CDC's URE's 2

Card Set Information

Author:
tromorg
ID:
85421
Filename:
CDC's URE's 2
Updated:
2011-05-12 10:54:24
Tags:
volume2
Folders:

Description:
volume 2
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user tromorg on FreezingBlue Flashcards. What would you like to do?


  1. Which original components were very susceptible to damage from electrostatic?
    CMOS
  2. what is considered to be a comps main storage?
    RAM
  3. what is considered as nonvolatile permanent memory?
    ROM
  4. what is a form of firmware that contains the comps startup instructions?
    BIOS
  5. What is defined as an asynchronous signal from a computer hardware device indicating theneed for attention from a central processing unit (CPU) or a synchronous event?
    Interrupt
  6. Which controller component interprets an electronic signal, prioritizes it, and requests theattention of the central processing unit (CPU)?
    Priority Interrupt
  7. which IRQ line number is normally used for the floppy disk controller?
    6
  8. which is a term used to describe that data is whole or complete?
    Data Integrity
  9. what is considered as a technique or method of checking data integrity?
    Parity
  10. which is a very simple example of an error detecting code?
    parity bit
  11. what is away of utilizing a group of storage devices as if they were physically connected to a server when they are not?
    SAN
  12. what is an advantage of using a SAN architecture?
    Ease of replacing server
  13. what is the connection type of choise for SAN?
    Fibre Channel
  14. which storage device can be easily connected to a network and appears as a network drive?
    NAS
  15. which storage device has the means of providing data storage reliability using multiple hard drives?
    RAID
  16. the hard drives in a RAID array are presented to the server as?
    one single hard drive
  17. which technology is often used in RAID array that can be daisy chained?
    SCSI
  18. which is not a characteristic of high order languages?
    source codes that are written closest to machine language
  19. what best describes programming machine code?
    instructions in a form that is acceptable to the comp
  20. which selection is a set of markup symbols or codes inserted in a file inteded for display on a web browser page?
    HTML
  21. which web app is most likely to succeed HTML?
    XHTML
  22. a standard web app used to pass a web users request to a servers app program and to exchange data back to the user is called a ?
    data encryption standard (DES)
  23. which proocol is commonly used for managing the security of a message transmission on the internet?
    SSL
  24. which program can be used to automatically launch programs on a preset schedule?
    task scheduler
  25. which error checking tool allows you to monitor the file system for errors?
    check disk
  26. which numbering system characteristic if the leftmost non-zero digit of a numeric value?
    Most significant digit (MSD)
  27. what should each org have that spells out which systems are prioritized in what order for the basis of protecting those sytems form disasters?
    List of critical devices
  28. which type of backup would you use at the end of the week to save all data that you select on your system?
    Normal
  29. which type of backup will back up all files that have been altered in the last 24hrs?
    daily
  30. what is based around a central directory database containing information about all the domain controllers in the network?
    Active Directory
  31. what is agroup of users, server, and other resources that share a centralized dtabase of account and security info?
    forest
  32. wher does acopy of the AD database reside?
    domain controllers
  33. what kind of server contains the master listing of all AD objects in the forest?
    global catalog
  34. what is aset of rules that can be set to affect AD leaf objects to control what can be done by a user?
    group policy objects
  35. which type of interface is friendlier for the average user to use?
    GUI
  36. which of the following is not one of the elements that most GUI's are composed of?
    programs
  37. sitting at a computer and loading a software patch onto it is an example of what type of software patch?
    attended
  38. whic type of patch would utilize a remote installation services (RIS)?
    Unattended
  39. which components of DNS contain a dtabase of associated names and IP addresses?
    name servers
  40. which query is made by one name server to another name server?
    non recursive
  41. which software program manages an IP address allocation for a network?
    DHCP
  42. the group of IP addresses that a DHCP server manages is known as a ?
    scope
  43. what is the min number of scopes a DHCP server can have?
    one
  44. according to the AF DHCP policies, how long is the lease that a non critical workstation will have applied to them?
    30 days
  45. what type of service allows network admins to install upgrades on any number of client comps at one type from a centralized location?
    Remote Installation Service (RIS)
  46. whic is not a component of IIS?
    SNMP
  47. what component of windows unifies and simplifies day to day system management tasks?
    MMC
  48. which type of group manages users rights assignments and access permissions?
    security
  49. which special identity can represent users currently logged onto a particular computer and accessing a given resource located on that computer?
    interactive
  50. what defines the rules by which operations can be preformed on a particular resource?
    permissions
  51. a feature of networking that enables individuals to designate resources they want other users to be able to acces through a network is called?
    sharing
  52. what permission always overrides all other permissions assigned to a user or groupu to which the user belongs?
    no access
  53. when a new folder or file is created on a new technology file system (NTFS) partition, what permissions are auto assigned?
    inherited permissions of the folder its contained in
  54. which exchange service is the first service launched when microsoft exchange starts and the last to stop when it is shut down?
    system attendant
  55. In Exchange System Manager, which container holds configuration objects such as Queues,Mailbox stores and Public Folder stores and protocols information?
    servers
  56. which type of list uses pointers to connect each element together?
    linked
  57. a set of data elements (values) organized useing a model of horizontal rows and vertical columns whos data is calculated in response to a query is called a ?
    view
  58. what is the most common type of operation in SQL?
    queries
  59. what type of SQL statement would you use to make the changes you were working on permenant?
    transaction
  60. which is the m ost commonly used SQL data statement?
    select
  61. which SQL server feature tracks changes and is used to ensure data integrity?
    logging
  62. which unix capability can execute numerous programs at the same time?
    multitasking
  63. which unix ability can run on different types of hardware with a few relatively minor changes?
    portability
  64. which unix operating sytem component interacts directly with the sytem hardware?
    kernel
  65. which unix component provides a logical way to organize, store, retrieve, manipulate, and manage data?
    file system
  66. which unix shell is the most compact and is often used for writing shell scripts?
    bourne shell
  67. normally, when you create a file with a text editor, the file is set up with ?
    read and write for you and read only for others
  68. to change permissions on a shell script, you use the unix command?
    chmod
  69. the simplest place to put your function definitions is in your?
    profile
  70. what do you type to quit a unix shell?
    exit
  71. how many characters do most unix system admins and users tend to use for filenames?
    14`
  72. unix disks are divided into logical sections called?
    partitions
  73. the /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
    root
  74. what does the 0 following the c in the device name c0t6d0s7 represent?
    controller
  75. what does the 7 in the device name c0t6d0s7 represent?
    partition
  76. what is the basic unit for storing and manipulating a collection of logically related information known as dtat?
    files
  77. hard links are created using which unix command?
    ln
  78. which unix mechanism enables programs to communicate with one another through the file sytem?
    named pipes
  79. which unix mechanism provides for communication with system device drivers through the file system one character at a time?
    character devices
  80. which unix command displays the current working directory?
    pwd
  81. which unix command allows you to move to different directories within a file system using absolute or relative pathnames?
    ls-s
  82. which unix command takes any characters from standard input and then echoes them to standard output?
    cat
  83. which unix command deletes files from within a directory?
    rm
  84. which unix command looks at an individual file and finds a specified pattern (string)?
    grep
  85. which unix cmd changes the grp ownership of one or more files?
    chgrp
  86. which unix cmd changes the ownership of one or more files to a new owner?
    chown
  87. which unix cmd sets access and modification times for each file to the current time?
    touch
  88. how many primary grps can a user be a member of?
    one
  89. which unix vi mode allows users to execute set cmds?
    command
  90. which unix vi character represents the end of the file?
    $
  91. while using unix vi to edit a file, what would you enter to save the buffer contents and stay in the same file?
    w
  92. in unix, which pakcage of programs lets a terminal handle many sessions at once?
    unix windows system
  93. what is the most common unix windows system?
    x windows
  94. which unix default cmd starts the x window system?
    xinit
  95. the act of choosing the window you type is called setting the ?
    input focus
  96. what action puts unneeded windows out of the way without quitting the program inside them?
    iconifying
  97. which unix cmd from the menu bar moves a window to the bottom of the stack of windows?
    lower
  98. the key to sutting down an xterm window is to know which of your programs is the?
    controlling program
  99. the first step to quiting and xterm session is to?
    quit all non-controlling programs
  100. which unix cmd does the system admin need to use to create the manual atabase prior to users being able to acces the man -k cmd?
    catman

What would you like to do?

Home > Flashcards > Print Preview