3d052n Vol 2 Ure

100 Questions | Total Attempts: 243

SettingsSettingsSettings
Please wait...
3d052n Vol 2 Ure

Updated answers to Volume 2 of the 3D052n URE's.


Questions and Answers
  • 1. 
    (201) Which original components were very susceptible to damage from electrostatic discharge?
    • A. 

      Read Only Memory (ROM).

    • B. 

      Basic Input/ Output System (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 2. 
    (201) What is considered to be a computer's main storage?
    • A. 

      Random Access Memory (RAM).

    • B. 

      Read-Only Memory (ROM).

    • C. 

      Basic Input/ Output System (BIOS).

    • D. 

      Complementary metal-oxide semiconductor (CMOS).

  • 3. 
    (201) What is considered as nonvolatile permanent memory?
    • A. 

      Read Only Memory (ROM).

    • B. 

      Basic Input/ Output System (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 4. 
    (201) What is a form of firmware that contains the computer's startup instructions?
    • A. 

      Cache.

    • B. 

      Basic Input/ Output System (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 5. 
    (202) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
    • A. 

      Cache.

    • B. 

      Buffer.

    • C. 

      Interface.

    • D. 

      Interrupt.

  • 6. 
    (202) Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
    • A. 

      2.

    • B. 

      4.

    • C. 

      6.

    • D. 

      8.

  • 7. 
    (202) Which is a term used to describe that data is whole or complete?
    • A. 

      Driver.

    • B. 

      Parity Bit.

    • C. 

      Data Integrity.

    • D. 

      Error Connection.

  • 8. 
    (202) What is considered as a technique or method of checking data integrity?
    • A. 

      Fault.

    • B. 

      Parity.

    • C. 

      Interrupt.

    • D. 

      Asynchronous.

  • 9. 
    (202) Which is a very simple example of an error detecting code?
    • A. 

      Interrupt.

    • B. 

      Parity Bit.

    • C. 

      Asynchronous.

    • D. 

      Data Integrity.

  • 10. 
    (203) What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
    • A. 

      Network Attached Storage (NAS).

    • B. 

      Storage Area Network (SAN).

    • C. 

      Redundant array of independent disks (RAID).

    • D. 

      Array Storage.

  • 11. 
    (203) What is an advantage of using a storage area network (SAN) architecture?
    • A. 

      Ease of replacing the hard drive.

    • B. 

      Ease of replacing network connectivity.

    • C. 

      Ease of Replacing Server.

    • D. 

      Multiple users can access the server at once.

  • 12. 
    (203) What is the connection type of choice for storage area networks (SAN)?
    • A. 

      Fibre Channel.

    • B. 

      ATA over Ethernet (AoE).

    • C. 

      Small computer system interface (SCSI).

    • D. 

      Internet small computer system interface (iSCSI).

  • 13. 
    (203) Which storage device can be easily connected to a network and appears as a network drive?
    • A. 

      Storage Area Network (SAN).

    • B. 

      Redundant array of independent disks (RAID).

    • C. 

      Network Attached Storage (NAS).

    • D. 

      RHD.

  • 14. 
    (204) Which storage device has the means of providing data storage reliability using multiple hard drives?
    • A. 

      Storage area network (SAN).

    • B. 

      Network attached storage (NAS).

    • C. 

      Small computer system interface (SCSI).

    • D. 

      Redundant array of independent disks (RAID).

  • 15. 
    (204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as
    • A. 

      One Single Hard Drive.

    • B. 

      A Collection of Hard Drives.

    • C. 

      A Single RAID Array.

    • D. 

      A Remote Storage Device.

  • 16. 
    (204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
    • A. 

      Small computer system interface (SCSI).

    • B. 

      Serial attached (SAS) SCSI.

    • C. 

      Serial advanced technology attachment (SATA).

    • D. 

      Peripheral component interconnect express (PCIe).

  • 17. 
    (205) Which is not a characteristic of high-order languages?
    • A. 

       They are nearly self-documenting.

    • B. 

      They use English-like statements.

    • C. 

      Source codes that are written closest to machine language.

    • D. 

      Programs are transportable between computers with few changes.

  • 18. 
    (206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
    • A. 

      Standard Generalized Markup Language (SGML).

    • B. 

      Extensible Markup Language (XML).

    • C. 

      HyperText Markup Language (HTML).

    • D. 

      Dynamic HTML (DHTML).

  • 19. 
    (206) Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
    • A. 

      Dynamic HTML (DHTML).

    • B. 

      Extensible Markup Language (XML).

    • C. 

      Standard Generalized Markup Language (SGML).

    • D. 

      Extensible HTML (XHTML).

  • 20. 
    (206) A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a
    • A. 

      Transport Layer Security (TLS).

    • B. 

      Common gateway interface (CGI).

    • C. 

      Data Encryption Standard (DES).

    • D. 

      Public Key Infrastructure (PKI).

  • 21. 
    (207) Which program can be used to automatically launch programs on a preset schedule?
    • A. 

      Check Disk.

    • B. 

      Disk Quotas.

    • C. 

      Disk Defragmenter.

    • D. 

      Task Scheduler.

  • 22. 
    (207) Which error-checking tool allows you to monitor the file system for errors?
    • A. 

      Check Disk.

    • B. 

      Disk Quotas.

    • C. 

      Task Scheduler.

    • D. 

      Disk Defragmenter.

  • 23. 
    (208) Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
    • A. 

      Least Significant Digit (LSD).

    • B. 

      Most Significant Digit (MSD).

    • C. 

      Exponent.

    • D. 

      Radix.

  • 24. 
    (209) What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?
    • A. 

      Preventative Controls.

    • B. 

      List of Critical Devices.

    • C. 

      Recovery Strategies.

    • D. 

      Emergency Action Plans.

  • 25. 
    (210) Which type of backup would you use at the end of the week to save all data that you select on your systems?
    • A. 

      Incremental.

    • B. 

      Differential.

    • C. 

      Daily.

    • D. 

      Normal.

Back to Top Back to top