ETA-I: Network Computer Technician (NCT)
Define a Southbridge. (Objective 4.1.12)
The southbridge is one of the two chips in the core logic chipset on a personal computer (PC) motherboard, the other being the northbridge. The southbridge typically implements the slower capabilities of the motherboard in a northbridge/southbridge chipset computer architecture. In systems with Intel chipsets, the southbridge is named I/O Controller Hub (ICH), while AMD has named its southbridge Fusion Controller Hub (FCH) since the introduction of its Fusion AMD Accelerated Processing Unit (APU) while moving the functions of the Northbridge onto the CPU die, hence making it similar in function to the Platform hub controller.The southbridge can usually be distinguished from the northbridge by not being directly connected to the CPU. Rather, the northbridge ties the southbridge to the CPU. Through the use of controller integrated channel circuitry, the northbridge can directly link signals from the I/O units to the CPU for data control and access.
Explain the function and importance of required and optional system files. (Objective 1.1.3)
These files are important for the operating system to perform various functions from printing to booting. Removal of files in the registry, system folders, or boot directory can be catastrophic.
Define: Enterprise Private Network (EPN) (Objective 6.1)
These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources.
Define: Metropolitan Area Network (MAN) (Objective 6.1)
These types of networks are larger than LANs but smaller than WANs - and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.).
Define System Image. (Objective 1.1.2)
This is a template containing OS and other software information generally used in corporate network environment installations.
Define Clean Install. (Objective 1.1.2.1)
This is the method of installing a fresh copy of a OS to a new system or overwriting an old system with a new one.
Define: System-Area Network (also known as SAN) (Objective 6.1)
This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called "SANs" as well) and processor-to-processor applications. The computers connected on a SAN operate as a single system at very high speeds.
Describe a TREE topology. (Objective 6.2.8)
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates various star topologies together in a single bus, so it is known as a Star Bus topology. Tree topology is a very common network which is similar to a bus and star topology. Advantages of tree topology 1. Failure of one node never affects the rest of the network. 2. Node expansion is fast and easy. 3. Detection of error is an easy process 4. It is easy to manage and maintain Disadvantages of tree topology 1. It is heavily cabled topology 2. If more nodes are added, then its maintenance is difficult 3. If the hub or concentrator fails, attached nodes are also disabled.
What is the minimum CPU GHz requirement to run Windows 7? (Misc)
1 GHz
How many USB devices can be hooked up on a single daisy chain? (Objective 1.5.7.1)
127 Devices
Describe a CRT monitor. (Objective 7.1.2)
A CRT monitor contains millions of tiny red, green, and blue phosphor dots that glow when struck by an electron beam that travels across the screen to create a visible image. The terms anode and cathode are used in electronics as synonyms for positive and negative terminals. For example, you could refer to the positive terminal of a battery as the anode and the negative terminal as the cathode. In a cathode ray tube, the "cathode" is a heated filament. The heated filament is in a vacuum created inside a glass "tube." The "ray" is a stream of electrons generated by an electron gun that naturally pour off a heated cathode into the vacuum. Electrons are negative. The anode is positive, so it attracts the electrons pouring off the cathode. This screen is coated with phosphor, an organic material that glows when struck by the electron beam.
Describe a backbone node. (Objective 6.3.1)
A backbone or core is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub-networks.[1] A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to it.
Define System Timer. (Objective 4.1.6)
A clock generator is an electronic oscillator (circuit) that produces a clock signal for use in synchronizing a circuit's operation. The signal can range from a simple symmetrical square wave to more complex arrangements. The basic parts that all clock generators share are a resonant circuit and an amplifier.
Describe a HYBRID network topology. (Objective 6.2.5)
A combination of two or more topology is known as hybrid topology. For example a combination of star and mesh topology is known as hybrid topology. Advantages of Hybrid topology 1. We can choose the topology based on the requirement for example, scalability is our concern then we can use star topology instead of bus technology. 2. Scalable as we can further connect other computer networks with the existing networks with different topologies. Disadvantages of Hybrid topology 1. Fault detection is difficult. 2. Installation is difficult. 3. Design is complex so maintenance is high thus expensive.
Explain File Management.(Objective 1.1.1.3)
A file system is organized into directories for efficient or easy navigation and usage. These directories may contain other directories and other files. An Operating System carries out the following file management activities. It keeps track of where information is stored, user access settings and status of every file and more... These facilities are collectively known as the file system.
Describe a gateway node. (Objective 6.3.2)
A gateway is a node (router) in a computer network, a key stopping point for data on its way to or from other networks. Thanks to gateways, we are able to communicate and send data back and forth. The Internet wouldn't be any use to us without gateways (as well as a lot of other hardware and software).
Describe an LCD Monitor. (Objective 7.1.1)
A liquid crystal display (LCD) monitor is a computer monitor or display that uses LCD technology to show clear images, and is found mostly in laptop computers and flat panel monitors. This technology has replaced the traditional cathode ray tube (CRT) monitors, which were the previous standard and once were considered to have better picture quality than early LCD variants. With the introduction of better LCD technology and its continuous improvement, LCD is now the clear leader over CRT, in terms of color and picture quality, not to mention capabilities for large resolutions. Also, LCD monitors may be made much more cheaply than CRT monitors.
FireWire (Objective 1.5.7.2)
A method of transferring information between digital devices, especially audio and video equipment. Also known as IEEE 1394, __________ is fast -- the latest version achieves speeds up to 800 Mbps. At some time in the future, that number is expected to jump to an unbelievable 3.2 Gbps when manufacturers overhaul the current _____________ cables.
Define Real Time Clock. (Objective 4.1.6)
A real-time clock (RTC) is a computer clock (most often in the form of an integrated circuit) that keeps track of the current time.
Explain a Virtual Machine. (Objective 1.1.1.5)
A virtual machine is a computer file, typically called an image, that behaves like an actual computer. In other words, creating a computer within a computer. It runs in a window, much like any other program, giving the end user the same experience on a virtual machine as they would have on the host operating system itself. The virtual machine is sandboxed from the rest of the system, meaning that the software inside a virtual machine can't escape or tamper with the computer itself. This produces an ideal environment for testing other operating systems including beta releases, accessing virus-infected data, creating operating system backups, and running software or applications on operating systems they weren't originally intended for.
Topically, how many type III PC cards can you insert in a laptop? A. 1 B. 2 C. 3 D. 4 E. None of the above
A. 1
On the 16-bit ISA bus, IRQ2 is elevated to which higher level interrupt? A. 9 B. 11 C. 13 D. 15 E. None of the above
A. 9
What is the best ground for a conductive work bench? A. AC outlet B. Ground to bend C. To another device D. Chassis ground E. None of the above
A. AC outlet
Which motherboard form factor uses one 20 pin connector? A. ATX B. AT C. Baby AT D. All of the above E. None of the above
A. ATX
The 34-pin connection on an I/O card is for? A. Floppy drive B. SCSI drive C. IDE drive D. Zip drive E. None of the above
A. Floppy drive
From what location are the 1st computer instructions available on boot up? A. ROM BIOS B. CPU C. boot.ini D. CONFIG.SYS E. None of the above
A. ROM BIOS
_________ help prevent power surges. A. Surge suppressor B. Spike protector C. UPS system D. High-grade multi-meter E. None of the above
A. Surge suppressor
Missing slot covers on a computer can cause? A. over heat B. power surges C. EMI. D. incomplete path for ESD E. None of the above
A. over heat
Define a NPU (Numeric Processing Unit). (Objective 4.1.2)
Alternate term for a co-processor. An additional microprocessor installed in a computer so as to supplement the central processing unit and expedite and facilitate certain mathematical functions (often by being designed to perform exponential arithmetic, expediting the calculation of large numbers). When the CPU encounters an instruction intended for a coprocessor, it sends it to the coprocessor and awaits a signal indicating that the calculation is completed. (If there is no coprocessor installed, an error message may be the result.) Since these coprocessors are designed specifically for certain types of calculations, they require significantly fewer instructions than a general CPU would. Many newer CPUs are now created to perform these functions. Spreadsheets, CAD, and some graphics programs perform significantly better when coprocessors are installed, although a program must be written specifically to take advantage of a coprocessor. These co-processors are sometimes called floating-point co-processors, or floating-point units.
Define I/O Ports. (Objective 4.1.10)
An I/O port is a socket on a computer that a cable is plugged into. The port connects the CPU to a peripheral device via a hardware interface or to the network via a network interface. See port, standards - hardware interfaces, DisplayPort, HDMI and USB.
Describe how an OS provides access to I/O devices. (Objective 1.1.1.2)
An OS manages device communication via their respective drivers. It performs the following activities for device management. Keeps tracks of all devices connected to system. designates a program responsible for every device known as the Input/Output controller. Decides which process gets access to a certain device and for how long. Allocates devices in an effective and efficient way. De-allocates devices when they are no longer required.
Define BIOS. (Objective 4.1.3)
An acronym for Basic Input/Output System and also known as the System BIOS, ROM BIOS or PC BIOS) is firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.
Define Expansion Bus. (Objective 4.1.8)
An expansion bus is a computer bus which moves information between the internal hardware of a computer system (including the CPU and RAM) and peripheral devices. It is a collection of wires and protocols that allows for the expansion of a computer.
What is an illegal operation? (Misc)
An illegal operation, a term often seen in error messages, is a command to the operating system or an instruction to the computer processor that specifies an operation that is unknown to the operating system or processor and that therefore can't be performed. The result is that the operating system or processor usually terminates the program that made the "illegal" request. If that program was an application that you were using, you may find that data you were entering was lost or, in some cases, can be recovered from a backed-up copy that the system made for you.
Define In-Place Upgrade. (Objective 1.1.2.1)
An installation that is written on top of a existing OS that retains the applications, user setting and data files.
Define: Storage-Area Network (SAN) (Objective 6.1)
As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don't rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs.
Define: Passive Optical Local Area Network (POLAN) (Objective 6.1)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of single-mode optical fiber into multiple signals to serve users and devices.
How many devices can be used on a single SCSI bus? Keep in mind that the SCSI host adapter counts as a device. A. 1 B. 8 C. 20 D. 10 E. All of the above
B. 8
What command is used to reset a MODEM when using the "AT Command Set"? A. ATR B. ATZ C. DTR D. DCE E. None of the above
B. ATZ
When installing a SCSI CD-ROM drive, you must set the CD-ROM SCSI adapter to: A. B0007 B. An unused SCSI address C. The same address as the SCSI device before the CD-ROM D. SCSI ID=1 E. None of the above
B. An unused SCSI address
12. ESD would cause the most damage to which component? A. Power supply B. Expansion board C. Monitor D. Keyboard E. None of the above
B. Expansion board
A hard disk is divided into tracks which are further subdivided into: A. Clusters B. Sectors C. Vectors D. Heads E. None of the above
B. Sectors
What should you do before replacing an existing OS installation? (Objective 1.1.2.1)
Back up the data from the existing OS installation.
Define: Virtual Private Network (VPN) (Objective 6.1)
By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network - even if they're not. Through a virtual point-to-point connection, users can access a private network remotely.
With respect to a network interface card, the term 10/100 refers to: A. Protocol Speed B. Fiber Speed C. Megabits per second D. Minimum and maximum server speed E. None of the above
C. Megabits per second
Which peripheral port provides the FASTEST throughput to laser printers? A. RS-232 B. SCSI C. Parallel D. Serial E. None of the above
C. Parallel
What tool is used to test serial and parallel ports? A. high volt probe B. cable scanner C. loop backs (wrap plugs) D. sniffer E. None of the above
C. loop backs (wrap plugs)
Explain the pros and cons of LCD monitors vs CRT monitors. (Objective 7.1.)
CRT Monitor: 1. CRT stands for Cathode Ray Tube. 2. CRT consumes more power. 3. The cost of CRT is less than LCD. 4. CRT is faster than LCD in terms of response. 5. CRT monitors are larger than LCD in terms of physical size. 6. It has not image confinement. 7. CRT's resolution is lower than LCD. 8. It is used only in PCs. LCD Monitor: 1. LCD stands for Liquid Crystal Display. 2. LCD uses less power. 3. LCD costs more than CRT. 4. LCD is slower than CRT in terms of response time. 5. LCD monitors are physically smaller than CRT monitors. 6. LCD has good image confinement. 7. LCD monitors have a higher resolution than CRT monitors. 8. LCD monitors are used in personal computers, laptops, and cellular phones.
Explain the difference between a LCD monitor and a CRT monitor. (Objective 7.1)
CRT stands for Cathode Ray Tube and LCD stands for Liquid Crystal Display area unit the kinds of display devices wherever CRT is employed as standard display devices whereas LCD is more modern technology. These area unit primarily differentiated supported the fabric they're made from and dealing mechanism, however, each area unit alleged to perform identical perform of providing a visible variety of electronic media. Here, the crucial operational distinction is that the CRT integrates the 2 processes lightweight generation and lightweight modulation and it's additionally managed by one set of elements. Conversely, the LCD isolates the 2 processes kind one another that's lightweight generation and modulation.
Define a Type I expansion card. (Misc)
Cards designed to the original specification (PCMCIA 1.0) are type I and have a 16-bit interface. They are 3.3 millimetres (0.13 in) thick and have a dual row of 34 holes (68 in total) along a short edge as a connecting interface. Type-I PC Card devices are typically used for memory devices such as RAM, flash memory, OTP (One-Time Programmable), and SRAM cards.
Which standard govern parallel communications? A. RS232 B. RS-232a C. CAT 5 D. IEEE 1284 E. None of the above
D. IEEE 1284
What could cause a fixed disk error. A. No-CD installed B. bad ram C. slow processor D. Incorrect CMOS settings E. None of the above
D. Incorrect CMOS settings
When installing PCI NICS you can check the IRQ availability by looking at A. Dip switches B. CONFIG.SYS C. Jumper settings D. Motherboard BIOS E. None of the above
D. Motherboard BIOS
Resistance is measured in? A. Volts B. Amps C. Watts D. Ohms E. None of the above
D. Ohms
What is the recommended way to fix the registry description for the printer driver. A. Delete the spool file B. Run regedit.exe and remove any reference to the printers C. Run sysedit.exe and remove any reference to the printers D. Remove the printer driver and re¬install it E. None of the above
D. Remove the printer driver and reinstall it.
8.A wrist grounding strap contains which of the following: A. Surge protector B. Capacitor C. Voltmeter D. Resistor E. None of the above
D. Resistor
What beep codes could indicate a system board or power supply failure? A. steady short beep B. no beep C. one long continuous beep tone D. steady long beeps E. All of the above
E. All of the above
Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC and don't get a beep. What should you check first? A. system board B. RAM C. microprocessor D. power supply E. speaker
E. speaker
What is a characteristic of SCSI drives? (Misc)
Each device on the SCSI bus is assigned a unique SCSI identification number or ID.
Define the FAT32 filesystem. (Objective 1.1.5.2)
FAT32 is a version of the File Allocation Table (FAT) file system that was introduced by Microsoft in 1996 with its Windows 95 OEM Service Releases 2 (OSR2) operating system. It is an extension of Microsoft's FAT16 file system. The purpose of FAT32 was to overcome the limitations of FAT16 and add support for larger media. The major enhancements introduced by FAT32 included support for much larger volumes, better performance and more flexibility and robustness.
When multiple domains are in a _________ they automatically trust each other.
Forest
Define: Wireless Local Area Network (WLAN) (Objective 6.1)
Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don't require that devices rely on physical cables to connect to the network.
How do you add a printer in Windows XP Pro? (Misc)
Go to "Start", open "Printers and Faxes" and click "Add a printer".
Describe a CLIENT/SERVER topology. (Objective 6.26)
In a client-server topology, access to a network's resources is controlled by a central server (or servers) and that central server (or servers) determines what resources get shared, who is allowed to use those resources, and even when those resources can be used.
Describe a BUS network topology. (Objective 6.2.1)
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over the main cable, there is a limit of drop lines and the distance a main cable can have. Advantages of bus topology 1. Easy installation, each cable needs to be connected with backbone cable. 2. Less cables required than Mesh and star topology Disadvantages of bus topology 1. Difficultly in fault detection. 2. Not scalable as there is a limit of how many nodes you can connect with backbone cable.
Define Expansion Card. (Objective 4.1.9)
In computing, an expansion card, expansion board, adapter card or accessory card is a printed circuit board that can be inserted into an electrical connector, or expansion slot, on a computer motherboard, backplane or riser card to add functionality to a computer system via the expansion bus
Describe a MESH network topology. (Objective 6.2.4)
In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only. Lets say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of links in a mesh topology of n devices would be n(n-1)/2.. Advantages of Mesh topology 1. No data traffic issues as there is a dedicated link between two devices which means the link is only available for those two devices. 2. Mesh topology is reliable and robust as failure of one link doesn't affect other links and the communication between other devices on the network. 3. Mesh topology is secure because there is a point to point link thus unauthorized access is not possible. 4. Fault detection is easy. Disadvantages of Mesh topology 1. Amount of wires required to connected each system is tedious and headache. 2. Since each device needs to be connected with other devices, number of I/O ports required must be huge. 3. Scalability issues because a device cannot be connected with large number of devices with a dedicated point to point link.
Describe a RING network topology. (Objective 6.2.3)
In ring topology each device is connected with the two devices on either side of it. There are two dedicated point to point links a device has with the devices on the either side of it. This structure forms a ring thus it is known as ring topology. If a device wants to send data to another device then it sends the data in one direction, each device in ring topology has a repeater, if the received data is intended for other device then repeater forwards this data until the intended device receives it. Advantages of Ring Topology 1. Easy to install. 2. Managing is easier as to add or remove a device from the topology only two links are required to be changed. Disadvantages of Ring Topology 1. A link failure can fail the entire network as the signal will not travel forward due to failure. 2. Data traffic issues, since all the data is circulating in a ring.
Describe a STAR network topology. (Objective 6.2.2)
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn't allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device. Advantages of Star topology 1. Less expensive because each device only need one I/O port and needs to be connected with hub with one link. 2. Easier to install 3. Less amount of cables required because each device needs to be connected with the hub only.4. Robust, if one link fails, other links will work just fine.5. Easy fault detection because the link can be easily identified. Disadvantages of Star topology 1. If hub goes down everything goes down, none of the devices can work without hub. 2. Hub requires more resources and regular maintenance because it is the central system of star topology.
Define Unattended Installation (Objective 1.1.2)
Installation using a file containing configuration information for setting up a new installation.
What boot loader does Linux most commonly use?
LILO
Define: Campus Area Network (CAN) (Objective 6.1)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources.
Explain the components of Resource Management. (Objective 1.1.1.6)
Memory Management -The operating system manages the Primary Memory or Main Memory. Main memory is made up of a large array of bytes or words where each byte or word is assigned a certain address. Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be executed, it should be first loaded in the main memory. An Operating System performs the following activities for memory management:It keeps tracks of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multi programming, the OS decides the order in which process are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and de-allocates the memory when the process has terminated or is performing an I/O operation. Processor Management -In a multi programming environment, the OS decides the order in which processes have access to the processor, and how much processing time each process has. This function of OS is called process scheduling. An Operating System performs the following activities for processor management.Keeps tracks of the status of processes. The program which perform this task is known as traffic controller. Allocates the CPU that is processor to a process. De-allocates processor when a process is no more required.
Explain how to configure an OS boot order. (Objective 1.1.4)
Once you have logged into the BIOS, you will need to find the Boot menu. You'll find this labelled Boot on older BIOS screens, but it can also be found as a sub-menu under System Configuration, and is accessed by navigating with the left/right arrow keys (these and other controls are usually displayed as a legend at the bottom of the screen).
Define Parallel ATA (PATA). (Objective 4.1.13)
Parallel ATA (PATA), originally AT Attachment, is an interface standard for the connection of storage devices such as hard disk drives, floppy disk drives, and optical disc drives in computers. The standard is maintained by the X3/INCITS committee.[1] It uses the underlying AT Attachment (ATA) and AT Attachment Packet Interface (ATAPI) standards.
Describe a PEER-TO-PEER network topology. (Objective 6.2.5)
Peer-to-peer networking is an approach to computer networking in which all computers share equivalent responsibility for processing data. Peer-to-peer networking (also known as peer networking) differs from client-server networking, where specific devices have responsibility for providing or serving data, and other devices consume or otherwise act as clients of those servers. Advantages of Peer-to-Peer topology 1. P2P networks are robust. If one attached device goes down, the network continues. 2. Peer networks allow data to be shared in both directions, whether for downloads to a computer or uploads from a computer. 3. Peer-to-peer networks are relatively easy to expand. Disadvantages of Peer-to-Peer topology 1. Because each device participates in routing traffic through the network, hackers can easily launch denial of service attacks. 2. P2P software acts as server and client, which makes peer-to-peer networks more vulnerable to remote attacks than client-server networks. 3. Data that is corrupt can be shared on P2P networks by modifying files that are on the network to introduce malicious code.
Define RAM. (Objective 4.1.5)
Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.
What are the 5 FSMO roles in Active Directory? (misc)
Schema Master, Domain Naming Master, Relative ID (RID) Master, Primary Domain Controller (PDC) Emulator, Infrastructure Master
Define Serial ATA (SATA). (Objective 4.1.13)
Serial ATA (SATA, abbreviated from Serial AT Attachment)[2] is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives. Serial ATA succeeded the earlier Parallel ATA (PATA) standard to become the predominant interface for storage devices.
Define: Wide Area Network (WAN) (Objective 6.1)
Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they're miles apart. The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN's vast reach, it is typically owned and maintained by multiple administrators or the public.
What socket does a Intel Pentium 4 use? (Misc)
Socket 423
Define a CPU. (Objective 4.1.1)
Stands for "Central Processing Unit." The CPU is the primary component of a computer that processes instructions. It runs the operating system and applications, constantly receiving input from the user or active software programs. It processes the data and produces output, which may stored by an application or displayed on the screen.
Define CMOS. (Objective 4.1.4)
The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the onboard battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy, Additionally, the system clock resets when the CMOS loses power.
Name some types of CPUs. (Objective 4.2.1)
The CPUs are differentiated by the number of cores it has. In the older days, CPUs only had one core which limited them to only in a single task. With the evolution in technology number of CPU cores are also increased to make computers faster and efficient. In today's time, we have CPUs that have up to 100 CPU cores, each of which works on a different task.
Define the NTFS filesystem. (Objective 1.1.5.2)
The New Technology File System (NTFS) is the standard file structure for the Windows NT operating system. It is used for retrieving and storing files on the hard disk. The NTFS introduced a number of enhancements, including innovative data structures that increased performance, improved metadata, and added expansions like security access control (ACL), reliability, disk space utilization, and file system journaling. The NTFS replaced the OS/2 High-Performance File System (HPFS) and the Windows 95 file allocation table (FAT), which were used in MS-DOS and earlier operating system versions. NTFS is also used with Windows 2000, Windows XP, and Windows Server 2003.
Define the HPFS filesystem. (Objective 1.1.5.3)
The high-performance file system (HPFS) is a file system designed especially for the IBM OS/2. It is known for handling large files of up to 2 GB across multiple hard disks, as well as for handling long file names of up to 256 bytes. HPFS was designed to improve on the weaknesses of the file allocation table file system. The Advantages of HPFS 1. Contiguous storage 2. Separate date stamps for file creation and last access and modification 3. Less file fragmentation 4. Smaller cluster size 5. Support for storage devices of up to 512 GB 6. Faster disk operation and file access of the root directory at the midpoint of the disk rather than the beginning The Disadvantages of HPFS 1. Requires more system memory 2. Requires disk partitions not recognized by MS-DOS, which prevents a computer from booting from a floppy disk 3. Requires a special utility (Partition Magic from PowerQuest) to access the HPFS partition
Explain the primary functions of an OS. (Objective 1.1.1)
The main task an operating system carries out is the allocation of resources and services, such as allocation of: memory, devices, processors and information. The operating system also includes programs to manage these resources, such as a traffic controller, a scheduler, memory management module, I/O programs, and a file system
Define a Northbridge. (Objective 4.1.11)
The northbridge, also known as Memory Controller Hub, is usually paired with a southbridge. In systems where they are included, these two chips manage communications between the CPU and other parts of the motherboard, and constitute the core logic chipset of the PC motherboard.
Define: Personal Area Network (PAN) (Objective 6.1)
The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.
Define a Type II expansion card. (Misc)
Type-II and above PC Card devices use two rows of 34 sockets, and have a 16- or 32-bit interface. They are 5.0 millimetres (0.20 in) thick. Type-II cards introduced I/O support, allowing devices to attach an array of peripherals or to provide connectors/slots to interfaces for which the host computer had no built-in support. For example, many modem, network, and TV cards accept this configuration. Due to their thinness, most Type II interface cards have miniature interface connectors on the card connecting to a dongle, a short cable that adapts from the card's miniature connector to an external full-size connector. Some cards instead have a lump on the end with the connectors. This is more robust and convenient than a separate adapter but can block the other slot where slots are present in a pair. Some Type II cards, most notably network interface and modem cards, have a retractable jack, which can be pushed into the card and will pop out when needed, allowing insertion of a cable from above. When use of the card is no longer needed, the jack can be pushed back into the card and locked in place, protecting it from damage. Most network cards have their jack on one side, while most modems have their jack on the other side, allowing the use of both at the same time as they do not interfere with each other. Wireless Type II cards often had a plastic shroud that jutted out from the end of the card to house the antenna.In the mid-90s, PC Card Type II hard disk drive cards became available; previously, PC Card hard disk drives were only available in Type III.
Define a Type III expansion card. (Misc)
Type-III PC Card devices are 16-bit or 32-bit. These cards are 10.5 millimetres (0.41 in) thick, allowing them to accommodate devices with components that would not fit type I or type II height. Examples are hard disk drive cards,[7] and interface cards with full-size connectors that do not require dongles (as is commonly required with type II interface cards).
Define a Type IV expansion card. (Misc)
Type-IV cards, introduced by Toshiba, were not officially standardized or sanctioned by the PCMCIA. These cards are 16 millimetres (0.63 in) thick.
What is a SATA to PATA adapter? (Objective 4.1.14)
Use this adapter and convert any SATA drive to Standard IDE connector.
Define: Local Area Network (LAN) (Objective 6.1)
We're confident that you've heard of these types of networks before - LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs. Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data.
When booting to Knoppix on a CD drive, what does the decompression?
When starting a program, it is loaded from the removable medium and decompressed into a RAM drive. The decompression is transparent and on-the-fly.
Explain Program Execution. (Objective 1.1.1.1)
When you are using any software, its program is executing. A program is some series of things that a computer can do. A computer can execute a word processing software program, by doing tasks such as: wait for you to type something, and when you do... display the character pressed on your keyboard on the screen (over and over) save what you have typed Each of these is interesting. Computers do a lot of waiting. While the computer is waiting for me to type the next character it checks, over and over to see if a character has been pressed. Many times each second. This is a kind of program execution called a loop.
Define Windows Deployment Services. (Objective 1.1.2.2)
Windows Deployment Services (WDS) is a server role that gives administrators the ability to deploy Windows operating systems remotely. WDS can be used for network-based installations to set up new computers so administrators do not have to directly install each operating system (OS).
What is an automated software allows you to check if a computer's existing hardware and some software will be comparable with a newer version of Windows. (Object 1.1.2)
Windows Upgrade Advisor.
Parity (Objective 4.3.4)
________ can be set to odd, even, or off. The ________ circuit works by adding one bit to every byte of data, resulting in nine bits. (Remember that a byte is already eight bits.) The value of any given bit (1 or 0) is determined at the time that data is written to memory.