An Advanced Computer Hardware And Software Components Test

100 Questions | Attempts: 679
Share
SettingsSettings
Please wait...
  • 1/100 Questions

    Which original components were very susceptible to damage from electrostatic discharge?

    • Read only memory (ROM)
    • Basic input/output system (BIOS)
    • Complementary metal-oxide semiconductor (CMOS)
    • Electronic erasable programmable read-only memory (EEPROM)
Please wait...
About This Quiz

An advanced computer hardware and software components test is good practice for someone who is more willing to refresh their understanding of some of the things they have covered about computers. Are you one of these people? The quiz below is perfect for just that. Give it a shot and get to see how much you understand. All the best!

An Advanced Computer Hardware And Software Components Test - Quiz

Quiz Preview

  • 2. 

    What is considered to be a computer's main storage?

    • Random access memory (RAM)

    • Read only memory (ROM)

    • Basic input/output system (BIOS)

    • Complementary metal-oxide semiconductor (CMOS)

    Correct Answer
    A. Random access memory (RAM)
  • 3. 

    What is considered as nonvolatile permanent memory?

    • Read only memory (ROM)

    • Basic input/output system (BIOS)

    • Complementary metal-oxide semiconductor (CMOS)

    • Electronic erasable programmable read-only memory (EEPROM)

    Correct Answer
    A. Read only memory (ROM)
  • 4. 

    What is a form of firmware that contains the computer's startup instructions?

    • Cache

    • Basic input/output system (BIOS)

    • Complementary metal-oxide semiconductor (CMOS)

    • Electronic erasable programmable read-only memory (EEPROM)

    Correct Answer
    A. Basic input/output system (BIOS)
  • 5. 

    Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?

    • Disk request

    • Utility resource

    • Priority interrupt

    • Integrated resource

    Correct Answer
    A. Priority interrupt
  • 6. 

    Which term is used to describe that data is whole or complete?

    • Driver

    • Parity bit

    • Data integrity

    • Error correction

    Correct Answer
    A. Data integrity
  • 7. 

    What is considered as a technique or method of checking data integrity?

    • Fault

    • Parity

    • Interrupt

    • Asynchronous

    Correct Answer
    A. Parity
  • 8. 

    What is the connection type of choice for storage area networks (SAN)?

    • Fibre channel

    • ATA over Ethernet (AoE)

    • Small computer system interface (SCSI)

    • Internet small computer system interface (iSCSI)

    Correct Answer
    A. Fibre channel
  • 9. 

    Which storage device can be easily connected to a network and appears as a network drive?

    • Storage area network (SAN)

    • Redundant array of independent disks (RAID)

    • Network attached storage (NAS)

    • RHD

    Correct Answer
    A. Network attached storage (NAS)
  • 10. 

    (205) Which is not a characteristic of high-order languages?

    • They are nearly self-documenting

    • They use English-like statements

    • Source codes that are written closest to the machine language

    • Programs that are transportable between computers with few changes

    Correct Answer
    A. Source codes that are written closest to the machine language
  • 11. 

    Which selection is a set of markup symbols or codes inserted in a file intended for display on a web browser page?

    • Standard Generalized Markup Language (SGML)

    • Extensible Markup Language (XML)

    • Hypertext Markup Language (HTML)

    • Dynamic HTML (DHTML)

    Correct Answer
    A. Hypertext Markup Language (HTML)
  • 12. 

    Which web application is most likely to succeed Hypertext Markup Language (HTML)?

    • Dynamic HTML (DHTML)

    • Extensible Markup Language (XML)

    • Standard Generalized Markup Language (SGML)

    • Extensible HTML (XHTML)

    Correct Answer
    A. Extensible HTML (XHTML)
  • 13. 

    Which protocol is commonly used for managing the security of a message transmission on the internet?

    • Secure socket layer (SSL)

    • Public key infrastructure (PKI)

    • Data encryption standard (DES)

    • Transport layer security (TLS)

    Correct Answer
    A. Secure socket layer (SSL)
  • 14. 

    Which program can be used to automatically launch programs on a preset schedule?

    • Check disk

    • Disk quotas

    • Disk defragmenter

    • Task scheduler

    Correct Answer
    A. Task scheduler
  • 15. 

    Which error-checking tool allows you to monitor the file systems for errors?

    • Check disk

    • Disk quotas

    • Task Scheduler

    • Disk defragmenter

    Correct Answer
    A. Check disk
  • 16. 

    What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?

    • Preventive controls

    • List of critical devices

    • Recovery strategies

    • Emergency action plans

    Correct Answer
    A. List of critical devices
  • 17. 

    Which type of backup would you use at the end of the week to save all the data that you select on your systems?

    • Incremental

    • Differential

    • Daily

    • Normal

    Correct Answer
    A. Normal
  • 18. 

    Which type of backup will backup all files that have been altered within the last 24 hours?

    • Daily

    • Normal

    • Incremental

    • Differential

    Correct Answer
    A. Daily
  • 19. 

    What is based around a central directory database containing information about all the domain controllers in the network?

    • Active directory

    • Domains manager

    • Domain name service (DNS)

    • Dynamic host configuration protocol (DHCP)

    Correct Answer
    A. Active directory
  • 20. 

    What is a group of users, servers, and other resources that share a centralized database of account and security information?

    • Domain

    • Forest

    • Schema

    • Tree

    Correct Answer
    A. Domain
  • 21. 

    Where does a copy of the active directory database reside?

    • Dynamic host configuration protocol (DHCP) servers

    • Domain name service (DNS) servers

    • Domain controllers

    • Global catalog servers

    Correct Answer
    A. Domain controllers
  • 22. 

    What kind of server contains the master listing of all active directory objects in the forest?

    • Dynamic host configuration protocol (DHCP)

    • Domain controller

    • Global catalog

    • Member

    Correct Answer
    A. Global catalog
  • 23. 

    What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?

    • Access control lists

    • Access policy objects

    • Group policy objects

    • Group rules sets

    Correct Answer
    A. Group policy objects
  • 24. 

    Which type of interface is friendlier to the average user to use?

    • Command line interface

    • Graphical user interface

    • Menu driven interface

    • Palo Alto Research Center user interface

    Correct Answer
    A. Graphical user interface
  • 25. 

    Sitting at a computer and loading a software patch onto it is an example of what type of software patch?

    • Automatic

    • Attended

    • Unattended

    • Remote

    Correct Answer
    A. Attended
  • 26. 

    Which type of patch would utilize a remote installation service (RIS)?

    • Automatic

    • Local

    • Manual

    • Unattended

    Correct Answer
    A. Unattended
  • 27. 

    Which components of domain name services (DNS) contain a database of associated names and IP addresses?

    • Name servers

    • Resolvers

    • Resource records

    • Forward lookup zone

    Correct Answer
    A. Name servers
  • 28. 

    Which query is made by one name server to another name server?

    • Dynamic host configuration protocol (DHCP) query

    • Domain name service (DNS) query

    • Recursive query

    • Non-recursive query

    Correct Answer
    A. Non-recursive query
  • 29. 

    According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?

    • 15 days

    • 30 days

    • 45 days

    • 60 days

    Correct Answer
    A. 30 days
  • 30. 

     which type of group manages the user's rights assignments and access permissions?

    • Universal

    • Distribution

    • Security

    • Access

    Correct Answer
    A. Security
  • 31. 

    Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?

    • Anonymous logon

    • Everyone

    • Network

    • Interactive

    Correct Answer
    A. Interactive
  • 32. 

    What defines the rules by which operations can be performed on a particular resource?

    • Rights

    • Permissions

    • Access control lists

    • Hardware configuration

    Correct Answer
    A. Permissions
  • 33. 

    What permission always overrides all other permissions assigned to a user or group to which the user belongs?

    • Full control

    • No access

    • Change

    • Write

    Correct Answer
    A. No access
  • 34. 

    When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned?

    • Global group permissions

    • Everyone group permissions

    • No permissions are automatically assigned

    • Inherited permissions of the folder it's contained in

    Correct Answer
    A. Inherited permissions of the folder it's contained in
  • 35. 

    Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it's shut down?

    • Mailbox service

    • System attendant

    • Simple mail transport protocol (SMTP)

    • Post office protocol version 3 (POP3) service

    Correct Answer
    A. System attendant
  • 36. 

    In exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information?

    • Global settings

    • System policies

    • Tools

    • Servers

    Correct Answer
    A. Servers
  • 37. 

    Which type of lists uses pointers to connect each element together?

    • Derived

    • Linked

    • Ordered

    • Sequential

    Correct Answer
    A. Linked
  • 38. 

    Which is the most commonly used sequential query language (SQL) data statement?

    • Commit

    • Select

    • Where

    • Update

    Correct Answer
    A. Select
  • 39. 

    Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?

    • Buffers

    • Concurrency

    • Locking

    • Logging

    Correct Answer
    A. Logging
  • 40. 

    Which UNIX operating system component interacts directly with the system hardware?

    • File system

    • VI editor

    • Kernel

    • Shell

    Correct Answer
    A. Kernel
  • 41. 

    Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data?

    • File system

    • VI editor

    • Kernel

    • Shell

    Correct Answer
    A. File system
  • 42. 

    Normally, when you create a file with a text editor, the file is set up with

    • Read and write permission for you and read-only permission for others

    • Write permission for you and read only permission for others

    • Read, write, and execute for you and read, write for others

    • Read and write permission for you and read, write for others

    Correct Answer
    A. Read and write permission for you and read-only permission for others
  • 43. 

    To change permissions on a shell script, you use the UNIX command

    • Chown

    • Chgrp

    • Chmod

    • Chper

    Correct Answer
    A. Chmod
  • 44. 

    The simplest place to put your function definitions is in your

    • Function

    • Dev

    • Definition

    • Profile

    Correct Answer
    A. Profile
  • 45. 

    What do you type to quit a UNIX shell?

    • Exit

    • Quit

    • X

    • Xit

    Correct Answer
    A. Exit
  • 46. 

    UNIX disks are divided into logical sections called

    • Sectors

    • Sections

    • Reams

    • Partitions

    Correct Answer
    A. Partitions
  • 47. 

    The /dev/dsk and /dev/rdsk directories are subdirectories of which directory?

    • Root

    • System

    • Device

    • Home

    Correct Answer
    A. Root
  • 48. 

    What does the 0 following the c in the device name c0t6d0s7 represent?

    • Controller

    • Partition

    • Drive number

    • Bus target drive

    Correct Answer
    A. Controller
  • 49. 

    What is the basic unit for storing and manipulating a collection of logically related information known as data?

    • Directories

    • Partitions

    • Slices

    • Files

    Correct Answer
    A. Files

Quiz Review Timeline (Updated): Mar 17, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 27, 2017
    Quiz Created by
    James Ciccone
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.