Trivia Quiz On 3d052 Vol 2

100 Questions | Total Attempts: 158

SettingsSettingsSettings
Please wait...
3d052 Quizzes & Trivia

3D052 VOL 2


Questions and Answers
  • 1. 
    Which original components were very susceptible to damage from electrostatic discharge?
    • A. 

      Read only memory (ROM).

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 2. 
    What is considered to be a computer’s main storage?
    • A. 

      Random access memory (RAM).

    • B. 

      Read only memory (ROM).

    • C. 

      Basic input/output system (BIOS).

    • D. 

      Complementary metal-oxide semiconductor (CMOS).

  • 3. 
    What is considered as nonvolatile permanent memory?
    • A. 

      Read only memory (ROM).

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 4. 
    What is a form of firmware that contains the computer’s startup instructions?
    • A. 

      Cache.

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 5. 
    What is defined as an asynchronous signal from a computer hardware device indicating theneed for attention from a central processing unit (CPU) or a synchronous event?
    • A. 

      Cache.

    • B. 

      Buffer.

    • C. 

      Interface.

    • D. 

      Interrupt.

  • 6. 
    Which controller component interprets an electronic signal, prioritizes it, and requests theattention of the central processing unit (CPU)?
    • A. 

      Disk request.

    • B. 

      Utility resource.

    • C. 

      Priority interrupt.

    • D. 

      Integrated resource.

  • 7. 
    Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 8. 
    Which is a term used to describe that data is whole or complete?
    • A. 

      Driver.

    • B. 

      Parity bit.

    • C. 

      Data integrity.

    • D. 

      Error correction.

  • 9. 
    What is considered as a technique or method of checking data integrity?
    • A. 

      Fault.

    • B. 

      Parity.

    • C. 

      Interrupt.

    • D. 

      Asynchronous.

  • 10. 
    Which is a very simple example of an error detecting code?
    • A. 

      Interrupt.

    • B. 

      Parity bit.

    • C. 

      Asynchronous.

    • D. 

      Data integrity.

  • 11. 
    What is a way of utilizing a group of storage devices as if they were physically connected toa server when they are not?
    • A. 

      Network attached storage (NAS).

    • B. 

      Storage area network (SAN).

    • C. 

      Redundant array of independent disks (RAID).

    • D. 

      Array storage.

  • 12. 
    What is an advantage of using a storage area network (SAN) architecture?
    • A. 

      Ease of replacing the hard drive.

    • B. 

      Ease of replacing network connectivity.

    • C. 

      Ease of replacing server.

    • D. 

      Multiple users can access the server at once.

  • 13. 
    What is the connection type of choice for storage area networks (SAN)?
    • A. 

      Fibre channel.

    • B. 

      ATA over Ethernet (AoE).

    • C. 

      Small computer system interface (SCSI).

    • D. 

      Internet small computer system interface (iSCSI).

  • 14. 
    Which storage device can be easily connected to a network and appears as a network drive?
    • A. 

      Storage area network (SAN).

    • B. 

      Redundant array of independent disks (RAID).

    • C. 

      Network attached storage (NAS).

    • D. 

      RHD.

  • 15. 
    Which storage device has the means of providing data storage reliability using multiple harddrives?
    • A. 

      Storage area network (SAN).

    • B. 

      Network attached storage (NAS).

    • C. 

      Small computer system interface (SCSI).

    • D. 

      Redundant array of independent disks (RAID).

  • 16. 
    The hard drives in a redundant array of independent disks (RAID) array are presented to theserver as
    • A. 

      One single hard drive.

    • B. 

      A collection of hard drives.

    • C. 

      A single RAID array.

    • D. 

      A remote storage device.

  • 17. 
    Which technology is often used in redundant array of independent disks (RAID) array thatcan be daisy chained?
    • A. 

      Small computer system interface (SCSI).

    • B. 

      Serial attached (SAS) SCSI.

    • C. 

      Serial advanced technology attachment (SATA).

    • D. 

      Peripheral component interconnect express (PCIe).

  • 18. 
    Which is not a characteristic of high-order languages?
    • A. 

      They are nearly self-documenting.

    • B. 

      They use English-like statements.

    • C. 

      Source codes that are written closest to machine language.

    • D. 

      Programs are transportable between computers with few changes.

  • 19. 
    What best describes programming machine code?
    • A. 

      Another term for firmware.

    • B. 

      Statements that correspond to complex actions.

    • C. 

      Instructions in a form that is acceptable to the computer.

    • D. 

      Source code that, when compiled, is appropriate for the computer.

  • 20. 
    Which selection is a set of markup symbols or codes inserted in a file intended for displayon a Web browser page?
    • A. 

      Standard Generalized Markup Language (SGML).

    • B. 

      Extensible Markup Language (XML).

    • C. 

      HyperText Markup Language (HTML).

    • D. 

      Dynamic HTML (DHTML).

  • 21. 
    Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
    • A. 

      Dynamic HTML (DHTML).

    • B. 

      Extensible Markup Language (XML).

    • C. 

      Standard Generalized Markup Language (SGML).

    • D. 

      Extensible HTML (XHTML).

  • 22. 
    A standard Web application used to pass a Web user’s request to a server’s applicationprogram and to exchange data back to the user is called a
    • A. 

      Transport layer security (TLS).

    • B. 

      Common gateway interface (CGI).

    • C. 

      Data encryption standard (DES).

    • D. 

      Public key infrastructure (PKI).

  • 23. 
    Which protocol is commonly used for managing the security of a message transmission onthe Internet?
    • A. 

      Secure socket layer (SSL).

    • B. 

      Public key infrastructure (PKI).

    • C. 

      Data encryption standard (DES).

    • D. 

      Transport layer security (TLS).

  • 24. 
    Which program can be used to automatically launch programs on a preset schedule?
    • A. 

      Check disk.

    • B. 

      Disk quotas.

    • C. 

      Disk defragmenter.

    • D. 

      Task scheduler.

  • 25. 
    Which error-checking tool allows you to monitor the file system for errors?
    • A. 

      Check disk.

    • B. 

      Disk quotas.

    • C. 

      Task scheduler.

    • D. 

      Disk defragmenter.

Back to Top Back to top