CDC 3D151 Comprehensive Review

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Airmanmcnair
A
Airmanmcnair
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,085
Questions: 286 | Attempts: 2,085

SettingsSettingsSettings
3D151 Quizzes & Trivia

This is a comprehensive review of the 3D151 Client Systems Journeyman CDCs (3D151 01 1105, Edit Code 01). Answers are verified 100% correct from CDCs. This test encompasses all URE questions from all three volumes. In this test 100 out of the 286 possible questions will be displayed in random order along with the answers in random order, with only one being correct. Minimum passing score for this test is 65%, just like the EOC. Good Luck.


Questions and Answers
  • 1. 

    What entails how we communicate and manage data?

    • A.

      Information systems.

    • B.

      Satellite systems.

    • C.

      Airfield systems.

    • D.

      Power systems.

    Correct Answer
    A. Information systems.
    Explanation
    Information systems encompass the processes, technologies, and resources used to collect, store, process, and distribute data in an organization. They include hardware, software, databases, networks, and people who manage and use the system. Information systems play a crucial role in facilitating communication and data management within an organization, enabling efficient and effective decision-making, collaboration, and information sharing. Satellite systems, airfield systems, and power systems are not directly related to communication and data management as information systems are.

    Rate this question:

  • 2. 

    What part of client systems includes the the physical aspect of computers, telecommunications, and other devices, to include the interconnect devices?

    • A.

      Programs.

    • B.

      Processes.

    • C.

      Hardware.

    • D.

      Paperwork.

    Correct Answer
    C. Hardware.
    Explanation
    The correct answer is hardware because it refers to the physical components of client systems such as computers, telecommunications devices, and interconnect devices. Programs and processes are software components, while paperwork is not directly related to the physical aspect of client systems.

    Rate this question:

  • 3. 

    What devices are mostly small, lightweight, and designed for mobile use?

    • A.

      Software.

    • B.

      Hardware.

    • C.

      Computers.

    • D.

      Handhelds.

    Correct Answer
    D. Handhelds.
    Explanation
    Handhelds are mostly small, lightweight, and designed for mobile use. Unlike computers, which can be larger and less portable, handhelds are specifically designed for on-the-go use. Software and hardware are general terms that encompass a wide range of devices and components, whereas handhelds refer specifically to portable devices that can be easily carried and used while mobile.

    Rate this question:

  • 4. 

    Any hardware added to a computer that expands its capabilities is referred to as a/an

    • A.

      Port.

    • B.

      Peripheral.

    • C.

      Interface.

    • D.

      I/O device.

    Correct Answer
    B. Peripheral.
    Explanation
    A peripheral refers to any hardware device that is added to a computer to enhance its capabilities or provide additional functionality. This can include devices such as printers, scanners, keyboards, and mice, among others. These peripherals are connected to the computer through ports or interfaces, allowing them to interact with the computer and expand its capabilities. Therefore, the correct answer is peripheral.

    Rate this question:

  • 5. 

    Which of the following is not one of the three types of interfaces?

    • A.

      Graphical.

    • B.

      Hardware.

    • C.

      Software.

    • D.

      User.

    Correct Answer
    A. Graphical.
    Explanation
    The question is asking to identify the option that is not one of the three types of interfaces. The options given are Graphical, Hardware, Software, and User. Out of these options, Graphical is the correct answer because it is not one of the three types of interfaces. The three types of interfaces commonly referred to are Hardware, Software, and User interfaces. Graphical, on the other hand, refers to the visual representation of information and does not specifically represent a type of interface.

    Rate this question:

  • 6. 

    The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a

    • A.

      Serial port.

    • B.

      Parallel port.

    • C.

      Switching port.

    • D.

      Universal serial bus port.

    Correct Answer
    B. Parallel port.
    Explanation
    The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a parallel port. This is because a parallel port is designed to transfer multiple bits of data simultaneously, with each bit being sent through a separate line. In contrast, a serial port transfers data one bit at a time through a single line, making it unsuitable for transferring eight bits simultaneously. A switching port refers to a networking device that connects multiple devices together, while a universal serial bus (USB) port is a common interface for connecting peripherals to a computer, but it does not specifically support parallel data transfer.

    Rate this question:

  • 7. 

    What program translates commands between a device and the programs that use the device?

    • A.

      Operating system.

    • B.

      Memory.

    • C.

      Driver.

    • D.

      Port.

    Correct Answer
    C. Driver.
    Explanation
    A driver is a program that acts as a translator between a device and the programs that use the device. It allows the operating system and applications to communicate with the device by converting the commands and instructions from the software into a language that the device can understand. The driver also enables the device to send data back to the software. Therefore, the correct answer is driver.

    Rate this question:

  • 8. 

    The term used to refer to the process of launching the OS is the

    • A.

      Boot.

    • B.

      Random access memory.

    • C.

      Basic Input/Output System.

    • D.

      Complimentary Metal-Oxide Semiconductor.

    Correct Answer
    A. Boot.
    Explanation
    The term used to refer to the process of launching the OS is "boot". This term is derived from the phrase "pulling oneself up by one's bootstraps" and it refers to the process of starting up a computer system. During the boot process, the computer's hardware is initialized, the operating system is loaded into memory, and various system checks and configurations are performed. The boot process is essential for the computer to become operational and ready for use.

    Rate this question:

  • 9. 

    What program sets up the divisions of memory that hold the operating system, user information and applications?

    • A.

      The Memory.

    • B.

      The bootstrap loader.

    • C.

      BIOS.

    • D.

      CMOS.

    Correct Answer
    B. The bootstrap loader.
    Explanation
    The bootstrap loader is responsible for setting up the divisions of memory that hold the operating system, user information, and applications. It is the first program that runs when a computer is turned on, and its main task is to load the operating system into memory. By doing so, it establishes the necessary memory partitions for the different components of the system to function properly.

    Rate this question:

  • 10. 

    What describes how a computer finds a specific byte it is looking for in memory?

    • A.

      Processing.

    • B.

      Programming.

    • C.

      Memory addressing.

    • D.

      Memory segmenting.

    Correct Answer
    C. Memory addressing.
    Explanation
    Memory addressing is the process by which a computer locates a specific byte in its memory. It involves assigning unique addresses to each byte in memory, allowing the computer to easily access and retrieve the desired data. This process is essential for efficient memory management and retrieval, enabling the computer to quickly find and retrieve the specific byte it is looking for. Processing refers to the execution of tasks by the computer's central processing unit, while programming refers to the creation and implementation of software instructions. Memory segmenting, on the other hand, involves dividing the computer's memory into segments for better organization and management.

    Rate this question:

  • 11. 

    How many bits long are the addresses that computer instructions work with?

    • A.

      8.

    • B.

      16.

    • C.

      24.

    • D.

      32.

    Correct Answer
    B. 16.
    Explanation
    Computer instructions typically work with addresses that are represented using a certain number of bits. In this case, the correct answer is 16 because it implies that the computer instructions work with addresses that are 16 bits long. This means that the computer can address up to 2^16 (65536) different memory locations.

    Rate this question:

  • 12. 

    Which type of memory stores configuration information, and is used by the BIOS during system boot up?

    • A.

      Complementary metal-oxide semiconductor memory.

    • B.

      Programmable read only memory.

    • C.

      Random access memory.

    • D.

      Read only memory.

    Correct Answer
    A. Complementary metal-oxide semiconductor memory.
    Explanation
    Complementary metal-oxide semiconductor (CMOS) memory is a type of memory that stores configuration information and is used by the BIOS during system boot up. CMOS memory is non-volatile, meaning it retains data even when the power is turned off. It is commonly used to store settings such as date and time, hardware configurations, and system preferences. During boot up, the BIOS reads this information from the CMOS memory to initialize the system according to the stored settings. Therefore, CMOS memory is the correct answer for this question.

    Rate this question:

  • 13. 

    What type of memory is nonvolatile, considered permanent, and is also called firmware in reference to the data and instructions stored?

    • A.

      RAM.

    • B.

      ROM.

    • C.

      Cache.

    • D.

      CMOS.

    Correct Answer
    B. ROM.
    Explanation
    ROM stands for Read-Only Memory. It is a type of memory that is nonvolatile, meaning it retains its data even when power is turned off. ROM is considered permanent because the data and instructions stored in it cannot be easily modified or erased. It is also called firmware because it contains essential software instructions for the computer system. Unlike RAM, which is volatile and loses its data when power is turned off, ROM provides long-term storage for critical system information. Cache and CMOS are not correct answers because they do not possess the characteristics mentioned in the question.

    Rate this question:

  • 14. 

    This type of memory is blank and instructions can be placed on permanently.

    • A.

      ROM.

    • B.

      RAM.

    • C.

      CMOS.

    • D.

      PROM.

    Correct Answer
    D. PROM.
    Explanation
    PROM stands for Programmable Read-Only Memory. It is a type of memory that can be programmed only once by the manufacturer or user. Once programmed, the instructions stored in PROM cannot be changed or erased, making it a permanent storage for instructions. This type of memory is commonly used for firmware or software that needs to be permanently stored and cannot be modified.

    Rate this question:

  • 15. 

    Which type of memory is used to duplicate frequently used information stored elsewhere or computer earlier, because the original data is time consuming to retrieve or to compute?

    • A.

      RAM.

    • B.

      ROM.

    • C.

      Buffer.

    • D.

      Cache.

    Correct Answer
    D. Cache.
    Explanation
    Cache is a type of memory used to duplicate frequently used information stored elsewhere or computed earlier. It is used to improve the speed and efficiency of data retrieval by storing a copy of the most frequently accessed data. This helps to reduce the time-consuming process of retrieving the original data from the main memory or storage devices. Cache memory is faster than RAM and provides quicker access to the data, making it an ideal choice for storing frequently used information.

    Rate this question:

  • 16. 

    Which term describes that data is whole or complete?

    • A.

      Driver.

    • B.

      Parity bit.

    • C.

      Data integrity.

    • D.

      Error correction.

    Correct Answer
    C. Data integrity.
    Explanation
    Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that data remains whole and complete, without any unauthorized modifications or corruption. Therefore, data integrity is the term that describes that data is whole or complete.

    Rate this question:

  • 17. 

    Which is a very simple example of an error detecting code?

    • A.

      Parity bit.

    • B.

      Interrupt.

    • C.

      Data integrity.

    • D.

      Asynchronous.

    Correct Answer
    A. Parity bit.
    Explanation
    A parity bit is a simple error-detecting code that is commonly used in computer systems. It is a single bit added to a binary code to ensure that the total number of 1s in the code is either even or odd. By checking the parity bit, errors in transmission can be detected. This makes it a very simple and effective method for error detection in data communication. Interrupt, data integrity, and asynchronous are not examples of error detecting codes, making the parity bit the correct answer.

    Rate this question:

  • 18. 

    What data integrity method is used in high-end personal computers and file servers?

    • A.

      Parity.

    • B.

      Polling.

    • C.

      Nonparity.

    • D.

      Error correction code memory.

    Correct Answer
    D. Error correction code memory.
    Explanation
    Error correction code (ECC) memory is a data integrity method used in high-end personal computers and file servers. ECC memory is designed to detect and correct errors that may occur during data storage or transmission. It achieves this by adding extra bits to each data word, allowing it to detect and correct single-bit errors, and detect multiple-bit errors. This makes ECC memory more reliable and less prone to data corruption, making it an ideal choice for high-end systems where data integrity is crucial.

    Rate this question:

  • 19. 

    Reading and storing a document on a hard disk or some other storage medium for processing at a more convenient time is called

    • A.

      A driver.

    • B.

      Spooling.

    • C.

      An interrupt.

    • D.

      A print queue.

    Correct Answer
    B. Spooling.
    Explanation
    Spooling refers to the process of reading and storing a document on a storage medium, such as a hard disk, in order to process it at a later, more convenient time. This allows the computer to continue with other tasks while the document is being prepared for processing. Spooling is commonly used in printing, where documents are stored in a print queue until they can be printed out. Therefore, the correct answer is spooling.

    Rate this question:

  • 20. 

    A spooled print job be several times larger than the printed document size because of the

    • A.

      Printer's language.

    • B.

      Driver's language.

    • C.

      Processor's language.

    • D.

      Print server's language.

    Correct Answer
    A. Printer's language.
    Explanation
    The correct answer is "printer's language." When a print job is spooled, it is converted into a format that the printer can understand, known as the printer's language. This language includes commands and instructions specific to the printer model, such as how to format the text, images, and other elements on the page. The spooled print job can be larger than the original document size because it includes additional data for the printer's language, which is necessary for accurate printing.

    Rate this question:

  • 21. 

    A static internet protocol address on a network printer during hardware configuration is used for

    • A.

      Print job queuing.

    • B.

      Print job locating.

    • C.

      Print job spooling.

    • D.

      Operating system configuration.

    Correct Answer
    B. Print job locating.
    Explanation
    A static internet protocol address on a network printer during hardware configuration is used for print job locating. This means that the printer is assigned a specific IP address that does not change, allowing other devices on the network to easily locate and send print jobs to that specific printer. By having a static IP address, the printer can be consistently identified and accessed by other devices, ensuring that print jobs are sent to the correct printer.

    Rate this question:

  • 22. 

    Printer hardware configuration via the web is done through

    • A.

      Hypertext transfer protocol.

    • B.

      Printer front panel controls.

    • C.

      Hewlett Packard Jetadmin.

    • D.

      Telnet.

    Correct Answer
    A. Hypertext transfer protocol.
    Explanation
    Printer hardware configuration via the web is done through hypertext transfer protocol. This means that the printer's hardware settings can be accessed and modified through a web browser using the HTTP protocol. This allows users to remotely configure and manage the printer's settings without the need for physical access to the printer or its front panel controls.

    Rate this question:

  • 23. 

    What type of printer software configuration option requries a new port to be created?

    • A.

      Telnet.

    • B.

      Local printer.

    • C.

      Driver printing.

    • D.

      TCP/IP printing.

    Correct Answer
    D. TCP/IP printing.
    Explanation
    TCP/IP printing requires a new port to be created because it uses the TCP/IP protocol to send print jobs over a network. In order for the printer to communicate with the computer, a specific port needs to be assigned to establish a connection. This allows the printer software to send print jobs to the correct destination and ensures proper communication between the computer and the printer.

    Rate this question:

  • 24. 

    Which of these is not a prominent characteristic of an operating system?

    • A.

      The operational environment.

    • B.

      The way it processes.

    • C.

      The user interface.

    • D.

      Multitasking.

    Correct Answer
    B. The way it processes.
    Explanation
    The given answer, "The way it processes," is not a prominent characteristic of an operating system. Operating systems are primarily responsible for managing computer hardware and software resources, providing an operational environment for applications to run, facilitating user interaction through a user interface, and enabling multitasking capabilities. The way an operating system processes information or performs tasks is an internal mechanism that is not typically considered a prominent characteristic when defining an operating system.

    Rate this question:

  • 25. 

    Which of the below is not a type of computer user interface?

    • A.

      Application driven interface.

    • B.

      Command driven interface.

    • C.

      Graphical user interface.

    • D.

      Menu driven interface.

    Correct Answer
    A. Application driven interface.
    Explanation
    The given question asks to identify the option that is not a type of computer user interface. The options provided are command driven interface, graphical user interface, menu driven interface, and application driven interface. The correct answer is "Application driven interface" because it is not a recognized type of computer user interface. Command driven interface allows users to interact with the computer through text commands, graphical user interface uses icons and visual elements to interact, and menu driven interface presents a list of options for users to choose from. However, application driven interface is not a commonly known or recognized type of interface.

    Rate this question:

  • 26. 

    Which hardware requirement is defined as the model and the clock speed of the CPU?

    • A.

      Memory.

    • B.

      Peripherals.

    • C.

      Architecture.

    • D.

      Processing power.

    Correct Answer
    D. Processing power.
    Explanation
    The hardware requirement defined as the model and the clock speed of the CPU is processing power. This refers to the capability of the CPU to handle and execute tasks efficiently and quickly. The model of the CPU indicates its generation and features, while the clock speed represents the number of instructions the CPU can process per second. Therefore, processing power is a crucial factor in determining the overall performance and speed of a computer system.

    Rate this question:

  • 27. 

    What should be done before anything else, once the operating system installation is complete?

    • A.

      A reboot.

    • B.

      Install drivers.

    • C.

      Set a password.

    • D.

      Install antivirus.

    Correct Answer
    D. Install antivirus.
    Explanation
    Once the operating system installation is complete, it is important to install antivirus software before anything else. This is because without antivirus protection, the system is vulnerable to various types of malware and security threats. Installing antivirus software helps to detect and remove any existing malware, as well as prevent future infections. It is a crucial step in ensuring the security and integrity of the operating system and the data stored on it.

    Rate this question:

  • 28. 

    The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system without constant problems is for the computer to have the minimum

    • A.

      Software.

    • B.

      Hardware.

    • C.

      Processors.

    • D.

      Applications.

    Correct Answer
    B. Hardware.
    Explanation
    To ensure a computer is compatible and powerful enough to run an operating system without constant problems, it is essential for the computer to have the necessary hardware. Hardware refers to the physical components of a computer system, such as the processor, memory, storage devices, and input/output devices. These components need to meet or exceed the minimum requirements specified by the operating system to ensure smooth and efficient functioning. Without adequate hardware, the computer may struggle to handle the demands of the operating system, leading to performance issues and frequent problems.

    Rate this question:

  • 29. 

    What are minor software updates or improvements called?

    • A.

      Bundles.

    • B.

      Patches.

    • C.

      Databases.

    • D.

      Processors.

    Correct Answer
    B. Patches.
    Explanation
    Minor software updates or improvements are commonly referred to as patches. Patches are small pieces of code that are designed to fix bugs, enhance functionality, or improve security in software applications. They are typically released by software developers to address specific issues or make minor enhancements to the software without requiring a complete update or reinstall of the application. Patches are an important part of software maintenance and help to ensure that software remains stable, secure, and up-to-date.

    Rate this question:

  • 30. 

    What is the simplest and most efficient way to duplicate a computer's software, with no loss of files or configurations within the programs?

    • A.

      WinZip.

    • B.

      Norton Utilities.

    • C.

      Bundled software.

    • D.

      Imaging software.

    Correct Answer
    D. Imaging software.
    Explanation
    Imaging software is the simplest and most efficient way to duplicate a computer's software without any loss of files or configurations within the programs. Imaging software creates a complete copy or image of the computer's entire hard drive, including the operating system, applications, files, and settings. This image can then be easily transferred to another computer or restored onto the same computer, ensuring that all files and configurations remain intact. WinZip, Norton Utilities, and bundled software may have their own functionalities but they do not specifically specialize in duplicating a computer's software without any loss.

    Rate this question:

  • 31. 

    How may byte sectors is a hard disk divided into?

    • A.

      124.

    • B.

      248.

    • C.

      512.

    • D.

      1024.

    Correct Answer
    C. 512.
    Explanation
    A hard disk is typically divided into sectors, which are the smallest units of storage on the disk. These sectors are usually 512 bytes in size. This division allows for efficient organization and retrieval of data on the disk.

    Rate this question:

  • 32. 

    The first sector at the beginning of a hard drive is called the master

    • A.

      Volume.

    • B.

      Cylinder.

    • C.

      Partition.

    • D.

      Boot record.

    Correct Answer
    D. Boot record.
    Explanation
    The first sector at the beginning of a hard drive is called the boot record. This sector contains important information that is necessary for the computer to start up and load the operating system. It includes the instructions for the computer to locate and load the operating system files, as well as any other necessary system files. The boot record is crucial for the proper functioning of the hard drive and the overall system.

    Rate this question:

  • 33. 

    A formatted disk partition that  is used for a particular file system is called

    • A.

      Dynamic storage.

    • B.

      Basic storage.

    • C.

      A volume.

    • D.

      A sector.

    Correct Answer
    C. A volume.
    Explanation
    A formatted disk partition that is used for a particular file system is called a volume. This is because a volume refers to a specific portion of a disk that has been formatted and allocated for a particular file system. It can be seen as a separate entity or unit within the disk, where files and folders are stored and organized.

    Rate this question:

  • 34. 

    Which file system is the best choice for data storage if the server is a dedicated Windows server?

    • A.

      NTFS.

    • B.

      FATS.

    • C.

      Neiter FATS nor NTFS.

    • D.

      Either FATS or NTFS.

    Correct Answer
    A. NTFS.
    Explanation
    NTFS (New Technology File System) is the best choice for data storage on a dedicated Windows server. NTFS offers advanced features such as file and folder permissions, encryption, compression, and support for large file sizes and volumes. It provides better security, reliability, and performance compared to the older FAT (File Allocation Table) file system. NTFS also supports features like journaling, which helps in recovering from system crashes or power failures. Therefore, NTFS is the recommended file system for a dedicated Windows server.

    Rate this question:

  • 35. 

    What physical structure component is a collection of Internet Protocol subnet ranges?

    • A.

      Site.

    • B.

      Namespace.

    • C.

      Global catalog.

    • D.

      Domain controller.

    Correct Answer
    A. Site.
    Explanation
    A site is a physical structure component that represents a collection of Internet Protocol (IP) subnet ranges. It is used to define the physical locations of network resources in a network infrastructure. By associating IP subnet ranges with a site, network administrators can control the replication of data and the authentication process based on the geographical locations of the network resources.

    Rate this question:

  • 36. 

    By default, the first domain controller in active direcotry services is a

    • A.

      Forest.

    • B.

      Namespace.

    • C.

      Global catalog.

    • D.

      Globally unique identifier.

    Correct Answer
    C. Global catalog.
    Explanation
    The first domain controller in active directory services is a global catalog. A global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multi-domain active directory forest. It stores a subset of attributes for each object, allowing for faster searches and authentication across domains. The global catalog is created automatically when the first domain controller in a forest is installed.

    Rate this question:

  • 37. 

    Which of these is a disadvantage of client-server networks?

    • A.

      A high level of security can be implemented at the server.

    • B.

      Users are relieved of the burden of managing resources.

    • C.

      Managing servers requires a dedicated staff.

    • D.

      More powerful resources can be shared.

    Correct Answer
    C. Managing servers requires a dedicated staff.
    Explanation
    The correct answer is "Managing servers requires a dedicated staff." This is a disadvantage of client-server networks because it requires a dedicated team or staff to manage and maintain the servers. This can be costly and time-consuming for organizations, as they need to hire and train professionals to handle server-related tasks such as installation, configuration, monitoring, and troubleshooting. Additionally, having a dedicated staff also means that there is a dependency on these individuals, and any issues or delays in server management can impact the overall network performance and availability.

    Rate this question:

  • 38. 

    What type of remote network provides a private tunnel through public cloud (the Internet)?

    • A.

      Virtual private network.

    • B.

      Peer to peer.

    • C.

      Broadband.

    • D.

      Three tier.

    Correct Answer
    A. Virtual private network.
    Explanation
    A virtual private network (VPN) is a type of remote network that allows users to create a secure and private connection over a public network, such as the Internet. It establishes a private tunnel through the public cloud, encrypting the data transmitted between the user's device and the network, ensuring privacy and security. This enables users to access resources on the network remotely, as if they were directly connected to it, making it an ideal solution for businesses and individuals seeking a secure remote connection.

    Rate this question:

  • 39. 

    What form of remote network access is often the only choice for rural or remote areas?

    • A.

      Dial-up.

    • B.

      Wireless.

    • C.

      Broadband.

    • D.

      Virtual private network.

    Correct Answer
    A. Dial-up.
    Explanation
    Dial-up is often the only choice for rural or remote areas because it uses a telephone line to establish a connection to the internet. In areas where broadband or wireless networks are not available, dial-up remains a viable option as it relies on existing infrastructure. While it may be slower and less reliable compared to other forms of remote network access, it can still provide basic internet connectivity in areas where other options are limited or unavailable.

    Rate this question:

  • 40. 

    What does Wi-Fi use to carry network signals to the network access point?

    • A.

      Cable lines.

    • B.

      Radio waves.

    • C.

      Dedicated lines.

    • D.

      Telephone lines.

    Correct Answer
    B. Radio waves.
    Explanation
    Wi-Fi uses radio waves to carry network signals to the network access point. Radio waves are electromagnetic waves that transmit data wirelessly through the air. This allows devices to connect to the internet without the need for physical cables. Wi-Fi signals are transmitted and received by devices such as routers and wireless adapters, enabling wireless communication and internet access.

    Rate this question:

  • 41. 

    What item below is not found in the Active Directory structure?

    • A.

      Domains.

    • B.

      Objects.

    • C.

      Forests.

    • D.

      Wi-Fi.

    Correct Answer
    D. Wi-Fi.
    Explanation
    The item that is not found in the Active Directory structure is Wi-Fi. Active Directory is a directory service that is used to manage and organize resources in a network environment. It provides a centralized database for storing information about network resources such as users, computers, and groups. Domains, objects, and forests are all components of the Active Directory structure, while Wi-Fi is a wireless networking technology that is not directly related to Active Directory.

    Rate this question:

  • 42. 

    What is configured to provide or deny users access to service on a local computer on on the local network/domain?

    • A.

      Profile.

    • B.

      Domain.

    • C.

      Account.

    • D.

      Directory.

    Correct Answer
    A. Profile.
    Explanation
    Profiles are configured to provide or deny users access to services on a local computer or on the local network/domain. A profile contains settings and preferences that determine how a user can interact with the system or network. These settings can include access permissions, restrictions, and privileges. By configuring profiles, administrators can control what services and resources users can access, ensuring security and proper usage of the system or network.

    Rate this question:

  • 43. 

    User accounts are uniquely identified by the

    • A.

      ACL.

    • B.

      SID.

    • C.

      Permissions.

    • D.

      Rights.

    Correct Answer
    B. SID.
    Explanation
    User accounts are uniquely identified by the Security Identifier (SID). A SID is a unique alphanumeric string assigned to each user account in a Windows operating system. It is used to identify and control access to various resources and objects on a computer or network. SIDs are persistent and remain the same even if the user account is renamed or moved to a different domain. Therefore, the SID is the correct answer for identifying user accounts uniquely.

    Rate this question:

  • 44. 

    Groups in active directory are directory

    • A.

      Trees.

    • B.

      Units.

    • C.

      Forests.

    • D.

      Objects.

    Correct Answer
    D. Objects.
    Explanation
    In Active Directory, groups are considered as objects. Active Directory is a hierarchical database that stores information about objects such as users, computers, and resources. Groups are used to organize and manage these objects by grouping them together based on certain criteria. Therefore, the correct answer is "objects".

    Rate this question:

  • 45. 

    Members of this group have full control of the server or individual workstations and can assign user rights and access control permissions.

    • A.

      Domain group accounts.

    • B.

      Domain user accounts.

    • C.

      Local Administarators.

    • D.

      Local user.

    Correct Answer
    C. Local Administarators.
    Explanation
    Local Administrators have full control of the server or individual workstations and can assign user rights and access control permissions. Domain group accounts refer to groups that are created and managed within a domain, while domain user accounts are individual user accounts within a domain. Local users are accounts that are created and managed locally on a specific machine. Therefore, Local Administrators is the correct answer as they have the necessary privileges to control user rights and access permissions on a server or workstation.

    Rate this question:

  • 46. 

    Which item resides on a domain controller and provides access to network resources throughout the domain?

    • A.

      Local groups.

    • B.

      Domain groups.

    • C.

      Local user accounts.

    • D.

      Domain user accounts.

    Correct Answer
    B. Domain groups.
    Explanation
    Domain groups are the correct answer because they reside on a domain controller and are used to provide access to network resources throughout the domain. Domain groups allow for centralized management of user accounts and permissions, making it easier to grant or revoke access to resources for multiple users at once. Local groups, on the other hand, are specific to individual computers and are not used for managing access across the entire domain. Local user accounts and domain user accounts are individual user accounts and do not provide access to network resources throughout the domain.

    Rate this question:

  • 47. 

    What is used to organize different types of accounts into manageable units?

    • A.

      An object.

    • B.

      An ACL.

    • C.

      A group.

    • D.

      A SID.

    Correct Answer
    C. A group.
    Explanation
    A group is used to organize different types of accounts into manageable units. By grouping accounts together, it becomes easier to manage permissions and access control for multiple accounts at once. This allows for streamlined administration and efficient organization of user accounts within a system.

    Rate this question:

  • 48. 

    What is installed on a computer to act as the interface between the computer and network?

    • A.

      NIC.

    • B.

      Ethernet.

    • C.

      Transceiver.

    • D.

      Coaxial cable.

    Correct Answer
    A. NIC.
    Explanation
    A Network Interface Card (NIC) is installed on a computer to act as the interface between the computer and the network. It allows the computer to connect to a network, whether it is wired or wireless, and enables communication between the computer and other devices on the network. The NIC handles the transmission and reception of data packets, converting them into a format that can be understood by the computer and the network. Ethernet, transceiver, and coaxial cable are all components that can be associated with a network connection, but the NIC is the actual device that facilitates the connection.

    Rate this question:

  • 49. 

    What is the unique identification number a network interface card (NIC) provides to a personal computer?

    • A.

      MAC address.

    • B.

      IEEE address.

    • C.

      OUI address.

    • D.

      SAS address.

    Correct Answer
    A. MAC address.
    Explanation
    A network interface card (NIC) provides a unique identification number to a personal computer known as a MAC address. This address is assigned by the manufacturer and is used to uniquely identify the NIC on a network. The MAC address is a 48-bit number, typically represented as six pairs of hexadecimal digits, and is essential for communication between devices on a network.

    Rate this question:

  • 50. 

    How many connector interfaces does a network interface card (NIC) provide for network cables?

    • A.

      One.

    • B.

      Two.

    • C.

      Three.

    • D.

      Four.

    Correct Answer
    D. Four.
    Explanation
    A network interface card (NIC) typically provides four connector interfaces for network cables. These interfaces are commonly known as Ethernet ports or RJ-45 ports. Each port can be used to connect a network cable, allowing the NIC to establish multiple network connections simultaneously. This is beneficial in scenarios where multiple devices need to be connected to a network using a single NIC.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 09, 2012
    Quiz Created by
    Airmanmcnair
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.