Hardware and Operating Systems Essentials - D386

Ace your homework & exams now with Quizwiz!

Which type of malware is referred to as a group of zombies?

Botnet

Which type of twisted pair cable can transmit data at speeds up to 10 Mbps?

Category 3

Which solution solves a user's need for dual booting different operating systems to test software?

Configure a virtual machine for the user

Which IDE can you use to write programs for Python, Java, and C++ languages?

Eclipse

Which cloud computing characteristic provides a company with the ability to automatically scale down processing resources as needed?

Elasticity

A printer is being configured on a network to print documents for users. Which role should the printer be configured for?

Server

Which type of storage devices are characterized by the fastest access times and data transfer rates?

Solid-state drives

Which chipset is a set of circuitry that provides support to the slower onboard peripherals?

Southbridge

Which type of topology has all nodes connected to a central device?

Star

What is a key reason to implement a RAID 0 disk configuration?

To improve overall disk performance

Which size data path do today's DIMMS use?

64-bit

Which memory type is characterized by its independence from the CPU's external clock?

Asynchronous DRAM

Which automatic configuration process occurs when a Windows-based dynamic host configuration protocol (DHCP) client is unable to reach a DHCP server?

Automatic private IP addressing (APIPA)

Which type of network topology is cheap and easy to install but difficult to reconfigure?

Bus

Which malware program can replicate quickly and spread from one computer to another by itself?

Computer worm

What is a characteristic of virtualized containers?

Containers share the same host operating system.

What facilitates a guest system's ability to run applications designed for a different operating system?

Emulator

Which device offers passive protection against attacks on network- and cloud-based resources?

Intrusion detection system (IDS)

Which ability describes a security feature in virtualization?

Isolating the operating system when running multiple concurrent VMs

What is the function of the operating system?

It acts as an intermediary between computer users and computer resources.

What is the next step to be performed to address storage drive issues after identifying recent changes and breaking down large problems?

Perform a system backup.

Which type of network connects devices within the ranges of 30 feet or less?

Personal area network (PAN)

Which part of a hard disk drive is responsible for storing actual data?

Platters

Which type of isolation do all virtualized containers employ?

Process

What is an example of a Microsoft-based mobile operating system?

Surface Duo

Which operating system allows for its source code to be modified and redistributed?

Android

An IT manager is implementing a simple web server for a small-business customer. Which basic tool should the manager implement for this customer?

Apache

Which set of components make up the central processing unit (CPU)?

Arithmetic logic unit and control unit

Which type of virus intends to make itself difficult to detect or analyze?

Armored virus

Which feature of an IDE provides a list of variables that are already declared in the program as the developer starts typing?

Autocomplete

A user is working on a critical mission project and needs to access a system and network during peak and off-peak hours. Which non-functional requirement (NFR) addresses the likelihood the system will be accessible to the user at a specified time within an organization's network?

Availability

What is another term for a type 1 hypervisor?

Bare metal hypervisor

Which component implements decision-making in the programming logic in an application?

Branching

Which cloud feature allows different types of clients and devices to access the resources?

Broad network access

How do computers avoid burdening the main central processing unit (CPU) with programmed I/O (PIO)?

By offloading to a direct-memory-access (DMA) controller

Which scripting or programming language is considered to be an object-oriented programming language?

C++

A computer support technician is deploying a workstation that will be used for editing spreadsheets and web browsing. Which network role should the computer be configured for?

Client

An application is being configured to only make requests to a database on another computer. Which role will the application play in this scenario?

Client

A client is utilizing servers, data storage, data backup, and software development platforms over an internet connection. Which computing approach is being applied?

Cloud computing

Which type of memory packaging can support quad, triple, and dual channels?

DDR2 SODIMM

Which Windows tool is referred to as a centralized authentication server?

Domain Controller

A project team's requirements often evolve during the development process, and they need to modify the project as it progresses. Why would this team choose to use a tech stack in this scenario?

Flexibility

Which layer does a type 2 hypervisor operate on in a virtual environment?

Host operating system

Which network device is considered passive in terms of how it connects to other devices?

Hub

Which component is responsible for creating and running a virtual machine instance on a host?

Hypervisor

A video production company needs massive storage but wants to minimize energy usage. Which network-attached storage (NAS) configuration will meet the goal?

Installing lower rotational speed disks

The marketing department needs a central storage solution that automatically scales with their increasing storage needs. Which storage solution would meet their requirement?

Network-attached storage (NAS)

Which kind of software are Mac OS X and Windows 10 programs?

Operating system (OS)

Which system hardening technique involves securing a data-based system's ports, data, permissions, and functions?

Server hardening

There are a number of different types of components of a motherboard. Which motherboard component is used for support of slower onboard peripherals?

Southbridge

Which type of network hardware works at layer 2 and provides centralized connectivity?

Switches

Which memory type shares a common clock signal with the computer's system-bus clock?

Synchronous DRAM

A client has recently purchased a CPU that references the amount of L1 cache in the list of features. What is this referring to?

The amount of memory residing directly on the processor die

What is a feature of cloud-based operating systems?

They are primarily stateless.

What is a key similarity between RAM and memory cards?

They are solid-state.

What is the primary function of the file system interface?

To provide a way for the system to access and use files

A development team adopts Kafka for streaming purposes. Which protocol should be in place to support this application?

Transmission Control Protocol (TCP)

A hiring manager is interviewing a candidate to be part of a front-end development team. Which skill would be relevant to their job function?

TypeScript

Why do applications designed to work on one operating system not work on a different operating system?

Unique system calls

Which non-functional requirement (NFR) deals with human factors, consistency, and documentation?

Usability

Which memory type is stored on a drive and is referred to as a paging file?

Virtual RAM

Which virtual machine tool involves testing out an application where files are not saved to the drive or memory and never affect the physical machine?

Virtual sandbox

Which IDE is a Microsoft-product and can be used to develop websites, web apps, and mobile apps?

Visual Studio

An IT tech has been tasked with identifying a front-end framework that the IT team may adopt. Which framework fits the team's needs?

Vue

Which feature of a solid-state drive's flash memory ensures that the logical block addressing does not always address the same physical block's drive?

Wear leveling

Which processors process in both 32 and 64 bits?

x86-64 processors

Which type of non-functional requirement (NFR) ensures that an updated database can return back in the event of update failures?

Reliability

Which networking device can be programmed to make decisions to send packets from an input port to an output port based on IP addresses?

Router

Which type of DRAM do modern laptops all use?

SO-DIMM

What is the top of the reconfigurable computing software pyramid?

Scripting

Which type of non-functional requirement (NFR) deals with how well a system and its data are protected against attacks?

Security

A user runs two different applications that need 4GB of random access memory (RAM) each. The operating system (OS) also needs 4GB. What is the minimum amount of RAM the user's computer should have?

12GB

A computer scientist has a computer with 32GB of random access memory (RAM), with the OS requiring 2GB. They want to run multiple instances of a classification algorithm that use 7GB of RAM each. What is the maximum number of instances that can be run on the computer?

4

What is one reason why programmed I/O does not work well when the I/O device is a hard disk or a graphics display?

A complete instruction fetch-execute cycle must be performed to transfer each I/O data word.

Which requirement should be understood when configuring a RAID 5 system for a client?

A minimum of three drives are required.

What is the purpose of a computer operating system?

It functions as a resource manager.

Which type of programming language is compiled?

Java and C/C++

Which cache memory is the smallest but fastest?

L1

Which type of processor memory is located on the processor itself?

Level 1 cache

Which operating system uses the Bourne-Again shell (bash) scripting tool?

Linux

Which networking solution helps to distribute the traffic across multiple servers capable of fulfilling the same tasks?

Load balancing

Which type of network connects computers and other networking devices in a single large building?

Local area network (LAN)

Which problem is managed by implementing a file system?

Logical structure for organizing and storing files on a storage device

What is a disadvantage of solid-state drives (SSD) when compared to hard disk drives (HDD)?

Longevity

Which type of virus exploits those applications that make use of a mini-basic programming language?

Macro virus

Which topology provides multiple pathways between end nodes?

Mesh

Which back-end database management system could an IT company use in cloud-based solutions for its customers?

Mongo

Which tool would be appropriate for an organization handling document-based data?

Mongo Database (MongoDB)

Which type of virus changes form to avoid detection?

Polymorphic virus

Which scripting or programming tool makes use of cmdlet (Command let) that performs a specific function?

PowerShell

Which type of cloud architecture requires costly up-front capital investment?

Private cloud

What is a fundamental building block of an operating system that keeps track of each process in memory, including whether to run it or wait for some event?

Process control management

Which server makes requests for resources on behalf of a client?

Proxy server

A client recently experienced a hard drive failure and lost stored data. The client does not want to rely on a backup but does want to secure their data. Which RAID configuration does this client need?

RAID 1

What is a temporary holding area for data and programs?

RAM

What is an example of a system call used by the POSIX API for POSIX-based systems running UNIX, Linux, and macOS?

Read ()

Which systems are types of operating systems?

Real-Time Systems

What is an example of a server operating system?

Red Hat Enterprise Linux

Which attribute of DRAM must a technician or developer consider ahead of time?

Refresh signal

What can a dual in-line memory module (DIMM) use to contain data as well as amplify a signal before writing the data to a module?

Registers


Related study sets

Brunners CH 46 Gastric and Duodenal Disorders

View Set

Diagnostic Procedures - Vision and Eyes

View Set

economic and stock market indicators

View Set

ICT chapter 2 Input and output devices

View Set

Networking - Chapter 7: Switching and Routing

View Set

Chapter 5 - Annuity Principles and Concepts

View Set