Intro To PC Final Exam

68 Questions | Total Attempts: 36

SettingsSettingsSettings
Intro To PC Final Exam - Quiz

Final Exam Reviewer


Questions and Answers
  • 1. 
    The Intel chipset system uses the ___________ device to control the transfer data into and out of the SATA ports.
    • A. 

      CPU

    • B. 

      GMCH

    • C. 

      ICH

  • 2. 
    ________________ are rated by the maximum power (in watts) that they can provide.  It is important to keep in mind that the ________________ must produce at least enough energy to operate all the components of the system at the same time.  During the initial startup of the computer,  many components require additional power to get going.
  • 3. 
    It is important to know that ___________________________ itself does not cause electrical damage.  The damage occurs when these extremely high voltages are discharged in an uncontrolled manner, typically through a semiconductor such as an integrated circuit.
  • 4. 
    The _____________________ is the first Intel desktop CPU to put two CPU's in the same package, called dual-core.
  • 5. 
    The _______________ is the prime heat source within a PC.
  • 6. 
    _____________________________ or ____________________, is a newer type od SDRAM.  As its name implies, it transfers data at double the speed of regular SDRAM.
  • 7. 
    _____________________ are designed to be used in notebook or laptop computers.  They are physically smaller than standard DIMMS, but electrically similar, and are available in EDO and SDRAM types.
  • 8. 
    A time - tested way to increase system performance is to __________________________.  However,  when upgrading memory there are several precautions that must be observed to insure a smooth upgrade.
  • 9. 
    The biggest technical difference between Windows and MS-DOS is the _______________.  The _______________ is a database that keeps track of hardware and software configuration and setup information.
  • 10. 
    On older Windows 9x systems, you might see login screens where you can optionally enter a _______________ and ____________ - the key being optional.  WIth Windows NT, 2000, XP, and Vista, the ________________ and _____________ are required.
  • 11. 
    The objects in the COntents window are viewed in one of several formats.  You can use the View menu bar or the View icon on the tool bar to change the view (Icon, Tile, List, Details, and the Thumbnail).  The _________view is the default but is difficult to use if you are concerned with file sizes, the dates they were modified, or if you have a list of files that could be sorted for easier viewing.  We recommend switching to the _____________view.
  • 12. 
    A __________________________ was one reason the "ILOVEYOU" VIRUS (WORM) WAS SO DAMAGING TO MILLIONS OF wINDOWS USERS.  
  • 13. 
    ______________________ is generally used to describe any memory that does not lose data when the power is removed.  Its opposite is _______________, which lose data when power is removed.  ____________ is the physical memory package, usually a large IC on the motherboard.
  • 14. 
    The _______________________ contains information that points to the location of the operating system. In DOS and WIndows 95/98 that file was __________________.  In Windows NT/2000/XP that file is _______________.  In earlier operating systems the key files were ____________ and __________________. In Windows NT, 2000, and XP, _________________ is the key file.
  • 15. 
    _______________________ is one of the most important responsibilities of the system administrator.  ______________ and _________________ bacups are the most effective way of preventing data loss.
  • 16. 
    Microsoft recommends that you only used _______________ drivers, which also come with a special Windows logo stating they are designed for Windows. 
  • 17. 
    The __________________________ process eliminates most of the device drivers on the Internet that load malware along with running a device.
  • 18. 
    Most experienced system administrators will ____________________________, which effectively closes a potential security hole.  An amazing number of people use the default administrator account with their first name as password...and the hackers know this.
  • 19. 
    The ___________________ and _________________ are an attempt to verify that you are the authentic intended user, and not an imposter.  The process of verifying that the person typing is the actual authorized user is called ____________________.
  • 20. 
    ______________________ is most often defined as the act of playing a ruse to entice you to give up personal information.
  • 21. 
    One final approach takes a bit of work upfront but it works very quickly.  You can make a copy of your entire system partition and put it on CD or another hard drive.  This copy is called _______________, and is an exact duplicate of your drive.
  • 22. 
    What are the 6 diagnostic questions to ask when something goes wrong with your pc?
  • 23. 
    The goal of the hard drive is to ____________, ________________________________________________. This is accomplished by utilizing motion in two directions.
  • 24. 
    As we learned, __________________________ are composed of one or more disks or platters on which data is stored.  The physical geometry on these platters if often referred to as the _________________________ of a hard drive.  It is the _______________________ of data that determines the maximum storage capacity of the drive.
  • 25. 
    It (_________________________________) generally uses a 40 pin, 80 conductor cable.
Back to Top Back to top