CNG120 A+ Certification

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Device drivers that prevent Windows from loading oftem produce the infamous ___________________

BSoD (Blue Screen of Death)

Device drivers that prevent Windows from loading often produce the infamous_____________________

Blue Screen of Death (BSoD)

The system file checker helps ensure that critical____________are not modified

DLLs

The system file checker helps you ensure that critical ________________are not modified.

DLLs

________________or mini-USB connectors are standard on most Android and Windows devices

Micro

The________________applet uses the Windows Experience Index to provide a relative feel for how your computer stacks up against other systems.

Performance Information and Tools

The___________applet uses the Windows Experience Index to provide a relative feel for how your computer stacks up against other systems.

Performance Information and Tools

CDMA devices may receive______________updates, which modify a host of complex device settings.

Product release instructions (PRI)

From the Windows Advanced Startup Options menu, if you decide that you just want to log into Windows, without rebooting, choose the _________________option.

Start Windows Normally

From the Windows Advanced Startup Options menu, if you decide that you just want to log into Windows, without rebooting, choose the ____________option

Start Windows Normally

The _____________utility serves as a one-stop, do it all option.

Startup Repair

_____________includes an impressive, powerful set of both automated and manual utilities that collectively diagnoses and fixes all but the most serious of Windows boot problems.

WinRE

Two critical boot files risk corruption in Windows, bootmgr and bcd, both of which you can fix with one tool called________________

Windows Recovery Environment

What is the default number of days for Windows to back up the registry? a. 5 b. 10 c. 20 d. 30

b. 10

What is the default Pass Count with Windows Memory Diagnostic Tool? a. 1 b. 2 c. 3 d. 4

b. 2

When do Windows XP boot failures occur in the startup process? a. After the Windows login screen appears b. Between the time POST ends and the Loading Windows screen begins c. Before POST starts and the Loading Windows screen begins d. After the GUI starts and before POST starts

b. Between the time POST ends and the Loading Windows screen begins

What service automatically assigns IP addresses? a. DNS b. DHCP c. HTTP d. TCP/IP

b. DHCP

An application particularly relies on which type of files? a. EXE b. DLL c. NFO d. CTD

b. DLL

A mobile device overheats for seemingly no reason. What is the most likely cause? a. HD video recording b. Defective battery c. Low battery d. Auto-dimming screen

b. Defective battery

What does Ubuntu Linux use for backing up files, folders, and drives? a. Ubuntu BackIn b. Deja Dup c. Linux Restore d. Save images

b. Deja Dup

Which automatic startup option should you choose when you require a default VGA driver to troubleshoot a video problem? a. Last Known Good Configuration b. Enable Low Resolution Mode c. Safe Mode d. Safe Mode with Command Prompt

b. Enable Low Resolution Mode

A(n)______________________number can be used to unlock a phone. a. IMEI b. IMSI c. ICCID d. SSID

b. IMSI

Which connector connects your telephone to the telephone jack in the wall of your house? a. RJ-45 b. RJ-11 c. RG-58 d. AWG 22-26

b. RJ-11

Which option nukes your system-all apps, programs, user files, user settings-and presents a fresh installation of Windows? a. Refresh your PC b. Reset your PC c. Restart your PC d. Repair your PC

b. Reset your PC

Which tool can you use to temporarily prevent programs from autoloading? a. System Configuration b. Task Manager c. Performance Monitor d. Event Viewer

b. Task Manager

Which hypervisor runs in Windows, Mac OS X, and Linux hosts? a. KVM b. VMware Fusion c. Hyper-V d. VirtualBox

b. VMware Fusion

A LAN is almost always a ______________________ a. homegroup b. broadcast domain c. workgroup d. bridge

b. broadcast domain

The first task of disk cleanup is to____________________ a. remove all uneeded files b. calculate the space to be freed up c. display the disk cleanup dialog d. check the disk-controller status

b. calculate the space to be freed up

If you are using an administrator account during a software installation and you get prompted by the UAC, you should______________ a. immediately stop the installation b. click continue and finish the installation c. restart the installation d. change to a user account

b. click continue and finish the installation

PGP and S/MIME are examples of ____________________ a. SMS notifications b. encryption standards c. system procedures d. email servers

b. encryption standards

How many binary characters are represented by one hexadecimal character? a. two b. four c. eight d. ten

b. four

Which device makes all computers share a given bandwidth? a. switch b. hub c. router d. DNS server

b. hub

The IPv6 address FE80::12C7:388B:CF:7114 represents what type of address? a. static b. link-local c. global d. temporary

b. link-local

What important benefit of virtualization provides significant cost savings in utility usage? a. hardware expansion b. power savings c. network security d. system security

b. power savings

Consolidating a system's physical and time resources is known as___________________ a. machine managing b. resource pooling c. emulating d. snapshotting

b. resource pooling

What is used to make a patch cable? a. solid cables b. stranded cables c. loose cables d. half-duplex cables

b. stranded cables

What is the Linux/Mac OS equivalent of tracert? a. ipconfig b. traceroute c. tracert d. telnet

b. traceroute

What is another name for a bare-metal hypervisor? a. virtual machine manager b. type-1 hypervisor c. platform d. type-2 hypervisor

b. type-1 hypervisor

Two critical boot files risk corruption in Windows bootmgr and bcd, both of which you can fix with one tool called________________

bcdedit

Your system won't boot, and you suspect that the boot.ini file is corrupt. To fix this problem, you enter _______________ from the Recovery Console.

bootcfg/rebuild

Your system won't boot, and you suspect that the boot.ini file is corrupt. To fix this problem, you enter_______________from the Recovery Console.

bootcfg/rebuild

In Android, the Application Manager will let you ________an app, also killing its background processes.

force stop

The term ___________________refers to mobile operating systems tracking and in many cases recording your location for an extended amount of time.

geotracking

A hypervisor can emulate certain physical______________such as network interface cards

hardware

Full virtualization requires an extra layer of sophisticated programming called a(n) _________________to manage vastly more complex interactions

hypervisor

The ____________________address is 48 bits long, providing more than 281 trillion MAC addresses.

physical/MAC

A(n)_____________gesture is used to zoom in or out on a mobile device

pinching

PaaS stands for_________

platform as a service

A virtualized machine can be seen as a complete system consisting of physical machine (hardware), a hypervisor, and one or more virtual machines, each with its own set of virtual hardware, a supervisor (operating system) and ________________

processes

The ______________Recovery Console command is used to remove a directory.

rd

When a mobile device connects to different carriers' networks, we say it is_________________

roaming

The bootrec______________command Looks for Windows installations not currently in the BCD store and gives you the choice to add them to the BCD store.

scanos

Network technologies that use laser light use _______________fiber optic cabling

single mode

Originally, DNS names all ended with one of seven domain name qualifiers, called______________________

top level domain

___________________perform chores that previously required multiple physical boxes.

virtual machines

Under the class system, a Class B network supported up to ____________host IDs.

65,534

The_______________is a priority-ordered list of the other carrier networks and frequencies it should search for when it cannot locate its home carrier's network? a. Preferred Release List (PRL) b. Product Roaming Instruction (PRI) c. Preferred Roaming List (PRL) d. Product Release Instruction (PRI)

C. Preferred Roaming List (PRL)

A(n)_____________removes the need for an operating system on the VM-supporting machine

ESXi

Most portable devices use a special__________________key that enables some keys to perform an extra duty.

Function (FN)

The best way to recover from a bad Registry load is to use the _______________________boot option

Last Known Good Configuration

_________________are snapshots of a system at a given point of time.

Restore Points

Modern mobile devices use what type of battery? a. Li-Ion b. Ni-CD c. Ni-Ion d. Ni-MH

a. Li-Ion

What are the two critical boot files that risk corruption in Windows? a. bootmgr and bcd b. bootmgr and boot.ini c. bcd and mbr d. boot.ini and fixboot

a. bootmgr and bcd

In Windows, System Restore is turned on____________________ a. by default b. only manually by the user c. permanently d. when the system crashed

a. by default

What is another term for a snapshot? a. Checkpoint b. backup c. rollback d. file

a. checkpoint

Which Recovery Console command lists the contents of the selected directory on the partition? a. dir b. del c. disable d. diskpart

a. dir

A physical system that runs specialized virtualization software is called a(n)____________________ a. host b. hypervisor c. guest d. operating system

a. host

The term "bare-metal" virtualization software refers to_______________ a. hypervisors b. cloud computing c. virtual switches d. hardware consolidation

a. hypervisors

The purpose of Windows Update is to allow users to easily_____________ a. install important or recommended updates b. update drivers c. update virus signatures d.download viruses

a. install important or recommended updates

Most mobile devices have a few ___________stickers that change color when exposed to water. a. liquid contact indicator b. water contact c. damage d. IMEI

a. liquid contact indicator

Which Recovery Console command displays the current drive letter mappings? a. map b. md c. more d. systemroot

a. map

The back-up-files option in Windows Vista enables you to back up________________ a. only personal information for all users b. only installed applications c. personal user information and installed information d. windows itself

a. only personal information for all users

What command verifies communication with a remote system by sending packets to it and receiving them back? a. ping b. tracert c. ipconfig d. net

a. ping

Removing OS restrictions on an Android device is known as_______________ a. rooting b. device spoofing c. unlocking d. jailbreaking

a. rooting

What device connects a LAN's switch to the next network? a. router b. transceiver c. MAUS d. gateway

a. router

Actions and schedules that start a program are called______in Task Scheduler. a. triggers b. actions c. conditions d. criteria

a. triggers

Windows task scheduler divides tasked into actions, conditions, and_________________ a. schedules b. triggers c. executables d. switches

a. triggers

Mobile devices connect to the outside world through the cellular networks or through various___________________Wi-Fi standards. a. 802.10 b. 802.11 c. 803.10 d. 803.11

b. 802.11

What hexadecimal value is represented by the binary value 1101? a. B b. C c. D d. E

c. D

Hyper-V is a part of which distribution? a. Mac OS b. Windows 7 c. Windows 8 Pro d. Linux

c. Windows 8 Pro

Time machine in Mac OS X creates a full system backups that are known as___________________ a. restore points b. images c. local snapshots d. system copies

c. local snaopshots

________________virtualization involves running a virtual machine on your local system regardless of whether the virtual machine file is stored locally or on a central server

client-side

Large groups of networked, virtualized servers providing simper interfaces to a vast array of computing resources are refereed to as ____________________

cloud computing

How many host nodes are supported on a single class C network? a. 65 b. 192 c. 129 d. 254

d. 254

What service translates easily remembered names such as google.com to IP addresses? a. DHCP b. TCP/IP c. HTTP d. DNS

d. DNS

What special type of "suspend" occurs when critical configuration information is written to the hard drive? a. Enabled b. Standby c. Soft Power d. Hibernation

d. Hibernation

What is a popular VMM in the Linux world? a. Hyper-V b. Parallels c. Fusion d. KVM

d. KVM

What is the Linux version of a Windows stop error. a. BSoD b. OS error c. Red alert d. Kernel panic

d. Kernel panic

Which term refers to a collection of configuration and security settings that an administrator has created? a. System group b. BYOD c. eXtensible markup d. Profile

d. Profile

What is the easiest fix for a missing DLL error? a. Use Task Manager to close the program b. Refresh the PC c. Restart the PC d. Reinstall the program

d. Reinstall the program

Which mode is identical to Safe mode but provides network support as well? a. Enable Boot Logging b. Safe Mode c. Safe Mode with Command Prompt d. Safe Mode with Networking

d. Safe Mode with Networking

What is the name of Apple's virtual assistant? a. Apple Now b. Google Now c. Siri d. Cortana

d. Siri

One of the features of power management enables the CPU to slow down or stop its clock without erasing register information. What is these options collectively called? a. Energy Management Mode b. Power Management Mode c. Resource Management Mode d. System Management Mode

d. System Management Mode

Which tool enables you to see all applications or programs currently running or to close an application that has stopped working? a. System Monitor b. Event Viewer c. System Configuration d. Task Manager

d. Task Manager

What is generally replacing portable-specific expansion slots? a. FireWire b. IEEE 1284 c. PS/2 d. USB

d. USB

What company makes ESXi? a. Microsoft b. Red Hat c. Oracle d. VMware

d. VMware

Which tool requires an underlying operating system in order to create and manage virtual machines? a. ESXi b. DropBox c. SaaS d. VMware Workstation

d. VMware workstation

Cloud providers often charge their customers based on various types of usage rather than with a fixed fee. This practice is known as _______________

measured service

The___________Recovery Console command displays the contents of a text file.

more

The____________Recovery Console command displays the contents of a text file.

more

The_____________Recovery Console command is used to remove a directory.

rd

The bootrec__________________command Looks for Windows installations not currently in the BCD store and gives you the choice to add them to the BCD store

rebuildmbr

All of the mobile operating systems provide at least one way to close running applications--the most common is to swipe the app in a particular direction from the device's list of ________________

recent apps

ACPI S3 is known as___________or standby mode

sleep

__________________enable you to make a point-in-time exact copy of virtual machine that can be used in case of an emergency restore.

snapshot

A(n) ________________is the part of an operating system that handles low-level interaction between hardware and software.

supervisor

Most modern Ethernet networks employ one of three speeds: 10BaseT, 100BaseT, or __________________?

1000BaseT

____________________mode is simply a switch (either an actual hardware switch located on the mobile device or a software switch that can be located in the device's configuration settings) that turns off all cellular and wireless services, including Bluetooth.

Airplane

Android-based devices assume you will have a(n)_____________account as your primary account.

Gmail

The______________command lists a computer's network connection settings.

IPconfig

To keep files and data up-to-date, smartphones and tablets can synchronize, or synchronize, with local machines or with cloud-based servers over the ___________________

Internet

The best way to recover from a bad Registry load is to use the ______________________boot option.

Last Known Good Configuration

To uninstall or run many programs in Windows with administrative privileges, you can right-click the program and select__________________

Run as Administrator

To uninstall or run many programs in Windows with administrative privileges, you can right-click the program and select____________________

Run as administrator

__________________consists of twisted pairs of wires surrounded by shielding to protect them from EMI, or electromagnetic interference.

STP

In Windows, you should select ________________in the System Recovery Options to restore Windows to a time when your computer worked properly.

System Restore

IBM's _________________device is a joystick the size of a pencil eraser, situation in the center of the keyboard.

TrackPoint

___________________cabling is the specified cabling for 10/100/1000BaseT and is the predominant cabling system used today.

UTP

___________________is an example of virtualization software for the Mac platform

Virtual Box

What is required to use a domain on a network of Windows computers? a. A computer running a version of Windows Server b. At least two routers c. A password management system d. a domain name server

a. A computer running a version of Windows Server

What is the successor to APM and specifies global and sleeping power states? a. ACPI b. SMM c. Energy Star d. Li-Ion

a. ACPI

Many virtual machine managers replace the CRTL-ALT-DELETE key sequence with______________________ a. CTRL-ALT-INSERT b. CTRL-ALT-ESC c. CTRL-ALT-FN d. ALT-F4

a. CTRL-ALT-INSERT

What is the name of Google's Linux-based computer? a. Chromebook b. Googlebook c. Google Computer d. Liunxbook

a. Chromebook

What is virtualization product that works on Mac operating systems? a. Virtual PC b. Parallels Desktop c. KVM d. Hyper-V

a. ESX

What does the abbreviation IaaS stand for? a. Infrastructure as a service b. Inspection and analysis system c. Input and actuate service d. inspect, analyze, aggregate, select

a. Infrastructure as a service

Why is a hard reset the most disruptive reset option? a. It removes all of a user's data settings b. It causes battery to drain c. It closes applications d. It frees up more internal space

a. It removes all of a user's data and settings

In the IPv6 address 2001::3210:800:200C:CF:1234, how many groups of four zeros does the "::" notation represent? a. 2 b. 4 c. 8 d. 1

a. 2

Under the class system, what was the default subnet mask for Class A addresses? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

a. 255.0.0.0

Generally, mobile devices have two types of radios: a. 802.11 and Bluetooth b. Satellite and Bluetooth c. 802.11 and Satellite d. 802.A and 803.B

a. 802.11 and Bluetooth

You connect a workstation to the wall outlet with a __________________ a. repeater b. hub c. patch cable d. router

c. patch cable

Which automatic startup option should you choose when Windows' startup fails immediately after installing a new driver but before you have logged on again? a. Last Known Good Configuration b. Enable VGA Mode (XP)/Enable Low-Resolution Mode c. Safe Mode with Networking d. Safe Mode with Command Prompt

a. Last Known Good Configuration

Which batteries cannot be used as replacement batteries in other systems? a. Li-Ion b. Ni-Cd c. Ni-MH d. Ni-Ion

a. Li-Ion

Which operating system, when added as a virtual machine, requires a separate, licensed copy? a. Microsoft Windows b. Ubuntu Linux c. FreeDOS d. OpenBSD

a. Microsoft Windows

Which connector is typically used in Ethernet? a. RJ-45 b. RJ-11 c. RG-58 d. AWG 22-26

a. RJ-45

What type of battery will often go unnoticed and the symptoms it creates may be hard to identify? a. Swollen b. Hot c. Dead d. Cool

a. Swallon

Which tool enables you to check and replace a number of critical file, including the important DLL cache? a. System File Checker b. System Configuration utility c. Recovery Console d. Windows Recovery Environment

a. System file checker

What feature enables you to copy a file that is in use? a. Volume Shadow Copy Service b. System Restore c. Recovery console d. Windows Recovery Environment

a. Volume Shadow Copy Serivce

To clean up the registry in Windows, you should________________ a. acquire the right third-party tool b. run registry cleanup c. configure windows update d. restart your computer

a. acquire the right third-party tool

What is the name of the back-up tool in WIndows Vista? a. backup and restore center b. complete computer backup c. backup user d. restore and backup computer

a. backup and restore center

A good patch cable should include a ______________________ a. boot b. clip c. buckle d. clasp

a. boot

What tool works in the background to stop viruses and other malware from taking over programs loaded in system memory? a. data execution prevention b. task manager c. system monitor d. performance console

a. data execution prevention

What tool identifies files that can be deleted to gain more hard drive space? a. disk cleanup b. disk restore c. disk defragmenter d. system restore

a. disk cleanup

What is the most accurate way to get a device's location? a. dropped connection b. high transfer speeds c. apps freezing d. constant reboots

a. dropped connection

The____________________________feature enables smartphones to receive broadcasts from national emergency broadcast systems, such as the Emergency Alert System (EAS) in the United States. a. emergency notification b. airplane mode c. geotracking d. virtual assistant

a. emergency notification

System protection falls under the category of ____________software? a. file recovery b. system recovery c. restore point d. backup

a. file recovery

What are most limiting factors in a host's ability to run virtual machines? a. hard disk space and RAM b. network bandwidth and driver c. CPU and RAM d. hard disk space and router

a. hard disk space and RAM

What command would you use to map a share to a drive letter on a computer? a. net use b. net view c. net unc d. net share

a. net use

The 10BaseT and 100BaseT standards require _____________________ pairs of wires. a. two b. three c. four d. five

a. two

If Windows 8 does not automatically detect a newly added device, to get the device recognized and the drivers installed, you should a. use the add-a-device option in the devices and printers applet b. run the update driver c. use the add hardware wizard in the add hardware applet d. restart the computer

a. use the Add-a-device option in the devices and printers applet

Your system can automatically contact Microsoft's Web sites and download critical updates through______________ a. Windows Update b. control panel c. service pack d. driver release

a. windows update

There are close to ________________different Ethernet fiber optic cabling standards. a. 20 b. 50 c. 100 d. 250

c. 100

POP3 uses TCP port__________________ a. 25 b. 55 c. 110 d. 143

c. 110

IPv4 addresses in the range 169.254.0.1 to 169.254.255.254 represent which feature? a. Domain Name Service b. Dynamic Host Control Protocol c. Automatic Private IP addressing (APIA) d. Hyper Text Transfer Protocol

c. Automatic Private IP addressing (APIA)

A Windows stop error is better known as the_______________________ a. Windows Recovery Screen b. Windows Panic Screen c. Blue Screen of Death d. Black Screen of Death

c. Blue Screen of Death

What tool in the Windows operating system is used to monitor various log files? a. Device Manager b. Drivers c. Event Viewer d. System Restore

c. Event Viewer

What key is pressed during boot-up to boot directly into Safe Mode? a. F1 b. F3 c. F5 d. F8

c. F5

Which wearable device is essentially a compact Windows 10 computer with sensors, 3-D display, great sound, and an optimized user interface, all in a single set of glasses? a. Apple watch b. FitBit Surge c. HoloLens d. Google Glass

c. HoloLens

What identifies a machine on a network? a. default gateway b. DNS c. IP address d. subnet mask

c. IP address

What key might be turned on if you're getting numbers when you're expecting to get letters? a. Caps Lock b. Keyboard Switch c. Numlck d. Function

c. Numlock

What must be enables for the Volume Shadow Copy Service (VSS) to function? a. Automatic Restore Points b. Recovery Console c. System Protection d. Windows Recovery Environment

c. System Protection

What is the connectionless, unreliable data transfer protocol within the TCP/IP suite? a. TCP b. HTTP c. UDP d. HTML

c. UDP

What cable type do Ethernet networks typically use? a. Unlocked twisted pair (UTP) b. Solid twisted paid (STP) c. Unshielded twisted pair (UTP) d. Shielded twisted pair (STP)

c. Unshielded twisted pair (UTP)

Which company was one of the earliest to make hypervisors, and arguably the one that put PC virtualization on the map? a. Solaris b. Microsoft c. VMware d. Amazon

c. VMware

The action center is found in which version of Windows? a. Windows XP b. Windows Vista c. Windows 7/8/8.1 d. Windows Server 2008

c. Windows 7/8/8.1

If you insert a software disc, which file does WIndwos look for automatically? a. startup.inf b. setup.exe c. autorun.inf d. bootmgr

c. autorun.inf

VMware's ESXi is an example of a(n)_________________________ a. operating system b. virtual machine c. bare-metal hypervisor d. sandbox

c. bare-metal hypervisor

Which command rebuilds the boot sector for the active system partition? a. bootrec/fixmbr b. bootrec/scanos c. bootrec/fixboot d. bootrec/rebuildmbr

c. bootrec/fixboot

What does the System Restore tool add automatically to a restore point? a. encryption b. password c. date and time d. file name

c. date and time

The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and _______________________ a. install b. enable c. disable d. driver status

c. disable

What is the single biggest problem uninstalling software? a. Trying to uninstall without administrator privileges b. Disable display scaling on high DPI settings c. Disable desktop composition d. Disable Aero desktop

c. disable desktop composition

1000BaseT needs all ______________pairs of wires in CAT 5e and higher cables? a. two b. three c. four d. five

c. four

Which VMware product is used on Mac Systems? a. ESX b. Virtual PC c. Fusion d. KVM

c. fusion

What should be entered at a commpand prompt to view all of a user's TCP/IP settings? a. ipconfig/renew b. ipconfig c. ipconfig/all d. ipconfig/release

c. ipconfig/all

Network technologies that use _________light use single-mode fiber optic cabling. a. blue b. fluorescent c. laser d. incandescent

c. laser

A workgroup shares folders over the network. What does a Homegroup share? a. passwords b. users c. libraries d. files

c. libraries

Which of the following are true of a restore process in Windows? a. the system reverts to factory status b. some data may be lost c. only settings and programs are changed d. an OS update is carried out

c. only settings and programs are changed

Which types of updates must be installed manually in Windows? a. important b. recommended c. optional d. special

c. optional

Inactive virtual machines are stored as____________

files

Virtualization occurs when a___________________running specialized software creates environments within unique single files that _____________other computers. a. single computer; manages b. database; manages c. single computer; replicates d. database; replicates

c. single computer; replicates

A point-in-time backup of a virtual machine is called a______________ a. full backup b. differential backup c. snapshot d. system status

c. snapshot

What device typically connects broadcast domains? a. domain controller b. DNS server c. switch d. router

c. switch

What is one important reason to implement virtualization? a. Online access b. resource duplication c. system management d. hardware installation

c. system management

Typically, how long are patch cables? a. one to two feet b. two to three feet c. two to five feet d. four to six feet

c. two to five feet

What term refers to a laptop that features a massive screen, a fullsized keyboard, an optical drive (or maybe two), and plenty of hard drives? a. Netbook b. Chromebook c. Notebook d. Desktop Replacement

d. Desktop Replacement

What key is pressed during boot-up to access the Advanced Startup Options menu? a. F1 b. F3 c. F5 d. F8

d. F8

Which operating system(s) can you install Windows XP mode into? a. Windows 7 Home or Pro b. Windows Vista Ultimate only c. Windows XP Professional 64-bit only d. Windows 7 Pro, Ultimate, or Enterprise

d. Windows 7 Pro, Ultimate, or Enterprise

What term refers a large number of networked, virtualized servers combined with a powerful front end? a. search engine b. virtual machine c. operating system d. cloud computing

d. cloud computing

The purpose of the Virtual memory option in the Advanced tab on the Performance Options dialog box in Windows is to_______________________ a. modify the size and location of the page file b. enable monitoring of virtual memory c. make more hard disk space available d. create or delete paging files

d. create or delete paging files

The tabs on the Performance Options dialog box in Windows are Visual Effects, Advanced, and ____________________ a. normal b. data execution prevention c. non-visual effects d. on/off

d. data execution prevention

Which of these tools is considered a web application? a. microsoft word b. linux c. virtualbox d.dropbox

d. dropbox

Software or hardware that converts the commands to and from the host machine into an entirely different platform is known as a(n)_______________________ a. hypervisor b. virtual machine manager c. supervisor d. emulator

d. emulator

What is another term for a virtual machine? a. host b. guest c. emulator d. environment

d. environment

Data is moved from one PC to another in discrete chunks called_____________ a. messages b. bursts c. segments d. frames

d. frames

Which command provides a detailed query about drives and volumes? a. reset b. initiate c. bootrec d. fsinfo

d. fsinfo

The system information tool in Windows can be used to _______________ a. search for information on future updates b. send information about system errors c. store information about relevant internet resources d. gather information about remote computers

d. gather information about remote computers

The stereotypical e-reader uses a low-power______________screen technology called e-paper a. OLED b. virtual c. digitized d. grayscale

d. grayscale

Intel's VT-x and AMD's AMD-V are examples of ______________________ a. virtual network interfaces b. virtual machine manager c. floating point hardware d. hardware virtualization support

d. hardware virtualization support

Users rely on________________to conveniently find things near them, such as stores and restaurants, or to determine when your Uber driver will show up. a. single sign-on b. digitizers c. airplane mode d. location services

d. location services

What type of cabling is rarely seen in networking implementations? a. CAT 6 b. CAT 5 c. Unshielded twisted pair d. Shielded twisted pair

d. shielded twisted pair

Virtual environments are stored as ______________________ a. a set of links b. processes in RAM c. a set of files d. snapshots

d. snapshots

System Restore in Windows uses _____________ to save information on restore points a. an optical disk b. a special internal drive c. an external USB drive d. some of your hard drive

d. some of your hard drive

Which component emits a sound when it receives an electrical signal along the wire at a certain frequency? a. tone generator b. time-domain reflectometer c. multimeter d. tone probe

d. tone probe

Event viewer, performance monitor and command prompt are found in which tab of the system configuration tab? a. startup b. boot c. services d. tools

d. tools

Removing OS restrictions on an Apple device is known as_________________ a. rooting b. jailbreaking c. device spoofing d. tower spoofing

d. tower spoofing

Setting up equipment to spoof a carrier's tower and infrastructure is known as ____________________ a. network ghosting b. cell tower control c. network analysis d. tower spoofing

d. tower spoofing

The options in the advanced tab on the Performance Options dialog box in WIndows are Processor and ______________ a. disk cache b. RAM c. USB d. virtual memory

d. virtual memory

Exceeding the ____________limits that your carrier sets can also lead to slow data speeds

data usage

To recharge mobile devices, ______________ either plug into a wall outlet and the mobile device, or plug into a computer and the mobile device

device chargers

The Control Panel box for setting printer sharing is called ____________________in Windows 7 and later

devices & printers

With virtualization, you can place multiple virtual servers on a single physical system, substantially reducing the use of _________________.

electrical power

A(n) ____________is software or hardware that converts the commands to and from the host machine into an entirely different platform

emulator


Kaugnay na mga set ng pag-aaral

Series 7 - All Questions (no letter for correct)

View Set

U.S. Naval Sea Cadet Corps~~BMR Training study guide

View Set

Final exam Records and Info management

View Set

US History Fall Semester Final Review

View Set

The Coca-Cola Letters & A Modest Proposal Satire Examples

View Set