3d052 CDC Vol 2 UREs

100 Questions | Total Attempts: 636

SettingsSettingsSettings
Please wait...
3d052 CDC Vol 2 UREs

These are the 3D052 Volume 2 UREs. This quiz is to help you study for your CDC exams. This should not be used as the only means of studying. You should also read through your CDCs in preparation for your exams.


Questions and Answers
  • 1. 
    (201) Which original components were very susceptible to damage from electrostatic discharge?
    • A. 

      Read only memory (ROM)

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 2. 
    (201) What is considered to be a computer’s main storage?
    • A. 

      Random access memory (RAM)

    • B. 

      Read only memory (ROM)

    • C. 

      Basic input/output system (BIOS)

    • D. 

      Complementary metal-oxide semiconductor (CMOS)

  • 3. 
    (201) What is considered as nonvolatile permanent memory?
    • A. 

      Read only memory (ROM)

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 4. 
    (201) What is a form of firmware that contains the computer’s startup instructions?
    • A. 

      Cache

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 5. 
    (202) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
    • A. 

      Cache

    • B. 

      Buffer

    • C. 

      Interface

    • D. 

      Interrupt

  • 6. 
    (202) Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?
    • A. 

      Disk request

    • B. 

      Utility resource

    • C. 

      Priority interrupt

    • D. 

      Integrated resource

  • 7. 
    (202) Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 8. 
    (202) Which is a term used to describe that data is whole or complete?
    • A. 

      Driver

    • B. 

      Parity bit

    • C. 

      Data integrity

    • D. 

      Error correction

  • 9. 
    (202) What is considered as a technique or method of checking data integrity?
    • A. 

      Fault

    • B. 

      Parity

    • C. 

      Interrupt

    • D. 

      Asynchronous

  • 10. 
    (202) Which is a very simple example of an error detecting code?
    • A. 

      Interrupt

    • B. 

      Parity bit

    • C. 

      Asynchronous

    • D. 

      Data integrity

  • 11. 
    (203) What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
    • A. 

      Network attached storage (NAS)

    • B. 

      Storage area network (SAN)

    • C. 

      Redundant array of independent disks (RAID)

    • D. 

      Array storage

  • 12. 
    (203) What is an advantage of using a storage area network (SAN) architecture?
    • A. 

      Ease of replacing the hard drive

    • B. 

      Ease of replacing network connectivity

    • C. 

      Ease of replacing server

    • D. 

      Multiple users can access the server at once

  • 13. 
    (203) What is the connection type of choice for storage area networks (SAN)?
    • A. 

      Fibre channel

    • B. 

      ATA over Ethernet (AoE)

    • C. 

      Small computer system interface (SCSI)

    • D. 

      Internet small computer system interface (iSCSI)

  • 14. 
    (203) Which storage device can be easily connected to a network and appears as a network drive?
    • A. 

      Storage area network (SAN)

    • B. 

      Redundant array of independent disks (RAID)

    • C. 

      Network attached storage (NAS)

    • D. 

      RHD

  • 15. 
    (204) Which storage device has the means of providing data storage reliability using multiple hard drives?
    • A. 

      Storage area network (SAN)

    • B. 

      Network attached storage (NAS)

    • C. 

      Small computer system interface (SCSI)

    • D. 

      Redundant array of independent disks (RAID)

  • 16. 
    (204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as __________
    • A. 

      One single hard drive

    • B. 

      A collection of hard drives

    • C. 

      A single RAID array

    • D. 

      A remote storage device

  • 17. 
    (204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
    • A. 

      Small computer system interface (SCSI)

    • B. 

      Serial attached (SAS) SCSI

    • C. 

      Serial advanced technology attachment (SATA)

    • D. 

      Peripheral component interconnect express (PCIe)

  • 18. 
    (205) Which is not a characteristic of high-order languages?
    • A. 

      They are nearly self-documenting

    • B. 

      They use English-like statements

    • C. 

      Source codes that are written closest to machine language

    • D. 

      Programs are transportable between computers with few changes

  • 19. 
    (205) What best describes programming machine code?
    • A. 

      Another term for firmware

    • B. 

      Statements that correspond to complex actions

    • C. 

      Instructions in a form that is acceptable to the computer

    • D. 

      Source code that, when compiled, is appropriate for the computer

  • 20. 
    (206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
    • A. 

      Standard Generalized Markup Language (SGML)

    • B. 

      Extensible Markup Language (XML)

    • C. 

      HyperText Markup Language (HTML)

    • D. 

      Dynamic HTML (DHTML)

  • 21. 
    (206) Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
    • A. 

      Dynamic HTML (DHTML)

    • B. 

      Extensible Markup Language (XML)

    • C. 

      Standard Generalized Markup Language (SGML)

    • D. 

      Extensible HTML (XHTML)

  • 22. 
    (206) A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a
    • A. 

      Transport Layer Security (TLS)

    • B. 

      Common Gateway Inferface (CGI)

    • C. 

      Data Encryption Standard (DES)

    • D. 

      Public Key Infrastructure (PKI)

  • 23. 
    (206) Which protocol is commonly used for managing the security of a message transmission on the Internet?
    • A. 

      Secure Socket Layer (SSL)

    • B. 

      Public Key Infrastructure (PKI)

    • C. 

      Data Encryption Standard (DES)

    • D. 

      Transport Layer Security (TLS)

  • 24. 
    (207) Which program can be used to automatically launch programs on a preset schedule?
    • A. 

      Check Disk

    • B. 

      Disk Quotas

    • C. 

      Disk Defragmenter

    • D. 

      Task Scheduler

  • 25. 
    (207) Which error-checking tool allows you to monitor the file system for errors?
    • A. 

      Check Disk

    • B. 

      Disk Quotas

    • C. 

      Task Scheduler

    • D. 

      Disk Defragmenter

Back to Top Back to top