Core 1 videos

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

IMEI

International Mobile Equipment Identity

IMEI

International Mobile Equipment Identity. Is uniquely assigned to the device itself.

IMSI

International Mobile Subscriber Identity. is uniquely assigned to the user.

D-subminiature Serial Connectors

Introduced in 1952. D-shaped electrical connector. Typically used for RS-232 serial communications. Contains two or more rows of pins or sockets

How is USB 3.0 different from USB 2.0 and 1.1

5 gigabits per sec and is 3 meters in length

Cellular networks support what in GSM networks?

3G, 4G, and 5G

Batch files are used to simplify and automate tasks. Which of the following extension is used to create a batch file? .vbs .js .bat .ps1 .py

.bat

Low Speed USB 1.1 can handle what

1.5 megabits per sec and is 3 meter in length

How is USB 3.2 different from other USBs

10 Gbps or 20 Gbps and uses USB-C

High speed USB 1.1 can handle what

12 megabites per set and is 5 meters in length

DD-50 Connector

17-16-17 pin layout. Fast-SCSI equipment

how are UBS-C connectors different from others

24 pins, double-sided, uses host and device, can't be plugged in upside down, Does not necessarily indicates USB 3.1 or 3.2

Lightning connector adapters attributes

30-pin. USB. HDMI. VGA. SD cards

DA-15 connector

8-7 pin layout and the key users for this type of connector are for gaming controllers

Which of the following can be enabled when the user signs in? It helps administrators with automating tasks, connecting shares and other useful processes. A. Logon Script B. Task Scheduler C. Task Manager D. BIOS

A

Which part of the Active Directory structure houses all the users, computers, and other objects in the active directory controlled by the administrator? A. Domain B. Forest C. Organizational Unit D. Tree

A

Which of the following methods are used by organizations to allow the use of mobile phones? A. Corporate-Owned, Personally Enabled B. Choose Your Own Device C. Corporate-Owned, Personal Use D. -Owned, Business Only E. Bring Your Own Device

A, B, D, and E

What is the reason for encrypting a mobile device's hard drive? [Choose all that apply] A. Prevent unauthorized access to the data on the device B. Prevent the device's hard drive from being accessed when lost or stolen C. the device from being unlocked with a password or PIN D. Prevent the access to the location of the device when lost or stolen

A and B

What is a SIM card

A chip inserted inside a mobile devices. Used to connect mobile devices to GSM networks. Identifies devices on a network

How is USB 2.0 better than USB 1.1

Improved performance and can do 480 megabits per sec. is 5 meters in length

Decide which of these statements about SATA and SAS data storage interfaces are true. (Choose all that are true.) A. The SAS interface is more than three times faster than the SATA interface. B. SAS interfaces are expected to replace SATA interfaces for home use. C. The SATA interface is better suited than the SAS interface for use in servers where many users will be using the data at the same time. : D. Because SATA drives are less expensive, higher-volume drives are more common in small offices.

A, D The SAS interface is too expensive to expect that they would replace SATA interfaces for typical home use. The SAS interface is best suited for use in servers because it is able to handle the load of many users accessing data at the same time.

How to enable Bluetooth

Access setting on a mobile device Apple devices Android devices Enabling Bluetooth on a laptop. Allow Bluetooth devices to find computer.

As an IT technician, you arrive at a customer's home office to troubleshoot problems they are experiencing with their printer. While questioning the customer to get an understanding of their network, you find they have a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, tablets, and the network printer. They also have several smart home devices, including security cameras, light switches, door locks, and a thermostat supported by an IoT controller hub. To work on the printer, which type of network will you be interacting with? A. WAN B. LAN C.WMN D. PAN

B A LAN can have a variety of several devices, but it is always limited to a single router that creates the boundary for the network. A single router indicates a LAN.

Which statements are false about the GPT partitioning system? (Choose all that apply.) A. It supports up to 128 partitions. B. It can only be installed on drives that are larger than 2 TB. C. It keeps a backup copy of the GPT table. D. contains the legacy MBR system for backward compatibility.

B and D GPT can support up to 128 partitions and keeps a backup copy of the GPT table. Although it is equipped to handle the situation when BIOS is expecting an MBR system, GPT does not actually support MBR. GPT can be installed on any size hard drive, but it is more expensive than the MBR system.

Which statements are true about TCP and UDP? (Choose all that apply.) A. TCP is generally faster than UPD. B. establishes a session between source and destination before it sends data, and UDP sends data without first establishing a session. C. TCP guarantees delivery and UDP does not. D. UDP is used on the local network but not on the Internet; TCP works on both the local network and the Internet.

B, C TCP is the protocol to use when guaranteed delivery is important—but speed is sacrificed to guarantee that delivery. Data delivery is guaranteed with TCP because a session between source and destination is first established so the source can verify the data was received and resend if necessary. Both UDP and TCP can work on local networks and the Internet.

BIOS is the

Basic input/ output system and is essential for starting the computer once it's powered on.

Which group is necessary to impose permissions and rights onto users? A. Power Users B. Cryptographic Group C. Security Group D. Distribution Group

C.

Preferred Roaming Lists (PRL) Updates

Changes to provider network configuration. Connecting to the right tower. Updating over-the-air

CDMA

Code division Multiple Accuse

DB-25 Connector

Communication ports, Printers, Audio Connections, Broadcast and Video

DE9 (DB-9) Connector

Communications Ports. Token Ring network connectivity. Legacy Computer mouse connector

Mobile Hotspot (Tethering)

Connecting to mobile device. Enables a network connection. Process Connect the laptop using a USB/charging cable Enable hotspot on the mobile device Laptop recognizes phone as a modem

What are some features of lightning cables

Contains 8 pins per side. Cant be inserted upside down

Which mobile security feature ensures that the device will not be vulnerable to attacks? A.Encryption B. Location C. Lock Screen D. Security Update

D

Which one of the following Screen lock options is not secure? A. Pattern B. PIN C. Password D. Swipe

D

Near-Field Communication (NFC)

Data sharing, Short distance. Radio-frequency identification

cipher /w:E:\ What does this command do on a Windows computer?

Deletes data on a NTFS drive

DIMM

Dual in-line memory module

You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory count shows only 4 GB. Which of the following is most likely the source of the problem? What can you do to fix it? A. The new DIMM you installed is faulty. B. Windows is displaying an error because it likely became corrupted while the computer was disassembled. C. The new DIMM is not properly seated. D. The DIMM is installed in the wrong slot. E. The new DIMM is not properly seated.

E Turn off the PC and reseat the DIMM. Check that the DIMM is standing in the slot at the same height of the other installed DIMM.

You need to install a customized console on 10 Windows 10 computers. What is the best way to do that? A. When installing the console on the first computer, write down each step to make it easier to do the same chore on the other nine. B. Make sure all computers are using Windows 10 Pro because Windows Home does not support MMC. Then create a console on each Windows 10 Pro computer. D. Create the console on one computer, and copy the .mmc file to the other nine. E. Create the console on one computer, and copy the .msc file to the other nine.

E You don't want to redo your work at each computer, and a console can easily be copied to another computer. A console has a .msc file extension. Windows 10 Pro and Windows 10 Home both support MMC.

What do GSM Networks allow cellular phones to do

Enable voice calls and transfer data

GPT

GUID Partition Table

GSM Communication is a network of what

Gateways, Repeaters, Relays and all mobile devices comment to cell towers.

GPS

Global Positioning System

GSM

Global system for mobile communication

What is a lightning cables advantages over Micro-USB

Higher power, Better durability, and simpler to connect

.js

Java Script

LAN

Local area network

What does MFi certification stand for?

Made for iPhone/iPod/iPad

MBR

Master boot record

Lightning cables device authentication

Microchip for device authentication. Compatible with approved devices only. Non-apple lightning cables

What does NFC stand for?

Near-Field Communication

Key Features of NFC

No deceive discovery. No pairing. Instant communication if near each other. Secure Data Transfer. Can be used to make tap transactions with cards. Encryption support.

Bring Your Own Device (BYOD)

Organizations might allow you to bring your own device for official use. However, organizations need to ensure that any corporate data on the mobile phone is secure. To safeguard the data, mobile phones must be encrypted.

You do not have a Corporate

Owned, Personal Use method.

PAN

Personal area network

.ps1

Powershell

PRL

Preferred Roaming List Updates

D-subminiature Naming Convention

Prefixed by the letter D. Shell size denoted by letters A, B, C, D, or e. Number of pins or sockets. Suffixed with P for pins or S for sockets

Lightning cable

Proprietary to apple products. Introduced in 2012. Used for power and data

.py

Python

SATA

Serial advanced technology attachment

Bluetooth Pairing

Set to discoverable mode List discoverable devices Nearby devices Select desired device Enter pin code Pair to synchronize devices

Airplane Mode

Standard feature on mobile devices. Turns off wireless antenna including the following services. GSM Wi-Fi Global Positioning System (GPS)

SAS

Statistical Analysis System

MFi certification

Stringent manufacturers' certification. Made for iPhone/iPad/iPod. Guarentes safety standards towards device

SIM

Subscriber Identity Module

SIM

Subscriber identity module

How is USB 3.1 different from other USBs

Superspeed +, 10 Gbps, Type A or USB-C

Corporate-Owned, Personally Enabled (COPE)

The organization provides the mobile device to the user. However, as a user, you are only allowed to install pre-approved apps.

Corporate-Owned, Business Only (COBO)

The organization provides, controls, and manages the devices. The applications and the data belong to the organization.

TCP

Transmission control protocol

What is CDMA Cellular Connectivity

Used to provide multiple devices simultaneous access. This is a form of multiplexing. Each device is assigned a code. Allows numerous signals on a single transmission channel

UDP

User Datagram Protocol

Global Positioning System (GPS)

Uses Radio navigation system. Geolocation satellites. Incoming data. Location and time

.vbs

Visual Basic

Micro-B plug

What is this

Mini-8 Plug

What is this

Standard-A plug

What is this

Standard-B Plug

What is this

USB 3.0 micro-B plug

What is this

USB 3.0 standard-B plug

What is this

WAN

Wide area network

WMN

Wireless Mesh Network Technology

Bluetooth

Wireless data transmission standard. Used for short distances. Wireless Personal Area Network (PAN). Connects different devices. Automatic connection and disconnection

Task Manager is a

tool that allows users to stop processes, get system information, and adjust logon applications and services.

A Domain is

a collection of users, computers, and other items that are controlled by the Active Directory administrators. They are grouped together regardless of their physical position.

Cryptographic Group members

are authorized to perform cryptographic operations.

Power Users

are included for backward compatibility and possess limited administrative powers.

Distribution Groups

are only meant for communication purposes. These are email lists that allow for communication with the users in the active directory. Distribution Groups can't affect policy.

Security groups

are the types of groups that allow administrators to apply rights and permissions, control access to shares, and apply overall controls to the system.

You work for a company that provides the same smartphone model for dozens of its employees. While troubleshooting one smartphone that won't connect to the cellular network, you call the provider's tech support number for some assistance. The technician asks for the device's IMEI. What is she trying to determine? A. The IP address of the phone on the cellular provider's data network B. The OS version on the phone C. The specific device you're calling about D. The SIM card installed in the device

c The IMEI identifies a device. It does not identify the OS version, the SIM card, or the IP address of the phone.

A Tree is a

collection of Domains that have formed a trust relationship with each other.

Organizational Units are a

necessary component of Active Directory's operation. Users, groups, and other group policy objects are stored in Organizational Units.

Task Scheduler is a program

that allows you to create and manage tasks that your computer will perform automatically at the times you specify. Predefined tasks are saved in Task Scheduler Library folders. Alternatively, users can create custom tasks as well.

A key component to using the GSM on your device is

the SIMs card

The Forest is at

the top level in the active directory structure. Forests are separate from one another. They each have their own boundaries for security and have a single database and global address for each.

Logon scripts can be

used for several purposes, such as including the mapping of network drives to users and computers, installing applications, setting up printers, creating log files, and many other tasks. Once the script is written, it will need to be saved in a batch file. The batch file is used to automate a process. When the user signs in, any logon scripts will be executed.

DC-37 Connector

used in aerospace industrial, defense, and healthcare

.bat extension is

used to create a Windows batch file.


Ensembles d'études connexes

Med surg Ch 29 Assessment of Hematologic System, Chapter 32: Assessment of Hematologic Function

View Set

Management & Organization Final Review

View Set

Chapter 9 - Nontaxable Exchanges

View Set

Chapter 2, Strategy and Human Resources Planning

View Set

Carbon Cycle Unit Test (Progress Learning)

View Set