An Advanced Computer Hardware And Software Components Test

100 Questions

Settings
Please wait...
An Advanced Computer Hardware And Software Components Test

An advanced computer hardware and software components test is good practice for someone who is more willing to refresh their understanding of some of the things they have covered about computers. Are you one of these people? The quiz below is perfect for just that. Give it a shot and get to see how much you understand. All the best!


Questions and Answers
  • 1. 
    Which original components were very susceptible to damage from electrostatic discharge?
    • A. 

      Read only memory (ROM)

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 2. 
    What is considered to be a computer's main storage?
    • A. 

      Random access memory (RAM)

    • B. 

      Read only memory (ROM)

    • C. 

      Basic input/output system (BIOS)

    • D. 

      Complementary metal-oxide semiconductor (CMOS)

  • 3. 
    What is considered as nonvolatile permanent memory?
    • A. 

      Read only memory (ROM)

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 4. 
    What is a form of firmware that contains the computer's startup instructions?
    • A. 

      Cache

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 5. 
    What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
    • A. 

      Cache

    • B. 

      Buffer

    • C. 

      Interface

    • D. 

      Interrupt

  • 6. 
    Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?
    • A. 

      Disk request

    • B. 

      Utility resource

    • C. 

      Priority interrupt

    • D. 

      Integrated resource

  • 7. 
    Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 8. 
    Which term is used to describe that data is whole or complete?
    • A. 

      Driver

    • B. 

      Parity bit

    • C. 

      Data integrity

    • D. 

      Error correction

  • 9. 
    What is considered as a technique or method of checking data integrity?
    • A. 

      Fault

    • B. 

      Parity

    • C. 

      Interrupt

    • D. 

      Asynchronous

  • 10. 
    Which is a very simple example of an error-detecting code?
    • A. 

      Interrupt

    • B. 

      Parity bit

    • C. 

      Asynchronous

    • D. 

      Data Integrity

  • 11. 
    What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
    • A. 

      Network attached storage (NAS)

    • B. 

      Storage are network (SAN)

    • C. 

      Redundant array of independent disks (RAID)

    • D. 

      Array storage

  • 12. 
    • A. 

      Ease of replacing the hard drive

    • B. 

      Ease of replacing network connectivity

    • C. 

      Ease of replacing server

    • D. 

      Multiple users can access the server at once

  • 13. 
    • A. 

      Fibre channel

    • B. 

      ATA over Ethernet (AoE)

    • C. 

      Small computer system interface (SCSI)

    • D. 

      Internet small computer system interface (iSCSI)

  • 14. 
    Which storage device can be easily connected to a network and appears as a network drive?
    • A. 

      Storage area network (SAN)

    • B. 

      Redundant array of independent disks (RAID)

    • C. 

      Network attached storage (NAS)

    • D. 

      RHD

  • 15. 
    Which storage device has the means of providing data storage reliability using multiple hard drives?
    • A. 

      Storage area network (SAN)

    • B. 

      Network attached storage (NAS)

    • C. 

      Small computer system interface (SCSI)

    • D. 

      Redundant array of independent disks (RAID)

  • 16. 
    (204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as
    • A. 

      One single hard drive

    • B. 

      A collection of hard drives

    • C. 

      A single RAID array

    • D. 

      A remote storage device

  • 17. 
    (204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
    • A. 

      Small computer system interface (SCSI)

    • B. 

      Serial attached (SAS) SCSI

    • C. 

      Serial advanced technology attachment (SATA)

    • D. 

      Peripheral component interconnect express (PCIe)

  • 18. 
    (205) Which is not a characteristic of high-order languages?
    • A. 

      They are nearly self-documenting

    • B. 

      They use English-like statements

    • C. 

      Source codes that are written closest to the machine language

    • D. 

      Programs that are transportable between computers with few changes

  • 19. 
    (205) what best describes programming machine code?
    • A. 

      Another term for firmware

    • B. 

      Statements that correspond to complex actions

    • C. 

      Instructions in a form that is acceptable to the computer

    • D. 

      Source code that, when compiled, is appropriate for the computer

  • 20. 
    Which selection is a set of markup symbols or codes inserted in a file intended for display on a web browser page?
    • A. 

      Standard Generalized Markup Language (SGML)

    • B. 

      Extensible Markup Language (XML)

    • C. 

      Hypertext Markup Language (HTML)

    • D. 

      Dynamic HTML (DHTML)

  • 21. 
    Which web application is most likely to succeed Hypertext Markup Language (HTML)?
    • A. 

      Dynamic HTML (DHTML)

    • B. 

      Extensible Markup Language (XML)

    • C. 

      Standard Generalized Markup Language (SGML)

    • D. 

      Extensible HTML (XHTML)

  • 22. 
    A standard web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a
    • A. 

      Transport layer security (TLS)

    • B. 

      Common gateway interface (CGI)

    • C. 

      Data encryption standard (DES)

    • D. 

      Public key infrastructure (PKI)

  • 23. 
    Which protocol is commonly used for managing the security of a message transmission on the internet?
    • A. 

      Secure socket layer (SSL)

    • B. 

      Public key infrastructure (PKI)

    • C. 

      Data encryption standard (DES)

    • D. 

      Transport layer security (TLS)

  • 24. 
    Which program can be used to automatically launch programs on a preset schedule?
    • A. 

      Check disk

    • B. 

      Disk quotas

    • C. 

      Disk defragmenter

    • D. 

      Task scheduler

  • 25. 
    Which error-checking tool allows you to monitor the file systems for errors?
    • A. 

      Check disk

    • B. 

      Disk quotas

    • C. 

      Task Scheduler

    • D. 

      Disk defragmenter

  • 26. 
    Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
    • A. 

      Least significant digit (LSD)

    • B. 

      Most significant digit (MSD)

    • C. 

      Exponent

    • D. 

      Radix

  • 27. 
    • A. 

      Preventive controls

    • B. 

      List of critical devices

    • C. 

      Recovery strategies

    • D. 

      Emergency action plans

  • 28. 
    Which type of backup would you use at the end of the week to save all the data that you select on your systems?
    • A. 

      Incremental

    • B. 

      Differential

    • C. 

      Daily

    • D. 

      Normal

  • 29. 
    Which type of backup will backup all files that have been altered within the last 24 hours?
    • A. 

      Daily

    • B. 

      Normal

    • C. 

      Incremental

    • D. 

      Differential

  • 30. 
    • A. 

      Active directory

    • B. 

      Domains manager

    • C. 

      Domain name service (DNS)

    • D. 

      Dynamic host configuration protocol (DHCP)

  • 31. 
    • A. 

      Domain

    • B. 

      Forest

    • C. 

      Schema

    • D. 

      Tree

  • 32. 
    • A. 

      Dynamic host configuration protocol (DHCP) servers

    • B. 

      Domain name service (DNS) servers

    • C. 

      Domain controllers

    • D. 

      Global catalog servers

  • 33. 
    • A. 

      Dynamic host configuration protocol (DHCP)

    • B. 

      Domain controller

    • C. 

      Global catalog

    • D. 

      Member

  • 34. 
    • A. 

      Access control lists

    • B. 

      Access policy objects

    • C. 

      Group policy objects

    • D. 

      Group rules sets

  • 35. 
    Which type of interface is friendlier to the average user to use?
    • A. 

      Command line interface

    • B. 

      Graphical user interface

    • C. 

      Menu driven interface

    • D. 

      Palo Alto Research Center user interface

  • 36. 
    Which of the following is not one of the elements that most graphical user interfaces are composed of?
    • A. 

      Windows

    • B. 

      Icons

    • C. 

      Menus

    • D. 

      Programs

  • 37. 
    Sitting at a computer and loading a software patch onto it is an example of what type of software patch?
    • A. 

      Automatic

    • B. 

      Attended

    • C. 

      Unattended

    • D. 

      Remote

  • 38. 
    Which type of patch would utilize a remote installation service (RIS)?
    • A. 

      Automatic

    • B. 

      Local

    • C. 

      Manual

    • D. 

      Unattended

  • 39. 
    Which components of domain name services (DNS) contain a database of associated names and IP addresses?
    • A. 

      Name servers

    • B. 

      Resolvers

    • C. 

      Resource records

    • D. 

      Forward lookup zone

  • 40. 
    Which query is made by one name server to another name server?
    • A. 

      Dynamic host configuration protocol (DHCP) query

    • B. 

      Domain name service (DNS) query

    • C. 

      Recursive query

    • D. 

      Non-recursive query

  • 41. 
    Which software program manages an IP address allocation for a network?
    • A. 

      Dynamic host configuration protocol (DHCP)

    • B. 

      Domain name service (DNS)

    • C. 

      Active directory (AD)

    • D. 

      DHCP server

  • 42. 
    The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a 
    • A. 

      Pool

    • B. 

      Range

    • C. 

      Scope

    • D. 

      Zone

  • 43. 
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Five

  • 44. 
    According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?
    • A. 

      15 days

    • B. 

      30 days

    • C. 

      45 days

    • D. 

      60 days

  • 45. 
    • A. 

      Domain name service (DNS)

    • B. 

      Internet information services (IIS)

    • C. 

      Remote installation services (RIS)

    • D. 

      Web

  • 46. 
    Which is not a component of Internet information services (IIS)?
    • A. 

      FTP server

    • B. 

      Internet services manager

    • C. 

      Simple mail transport protocol (SMTP)

    • D. 

      Simple network management protocol (SNMP)

  • 47. 
    • A. 

      Domain name service (DNS)

    • B. 

      Internet information services (IIS)

    • C. 

      Microsoft management consoles (MMC)

    • D. 

      Remote installation services (RIS)

  • 48. 
     which type of group manages the user's rights assignments and access permissions?
    • A. 

      Universal

    • B. 

      Distribution

    • C. 

      Security

    • D. 

      Access

  • 49. 
    Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?
    • A. 

      Anonymous logon

    • B. 

      Everyone

    • C. 

      Network

    • D. 

      Interactive

  • 50. 
    • A. 

      Rights

    • B. 

      Permissions

    • C. 

      Access control lists

    • D. 

      Hardware configuration

  • 51. 
    A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called
    • A. 

      Rights

    • B. 

      Sharing

    • C. 

      Permissions

    • D. 

      Access control lists

  • 52. 
    • A. 

      Full control

    • B. 

      No access

    • C. 

      Change

    • D. 

      Write

  • 53. 
    • A. 

      Global group permissions

    • B. 

      Everyone group permissions

    • C. 

      No permissions are automatically assigned

    • D. 

      Inherited permissions of the folder it's contained in

  • 54. 
    Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it's shut down?
    • A. 

      Mailbox service

    • B. 

      System attendant

    • C. 

      Simple mail transport protocol (SMTP)

    • D. 

      Post office protocol version 3 (POP3) service

  • 55. 
    In exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information?
    • A. 

      Global settings

    • B. 

      System policies

    • C. 

      Tools

    • D. 

      Servers

  • 56. 
    Which type of lists uses pointers to connect each element together?
    • A. 

      Derived

    • B. 

      Linked

    • C. 

      Ordered

    • D. 

      Sequential

  • 57. 
    A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a
    • A. 

      List

    • B. 

      Schema

    • C. 

      Table

    • D. 

      View

  • 58. 
    • A. 

      Clauses

    • B. 

      Expressions

    • C. 

      Queries

    • D. 

      Statements

  • 59. 
    • A. 

      Data

    • B. 

      Query

    • C. 

      Schema

    • D. 

      Transaction

  • 60. 
    Which is the most commonly used sequential query language (SQL) data statement?
    • A. 

      Commit

    • B. 

      Select

    • C. 

      Where

    • D. 

      Update

  • 61. 
    Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?
    • A. 

      Buffers

    • B. 

      Concurrency

    • C. 

      Locking

    • D. 

      Logging

  • 62. 
    Which UNIX capability can execute numerous programs at the same time?
    • A. 

      Mulit-user

    • B. 

      Multiprocessing

    • C. 

      Time sharing

    • D. 

      Multitasking

  • 63. 
    Which UNIX ability can run on different types of hardware with few relatively minor changes?
    • A. 

      Portability

    • B. 

      Flexibility

    • C. 

      Simplicity

    • D. 

      Base line programming

  • 64. 
    Which UNIX operating system component interacts directly with the system hardware?
    • A. 

      File system

    • B. 

      VI editor

    • C. 

      Kernel

    • D. 

      Shell

  • 65. 
    Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data?
    • A. 

      File system

    • B. 

      VI editor

    • C. 

      Kernel

    • D. 

      Shell

  • 66. 
    Which UNIX shell is the most compact and is often used for writing shell scripts?
    • A. 

      C Shell

    • B. 

      Bourne shell

    • C. 

      Korn shell

    • D. 

      D shell

  • 67. 
    Normally, when you create a file with a text editor, the file is set up with
    • A. 

      Read and write permission for you and read-only permission for others

    • B. 

      Write permission for you and read only permission for others

    • C. 

      Read, write, and execute for you and read, write for others

    • D. 

      Read and write permission for you and read, write for others

  • 68. 
    To change permissions on a shell script, you use the UNIX command
    • A. 

      Chown

    • B. 

      Chgrp

    • C. 

      Chmod

    • D. 

      Chper

  • 69. 
    The simplest place to put your function definitions is in your
    • A. 

      Function

    • B. 

      Dev

    • C. 

      Definition

    • D. 

      Profile

  • 70. 
    • A. 

      Exit

    • B. 

      Quit

    • C. 

      X

    • D. 

      Xit

  • 71. 
    UNIX disks are divided into logical sections called
    • A. 

      Sectors

    • B. 

      Sections

    • C. 

      Reams

    • D. 

      Partitions

  • 72. 
    • A. 

      10

    • B. 

      12

    • C. 

      14

    • D. 

      16

  • 73. 
    The /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
    • A. 

      Root

    • B. 

      System

    • C. 

      Device

    • D. 

      Home

  • 74. 
    • A. 

      Controller

    • B. 

      Partition

    • C. 

      Drive number

    • D. 

      Bus target drive

  • 75. 
    • A. 

      Bus target number

    • B. 

      Drive number

    • C. 

      Controller

    • D. 

      Partition

  • 76. 
    • A. 

      Directories

    • B. 

      Partitions

    • C. 

      Slices

    • D. 

      Files

  • 77. 
    Hard links are created using which UNIX command?
    • A. 

      Cd

    • B. 

      Hd

    • C. 

      Lm

    • D. 

      Ln

  • 78. 
    Which UNIX mechanism enables programs to communicate with one another through the file system?
    • A. 

      Named pipes

    • B. 

      Character devices

    • C. 

      Block devices

    • D. 

      Sockets

  • 79. 
    Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time?
    • A. 

      Named pipes

    • B. 

      Character devices

    • C. 

      Block devices

    • D. 

      Sockets

  • 80. 
    Which UNIX command displays the current working directory?
    • A. 

      Ls

    • B. 

      Ls-s

    • C. 

      Pwf

    • D. 

      Pwd

  • 81. 
    Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames?
    • A. 

      Ls

    • B. 

      Cd

    • C. 

      Pwf

    • D. 

      Pwd

  • 82. 
    Which UNIX command takes any characters from standard input and then echoes them to standard output?
    • A. 

      Cat

    • B. 

      Mkdir

    • C. 

      Pwd

    • D. 

      Pwf

  • 83. 
    Which UNIX command deletes files from within a directory?
    • A. 

      Lm

    • B. 

      Rm

    • C. 

      Pr

    • D. 

      Ps

  • 84. 
    Which UNIX command looks at an individual file and finds a specified pattern (string)?
    • A. 

      Grep

    • B. 

      Find

    • C. 

      Crypt

    • D. 

      Group

  • 85. 
    Which UNIX command changes the group ownership of one or more files?
    • A. 

      Chgrp

    • B. 

      Chown

    • C. 

      Whodo

    • D. 

      Finger

  • 86. 
    Which UNIX command changes the ownership of one or more files to a new owner?
    • A. 

      Chgrp

    • B. 

      Chown

    • C. 

      Whodo

    • D. 

      Finger

  • 87. 
    Which UNIX command sets access and modification times for each file to the current time?
    • A. 

      Chgrp

    • B. 

      Chown

    • C. 

      Touch

    • D. 

      Finger

  • 88. 
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Four

  • 89. 
    Which UNIX vi mode allows users to execute set commands?
    • A. 

      Edit

    • B. 

      Text input

    • C. 

      Command

    • D. 

      Append

  • 90. 
    Which UNIX vi character represents the end of the file?
    • A. 

      *

    • B. 

      &

    • C. 

      ?

    • D. 

      $

  • 91. 
    While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in the same file?
    • A. 

      W

    • B. 

      W!

    • C. 

      Wq

    • D. 

      !

  • 92. 
    In UNIX, which package of programs lets a terminal handle many sessions at once?
    • A. 

      UNIX windows system

    • B. 

      Multi-user manager

    • C. 

      Multi-session manager

    • D. 

      UNIX session manager

  • 93. 
    • A. 

      U windows

    • B. 

      X windows

    • C. 

      UX windows

    • D. 

      UZwindows

  • 94. 
    Which UNIX default command starts the X windows system?
    • A. 

      Xwnds

    • B. 

      Xstart

    • C. 

      Xinit

    • D. 

      X

  • 95. 
    The act of choosing the window you type is called setting the 
    • A. 

      Active window

    • B. 

      Input focus

    • C. 

      X window

    • D. 

      Window manager

  • 96. 
    • A. 

      Iconifying

    • B. 

      Previewing

    • C. 

      Paging

    • D. 

      Desktop management

  • 97. 
    Which UNIX command from the menu bar moves a window to the bottom of the stack of windows?
    • A. 

      Resize

    • B. 

      Move

    • C. 

      Lower

    • D. 

      Restore

  • 98. 
    The key to shutting down an xterm window is to know which of your programs is the 
    • A. 

      Controlling program

    • B. 

      Exiting program

    • C. 

      Executing program

    • D. 

      Hard link file

  • 99. 
    The first step in quitting an xterm session is to 
    • A. 

      Quit all non-controlling programs

    • B. 

      Quit all controlling programs

    • C. 

      Type quit and press enter

    • D. 

      Type exit and press enter

  • 100. 
    Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man -k command?
    • A. 

      Catman

    • B. 

      Manbld

    • C. 

      Mancat

    • D. 

      Man-b