Card Set Information

2012-01-23 22:13:59
CDC3D052 Volume2

CDC3D052 Volume2 URE1
Show Answers:

  1. Which original components were very susceptible to damage from electrostatic discharge?
    Complementary metal-oxide semiconductor (CMOS)
  2. What considered to be a computer's main storage?
  3. What is considered as a nonvolatile permanent memory?
  4. What is a form of firmware that contains the computer's startup instructions?
  5. What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
  6. Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)
    Priority interrupt
  7. Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
  8. Which is a term used to describe that data is whole or complete?
    Data integrity
  9. What is considered as a technique or method of checking data integrity?
  10. Which is a very simple example of an error detecting code?
    Parity bit
  11. What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
    Storage area network (SAN)
  12. What is an advantage of using a storage area network (SAN) architecture?
    Ease of replacing server
  13. What is the connection type of choice for storage are networks (SAN)?
    Fibre channel
  14. Which storage device can be easily connected to a network and appears as a network drive?
    Network attached storage (NAS)
  15. Which storage device has the means of providing data storage reliability using multiple hard drives?
    Redundant array of independent disks (RAID)
  16. The hard drives in a redundant array of independent disks (RAID) array are presented to the server as?
    one single hard drive
  17. Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
    Small Computer System Interface (SCSI)
  18. Which is not a characteristic of high-order languages?
    Source codes that are written closest to machine language
  19. What best describes programming machine code?
    Instructions in a form that is acceptable to the computer
  20. Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
    HypterText Markup Language (HTML)
  21. Which Web application is most likley to succeed Hyptertext Markup Language (HTML)?
    Extensible HTML (XHTML)
  22. A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a?
    common gateway interface (CGI)
  23. Which protocol is commonly used for managing the security of a message transmission on the Internet?
    Secure socket layer (SSL)
  24. Which program can be used to automatically launch programs on a preset schedule?
    Task scheduler
  25. Which error-cehcking tool allows you to monitor the file system for errors?
    Check disk
  26. Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
    Most significant digt (MSD)
  27. What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?
    List of critical devices
  28. Which type of backup would you use at the end of the week to save all data that you select on your systems?
  29. Which type of backup will backup all files that have been altered in the last 24 hours?