3d052 CDC Vol 2 UREs

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Henckel
H
Henckel
Community Contributor
Quizzes Created: 3 | Total Attempts: 5,234
| Attempts: 682 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. (212) Which type of interface is friendlier for the average user to use?

Explanation

A Graphical User Interface (GUI) is friendlier for the average user to use compared to other types of interfaces. GUIs use icons, menus, and visual indicators to allow users to interact with the system easily. This interface provides a more intuitive and visually appealing way for users to navigate and perform tasks, eliminating the need to remember complex commands or understand technical language. GUIs are widely used in operating systems, applications, and websites, making them familiar to most users and reducing the learning curve.

Submit
Please wait...
About This Quiz
3d052 CDC Vol 2 UREs - Quiz

These are the 3D052 Volume 2 UREs. This quiz is to help you study for your CDC exams. This should not be used as the only means of studying. You should also read through your CDCs in preparation for your exams.

Personalize your quiz and earn a certificate with your name on it!
2. (212) Sitting at a computer and loading a software patch onto it is an example of what type of software patch?

Explanation

Loading a software patch onto a computer while sitting at it suggests that the process requires human intervention and supervision. This type of software patch is known as an "attended" patch, as it involves the user actively participating in the installation process.

Submit
3. (215) What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location?

Explanation

Remote Installation Services (RIS) is the correct answer because it allows network administrators to install upgrades on multiple client computers simultaneously from a centralized location. This service simplifies the process of deploying software updates or operating system upgrades across a network, saving time and effort for administrators.

Submit
4. (207) Which program can be used to automatically launch programs on a preset schedule?

Explanation

Task Scheduler is a program that can be used to automatically launch programs on a preset schedule. It allows users to schedule tasks such as running programs, opening documents, and executing scripts at specific times or intervals. This feature is useful for automating repetitive tasks, managing system maintenance, and ensuring that important programs or processes are executed without manual intervention. Disk Quotas, Check Disk, and Disk Defragmenter are not programs designed for launching programs on a schedule, making Task Scheduler the correct answer.

Submit
5. (201) What is a form of firmware that contains the computer's startup instructions?

Explanation

The correct answer is Basic input/output system (BIOS). BIOS is a form of firmware that contains the computer's startup instructions. It is responsible for initializing hardware components, performing a power-on self-test (POST), and loading the operating system into memory. BIOS is stored on a chip on the motherboard and is the first software that runs when a computer is powered on.

Submit
6. (214) According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?

Explanation

According to Air Force dynamic host configuration protocol (DHCP) policies, a noncritical workstation will have a lease of 30 days applied to them. This means that the workstation will be assigned an IP address for a period of 30 days before it needs to renew the lease.

Submit
7. (223) UNIX™ disks are divided into logical sections called

Explanation

UNIX disks are divided into logical sections called partitions. A partition is a separate section of a disk that can be formatted and used as a separate entity. Each partition can have its own file system and can be used for different purposes. By dividing the disk into partitions, it allows for better organization and management of data, as well as providing the ability to have multiple operating systems installed on the same disk.

Submit
8. (206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?

Explanation

HTML is the correct answer because it is a set of markup symbols or codes that are used to structure the content of a web page and define its layout. HTML tags are inserted into the file to indicate how the content should be displayed on a web browser page. SGML and XML are also markup languages, but they are not specifically designed for web browser display. DHTML is a combination of HTML, CSS, and JavaScript that allows for dynamic and interactive web content, but it is not a set of markup symbols or codes inserted in a file.

Submit
9. (202) Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?

Explanation

The correct answer is "Priority interrupt." The priority interrupt is a controller component that interprets an electronic signal and determines its priority level. It then requests the attention of the central processing unit (CPU) based on this priority level. This allows for the efficient handling of important tasks and helps optimize the overall performance of the system.

Submit
10. (217) What component of windows unifies and simplifies day to day system management tasks?

Explanation

The Microsoft Management Console (MMC) is a component of Windows that unifies and simplifies day-to-day system management tasks. It provides a centralized platform for managing various aspects of the operating system, such as user accounts, system settings, and network configurations. With the MMC, administrators can access and control multiple management tools and utilities from a single interface, making it easier to perform routine system management tasks efficiently.

Submit
11. (224) Which UNIX command deletes files from within a directory?

Explanation

The correct answer is "rm". The "rm" command in UNIX is used to delete files from within a directory. It stands for "remove" and is a commonly used command for deleting files.

Submit
12. (207) Which error-checking tool allows you to monitor the file system for errors?

Explanation

Check Disk is an error-checking tool that allows you to monitor the file system for errors. It scans the file system and checks for any issues or inconsistencies, such as bad sectors, cross-linked files, or file system errors. By running Check Disk, you can identify and fix these errors, ensuring the integrity and stability of the file system.

Submit
13. (201) What is considered as nonvolatile permanent memory?

Explanation

ROM is considered as nonvolatile permanent memory because it retains its stored data even when the power is turned off. It is a type of memory that is pre-programmed during manufacturing and cannot be easily changed or erased. ROM is commonly used for storing firmware and software instructions that are essential for the operation of a computer system. Unlike volatile memory, such as RAM, ROM does not require constant power to maintain its data, making it a reliable and permanent storage solution.

Submit
14. (202) Which is a term used to describe that data is whole or complete?

Explanation

Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that data remains whole and complete, without any corruption or unauthorized modifications. Data integrity is crucial for maintaining the quality and trustworthiness of data, especially in critical systems and databases. It involves implementing measures such as checksums, validation rules, and access controls to prevent data loss, unauthorized access, or data corruption.

Submit
15. (202) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?

Explanation

An interrupt is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event. When an interrupt occurs, it temporarily suspends the normal execution of the CPU and transfers control to a specific interrupt handler routine. This allows the CPU to respond to the event or request from the hardware device in a timely manner, ensuring efficient communication and coordination between the CPU and the device.

Submit
16. (210) Which type of backup will backup all files that have been altered in the last 24 hours?

Explanation

A daily backup will backup all files that have been altered in the last 24 hours. This type of backup ensures that any changes made to files during the day are captured and saved. It is typically used for regular backups to ensure that the most recent versions of files are protected.

Submit
17. (212) Which type of patch would utilize a remote installation services (RIS)?

Explanation

An unattended patch would utilize a remote installation service (RIS) because it can be installed without any user intervention. RIS allows for the remote installation of operating systems or software, making it ideal for unattended patches that can be deployed across multiple systems without the need for manual installation.

Submit
18. (221) Normally, when you create a file with a text editor, the file is set up with

Explanation

When you create a file with a text editor, it is typically set up with read and write permission for you, the creator of the file. This means that you can both view and modify the contents of the file. On the other hand, the file is usually set to have read-only permission for others. This means that other users can only view the contents of the file but cannot make any changes to it. This setup ensures that you have full control over the file while still allowing others to access and read its contents.

Submit
19. (202) What is considered as a technique or method of checking data integrity?

Explanation

Parity is considered as a technique or method of checking data integrity. It involves adding an extra bit to a binary code to ensure that the total number of 1s in the code is always even or odd. This allows for the detection of errors that may occur during data transmission or storage. By comparing the parity bit with the received data, any discrepancies can be identified, indicating a potential error in the data.

Submit
20. (226) How many primary groups can a user be a member of?

Explanation

A user can be a member of only one primary group. Primary groups are the main groups that a user belongs to and are used to determine the user's default permissions and access rights. These groups are typically used for organizing users based on their roles or departments within an organization. Having multiple primary groups for a user can lead to conflicts and confusion in terms of permissions and access control. Therefore, it is recommended to assign a user to only one primary group.

Submit
21. (220) Which is the most commonly used sequential query language (SQL) data statement?

Explanation

The most commonly used sequential query language (SQL) data statement is "Select". This statement is used to retrieve data from a database. It allows users to specify the columns they want to retrieve and the conditions for selecting specific rows. The "Select" statement is essential in querying and analyzing data in relational databases. It is widely used in various applications and is considered a fundamental command in SQL.

Submit
22. (208) Which numbering system characteristic is the leftmost non-zero digit of a numeric value?

Explanation

The leftmost non-zero digit of a numeric value represents the most significant digit (MSD). In a numbering system, the most significant digit holds the highest value and contributes the most to the overall value of the number. It determines the scale and magnitude of the number. The MSD is important in understanding the order of magnitude and comparing numbers.

Submit
23. (204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as __________

Explanation

The hard drives in a RAID array are presented to the server as one single hard drive. In a RAID array, multiple physical hard drives are combined and managed as a single logical unit. This allows for increased performance, fault tolerance, and data redundancy. The server sees the RAID array as a single hard drive, abstracting the complexity of multiple drives from the operating system and applications. This simplifies data management and allows for easier implementation of RAID technology.

Submit
24. (221) Which UNIX shell is the most compact and is often used for writing shell scripts?

Explanation

The Bourne Shell is the most compact UNIX shell and is often used for writing shell scripts. It is the original UNIX shell and provides a simple and efficient way to interact with the operating system. It has a small memory footprint and is widely supported across different UNIX systems. The Bourne Shell is known for its simplicity and ease of use, making it a popular choice for scripting purposes.

Submit
25. (217) Which type of group manages user's rights assignments and access permissions?

Explanation

The correct answer is "Security." Security groups are used to manage user's rights assignments and access permissions. They are used to grant or deny access to resources such as files, folders, and network resources. By assigning users to security groups, administrators can easily manage and control access to various resources within an organization.

Submit
26. (223) What is the basic unit for storing and manipulating a collection of logically related information known as data?

Explanation

Files are the basic unit for storing and manipulating a collection of logically related information known as data. A file is a container that holds data in a structured format, such as text, images, or videos. It can be accessed, modified, and organized using various file management operations. Directories are used for organizing and storing files, partitions are divisions on a storage device, and slices are specific to certain operating systems, but files are the fundamental unit for storing and manipulating data.

Submit
27. (220) Which type of lists uses pointers to connect each element together?

Explanation

Linked lists use pointers to connect each element together. In a linked list, each element contains a reference to the next element in the list, forming a chain-like structure. This allows for efficient insertion and deletion operations, as elements can be easily rearranged by updating the pointers. Unlike sequential lists, linked lists do not require elements to be stored in contiguous memory locations.

Submit
28. (225) Which UNIX command changes the ownership of one or more files to a new owner?

Explanation

The chown command in UNIX is used to change the ownership of one or more files to a new owner. It allows the user to specify the new owner by either using the username or the user ID. This command is particularly useful when there is a need to transfer ownership of files to a different user or when managing file permissions and access control.

Submit
29. (227) Which UNIX vi character represents the end of the file?

Explanation

The character "$" in UNIX vi represents the end of the file. In vi, the "$" command is used to move the cursor to the last line of the file. It is a commonly used command to quickly navigate to the end of a file while editing or viewing it in vi.

Submit
30. (228) What is the most common UNIX windows system?

Explanation

X windows is the most common UNIX windows system. X windows, also known as X11 or simply X, is a windowing system for bitmap displays, common on Unix-like operating systems. It provides a graphical user interface (GUI) and allows multiple applications to run simultaneously in separate windows. X windows has been widely adopted and is used by many Unix-based systems, making it the most common UNIX windows system.

Submit
31. (221) Which UNIX operating system component interacts directly with the system hardware?

Explanation

The kernel is the correct answer because it is the central component of the UNIX operating system that interacts directly with the system hardware. It manages the system's resources, such as memory and processes, and acts as a bridge between the hardware and the software running on the system. The kernel is responsible for handling low-level tasks, such as device drivers, memory management, and input/output operations.

Submit
32. (220) Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?

Explanation

Logging is a sequential query language (SQL) server feature that tracks changes made to the database. It is used to ensure data integrity by recording all modifications, such as inserts, updates, and deletes, in a log file. This log file can be used for various purposes, including recovering the database in case of a system failure or error. By tracking changes, logging helps maintain the consistency and reliability of the data stored in the database.

Submit
33. (229) Which UNIX command from the menu bar moves a window to the bottom of the stack of windows?

Explanation

The "Lower" command in the UNIX menu bar moves a window to the bottom of the stack of windows. This means that when multiple windows are open, the "Lower" command will place the selected window behind all the other windows, making it the least visible or accessible. It is useful for organizing and prioritizing windows based on their importance or relevance.

Submit
34. (204) Which storage device has the means of providing data storage reliability using multiple hard drives?

Explanation

RAID stands for Redundant Array of Independent Disks. It is a storage technology that combines multiple physical hard drives into a single logical unit. RAID provides data storage reliability by using redundancy, which means that data is duplicated and stored across multiple drives. This redundancy ensures that if one drive fails, the data can still be accessed from the remaining drives. RAID is commonly used in enterprise environments where data reliability and availability are critical.

Submit
35. (209) What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?

Explanation

Each organization should have a list of critical devices that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters. This list helps identify the most important devices that need to be protected and ensures that appropriate preventive controls, recovery strategies, and emergency action plans are in place for these devices. By having a clear understanding of the critical devices, organizations can effectively allocate resources and prioritize their efforts to minimize the impact of disasters on these systems.

Submit
36. (214) The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a

Explanation

A DHCP server manages a group of IP addresses known as a scope. A scope is a range of IP addresses that the DHCP server can assign to devices on a network. The DHCP server is responsible for dynamically assigning IP addresses to devices within the scope as they connect to the network.

Submit
37. (223) The /dev/dsk and /dev/rdsk directories are subdirectories of which directory?

Explanation

The /dev/dsk and /dev/rdsk directories are subdirectories of the root directory. The root directory is the top-level directory in a file system hierarchy and contains all other directories and files. The /dev directory is used to store device files, which represent hardware devices connected to the system. The /dev/dsk directory contains device files for disk devices, while the /dev/rdsk directory contains raw device files for disk devices. These directories are essential for accessing and managing disk devices in the system.

Submit
38. (218) When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned?

Explanation

When a new folder or file is created on a new technology file system (NTFS) partition, the permissions that are automatically assigned are the inherited permissions of the folder it's contained in. This means that the new folder or file will inherit the same permissions as the parent folder, ensuring consistency and security within the file system.

Submit
39. (220) What is the most common type of operation in sequential query language (SQL)?

Explanation

In SQL, a query is a statement that is used to retrieve data from a database. It allows users to specify what information they want to retrieve and how it should be organized. Queries are the most common type of operation in SQL as they form the basis of retrieving and manipulating data in a database. Clauses, expressions, and statements are all components of a query, but the actual retrieval of data is done through the execution of a query.

Submit
40. (201) Which original components were very susceptible to damage from electrostatic discharge?

Explanation

The CMOS (Complementary Metal-Oxide Semiconductor) is very susceptible to damage from electrostatic discharge. Electrostatic discharge occurs when there is a sudden flow of electricity between two objects with different electrical charges. CMOS components are sensitive to this discharge and can be easily damaged if not handled properly.

Submit
41. (211) What is a group of users, servers, and other resources that share a centralized database of account and security information?

Explanation

A domain is a group of users, servers, and other resources that share a centralized database of account and security information. In a domain, all user accounts, security policies, and resources are managed by a central authority called a domain controller. This allows for centralized administration and authentication across the network, ensuring that users can access the resources they need and that security measures are enforced consistently.

Submit
42. (206) Which Web application is most likely to succeed Hypertext Markup Language (HTML)?

Explanation

XHTML is the most likely web application to succeed HTML because it is a stricter and cleaner version of HTML. It combines the flexibility of HTML with the extensibility of XML, allowing for better structure and compatibility with other technologies. XHTML also supports the separation of content and presentation, making it easier to maintain and update websites. Additionally, XHTML is backward compatible with HTML, ensuring that existing HTML documents can be easily migrated to the new standard.

Submit
43. (221) The simplest place to put your function definitions is in your

Explanation

The correct answer is "profile". This is because the question is asking for the simplest place to put function definitions, and the profile is the most common and straightforward location for storing function definitions.

Submit
44. (222) What do you type to quit a UNIX shell?

Explanation

To quit a UNIX shell, you would type "exit". This command is used to terminate the shell session and return to the parent shell or close the terminal window. It is a commonly used command to gracefully exit the shell and end the session.

Submit
45. (218) What permission always overrides all other permissions assigned to a user or group to which the user belongs?

Explanation

No Access always overrides all other permissions assigned to a user or group to which the user belongs. This means that even if a user has been granted other permissions such as Full Control, Change, or Write, if they are also assigned the No Access permission, they will not be able to access or perform any actions on the resource. No Access essentially denies all access rights, making it the most restrictive permission.

Submit
46. (212) Which of the following is not one of the elements that most graphical user interfaces are composed of?

Explanation

Most graphical user interfaces are composed of windows, icons, and menus, which are essential elements for interacting with the system. However, programs are not considered an element of the graphical user interface itself, but rather the applications or software that run within the interface. Programs are separate entities that can be launched and run within the interface, but they are not inherent components of the interface itself.

Submit
47. (224) Which UNIX command takes any characters from standard input and then echoes them to standard output?

Explanation

The correct answer is "cat". The "cat" command in UNIX is used to concatenate files and display the content of files on the standard output. It can also be used to take input from standard input and echo it to standard output. Therefore, "cat" is the appropriate command for taking any characters from standard input and echoing them to standard output.

Submit
48. (201) What is considered to be a computer's main storage?

Explanation

Random access memory (RAM) is considered to be a computer's main storage because it is a type of volatile memory that allows the computer to store and access data quickly. It is used to temporarily store data that the computer is actively using, such as running programs and open files. Unlike other types of memory like ROM, BIOS, and CMOS, RAM can be read from and written to, making it ideal for storing and retrieving data in real-time.

Submit
49. (228) Which UNIX default command starts the X windows system?

Explanation

The correct answer is xinit. xinit is a UNIX default command that starts the X windows system. It initializes the X server and launches the user's chosen window manager or desktop environment. This command is commonly used to start the graphical user interface on UNIX systems.

Submit
50. (221) Which UNIX capability can execute numerous programs at the same time?

Explanation

Multitasking is the correct answer because it refers to the capability of an operating system to execute multiple tasks or programs simultaneously. This allows multiple users to run different programs at the same time, improving efficiency and productivity. Multitasking is a fundamental feature of UNIX systems, enabling them to handle multiple processes and allocate system resources effectively.

Submit
51. (227) Which UNIX vi mode allows users to execute set commands?

Explanation

In the UNIX vi editor, the "Command" mode allows users to execute set commands. In this mode, users can enter various commands such as saving the file, searching for text, replacing text, and other editing operations. The "Edit" mode is used for modifying the text content, the "Text input" mode is used for inserting new text, and the "Append" mode is used for adding text after the current cursor position. However, it is in the "Command" mode where users can execute specific commands to perform various actions on the text.

Submit
52. (206) Which protocol is commonly used for managing the security of a message transmission on the Internet?

Explanation

Secure Socket Layer (SSL) is commonly used for managing the security of a message transmission on the Internet. SSL provides encryption and authentication mechanisms to ensure secure communication between a client and a server. It establishes a secure connection by encrypting the data transmitted between the two parties, preventing unauthorized access and protecting the integrity of the message. SSL is widely used for secure online transactions, such as e-commerce websites, online banking, and email services. It has been widely replaced by Transport Layer Security (TLS), but SSL is still commonly referred to when discussing secure communication protocols on the Internet.

Submit
53. (214) What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have?

Explanation

A dynamic host configuration protocol (DHCP) server is responsible for assigning IP addresses and network configuration settings to devices on a network. The minimum number of scopes a DHCP server can have is one. A scope is a range of IP addresses that the server can assign to devices. Having at least one scope is necessary for the DHCP server to function properly and allocate IP addresses to connected devices.

Submit
54. (219) Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down?

Explanation

The System Attendant service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down. The System Attendant is responsible for various tasks such as managing recipient policies, generating address lists, and monitoring the overall health of the Exchange server. It is an essential component that ensures the proper functioning of Exchange and its associated services.

Submit
55. (205) What best describes programming machine code?

Explanation

Programming machine code refers to instructions that are written in a format that the computer can understand and execute. This code is typically written using low-level programming languages and is specific to the hardware architecture of the computer. It is the most basic form of instructions that a computer can execute directly without any translation or interpretation.

Submit
56. (224) Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames?

Explanation

The UNIX command "cd" allows you to move to different directories within a file system using absolute or relative pathnames. This command stands for "change directory" and is used to navigate through the file system by specifying the path of the desired directory. By using "cd" followed by the path, you can switch to a different directory and continue your work within that location.

Submit
57. (229) The key to shutting down an xterm window is to know which of your programs is the

Explanation

The key to shutting down an xterm window is to know which of your programs is the controlling program. This means that in order to close the xterm window, you need to identify the program that is currently controlling or running within the window and terminate it. Once the controlling program is stopped or exited, the xterm window will also close.

Submit
58. (211) What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?

Explanation

Group Policy Objects (GPOs) are a set of rules that can be set to affect Active Directory leaf objects. GPOs are used to control what can be done by a user in an Active Directory environment. They allow administrators to manage and enforce various settings, such as security policies, software installation, and user preferences, across multiple computers and users within a domain. By applying GPOs, administrators can ensure consistent and centralized control over the configuration and behavior of Active Directory objects.

Submit
59. (221) Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data?

Explanation

The correct answer is File System. The file system in UNIX provides a logical structure for organizing and managing data. It allows users to store, retrieve, manipulate, and manage files and directories in a hierarchical manner. The file system ensures that data is stored in an organized and efficient manner, making it easy for users to access and work with their files. It is an essential component of the UNIX operating system.

Submit
60. (210) Which type of backup would you use at the end of the week to save all data that you select on your systems?

Explanation

At the end of the week, a normal backup would be used to save all the selected data on the systems. A normal backup is a full backup that copies all the selected data regardless of whether it has changed or not. This ensures that all the data is backed up and can be restored in case of any data loss or system failure. Incremental backups only save the data that has changed since the last backup, differential backups save the data that has changed since the last full backup, and daily backups save the data that has changed since the last backup, regardless of its type.

Submit
61. (225) Which UNIX command looks at an individual file and finds a specified pattern (string)?

Explanation

The correct answer is grep. Grep is a UNIX command that is used to search for a specified pattern or string within a file. It scans the file line by line and displays any lines that contain the specified pattern. Grep is a powerful tool for searching and filtering text in UNIX systems.

Submit
62. (225) Which UNIX command sets access and modification times for each file to the current time?

Explanation

The touch command in UNIX sets access and modification times for each file to the current time. This command is commonly used to update the timestamp of a file or create a new file if it doesn't exist. By running the touch command, the access and modification times of the specified file(s) are automatically set to the current time, allowing users to keep track of when files were last accessed or modified.

Submit
63. (203) Which storage device can be easily connected to a network and appears as a network drive?

Explanation

Network attached storage (NAS) is a storage device that can be easily connected to a network and appears as a network drive. It allows multiple users to access and share files over a network, making it a convenient solution for storing and managing data in a network environment. Unlike a storage area network (SAN) or a redundant array of independent disks (RAID), which are more complex and typically used for specific purposes, NAS is designed for simple and straightforward file sharing and storage. RHD is not a recognized storage device or technology.

Submit
64. (229) What action puts unneeded windows out of the way without quitting the program inside them?

Explanation

Iconifying is the action that puts unneeded windows out of the way without quitting the program inside them. When a window is iconified, it is minimized and represented by an icon on the desktop or taskbar, allowing the user to quickly and easily access it when needed. This helps in managing multiple windows and decluttering the workspace without closing the program completely.

Submit
65. (206) A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a

Explanation

A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a Common Gateway Interface (CGI). CGI is a protocol that allows communication between a web server and a server-side program. It enables the web server to pass user requests to the server-side program, which then processes the request and sends the response back to the web server for display to the user. This allows dynamic content generation and interaction with databases or other resources on the server.

Submit
66. (224) Which UNIX command displays the current working directory?

Explanation

The UNIX command "pwd" stands for "print working directory" and it is used to display the current working directory. It is a commonly used command to quickly check the directory path that the user is currently in.

Submit
67. (202) Which is a very simple example of an error detecting code?

Explanation

A parity bit is a very simple example of an error detecting code. It is a single bit added to a binary code to detect errors during transmission. The parity bit is set to either 0 or 1, depending on whether the number of 1s in the code is even or odd. During transmission, the parity bit is recalculated at the receiving end, and if it doesn't match the expected value, an error is detected. This method is simple and efficient in detecting single-bit errors, making it a commonly used error detection technique.

Submit
68. (213) Which components of domain name service (DNS) contain a database of associated names and IP addresses?

Explanation

Name Servers contain a database of associated names and IP addresses. They are responsible for storing and managing the domain name system information. When a user enters a domain name into a web browser, the Name Servers are queried to find the corresponding IP address for that domain name. They maintain the database of all registered domain names and their corresponding IP addresses, allowing for the translation of human-readable domain names into machine-readable IP addresses.

Submit
69. (204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?

Explanation

SCSI (Small Computer System Interface) is often used in redundant array of independent disks (RAID) arrays that can be daisy chained. SCSI is a high-performance interface that allows multiple devices to be connected to a single host adapter. It supports multiple devices in a chain, allowing for easy expansion and scalability in RAID arrays. SCSI also provides faster data transfer rates and better performance compared to other technologies like SATA or PCIe, making it a preferred choice for RAID configurations.

Submit
70. (203) What is the connection type of choice for storage area networks (SAN)?

Explanation

The correct answer is Fibre channel. Fibre channel is the preferred connection type for storage area networks (SAN) because it provides high-speed and reliable data transfer between servers and storage devices. It offers high bandwidth, low latency, and the ability to connect multiple devices in a network. Fibre channel also supports long distances and can be used for both block-level and file-level storage. It is commonly used in enterprise environments where high-performance storage and data access are critical.

Submit
71. (214) Which software program manages an IP address allocation for a network?

Explanation

Dynamic Host Configuration Protocol (DHCP) is a software program that manages the allocation of IP addresses for a network. It automatically assigns IP addresses to devices on the network, eliminating the need for manual configuration. DHCP also provides other network configuration information, such as subnet mask and default gateway, to the devices. This allows for efficient management and administration of IP addresses within a network.

Submit
72. (205) Which is not a characteristic of high-order languages?

Explanation

High-order languages are known for being nearly self-documenting, using English-like statements, and allowing programs to be easily transported between computers with few changes. However, they are not characterized by source codes that are written closest to machine language. High-order languages are designed to be more user-friendly and abstracted from the low-level details of the machine, making programming easier and more efficient.

Submit
73. (223) What does the 0 following the c in the device name c0t6d0s7 represent?

Explanation

The 0 following the c in the device name c0t6d0s7 represents the controller. In UNIX-based operating systems, the device name is typically composed of several components that indicate the controller, drive number, and partition. In this case, the 0 indicates the controller, specifying which interface or controller the device is connected to.

Submit
74. (220) What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent?

Explanation

To make the changes permanent in a sequential query language (SQL), you would use a "Transaction" statement. A transaction is a set of SQL statements that are executed as a single unit. It allows you to ensure that all the changes made to the database are either committed (made permanent) or rolled back (undone) as a whole. By using a transaction, you can maintain data integrity and consistency by ensuring that all changes are successfully completed or none are applied at all.

Submit
75. (202) Which interrupt request (IRQ) line number is normally used for the floppy disk controller?

Explanation

The floppy disk controller usually uses IRQ line number 6. IRQ lines are used by devices to request the attention of the CPU. Each device is assigned a specific IRQ line number to communicate with the CPU. In this case, the floppy disk controller uses IRQ line 6 to send and receive signals to and from the CPU.

Submit
76. (203) What is an advantage of using a storage area network (SAN) architecture?

Explanation

Using a storage area network (SAN) architecture provides the advantage of ease in replacing servers. SAN allows for the separation of storage resources from the servers, enabling the servers to be easily replaced without affecting the storage infrastructure. This means that if a server fails or needs to be upgraded, it can be swapped out without disrupting the storage system, minimizing downtime and increasing flexibility in managing the infrastructure.

Submit
77. (230) Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man –k command?

Explanation

The system administrator needs to use the "catman" command to create the manual database before users can access the "man -k" command.

Submit
78. (221) Which UNIX ability can run on different types of hardware with few relatively minor changes?

Explanation

Portability refers to the ability of a program or software to run on different types of hardware with minimal modifications. It allows the program to be easily transferred or adapted to different operating systems or platforms without significant changes. This ensures that the program can be used on various devices and architectures, making it versatile and convenient for developers and users.

Submit
79. (223) What does the 7 in the device name c0t6d0s7 represent?

Explanation

The 7 in the device name c0t6d0s7 represents the partition. In this naming convention, c0t6d0s7 indicates that the device is connected to controller 0, target 6, drive 0, and partition 7. The partition number is used to identify specific sections of a storage device that have been divided for different purposes or operating systems.

Submit
80. (223) Hard links are created using which UNIX command?

Explanation

Hard links are created using the UNIX command "ln". The "ln" command is used to create a link between files or directories. A hard link is a direct link to the inode of a file, which means that it points directly to the file's data on the disk. This allows multiple names to refer to the same file, and any changes made to the file will be reflected in all of its hard links.

Submit
81. (223) Which UNIX mechanism enables programs to communicate with one another through the file system?

Explanation

Named Pipes in UNIX enable programs to communicate with each other through the file system. They provide a way for processes to exchange data by reading and writing to a special type of file called a named pipe or FIFO. Named pipes act as a bridge between processes, allowing them to send and receive data as if they were reading from and writing to regular files. This mechanism is commonly used for inter-process communication in UNIX systems.

Submit
82. (228) The act of choosing the window you type is called setting the

Explanation

The act of choosing the window you type is called setting the input focus. This means that when you set the input focus on a particular window, it becomes the active window and any text or input you type will be directed to that window. The other options mentioned, such as "active window," "x window," and "window manager," do not accurately describe the specific action of choosing the window for typing, which is setting the input focus.

Submit
83. (229) The first step in quitting an xterm session is to

Explanation

The correct answer is to quit all non-controlling programs. This means that before closing the xterm session, any programs that are running in the background and are not directly controlled by the user should be terminated. This ensures that all processes are properly ended before exiting the session.

Submit
84. (211) What is based around a central directory database containing information about all the domain controllers in the network?

Explanation

Active Directory is based around a central directory database containing information about all the domain controllers in the network. It is a service provided by Microsoft Windows operating systems that allows for the centralized management and organization of network resources, including user accounts, computers, and other devices. Active Directory enables administrators to control access to resources and implement security policies across the network. It also provides a hierarchical structure for organizing objects and allows for the delegation of administrative tasks.

Submit
85. (221) To change permissions on a shell script, you use the UNIX command

Explanation

The UNIX command "chmod" is used to change permissions on a shell script. It allows the user to modify the permissions for the file owner, group, and others. The "chown" command is used to change the owner of a file, "chgrp" is used to change the group ownership of a file, and "chper" is not a valid UNIX command. Therefore, the correct answer is "chmod".

Submit
86. (225) Which UNIX command changes the group ownership of one or more files?

Explanation

The correct answer is "chgrp". The chgrp command in UNIX is used to change the group ownership of one or more files. It allows the user to specify the new group ownership for the specified files, granting the specified group the same level of access as the previous group. This command is useful for managing file permissions and access control within a UNIX system.

Submit
87. (218) What defines the rules by which operations can be performed on a particular resource?

Explanation

Permissions define the rules by which operations can be performed on a particular resource. Permissions determine what actions can be taken on a resource, such as read, write, or execute. They specify the level of access that a user or group has to a resource and help enforce security policies. By assigning appropriate permissions, organizations can control who can access and manipulate resources, ensuring that only authorized individuals have the necessary privileges. Access control lists and other mechanisms are used to implement and manage permissions effectively.

Submit
88. (218) A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called

Explanation

Sharing is a feature of networking that allows individuals to designate resources they want other users to be able to access through the network. This feature enables users to share files, folders, printers, and other resources with specific individuals or groups on the network. By granting access to these resources, users can collaborate, exchange information, and work together more efficiently. This feature is commonly used in home networks, office networks, and cloud-based platforms to facilitate file sharing and collaboration among users.

Submit
89. (219) In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information?

Explanation

In Exchange System Manager, the container that holds configuration objects such as Queues, Mailbox stores, Public Folder stores, and protocols information is the "Servers" container. This container is responsible for managing and organizing the various servers within the Exchange environment. It allows administrators to view and configure server-specific settings and properties, making it a crucial component for managing the Exchange infrastructure.

Submit
90. (227) While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file?

Explanation

To save the buffer contents and stay in the same file while using UNIX vi, you would enter "w". This command allows you to write the changes made to the file without exiting the vi editor.

Submit
91. (211) What kind of server contains the master listing of all active directory objects in the forest?

Explanation

A global catalog server contains the master listing of all active directory objects in the forest. It stores a partial replica of every object in the forest, allowing users to search for objects and access information quickly. This server is responsible for handling queries across domains in a multi-domain environment. It helps in speeding up the search process by providing a centralized location for accessing directory information.

Submit
92. (223) How many characters do most UNIX system administrators and users tend to use for filenames?

Explanation

Most UNIX system administrators and users tend to use 14 characters for filenames. This is because the UNIX file system has a maximum filename length of 255 characters, but it is recommended to keep filenames shorter for ease of use and compatibility with different systems. A 14-character limit strikes a balance between having descriptive filenames and avoiding excessive length.

Submit
93. (223) Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time?

Explanation

Character devices in UNIX provide a mechanism for communication with system device drivers through the file system one character at a time. Unlike block devices that transfer data in fixed-size blocks or sockets that enable communication between processes over a network, character devices allow for reading from or writing to devices one character at a time. This is useful for devices that operate on a stream of characters, such as keyboards, serial ports, or terminals. Named pipes, on the other hand, are a different mechanism used for interprocess communication, not specifically for communication with device drivers.

Submit
94. (203) What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?

Explanation

A Storage Area Network (SAN) is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not. It allows multiple servers to access the storage devices over a high-speed network, providing centralized storage management and increased storage capacity. SANs are commonly used in enterprise environments to improve storage performance, availability, and scalability.

Submit
95. (216) Which is not a component of Internet information services (IIS)?

Explanation

Simple Network Management Protocol (SNMP) is not a component of Internet Information Services (IIS). IIS is a web server software package developed by Microsoft that provides various services for hosting websites and applications. The other options listed, such as FTP Server, Internet Services Manager, and Simple Mail Transport Protocol (SMTP), are all components or features commonly associated with IIS. SNMP, on the other hand, is a protocol used for managing and monitoring network devices and is not directly related to IIS.

Submit
96. (211) Where does a copy of the active directory database reside?

Explanation

A copy of the active directory database resides on domain controllers. Domain controllers are servers that store and manage the active directory database, which contains information about all the objects in a domain, such as users, groups, and computers. This database is crucial for the functioning of the domain, as it allows for authentication, authorization, and other directory services. Therefore, domain controllers are responsible for maintaining and replicating the active directory database across the network.

Submit
97. (213) Which query is made by one name server to another name server?

Explanation

A non-recursive query is made by one name server to another name server. In a non-recursive query, the name server being queried does not provide the complete answer to the query, but instead refers the querying server to another name server that may have the answer. This process continues until the querying server receives a complete answer or reaches a timeout. Non-recursive queries are commonly used in DNS resolution to efficiently distribute the workload among multiple name servers.

Submit
98. (217) Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?

Explanation

The special identity "Interactive" represents users who are currently logged on to a particular computer and accessing a given resource located on that computer. This identity is used to differentiate users who are physically present at the computer and interacting with it directly, as opposed to users accessing the computer remotely or through a network connection.

Submit
99. (220) A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a

Explanation

A set of data elements organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a view. A view is a virtual table that is based on the result of a query and does not store any data. It provides a way to present data from one or more tables in a customized manner without actually modifying the underlying tables. Views are used to simplify data access, provide security restrictions, and present data in a specific format for reporting or analysis purposes.

Submit
100. (228) In UNIX, which package of programs lets a terminal handle many sessions at once?

Explanation

The correct answer is "Multi-session manager." In UNIX, the multi-session manager package of programs allows a terminal to handle multiple sessions simultaneously. This package enables users to open multiple windows or terminals and switch between them, thus facilitating multitasking and efficient use of system resources.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 01, 2014
    Quiz Created by
    Henckel
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(212) Which type of interface is friendlier for the average user to...
(212) Sitting at a computer and loading a software patch onto it is an...
(215) What type of service allows network administrators to install...
(207) Which program can be used to automatically launch programs on a...
(201) What is a form of firmware that contains the computer's startup...
(214) According to Air Force dynamic host configuration protocol...
(223) UNIX™ disks are divided into logical sections called
(206) Which selection is a set of markup symbols or codes inserted in...
(202) Which controller component interprets an electronic signal,...
(217) What component of windows unifies and simplifies day to day...
(224) Which UNIX command deletes files from within a directory?
(207) Which error-checking tool allows you to monitor the file system...
(201) What is considered as nonvolatile permanent memory?
(202) Which is a term used to describe that data is whole or complete?
(202) What is defined as an asynchronous signal from a computer...
(210) Which type of backup will backup all files that have been...
(212) Which type of patch would utilize a remote installation services...
(221) Normally, when you create a file with a text editor, the file is...
(202) What is considered as a technique or method of checking data...
(226) How many primary groups can a user be a member of?
(220) Which is the most commonly used sequential query language (SQL)...
(208) Which numbering system characteristic is the leftmost non-zero...
(204) The hard drives in a redundant array of independent disks (RAID)...
(221) Which UNIX shell is the most compact and is often used for...
(217) Which type of group manages user's rights assignments and access...
(223) What is the basic unit for storing and manipulating a collection...
(220) Which type of lists uses pointers to connect each element...
(225) Which UNIX command changes the ownership of one or more files to...
(227) Which UNIX vi character represents the end of the file?
(228) What is the most common UNIX windows system?
(221) Which UNIX operating system component interacts directly with...
(220) Which sequential query language (SQL) server feature tracks...
(229) Which UNIX command from the menu bar moves a window to the...
(204) Which storage device has the means of providing data storage...
(209) What should each organization have that spells out which systems...
(214) The group of IP addresses that a dynamic host configuration...
(223) The /dev/dsk and /dev/rdsk directories are subdirectories of...
(218) When a new folder or file is created on a new technology file...
(220) What is the most common type of operation in sequential query...
(201) Which original components were very susceptible to damage from...
(211) What is a group of users, servers, and other resources that...
(206) Which Web application is most likely to succeed Hypertext Markup...
(221) The simplest place to put your function definitions is in your
(222) What do you type to quit a UNIX shell?
(218) What permission always overrides all other permissions assigned...
(212) Which of the following is not one of the elements that most...
(224) Which UNIX command takes any characters from standard input and...
(201) What is considered to be a computer's main storage?
(228) Which UNIX default command starts the X windows system?
(221) Which UNIX capability can execute numerous programs at the same...
(227) Which UNIX vi mode allows users to execute set commands?
(206) Which protocol is commonly used for managing the security of a...
(214) What is the minimum number of scopes a dynamic host...
(219) Which exchange service is the first service launched when...
(205) What best describes programming machine code?
(224) Which UNIX command allows you to move to different directories...
(229) The key to shutting down an xterm window is to know which of...
(211) What is a set of rules that can be set to affect active...
(221) Which UNIX component provides a logical way to organize, store,...
(210) Which type of backup would you use at the end of the week to...
(225) Which UNIX command looks at an individual file and finds a...
(225) Which UNIX command sets access and modification times for each...
(203) Which storage device can be easily connected to a network and...
(229) What action puts unneeded windows out of the way without...
(206) A standard Web application used to pass a Web user's request to...
(224) Which UNIX command displays the current working directory?
(202) Which is a very simple example of an error detecting code?
(213) Which components of domain name service (DNS) contain a database...
(204) Which technology is often used in redundant array of independent...
(203) What is the connection type of choice for storage area networks...
(214) Which software program manages an IP address allocation for a...
(205) Which is not a characteristic of high-order languages?
(223) What does the 0 following the c in the device name c0t6d0s7...
(220) What type of sequential query language (SQL) statement would you...
(202) Which interrupt request (IRQ) line number is normally used for...
(203) What is an advantage of using a storage area network (SAN)...
(230) Which UNIX command does the system administrator need to use to...
(221) Which UNIX ability can run on different types of hardware with...
(223) What does the 7 in the device name c0t6d0s7 represent?
(223) Hard links are created using which UNIX command?
(223) Which UNIX mechanism enables programs to communicate with one...
(228) The act of choosing the window you type is called setting the
(229) The first step in quitting an xterm session is to
(211) What is based around a central directory database containing...
(221) To change permissions on a shell script, you use the UNIX...
(225) Which UNIX command changes the group ownership of one or more...
(218) What defines the rules by which operations can be performed on a...
(218) A feature of networking that enables individuals to designate...
(219) In Exchange System Manager, which container holds configuration...
(227) While using UNIX vi to edit a file, what would you enter to save...
(211) What kind of server contains the master listing of all active...
(223) How many characters do most UNIX system administrators and users...
(223) Which UNIX mechanism provides for communication with system...
(203) What is a way of utilizing a group of storage devices as if they...
(216) Which is not a component of Internet information services (IIS)?
(211) Where does a copy of the active directory database reside?
(213) Which query is made by one name server to another name server?
(217) Which special identity can represent users currently logged on...
(220) A set of data elements (values) organized using a model of...
(228) In UNIX, which package of programs lets a terminal handle many...
Alert!

Advertisement