CET 1179 A+ Midterm Exam

Ace your homework & exams now with Quizwiz!

A Windows command switch is expressed by using which character?

/

What character represents the root of a Linux file system?

/

Marketed as and now generally accepted as a true 4G technology, LTE networks feature theoretical speeds of up to ______________ download and 100 Mbps upload?

1 Gbps

How wide are all equipment racks?

19 inches

At what frequency range do the 802.11b- and 802.11g-based wireless technologies operate?

2.4 GHz

Average LCD panels are around _______________, which most monitor authorities consider excellent brightness.

300 nits

How long is a MAC address?

48 bits

A device that goes into a 7-inch space is called a _______________.

4U

At what frequency range does the 802.11a-based wireless technology operate?

5 GHz

Most fiber Ethernet networks use _______________ multimode fiber optic cable.

62.5/125

A Windows stop error is better known as the _______________.

Blue Screen of Death

In Windows, hard drive partitions are usually start with the letter _______________.

C:

What is another term for a snapshot?

Checkpoint

An application particularly relies on which type of files?

DLL

Many computers can share a smaller pool of routable IP addresses with _______________.

DNAT

The Integrated Services Digital Network (ISDN) sends telephone transmissions across what type of lines?

Digital

What is another name for a folder?

Directory

In Compatibility mode which setting turns off automatic resizing of a program's windows?

Disable display scaling on high DPI settings

Digital Equipment, Intel, and Xerox invented the first network in the mid-1970s and created what eventually became _______________.

Ethernet

The part of a filename following the period (.) is called the _______________.

Extension

How many binary characters are represented by one hexadecimal character?

Four

Some projectors use a connection technology called _______________ that enables long-range connectivity for uncompressed HD video and audio over Cat 5a or Cat 6 network cables.

HDBaseT

Every Tier 1 and Tier 2 provider leases connections to the Internet to companies called ______________.

Internet service providers (ISPs)

If you hear a hissing sound coming from the LCD, which component is most likely about to fail?

Inverter

What is a popular VMM in the Linux world?

KVM

What device turns digital data into an analog signal for sending it over the telephone line, and then turns it back into digital data when it reaches the other end of the connection?

Modem

How many physical lines does the Basic Rate Interface (BRI) setup use?

One

What is a virtualization product that works on macOS?

Parallels Desktop

What important benefit of virtualization provides significant cost savings in utility usage?

Power savings

Apart from hardware virtualization support, the second concern is _______________.

RAM

Like any other processor, a graphics processor needs _______________.

RAM

What allows you to give anyone control of your desktop through an e-mail invitation?

Remote Assistance

The term virtual desktop commonly refers to the multiple desktop environments you can access in modern operating systems, such as clicking the _______________ in Windows 10 and going to a second desktop.

Task View icon

After entering IPCONFIG at a command prompt, you notice you are using an IP address in the 169.254.0.1 to 169.254.255.254 address range. What is most likely explanation for being assigned one of these addresses?

The DHCP server is down.

How are MAC addresses represented?

Using 12 hexadecimal characters

What company makes ESXi?

VMware

Hyper-V is a part of which distribution?

Windows 10

The Action Center is found in which version of Windows?

Windows 7/8/8.1

If you insert a software disc or USB drive, which file does Windows look for automatically?

autorun.inf

Virtualization occurs when a ________________ running specialized software creates environments within unique single files that _______________ other computers.

single computer; replicate

A point-in-time backup of a virtual machine is called a _______________.

snapshot

The command-line interface tells a user that it's ready to receive commands by displaying a specific set of characters called a(n) _______________.

prompt

What Linux command displays the current working directory?

pwd

Using Cloud-based features, you can easily expand the number of servers, even spread them out geographically, with just a click of the switch. This ability is called _______________.

rapid elasticity

Tier 1 providers own long-distance, high-speed fiber-optic networks called ______________.

backbones

VMware's ESXi is an example of a(n) _______________.

bare-metal hypervisor

Phone lines have a speed based on a unit called a ______________, which is one cycle per second.

baud

A MAC address is a(n) _______________ number.

binary

A good patch cable should include a _______________.

boot

What are the two critical boot files that risk corruption in Windows?

bootmgr and bcd

A LAN is almost always a _______________.

broadcast domain

A color LCD screen is composed of a large number of tiny liquid crystal molecules, called _______________, arranged in rows and columns between polarizing filters.

sub-pixels

A folder inside another folder is called a(n) _______________.

subfolder

Cloud file storage services, like Dropbox and Box allow people to move to the cloud for some of their storage needs. These services include _______________ with their desktop versions, so that you can easily have the same version of every file in multiple places (desktop, laptop, online).

synchronization apps

Early LCD backlights use _______________ technology, popular for its low power use, even brightness, and long life.

cold cathode fluorescent lamp

A text-based user interface, in which users type in instructions at a prompt, is also known as a _______________ interface.

command-line

The standard copy/move commands can work on only one _______________ at a time.

directory

A(n) _______________ is a network organization that centralizes user accounts, passwords, and access to resources.

domain

In older Windows versions, the filename was restricted to _______________ characters.

eight

Software or hardware that converts the commands to and from the host machine into an entirely different platform is known as a(n) ________________.

emulator

System Protection falls under the category of _______________ software.

file recovery

1000BaseT needs all _______________ pairs of wires in CAT 5e and higher cables.

four

Data is moved from one PC to another in discrete chunks called _______________.

frames

Intel's VT-x and AMD's AMD-V are examples of _______________.

hardware virtualization support

A physical system that runs specialized virtualization software is called a(n) ________________.

host

The _______________ command at the Bash or Terminal shell enables you to terminate running programs in Linux or macOS, just like the tools in Command or PowerShell.

kill

Network technologies that use _______________ light use single-mode fiber optic cabling.

laser

A pixel that is stuck on pure white is known as a(n) _______________ pixel.

lit

A _______________ is the amount of light given off by a light source from a certain angle that is perceived by the human eye.

lumen

What Linux command describes the syntax and options of a specific command?

man

What Linux command is used to create a new directory?

mkdir

Network people call anything that one computer might share with another a _______________.

resource

Consolidating a system's physical and time resources is known as ________________.

resource pooling

On a Linux system it is considered bad manners to create files and folders in the _______________ directory.

root

A file not within a subfolder is said to be in the _______________.

root directory

Higher-end monitors are capable of _______________ color, meaning the monitor can display _______________ color variations per channel.

10-bit, 1024

How do you represent the hexadecimal value A in binary?

1010

All Web browsers use the _______________.

Hypertext Transfer Protocol (HTTP)

What does the abbreviation IaaS stand for?

Infrastructure as a service

A Workgroup shares folders over the network. What does a Homegroup share?

Libraries

All network interfaces cards (NICs) have a(n) _______________ "burned" into them.

MAC address

A common way to access the command-line interface in Windows is through the _______________.

Start Menu

What allows you to make voice calls over a computer network?

VoIP

What feature enables you to copy a file that is in use?

Volume Shadow Copy Service

In the Windows command-line syntax, a directory is referred to by which character(s)?

\

Virtual environments are stored as _______________.

a set of files

The file's _______________ indicates what type of program uses the data by looking at the _______________.

association; extension

One nit is equivalent to _______________.

one candela/m2

The exact location of a file is called its _______________.

path

Every 3-D game stores a number of image files called _______________.

textures

The 10BaseT and 100BaseT standards require _______________ pairs of wires.

two

A true 3-D object is composed of a group of points called _______________.

vertices

RJ-45 is visibly much _______________ than RJ-11.

wider

What Windows command can be used to copy entire directories, including subdirectories?

xcopy

In macOS and Linux, what is the shorthand character that represents a user's home directory?

~


Related study sets

Biology Quiz Question for Test 2

View Set

consumer behavior- exam 3- quiz questions

View Set

Crisis 2 Exam 2 Book Questions BSN3

View Set

EXAM FX (Types of Property Policies)

View Set

Photosynthesis and Respiration Quiz

View Set