CDC 3D151 Client Systems Journeyman Volume 1. Computer and Network Systems Fundamentals

  • 11th Grade,
  • 12th Grade
  • IEEE
  • ACM
  • CompTIA
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Atwellicus
A
Atwellicus
Community Contributor
Quizzes Created: 2 | Total Attempts: 385
| Attempts: 282 | Questions: 99 | Updated: Mar 21, 2025
Please wait...
Question 1 / 100
🏆 Rank #--
Score 0/100

1. What is one of the best habits a Client Systems Technician can form in order to save time, effort and prevent mistakes?

Explanation

022. 3-8

Submit
Please wait...
About This Quiz
CDC 3D151 Client Systems Journeyman Volume 1. Computer and Network Systems Fundamentals - Quiz

Explore the fundamentals of computer and network systems through the CDC 3D151 Client Systems Journeyman Volume 1 quiz. This assessment covers information systems, hardware, peripheral devices, and more, enhancing your understanding of essential client system components.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What entails how we communicate and manage data?

Explanation

001. 1-1

Submit

3. What piece of equipment is at the core of most Wi-Fi networks?

Explanation

017. 2-35

Submit

4. Any hardware added to a computer that expands its capabilities is referred to as a/an

Explanation

002. 1-6

Submit

5. What is an essential tool for any Client Systems Technician to find software approved for use on an AF network?

Explanation

021. 3-5

Submit

6. What type of remote network provides a private tunnel through public cloud (the Internet)?

Explanation

010. 2-5

Submit

7. Which term describes that data is whole or complete?

Explanation

004. 1-15

Submit

8. What type of printer software configuration option requires a new port to be created?

Explanation

005. 1-18

Submit

9. What are minor software updates or improvements called?

Explanation

006. 1-33

Submit

10. What part of client systems includes the physical aspect of computers, telecommunications, and other devices, to include the interconnect devices?

Explanation

001. 1-2

Submit

11. What is installed on a computer to act as the interface between the computer and network?

Explanation

012. 2-12

Submit

12. What devices are mostly small, lightweight, and designed for mobile use?

Explanation

001. 1-2

Submit

13. What is the unique identification number a network interface card (NIC) provides to a personal computer?

Explanation

012. 2-12

Submit

14. What is the simplest and most efficient way to duplicate a computer's software, with no loss or files or configurations within the programs? 

Explanation

006. 1-35

Submit

15. This practice uses tapes, electronic vaulting, or mirrored disks and should be done regularly.

Explanation

028. 3-43

Submit

16. What does Wi-Fi use to carry network signals to the network access point?

Explanation

010. 2-6

Submit

17. The term used to refer to the process of launching the OS is the 

Explanation

003. 1-9

Submit

18. What item below is not found in the Active Directory structure?

Explanation

011. 2-7

Submit

19. Which is not a valid form of identity management? 

Explanation

018. 2-38

Submit

20. What describes how a computer finds a specific byte it is looking for in memory?

Explanation

004. 1-9

Submit

21. This type of memory is blank and instructions can be placed on permanently.

Explanation

004. 1-11

Submit

22. Which  type of memory is used to duplicate frequently used information stored elsewhere or computed earlier, because the original data is time consuming to retrieve or to compute?

Explanation

004. 1-12

Submit

23. What technology involves the capture and storage of a distinctive, measurable characteristic, feature, or trait of an individual for later recognition by automated means?

Explanation

018. 2-38

Submit

24. What device receives information from the internet and translates it into a radio signal and sends it to the computer's wireless adapter?

Explanation

017. 2-35

Submit

25. What program translates commands between a device and the programs that use the device?

Explanation

002. 1-7

Submit

26. What protocol provides an almost unlimited number of Internet Protocol addresses?

Explanation

018. 2-38

Submit

27. Which of these is a disadvantage of client-server networks?

Explanation

009. 2-5

Submit

28. Members of this group have full control of the server or individual workstations and can assign user rights and access control permissions. 

Explanation

011. 2-10

Submit

29. Use which tool to list all installed device drivers and their status, find hardware components that are not functioning properly or two devices that are in conflict on an operating system (OS)?

Explanation

026. 3-41

Submit

30. Which item is not a good practice in helping with future troubleshooting?

Explanation

023. 3-20

Submit

31. With a software license agreement, who has the full rights to the software and its further distribution and reproduction?

Explanation

021. 3-5

Submit

32. Reading and storing a document on a hard disk or some other storage medium for processing at a more convenient time is called

Explanation

005. 1-16

Submit

33. Printer hardware configuration via the web is done through

Explanation

005. 1-17

Submit

34. What form of remote network access is often the only choice for rural or remote areas?

Explanation

010. 2-6

Submit

35. Which hardware requirement is defined as the model and the clock speed of the CPU?

Explanation

006. 1-31

Submit

36. What file system is the best choice for data storage if the server is a dedicated Windows server?

Explanation

007. 1-38

Submit

37. The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system without constant problems is for the computer to have the minimum 

Explanation

006. 1-32

Submit

38. What program sets up the divisions of memory that hold the operating system, user information and applications?

Explanation

003. 1-9

Submit

39. What type of memory is nonvolatile, considered permanent, and is also called firmware in reference to the data and instructions stored?

Explanation

004. 1-11.

Submit

40. When troubleshooting after a system failure, this step is a last resort effort when all other avenues have been exhasted.

Explanation

027. 3-42

Submit

41. How many byte sectors is a hard disk divided into?

Explanation

007. 1-36

Submit

42. What stores print jobs in a print queue until a printer becomes available? 

Explanation

013. 2-16

Submit

43. Which of the below is not a type of computer user interface?

Explanation

006. 1-29

Submit

44. Which type of memory stores configuration information, and is used by the BIOS during system boot up?

Explanation

004. 1-11

Submit

45. The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a 

Explanation

002. 1-6

Submit

46. What percentage of all network problems occur at the data link and physical layers of the open systems interconnect reference model?

Explanation

025. 3-33

Submit

47. The Public Key Infrastructure component that would be necessary if the private key of a key holder was compromised is referred to as the certificate

Explanation

016. 2-33

Submit

48. What are the two major ways to implement a client server network?

Explanation

015. 2-25

Submit

49. A formatted disk partition that is used for a particular file system is called

Explanation

007. 1-37

Submit

50. Who centrally manages the Air Force server updates that keep your workstation antivirus software current?

Explanation

019. 3-3

Submit

51. Which is not a transmission medium for a wireless local area network?

Explanation

014. 2-24

Submit

52. In a network environment, what may be responsible for all or some of the network operational tasks?

Explanation

015. 2-25

Submit

53. Which media has a storage capacity of gigabyte (GB) - terabyte (TB), has a slow to moderate speed and is moderately expensive?

Explanation

028. 3-44

Submit

54. Which of these is not a prominent characteristic of an operating system?

Explanation

006. 1-26

Submit

55. Which is a very simple example of an error detecting code?

Explanation

004. 1-15

Submit

56. How many bits long are the addresses that computer instructions work with?

Explanation

004. 1-10

Submit

57. What data integrity method is used in high-end personal computers and file servers?

Explanation

004. 1-16

Submit

58. The first sector at the beginning of a hard drive is called the master

Explanation

007. 1-37

Submit

59. What software activates the actual transmission and receipt of data over the network?

Explanation

012. 2-14

Submit

60. User accounts are uniquely identified by the

Explanation

011. 2-8

Submit

61. What is used to organize different types of accounts into manageable units?

Explanation

011. 2-11

Submit

62. A static internet protocol address on a network printer during hardware configuration is used for

Explanation

005. 1-17

Submit

63. Which of the following is not one of the three types of interfaces?

Explanation

002. 1-6

Submit

64. What access control uses segregation of duties and security screening for users?

Explanation

016. 2-31

Submit

65. Which item resides on a domain controller and provides access to network resources throughout  the domain?

Explanation

011. 2-10

Submit

66. What drives faster processing speeds and increases the power of man computers and communication devices?

Explanation

018. 2-38

Submit

67. Which logical troubleshooting step would include classifying the problem as hardware or software related?

Explanation

022. 3-9I

Submit

68. If this security feature is enabled on a wireless network, access points or routers perform additional checks, helping prevent network break-ins.

Explanation

017. 2-36

Submit

69. Which alarm category in the network management system indicates a warning?

Explanation

023. 3-24

Submit

70. Which type of network is often called the GigE network?

Explanation

024. 3-26

Submit

71. Groups in active directory are directory

Explanation

011. 2-9

Submit

72. What physical structure component is a collection of Internet Protocol subnet ranges?

Explanation

008. 1-41

Submit

73. The most common hardware dignostic tool is the

Explanation

022. 3-12

Submit

74. In network troubleshooting, any event that has a negative effect on the service of the network is referred to as a

Explanation

023. 3-14.

Submit

75. This operating system tool allows the viewing of the number of sent packets, status, total connection time, and speed of a network.

Explanation

026. 3-41

Submit

76. What piece of test equipment can help verify connectivity and identify shorts, reversed, crossed or split pairs on a network?

Explanation

025. 3-33

Submit

77. On a network, what system manages network resources, allows other resources to be shared across the network, and provides the security necessary in a multi-user environment?

Explanation

015. 2-25

Submit

78. A spooled print job be several times larger than the printed document size because of the conversion to the 

Explanation

005. 1-17

Submit

79. How does a router send information to the internet on a wireless network?

Explanation

017. 2-35

Submit

80. What function enables the higher layer protocol data units to fit into the lower layer PDU for transmission across the network?

Explanation

023. 3-23

Submit

81. What tool can launch individual troubleshooting/configuration programs and other utilities having to do with networking, video display, printers, sound, and email configuration on an operating system?

Explanation

026. 3-41

Submit

82. How much power does a NAND drive require?

Explanation

018. 2-38

Submit

83. By default, the first domain controller in active directory service is a

Explanation

008. 1-42

Submit

84. What should be done before anything else, once the operating system installation is complete?

Explanation

006. 1-32

Submit

85. How many connector interfaces does a network interface card (NIC) provide for network cables?

Explanation

012. 2-14

Submit

86. Which backup type does not clear archive flags once the backup job is complete?

Explanation

028. 3-45

Submit

87. Which fault isolation technique may entail checking the cable connections as well as reseating devices and checking all switches and settings for devices?

Explanation

027. 3-42

Submit

88. Which is NOT a basic function of antivirus programs?

Explanation

019. 3-2

Submit

89. Which is not a way in which round trip delay can be determined?

Explanation

023. 3-23

Submit

90. What information is not required when configuring Transmission Control Protocol/Internet Protocol (TCP/IP)?

Explanation

012. 2-15

Submit

91. Within how many bytes of a transmission should a network interface card sense a collision?

Explanation

023. 3-21

Submit

92. This is an authorized method of cleaning and sanitizing many types of magnetic media.

Explanation

029. 3-48

Submit

93. The action that involves localization and identification of irregularities that cause a fault to be registered is referred to as fault

Explanation

023. 3-14

Submit

94. What is an electronic credit card-like device that establishes your credentials when doing business or other transactions on the Internet?

Explanation

016. 2-34

Submit

95. Which cleaning process overwrites all addressable locations with binary zeros, then binary ones, and overwrites all addressable locations with any character on sealed disk drives, hard disks, and drives?

Explanation

029. 3-46

Submit

96. Which Air Force Instruction governs software use?

Explanation

021. 3-4

Submit

97. Which item is not an optical storage media?

Explanation

029. 3-47

Submit

98. What item is a means by which Windows products are updated and kept current?

Explanation

020. 3-3

Submit

99. What is configured to provide or deny users access to service on a local computer or on the local network/domain?

Explanation

011. 2-8

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (99)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is one of the best habits a Client Systems Technician can form in...
What entails how we communicate and manage data?
What piece of equipment is at the core of most Wi-Fi networks?
Any hardware added to a computer that expands its capabilities is...
What is an essential tool for any Client Systems Technician to find...
What type of remote network provides a private tunnel through public...
Which term describes that data is whole or complete?
What type of printer software configuration option requires a new port...
What are minor software updates or improvements called?
What part of client systems includes the physical aspect of computers,...
What is installed on a computer to act as the interface between the...
What devices are mostly small, lightweight, and designed for mobile...
What is the unique identification number a network interface card...
What is the simplest and most efficient way to duplicate a...
This practice uses tapes, electronic vaulting, or mirrored disks and...
What does Wi-Fi use to carry network signals to the network access...
The term used to refer to the process of launching the OS is the 
What item below is not found in the Active Directory structure?
Which is not a valid form of identity management? 
What describes how a computer finds a specific byte it is looking for...
This type of memory is blank and instructions can be placed on...
Which  type of memory is used to duplicate frequently used...
What technology involves the capture and storage of a distinctive,...
What device receives information from the internet and translates it...
What program translates commands between a device and the programs...
What protocol provides an almost unlimited number of Internet Protocol...
Which of these is a disadvantage of client-server networks?
Members of this group have full control of the server or individual...
Use which tool to list all installed device drivers and their status,...
Which item is not a good practice in helping with future...
With a software license agreement, who has the full rights to the...
Reading and storing a document on a hard disk or some other storage...
Printer hardware configuration via the web is done through
What form of remote network access is often the only choice for rural...
Which hardware requirement is defined as the model and the clock speed...
What file system is the best choice for data storage if the server is...
The specifications that should be met, if not exceeded, to ensure a...
What program sets up the divisions of memory that hold the operating...
What type of memory is nonvolatile, considered permanent, and is also...
When troubleshooting after a system failure, this step is a last...
How many byte sectors is a hard disk divided into?
What stores print jobs in a print queue until a printer becomes...
Which of the below is not a type of computer user interface?
Which type of memory stores configuration information, and is used by...
The transfer of eight bits of data simultaneously through eight...
What percentage of all network problems occur at the data link and...
The Public Key Infrastructure component that would be necessary if the...
What are the two major ways to implement a client server network?
A formatted disk partition that is used for a particular file system...
Who centrally manages the Air Force server updates that keep your...
Which is not a transmission medium for a wireless local area...
In a network environment, what may be responsible for all or some of...
Which media has a storage capacity of gigabyte (GB) - terabyte (TB),...
Which of these is not a prominent characteristic of an operating...
Which is a very simple example of an error detecting code?
How many bits long are the addresses that computer instructions work...
What data integrity method is used in high-end personal computers and...
The first sector at the beginning of a hard drive is called the master
What software activates the actual transmission and receipt of data...
User accounts are uniquely identified by the
What is used to organize different types of accounts into manageable...
A static internet protocol address on a network printer during...
Which of the following is not one of the three types of interfaces?
What access control uses segregation of duties and security screening...
Which item resides on a domain controller and provides access to...
What drives faster processing speeds and increases the power of man...
Which logical troubleshooting step would include classifying the...
If this security feature is enabled on a wireless network, access...
Which alarm category in the network management system indicates a...
Which type of network is often called the GigE network?
Groups in active directory are directory
What physical structure component is a collection of Internet Protocol...
The most common hardware dignostic tool is the
In network troubleshooting, any event that has a negative effect on...
This operating system tool allows the viewing of the number of sent...
What piece of test equipment can help verify connectivity and identify...
On a network, what system manages network resources, allows other...
A spooled print job be several times larger than the printed document...
How does a router send information to the internet on a wireless...
What function enables the higher layer protocol data units to fit into...
What tool can launch individual troubleshooting/configuration programs...
How much power does a NAND drive require?
By default, the first domain controller in active directory service is...
What should be done before anything else, once the operating system...
How many connector interfaces does a network interface card (NIC)...
Which backup type does not clear archive flags once the backup job is...
Which fault isolation technique may entail checking the cable...
Which is NOT a basic function of antivirus programs?
Which is not a way in which round trip delay can be...
What information is not required when configuring Transmission Control...
Within how many bytes of a transmission should a network interface...
This is an authorized method of cleaning and sanitizing many types of...
The action that involves localization and identification of...
What is an electronic credit card-like device that establishes your...
Which cleaning process overwrites all addressable locations with...
Which Air Force Instruction governs software use?
Which item is not an optical storage media?
What item is a means by which Windows products are updated and kept...
What is configured to provide or deny users access to service on a...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!