3d052 CDC Vol 2

100 Questions | Attempts: 823
Share

SettingsSettingsSettings
3d052 Quizzes & Trivia

Questions and Answers
  • 1. 
    Which original components were very susceptible to damage from electrostatic discharge?
    • A. 

      Read only memory (ROM)

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 2. 
    What is considered to be a computer's main storage?
    • A. 

      Random access memory (RAM)

    • B. 

      Read only memory (ROM)

    • C. 

      Basic input/output system (BIOS)

    • D. 

      Complementary metal-oxide semiconductor (CMOS)

  • 3. 
    What is considered as nonvolatile permanent memory?
    • A. 

      Read only memory (ROM)

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 4. 
    What is a form of firmware that contains the computer's startup instructions?
    • A. 

      Cache

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 5. 
    What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
    • A. 

      Cache

    • B. 

      Buffer

    • C. 

      Interface

    • D. 

      Interrupt

  • 6. 
    Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?
    • A. 

      Disk request

    • B. 

      Utility resource

    • C. 

      Priority interrupt

    • D. 

      Integrated resource

  • 7. 
    Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 8. 
    Which is a term used to describe that data is whole or complete?
    • A. 

      Driver

    • B. 

      Parity bit

    • C. 

      Data integrity

    • D. 

      Error correction

  • 9. 
    What is considered as a technique or method of checking data integrity?
    • A. 

      Fault

    • B. 

      Parity

    • C. 

      Interrupt

    • D. 

      Asynchronous

  • 10. 
    Which is a very simple example of an error detecting code?
    • A. 

      Interrupt

    • B. 

      Parity bit

    • C. 

      Asynchronous

    • D. 

      Data integrity

  • 11. 
    What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
    • A. 

      Network attached storage (NAS)

    • B. 

      Storage area network (SAN)

    • C. 

      Redundant array of independent disks (RAID)

    • D. 

      Array Storage

  • 12. 
    What is an advantage of using a storage area network (SAN) architecture?
    • A. 

      Ease of replacing the hard drive

    • B. 

      Ease of replacing network connectivity

    • C. 

      Ease of replacing server

    • D. 

      Multiple users can access the server at once

  • 13. 
    What is the connection type of choice for storage area networks (SAN)?
    • A. 

      Fibre channel

    • B. 

      ATA over Ethernet (AoE)

    • C. 

      Small computer system interface (SCSI)

    • D. 

      Internet small computer system interface (iSCSI)

  • 14. 
    Which storage device can be easily connected to a network and appears as a network drive?
    • A. 

      Storage area network (SAN)

    • B. 

      Redundant array of independent disks (RAID)

    • C. 

      Network attached storage (NAS)

    • D. 

      RHD

  • 15. 
    Which storage device has the means of providing data storage reliability using multiple hard drives?
    • A. 

      Storage area network (SAN)

    • B. 

      Network attached storage (NAS)

    • C. 

      Small computer system interface (SCSI)

    • D. 

      Redundant array of independent disks (RAID)

  • 16. 
    The hard drives in a redundant array of independent disks (RAID) array are presented to the server as
    • A. 

      One single hard drive

    • B. 

      A collection of hard drives

    • C. 

      A single RAID array

    • D. 

      A remote storage device

  • 17. 
    Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
    • A. 

      Small computer system interface (SCSI)

    • B. 

      Serial attached (SAS) SCSI)

    • C. 

      Serial advanced technology attachment (SATA)

    • D. 

      Peripheral component interconnect express (PCIe)

  • 18. 
    Which is not a characteristic of high-order languages?
    • A. 

      They are nearly self-documenting

    • B. 

      They use English-like statements

    • C. 

      Source codes that are written closest to machine language

    • D. 

      Programs are transportable between computers with few changes

  • 19. 
    What best describes programming machine code?
    • A. 

      Another term for firmware

    • B. 

      Statements that correspond to complex actions

    • C. 

      Instructions in a form that is acceptable to the computer

    • D. 

      Source code that, when compiled, is appropriate for the computer

  • 20. 
    Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
    • A. 

      Standard Generalized Markup Language (SGML)

    • B. 

      Extensible Markup Language (XML)

    • C. 

      HyperText Markup Language (HTML)

    • D. 

      Dynamic HTML (DHTML)

  • 21. 
    Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
    • A. 

      Dynamic HTML (DHTML)

    • B. 

      Extensible Markup Language (XML)

    • C. 

      Standard Generalized Markup Language (SGML)

    • D. 

      Extensible HTML (XHTML)

  • 22. 
    A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a
    • A. 

      Transport layer security (TLS)

    • B. 

      Common gateway interface (CGI)

    • C. 

      Data encryption standard (DES)

    • D. 

      Public key infrastructure (PKI)

  • 23. 
    Which protocol is commonly used for managing the security of a message transmission on the internet?
    • A. 

      Secure socket layer (SSL)

    • B. 

      Public Key infrastructure (PKI)

    • C. 

      Data encryption standard (DES)

    • D. 

      Transport layer security (TLS)

  • 24. 
    Which program can be used to automatically launch programs on a preset schedule?
    • A. 

      Check disk

    • B. 

      Disk quotas

    • C. 

      Disk defragmenter

    • D. 

      Task scheduler

  • 25. 
    Which error-checking tool allows you to monitor the file system for errors?
    • A. 

      Check disk

    • B. 

      Disk quotas

    • C. 

      Disk defragmenter

    • D. 

      Task scheduler

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.