /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
  74. what does the 0 following the c in the device name c0t6d0s7 represent?
  75. what does the 7 in the device name c0t6d0s7 represent?
  76. what is the basic unit for storing and manipulating a collection of logically related information known as dtat?
  77. hard links are created using which unix command?
  78. which unix mechanism enables programs to communicate with one another through the file sytem?
    named pipes
  79. which unix mechanism provides for communication with system device drivers through the file system one character at a time?
    character devices
  80. which unix command displays the current working directory?
  81. which unix command allows you to move to different directories within a file system using absolute or relative pathnames?
  82. which unix command takes any characters from standard input and then echoes them to standard output?
  83. which unix command deletes files from within a directory?
  84. which unix command looks at an individual file and finds a specified pattern (string)?
  85. which unix cmd changes the grp ownership of one or more files?
  86. which unix cmd changes the ownership of one or more files to a new owner?
  87. which unix cmd sets access and modification times for each file to the current time?
  88. how many primary grps can a user be a member of?
  89. which unix vi mode allows users to execute set cmds?
  90. which unix vi character represents the end of the file?
  91. while using unix vi to edit a file, what would you enter to save the buffer contents and stay in the same file?
  92. in unix, which pakcage of programs lets a terminal handle many sessions at once?
    unix windows system
  93. what is the most common unix windows system?
    x windows
  94. which unix default cmd starts the x window system?
  95. the act of choosing the window you type is called setting the ?
    input focus
  96. what action puts unneeded windows out of the way without quitting the program inside them?
  97. which unix cmd from the menu bar moves a window to the bottom of the stack of windows?
  98. the key to sutting down an xterm window is to know which of your programs is the?
    controlling program
  99. the first step to quiting and xterm session is to?
    quit all non-controlling programs
  100. which unix cmd does the system admin need to use to create the manual atabase prior to users being able to acces the man -k cmd?
Card Set
CDC's URE's 2
volume 2