CDC 3D151 Client Systems Journeyman Volume 1. Computer And Network Systems Fundamentals

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Atwellicus
A
Atwellicus
Community Contributor
Quizzes Created: 2 | Total Attempts: 383
| Attempts: 282 | Questions: 99
Please wait...
Question 1 / 99
0 %
0/100
Score 0/100
1. What is one of the best habits a Client Systems Technician can form in order to save time, effort and prevent mistakes?

Explanation

022. 3-8

Submit
Please wait...
About This Quiz
CDC 3D151 Client Systems Journeyman Volume 1. Computer And Network Systems Fundamentals - Quiz

Explore the fundamentals of computer and network systems through the CDC 3D151 Client Systems Journeyman Volume 1 quiz. This assessment covers information systems, hardware, peripheral devices, and more, enhancing your understanding of essential client system components.

Personalize your quiz and earn a certificate with your name on it!
2. What entails how we communicate and manage data?

Explanation

001. 1-1

Submit
3. What piece of equipment is at the core of most Wi-Fi networks?

Explanation

017. 2-35

Submit
4. Any hardware added to a computer that expands its capabilities is referred to as a/an

Explanation

002. 1-6

Submit
5. What is an essential tool for any Client Systems Technician to find software approved for use on an AF network?

Explanation

021. 3-5

Submit
6. What type of remote network provides a private tunnel through public cloud (the Internet)?

Explanation

010. 2-5

Submit
7. Which term describes that data is whole or complete?

Explanation

004. 1-15

Submit
8. What type of printer software configuration option requires a new port to be created?

Explanation

005. 1-18

Submit
9. What are minor software updates or improvements called?

Explanation

006. 1-33

Submit
10. What part of client systems includes the physical aspect of computers, telecommunications, and other devices, to include the interconnect devices?

Explanation

001. 1-2

Submit
11. What is installed on a computer to act as the interface between the computer and network?

Explanation

012. 2-12

Submit
12. What devices are mostly small, lightweight, and designed for mobile use?

Explanation

001. 1-2

Submit
13. What is the unique identification number a network interface card (NIC) provides to a personal computer?

Explanation

012. 2-12

Submit
14. What is the simplest and most efficient way to duplicate a computer's software, with no loss or files or configurations within the programs? 

Explanation

006. 1-35

Submit
15. This practice uses tapes, electronic vaulting, or mirrored disks and should be done regularly.

Explanation

028. 3-43

Submit
16. What does Wi-Fi use to carry network signals to the network access point?

Explanation

010. 2-6

Submit
17. The term used to refer to the process of launching the OS is the 

Explanation

003. 1-9

Submit
18. What item below is not found in the Active Directory structure?

Explanation

011. 2-7

Submit
19. Which is not a valid form of identity management? 

Explanation

018. 2-38

Submit
20. What describes how a computer finds a specific byte it is looking for in memory?

Explanation

004. 1-9

Submit
21. This type of memory is blank and instructions can be placed on permanently.

Explanation

004. 1-11

Submit
22. Which  type of memory is used to duplicate frequently used information stored elsewhere or computed earlier, because the original data is time consuming to retrieve or to compute?

Explanation

004. 1-12

Submit
23. What technology involves the capture and storage of a distinctive, measurable characteristic, feature, or trait of an individual for later recognition by automated means?

Explanation

018. 2-38

Submit
24. What device receives information from the internet and translates it into a radio signal and sends it to the computer's wireless adapter?

Explanation

017. 2-35

Submit
25. What program translates commands between a device and the programs that use the device?

Explanation

002. 1-7

Submit
26. What protocol provides an almost unlimited number of Internet Protocol addresses?

Explanation

018. 2-38

Submit
27. Which of these is a disadvantage of client-server networks?

Explanation

009. 2-5

Submit
28. Members of this group have full control of the server or individual workstations and can assign user rights and access control permissions. 

Explanation

011. 2-10

Submit
29. Use which tool to list all installed device drivers and their status, find hardware components that are not functioning properly or two devices that are in conflict on an operating system (OS)?

Explanation

026. 3-41

Submit
30. Which item is not a good practice in helping with future troubleshooting?

Explanation

023. 3-20

Submit
31. With a software license agreement, who has the full rights to the software and its further distribution and reproduction?

Explanation

021. 3-5

Submit
32. Reading and storing a document on a hard disk or some other storage medium for processing at a more convenient time is called

Explanation

005. 1-16

Submit
33. Printer hardware configuration via the web is done through

Explanation

005. 1-17

Submit
34. What form of remote network access is often the only choice for rural or remote areas?

Explanation

010. 2-6

Submit
35. Which hardware requirement is defined as the model and the clock speed of the CPU?

Explanation

006. 1-31

Submit
36. What file system is the best choice for data storage if the server is a dedicated Windows server?

Explanation

007. 1-38

Submit
37. The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system without constant problems is for the computer to have the minimum 

Explanation

006. 1-32

Submit
38. What program sets up the divisions of memory that hold the operating system, user information and applications?

Explanation

003. 1-9

Submit
39. What type of memory is nonvolatile, considered permanent, and is also called firmware in reference to the data and instructions stored?

Explanation

004. 1-11.

Submit
40. When troubleshooting after a system failure, this step is a last resort effort when all other avenues have been exhasted.

Explanation

027. 3-42

Submit
41. How many byte sectors is a hard disk divided into?

Explanation

007. 1-36

Submit
42. What stores print jobs in a print queue until a printer becomes available? 

Explanation

013. 2-16

Submit
43. Which of the below is not a type of computer user interface?

Explanation

006. 1-29

Submit
44. Which type of memory stores configuration information, and is used by the BIOS during system boot up?

Explanation

004. 1-11

Submit
45. The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a 

Explanation

002. 1-6

Submit
46. What percentage of all network problems occur at the data link and physical layers of the open systems interconnect reference model?

Explanation

025. 3-33

Submit
47. The Public Key Infrastructure component that would be necessary if the private key of a key holder was compromised is referred to as the certificate

Explanation

016. 2-33

Submit
48. What are the two major ways to implement a client server network?

Explanation

015. 2-25

Submit
49. A formatted disk partition that is used for a particular file system is called

Explanation

007. 1-37

Submit
50. Who centrally manages the Air Force server updates that keep your workstation antivirus software current?

Explanation

019. 3-3

Submit
51. Which is not a transmission medium for a wireless local area network?

Explanation

014. 2-24

Submit
52. In a network environment, what may be responsible for all or some of the network operational tasks?

Explanation

015. 2-25

Submit
53. Which media has a storage capacity of gigabyte (GB) - terabyte (TB), has a slow to moderate speed and is moderately expensive?

Explanation

028. 3-44

Submit
54. Which of these is not a prominent characteristic of an operating system?

Explanation

006. 1-26

Submit
55. Which is a very simple example of an error detecting code?

Explanation

004. 1-15

Submit
56. How many bits long are the addresses that computer instructions work with?

Explanation

004. 1-10

Submit
57. What data integrity method is used in high-end personal computers and file servers?

Explanation

004. 1-16

Submit
58. The first sector at the beginning of a hard drive is called the master

Explanation

007. 1-37

Submit
59. What software activates the actual transmission and receipt of data over the network?

Explanation

012. 2-14

Submit
60. User accounts are uniquely identified by the

Explanation

011. 2-8

Submit
61. What is used to organize different types of accounts into manageable units?

Explanation

011. 2-11

Submit
62. A static internet protocol address on a network printer during hardware configuration is used for

Explanation

005. 1-17

Submit
63. Which of the following is not one of the three types of interfaces?

Explanation

002. 1-6

Submit
64. What access control uses segregation of duties and security screening for users?

Explanation

016. 2-31

Submit
65. Which item resides on a domain controller and provides access to network resources throughout  the domain?

Explanation

011. 2-10

Submit
66. What drives faster processing speeds and increases the power of man computers and communication devices?

Explanation

018. 2-38

Submit
67. Which logical troubleshooting step would include classifying the problem as hardware or software related?

Explanation

022. 3-9I

Submit
68. If this security feature is enabled on a wireless network, access points or routers perform additional checks, helping prevent network break-ins.

Explanation

017. 2-36

Submit
69. Which alarm category in the network management system indicates a warning?

Explanation

023. 3-24

Submit
70. Which type of network is often called the GigE network?

Explanation

024. 3-26

Submit
71. Groups in active directory are directory

Explanation

011. 2-9

Submit
72. What physical structure component is a collection of Internet Protocol subnet ranges?

Explanation

008. 1-41

Submit
73. The most common hardware dignostic tool is the

Explanation

022. 3-12

Submit
74. In network troubleshooting, any event that has a negative effect on the service of the network is referred to as a

Explanation

023. 3-14.

Submit
75. This operating system tool allows the viewing of the number of sent packets, status, total connection time, and speed of a network.

Explanation

026. 3-41

Submit
76. What piece of test equipment can help verify connectivity and identify shorts, reversed, crossed or split pairs on a network?

Explanation

025. 3-33

Submit
77. On a network, what system manages network resources, allows other resources to be shared across the network, and provides the security necessary in a multi-user environment?

Explanation

015. 2-25

Submit
78. A spooled print job be several times larger than the printed document size because of the conversion to the 

Explanation

005. 1-17

Submit
79. How does a router send information to the internet on a wireless network?

Explanation

017. 2-35

Submit
80. What function enables the higher layer protocol data units to fit into the lower layer PDU for transmission across the network?

Explanation

023. 3-23

Submit
81. What tool can launch individual troubleshooting/configuration programs and other utilities having to do with networking, video display, printers, sound, and email configuration on an operating system?

Explanation

026. 3-41

Submit
82. How much power does a NAND drive require?

Explanation

018. 2-38

Submit
83. By default, the first domain controller in active directory service is a

Explanation

008. 1-42

Submit
84. What should be done before anything else, once the operating system installation is complete?

Explanation

006. 1-32

Submit
85. How many connector interfaces does a network interface card (NIC) provide for network cables?

Explanation

012. 2-14

Submit
86. Which backup type does not clear archive flags once the backup job is complete?

Explanation

028. 3-45

Submit
87. Which fault isolation technique may entail checking the cable connections as well as reseating devices and checking all switches and settings for devices?

Explanation

027. 3-42

Submit
88. Which is NOT a basic function of antivirus programs?

Explanation

019. 3-2

Submit
89. Which is not a way in which round trip delay can be determined?

Explanation

023. 3-23

Submit
90. What information is not required when configuring Transmission Control Protocol/Internet Protocol (TCP/IP)?

Explanation

012. 2-15

Submit
91. Within how many bytes of a transmission should a network interface card sense a collision?

Explanation

023. 3-21

Submit
92. This is an authorized method of cleaning and sanitizing many types of magnetic media.

Explanation

029. 3-48

Submit
93. The action that involves localization and identification of irregularities that cause a fault to be registered is referred to as fault

Explanation

023. 3-14

Submit
94. What is an electronic credit card-like device that establishes your credentials when doing business or other transactions on the Internet?

Explanation

016. 2-34

Submit
95. Which cleaning process overwrites all addressable locations with binary zeros, then binary ones, and overwrites all addressable locations with any character on sealed disk drives, hard disks, and drives?

Explanation

029. 3-46

Submit
96. Which Air Force Instruction governs software use?

Explanation

021. 3-4

Submit
97. Which item is not an optical storage media?

Explanation

029. 3-47

Submit
98. What item is a means by which Windows products are updated and kept current?

Explanation

020. 3-3

Submit
99. What is configured to provide or deny users access to service on a local computer or on the local network/domain?

Explanation

011. 2-8

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 06, 2016
    Quiz Created by
    Atwellicus
Cancel
  • All
    All (99)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is one of the best habits a Client Systems Technician can form in...
What entails how we communicate and manage data?
What piece of equipment is at the core of most Wi-Fi networks?
Any hardware added to a computer that expands its capabilities is...
What is an essential tool for any Client Systems Technician to find...
What type of remote network provides a private tunnel through public...
Which term describes that data is whole or complete?
What type of printer software configuration option requires a new port...
What are minor software updates or improvements called?
What part of client systems includes the physical aspect of computers,...
What is installed on a computer to act as the interface between the...
What devices are mostly small, lightweight, and designed for mobile...
What is the unique identification number a network interface card...
What is the simplest and most efficient way to duplicate a...
This practice uses tapes, electronic vaulting, or mirrored disks and...
What does Wi-Fi use to carry network signals to the network access...
The term used to refer to the process of launching the OS is the 
What item below is not found in the Active Directory structure?
Which is not a valid form of identity management? 
What describes how a computer finds a specific byte it is looking for...
This type of memory is blank and instructions can be placed on...
Which  type of memory is used to duplicate frequently used...
What technology involves the capture and storage of a distinctive,...
What device receives information from the internet and translates it...
What program translates commands between a device and the programs...
What protocol provides an almost unlimited number of Internet Protocol...
Which of these is a disadvantage of client-server networks?
Members of this group have full control of the server or individual...
Use which tool to list all installed device drivers and their status,...
Which item is not a good practice in helping with future...
With a software license agreement, who has the full rights to the...
Reading and storing a document on a hard disk or some other storage...
Printer hardware configuration via the web is done through
What form of remote network access is often the only choice for rural...
Which hardware requirement is defined as the model and the clock speed...
What file system is the best choice for data storage if the server is...
The specifications that should be met, if not exceeded, to ensure a...
What program sets up the divisions of memory that hold the operating...
What type of memory is nonvolatile, considered permanent, and is also...
When troubleshooting after a system failure, this step is a last...
How many byte sectors is a hard disk divided into?
What stores print jobs in a print queue until a printer becomes...
Which of the below is not a type of computer user interface?
Which type of memory stores configuration information, and is used by...
The transfer of eight bits of data simultaneously through eight...
What percentage of all network problems occur at the data link and...
The Public Key Infrastructure component that would be necessary if the...
What are the two major ways to implement a client server network?
A formatted disk partition that is used for a particular file system...
Who centrally manages the Air Force server updates that keep your...
Which is not a transmission medium for a wireless local area...
In a network environment, what may be responsible for all or some of...
Which media has a storage capacity of gigabyte (GB) - terabyte (TB),...
Which of these is not a prominent characteristic of an operating...
Which is a very simple example of an error detecting code?
How many bits long are the addresses that computer instructions work...
What data integrity method is used in high-end personal computers and...
The first sector at the beginning of a hard drive is called the master
What software activates the actual transmission and receipt of data...
User accounts are uniquely identified by the
What is used to organize different types of accounts into manageable...
A static internet protocol address on a network printer during...
Which of the following is not one of the three types of interfaces?
What access control uses segregation of duties and security screening...
Which item resides on a domain controller and provides access to...
What drives faster processing speeds and increases the power of man...
Which logical troubleshooting step would include classifying the...
If this security feature is enabled on a wireless network, access...
Which alarm category in the network management system indicates a...
Which type of network is often called the GigE network?
Groups in active directory are directory
What physical structure component is a collection of Internet Protocol...
The most common hardware dignostic tool is the
In network troubleshooting, any event that has a negative effect on...
This operating system tool allows the viewing of the number of sent...
What piece of test equipment can help verify connectivity and identify...
On a network, what system manages network resources, allows other...
A spooled print job be several times larger than the printed document...
How does a router send information to the internet on a wireless...
What function enables the higher layer protocol data units to fit into...
What tool can launch individual troubleshooting/configuration programs...
How much power does a NAND drive require?
By default, the first domain controller in active directory service is...
What should be done before anything else, once the operating system...
How many connector interfaces does a network interface card (NIC)...
Which backup type does not clear archive flags once the backup job is...
Which fault isolation technique may entail checking the cable...
Which is NOT a basic function of antivirus programs?
Which is not a way in which round trip delay can be...
What information is not required when configuring Transmission Control...
Within how many bytes of a transmission should a network interface...
This is an authorized method of cleaning and sanitizing many types of...
The action that involves localization and identification of...
What is an electronic credit card-like device that establishes your...
Which cleaning process overwrites all addressable locations with...
Which Air Force Instruction governs software use?
Which item is not an optical storage media?
What item is a means by which Windows products are updated and kept...
What is configured to provide or deny users access to service on a...
Alert!

Advertisement