3d052 Vol 2 Ure

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By KrownedK
K
KrownedK
Community Contributor
Quizzes Created: 1 | Total Attempts: 107
| Attempts: 107
SettingsSettings
Please wait...
  • 1/100 Questions

    (201) Which original components were very susceptible to damage from electrostatic discharge? 

    • Read only memory (ROM).
    • Basic input/output system (BIOS).
    • Complementary metal-oxide semiconductor (CMOS).
    • Electronic erasable programmable read-only memory (EEPROM).
Please wait...
About This Quiz

3d052 Vol 2 Ure - Quiz

Quiz Preview

  • 2. 

    (202) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?

    • Cache.

    • Buffer.

    • Interface.

    • Interrupt.

    Correct Answer
    A. Interrupt.
    Explanation
    An interrupt is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event. It is a mechanism used by hardware devices to communicate with the CPU, allowing them to request immediate attention or notify the CPU of an event. Interrupts are used to handle time-sensitive tasks and ensure efficient communication between hardware devices and the CPU.

    Rate this question:

  • 3. 

    (202) Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)? 

    • Disk request.

    • Utility resource.

    • Priority interrupt.

    • Integrated resource.

    Correct Answer
    A. Priority interrupt.
    Explanation
    The correct answer is priority interrupt. In a computer system, a priority interrupt is a signal that is sent to the CPU from a controller component to request immediate attention. The priority interrupt is used to interrupt the normal execution of the CPU and prioritize the execution of a specific task or process. This allows for important tasks or processes to be given higher priority and ensures that they are executed in a timely manner.

    Rate this question:

  • 4. 

    (206) Which Web application is most likely to succeed Hypertext Markup Language (HTML)?

    • Dynamic HTML (DHTML).

    • Extensible Markup Language (XML).

    • Standard Generalized Markup Language (SGML).

    • Extensible HTML (XHTML).

    Correct Answer
    A. Extensible HTML (XHTML).
    Explanation
    XHTML is the most likely web application to succeed HTML because it is an extended version of HTML that combines the features of HTML and XML. It is stricter and more standardized than HTML, making it easier for web developers to create consistent and well-structured web pages. Additionally, XHTML is compatible with XML, which allows for better integration with other web technologies and makes it more future-proof.

    Rate this question:

  • 5. 

    (207) Which program can be used to automatically launch programs on a preset schedule?

    • Check disk.

    • Disk quotas.

    • Disk defragmenter.

    • Task scheduler.

    Correct Answer
    A. Task scheduler.
    Explanation
    Task scheduler is a program that can be used to automatically launch programs on a preset schedule. It allows users to schedule tasks such as running programs, scripts, or commands at specific times or on specific events. This feature is particularly useful for automating repetitive tasks, managing system maintenance, and improving overall efficiency. Disk quotas, disk defragmenter, and check disk are not programs that have the capability to automatically launch programs on a preset schedule.

    Rate this question:

  • 6. 

    (207) Which error-checking tool allows you to monitor the file system for errors? 

    • Check disk.

    • Disk quotas.

    • Task scheduler.

    • Disk defragmenter.

    Correct Answer
    A. Check disk.
    Explanation
    Check disk is an error-checking tool that allows you to monitor the file system for errors. It scans the file system for any inconsistencies or corruption and fixes them if possible. It helps in detecting and repairing issues related to bad sectors, file system errors, and other disk-related problems. Disk quotas, task scheduler, and disk defragmenter do not have the same functionality as check disk and are not specifically designed for monitoring file system errors.

    Rate this question:

  • 7. 

    (208) Which numbering system characteristic is the leftmost non-zero digit of a numeric value?

    • Least significant digit (LSD).

    • Most significant digit (MSD).

    • Exponent.

    • Radix.

    Correct Answer
    A. Most significant digit (MSD).
    Explanation
    The leftmost non-zero digit of a numeric value is the most significant digit (MSD). This digit holds the most weight and contributes the most to the value of the number. It is the digit that represents the largest place value in the number.

    Rate this question:

  • 8. 

    (212) Which type of interface is friendlier for the average user to use?

    • Command line interface.

    • Graphical user interface.

    • Menu driven interface.

    • Palo Alto Research Center user interface.

    Correct Answer
    A. Graphical user interface.
    Explanation
    A graphical user interface is considered friendlier for the average user to use because it provides visual elements such as icons, menus, and windows that make it easier to navigate and interact with the computer system. Unlike command line interfaces that require users to type specific commands, a graphical user interface allows users to perform tasks by simply clicking on icons or using drag-and-drop functionality. This makes it more intuitive and user-friendly, especially for individuals who may not be familiar with complex computer commands.

    Rate this question:

  • 9. 

    (212) Sitting at a computer and loading a software patch onto it is an example of what type of software patch? 

    • Automatic.

    • Attended.

    • Unattended.

    • Remote.

    Correct Answer
    A. Attended.
    Explanation
    Loading a software patch onto a computer while sitting at the computer implies that the user is actively present and involved in the process. This type of software patch is known as an attended patch, where the user manually initiates and monitors the installation process.

    Rate this question:

  • 10. 

    (213) Which components of domain name service (DNS) contain a database of associated names and IP addresses? 

    • Name servers.

    • Resolvers.

    • Resource records.

    • Forward lookup zone.

    Correct Answer
    A. Name servers.
    Explanation
    Name servers in the Domain Name System (DNS) contain a database of associated names and IP addresses. They are responsible for storing and managing the information that maps domain names to their corresponding IP addresses. Name servers are crucial in the DNS infrastructure as they handle queries from resolvers and provide the necessary information to resolve domain names to IP addresses. Resolvers, on the other hand, are responsible for initiating DNS queries and requesting information from name servers. Resource records are the individual entries in the DNS database that contain information such as IP addresses, domain names, and other related data. Forward lookup zone is a term used in DNS to refer to a zone that maps domain names to IP addresses.

    Rate this question:

  • 11. 

    (217) What component of windows unifies and simplifies day to day system management tasks?

    • Domain name service (DNS).

    • Internet information services (IIS).

    • Microsoft management console (MMC).

    • Remote installation services (RIS).

    Correct Answer
    A. Microsoft management console (MMC).
    Explanation
    The correct answer is Microsoft management console (MMC). The MMC is a component of Windows that provides a unified and simplified interface for managing system tasks. It allows users to access and configure various administrative tools and snap-ins in one central location, making it easier to perform day-to-day system management tasks. DNS, IIS, and RIS are not components that specifically unify and simplify system management tasks.

    Rate this question:

  • 12. 

    (217) Which type of group manages user’s rights assignments and access permissions?

    • Universal.

    • Distribution.

    • Security.

    • Access.

    Correct Answer
    A. Security.
    Explanation
    The correct answer is "Security." This is because the security group is responsible for managing user's rights assignments and access permissions. Security groups are used to grant or deny access to resources such as files, folders, and network shares. They are commonly used in operating systems and network environments to control access to sensitive information and ensure that only authorized users have the necessary permissions to perform certain actions.

    Rate this question:

  • 13. 

    (224) Which UNIX command deletes files from within a directory? 

    • Lm.

    • Rm

    • Pr.

    • Ps.

    Correct Answer
    A. Rm
    Explanation
    The correct answer is "rm". The "rm" command in UNIX is used to delete files and directories from within a directory. It stands for "remove" and is a commonly used command for file management in UNIX systems.

    Rate this question:

  • 14. 

    (225) Which UNIX command changes the ownership of one or more files to a new owner?

    • Chgrp

    • Chown.

    • Whodo.

    • Finger.

    Correct Answer
    A. Chown.
    Explanation
    The chown command in UNIX is used to change the ownership of one or more files to a new owner. It allows the administrator to transfer ownership rights from one user to another. This command is useful in situations where there is a need to change the ownership of files, for example, when a user leaves an organization and their files need to be transferred to another user. The chgrp command, on the other hand, is used to change the group ownership of files, not the owner. The commands whodo and finger are unrelated to changing file ownership in UNIX.

    Rate this question:

  • 15. 

    (227) Which UNIX vi character represents the end of the file?

    • *.

    • &.

    • ?.

    • $.

    Correct Answer
    A. $.
    Explanation
    The character "$" in UNIX vi represents the end of the file. It is used to navigate to the last line of the file or to append text at the end of the file. This character is commonly used in vi commands to indicate the end of a range or to specify the end location for various operations within the vi editor.

    Rate this question:

  • 16. 

    (229) Which UNIX command from the menu bar moves a window to the bottom of the stack ofwindows? 

    • Resize.

    • Move.

    • . Lower.

    • . Restore.

    Correct Answer
    A. . Lower.
    Explanation
    The correct answer is "Lower." The Lower command in the UNIX menu bar is used to move a window to the bottom of the stack of windows. This means that the window will be placed behind all other open windows on the screen. This command is useful when you want to temporarily hide a window or prioritize other windows over it.

    Rate this question:

  • 17. 

    (201) What is considered as nonvolatile permanent memory? 

    • Read only memory (ROM).

    • Basic input/output system (BIOS).

    • Complementary metal-oxide semiconductor (CMOS).

    • Electronic erasable programmable read-only memory (EEPROM).

    Correct Answer
    A. Read only memory (ROM).
    Explanation
    Nonvolatile permanent memory refers to a type of memory that retains its data even when power is turned off. Among the options provided, Read only memory (ROM) is considered as nonvolatile permanent memory. ROM is a type of memory that stores data permanently and cannot be modified or erased. It contains firmware or software instructions that are required for booting up a computer or electronic device. ROM retains its data even when the power is turned off, making it a nonvolatile permanent memory.

    Rate this question:

  • 18. 

    (201) What is a form of firmware that contains the computer’s startup instructions?

    • Cache.

    • Basic input/output system (BIOS).

    • Complementary metal-oxide semiconductor (CMOS).

    • Electronic erasable programmable read-only memory (EEPROM).

    Correct Answer
    A. Basic input/output system (BIOS).
    Explanation
    The correct answer is "Basic input/output system (BIOS)". BIOS is a form of firmware that contains the computer's startup instructions. It is responsible for initializing hardware components and loading the operating system. It is typically stored on a chip on the computer's motherboard and is the first software that runs when the computer is powered on.

    Rate this question:

  • 19. 

    (202) Which is a term used to describe that data is whole or complete?

    • Driver.

    • Parity bit.

    • Data integrity.

    • Error correction.

    Correct Answer
    A. Data integrity.
    Explanation
    Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that data is complete, accurate, and reliable, without any errors or inconsistencies. It involves measures such as data validation, error checking, and encryption to maintain the integrity of data. Therefore, data integrity is the term used to describe that data is whole or complete.

    Rate this question:

  • 20. 

    (203) What is an advantage of using a storage area network (SAN) architecture?

    • Ease of replacing the hard drive.

    • Ease of replacing network connectivity.

    • Ease of replacing server.

    • Multiple users can access the server at once.

    Correct Answer
    A. Ease of replacing server.
    Explanation
    Using a storage area network (SAN) architecture provides the advantage of ease of replacing the server. In a SAN, the storage resources are separate from the servers, allowing for easier replacement or upgrade of servers without affecting the storage infrastructure. This means that if a server fails or needs to be upgraded, it can be done without disrupting the storage system or impacting the availability of data. This flexibility and scalability make SAN architecture a preferred choice for organizations that require high availability and easy server maintenance.

    Rate this question:

  • 21. 

    (204) Which storage device has the means of providing data storage reliability using multiple hard drives? 

    • Storage area network (SAN).

    • Network attached storage (NAS).

    • Small computer system interface (SCSI).

    • Redundant array of independent disks (RAID).

    Correct Answer
    A. Redundant array of independent disks (RAID).
    Explanation
    RAID is a storage technology that uses multiple hard drives to provide data storage reliability. It combines the drives into a single logical unit, distributing data across the drives in different ways to ensure redundancy and improve performance. By using techniques such as mirroring and striping, RAID can protect against data loss in case of drive failure and provide faster access to data. Therefore, RAID is the storage device that offers data storage reliability using multiple hard drives.

    Rate this question:

  • 22. 

    (212) Which type of patch would utilize a remote installation services (RIS)?

    • Automatic.

    • Local.

    • Manual.

    • Unattended.

    Correct Answer
    A. Unattended.
    Explanation
    An unattended patch would utilize a remote installation service (RIS) because it allows for the automated installation of software or patches without requiring any user interaction. This means that the patch can be installed remotely without the need for someone to manually initiate the installation process. Therefore, the correct answer is unattended.

    Rate this question:

  • 23. 

    (215) What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location? 

    • Domain name service (DNS).

    • Internet information services (IIS).

    • Remote installation services (RIS.

    • Web.

    Correct Answer
    A. Remote installation services (RIS.
    Explanation
    Remote installation services (RIS) is the correct answer because it allows network administrators to install upgrades on multiple client computers simultaneously from a centralized location. This service simplifies the process of deploying software updates and configurations, saving time and effort for administrators. DNS, IIS, and web services are unrelated to the specific functionality described in the question.

    Rate this question:

  • 24. 

    (216) Which is not a component of Internet information services (IIS)?

    • FTP server.

    • Internet services manager.

    • Simple mail transport protocol (SMTP).

    • Simple network management protocol (SNMP).

    Correct Answer
    A. Simple network management protocol (SNMP).
    Explanation
    SNMP is not a component of Internet Information Services (IIS). IIS is a web server software package developed by Microsoft that provides services for hosting websites, FTP servers, and SMTP servers. SNMP, on the other hand, is a protocol used for managing and monitoring network devices. While it is commonly used in network management, it is not directly related to IIS.

    Rate this question:

  • 25. 

    (218) What permission always overrides all other permissions assigned to a user or group to which the user belongs? 

    • Full control.

    • No access.

    • Change.

    • Write.

    Correct Answer
    A. No access.
    Explanation
    No access permission always overrides all other permissions assigned to a user or group. This means that even if a user has been granted full control, change, or write permissions, if they also have a "no access" permission, they will be denied access to the resource. "No access" is the most restrictive permission and takes precedence over all other permissions.

    Rate this question:

  • 26. 

    (221) Which UNIX operating system component interacts directly with the system hardware? 

    • File system

    • VI editor.

    • Kernel

    • Shell

    Correct Answer
    A. Kernel
    Explanation
    The kernel is the correct answer because it is the component of the UNIX operating system that interacts directly with the system hardware. It manages the system's resources, such as memory and CPU, and provides services to other parts of the operating system and user applications. The kernel also handles input and output operations, manages file systems, and controls the execution of processes.

    Rate this question:

  • 27. 

    (223) UNIX™ disks are divided into logical sections called 

    • Sectors.

    • Sections.

    • Reams.

    • Partitions.

    Correct Answer
    A. Partitions.
    Explanation
    UNIX disks are divided into logical sections called partitions. A partition is a separate section of a disk that can be formatted and used as an independent storage unit. It allows the disk to be divided into multiple sections, each with its own file system and data. This division helps in organizing and managing data efficiently, as different partitions can be used for different purposes or operating systems.

    Rate this question:

  • 28. 

    (223) The /dev/dsk and /dev/rdsk directories are subdirectories of which directory? 

    • Root.

    • System.

    • Device.

    • Home.

    Correct Answer
    A. Root.
    Explanation
    The /dev/dsk and /dev/rdsk directories are subdirectories of the root directory. The root directory is the top-level directory in a file system hierarchy, and it serves as the starting point for navigating the file system. The /dev/dsk directory contains device files for disk devices, while the /dev/rdsk directory contains raw device files for disk devices. These directories are essential for accessing and managing disk devices in the system.

    Rate this question:

  • 29. 

    (226) How many primary groups can a user be a member of? 

    • One.

    • Two.

    • Three.

    • Four.

    Correct Answer
    A. One.
    Explanation
    A user can only be a member of one primary group. Primary groups are used to assign basic permissions and access rights to a user, and each user can have only one primary group. This primary group is set when the user account is created and cannot be changed without modifying the user's account settings.

    Rate this question:

  • 30. 

    (227) Which UNIX vi mode allows users to execute set commands?

    • Edit.

    • Text input

    • Command.

    • Append.

    Correct Answer
    A. Command.
    Explanation
    In the UNIX vi mode, the "Command" mode allows users to execute set commands. This mode is used for entering commands to perform various operations such as saving the file, searching for text, or copying and pasting. In Command mode, the user can navigate through the file using keyboard shortcuts and execute commands by typing them directly. This mode is different from the other modes mentioned (Edit, Text input, and Append) as they are primarily used for editing and entering text, whereas the Command mode focuses on executing commands.

    Rate this question:

  • 31. 

    (228) What is the most common UNIX windows system?

    • U windows.

    • X windows.

    • UX windows.

    • UZ windows.

    Correct Answer
    A. X windows.
    Explanation
    X windows is the most common UNIX window system. This system provides a graphical user interface (GUI) for UNIX-based operating systems. It allows users to interact with applications and manage windows on their desktop. X windows is widely used and has become a standard for GUI on UNIX systems, providing a flexible and customizable environment for users.

    Rate this question:

  • 32. 

    (229) The key to shutting down an xterm window is to know which of your programs is the 

    • Controlling program.

    • Exiting program.

    • Executing program.

    • Hard link file

    Correct Answer
    A. Controlling program.
    Explanation
    The correct answer is "controlling program." In order to shut down an xterm window, it is important to identify the program that is controlling it. This program holds the authority to close the window and terminate any processes running within it. By identifying the controlling program, users can effectively shut down the xterm window and end any associated processes.

    Rate this question:

  • 33. 

    (206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?

    • Standard Generalized Markup Language (SGML).

    • Extensible Markup Language (XML).

    • HyperText Markup Language (HTML).

    • Dynamic HTML (DHTML).

    Correct Answer
    A. HyperText Markup Language (HTML).
    Explanation
    HTML is the correct answer because it is a set of markup symbols or codes that are used to structure content on a web page. HTML tags are inserted into a file to define elements such as headings, paragraphs, links, images, and more. These tags are interpreted by web browsers to display the content in a formatted manner. SGML, XML, and DHTML are also markup languages, but they are not specifically designed for display on a web browser page.

    Rate this question:

  • 34. 

    (209) What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters? 

    • Preventive controls.

    • List of critical devices.

    • Recovery strategies.

    • Emergency action plans.

    Correct Answer
    A. List of critical devices.
    Explanation
    Each organization should have a list of critical devices that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters. This list helps in identifying the most important devices that need to be protected and ensures that appropriate preventive controls, recovery strategies, and emergency action plans are in place for these devices. By having a clear understanding of the critical devices, organizations can effectively allocate resources and prioritize their efforts to minimize the impact of disasters on their systems.

    Rate this question:

  • 35. 

    (214) The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a 

    • Pool.

    • Range.

    • Scope.

    • Zone.

    Correct Answer
    A. Scope.
    Explanation
    A dynamic host configuration protocol (DHCP) server manages a group of IP addresses known as a scope. This scope represents a range of IP addresses that can be assigned to client devices on a network. The DHCP server is responsible for dynamically allocating and managing these IP addresses within the defined scope.

    Rate this question:

  • 36. 

    (214) What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have? 

    • One.

    • Two.

    • Three.

    • Five.

    Correct Answer
    A. One.
    Explanation
    The minimum number of scopes a DHCP server can have is one. A scope refers to a range of IP addresses that the DHCP server can assign to devices on a network. A DHCP server needs at least one scope to allocate IP addresses to devices that connect to the network.

    Rate this question:

  • 37. 

    (218) When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned? 

    • Global group permissions.

    • Everyone group permission.

    • No permissions are automatically assigned.

    • Inherited permissions of the folder it’s contained in.

    Correct Answer
    A. Inherited permissions of the folder it’s contained in.
    Explanation
    When a new folder or file is created on a new technology file system (NTFS) partition, the permissions that are automatically assigned are the inherited permissions of the folder it is contained in. This means that the new folder or file will inherit the same permissions as the parent folder, ensuring consistency and ease of management.

    Rate this question:

  • 38. 

    (221) Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data? 

    • File system

    • VI editor

    • Kernel.

    • Shell.

    Correct Answer
    A. File system
    Explanation
    The correct answer is File system. The file system in UNIX provides a logical way to organize, store, retrieve, manipulate, and manage data. It is responsible for managing the structure and organization of files and directories on a storage device. It allows users to create, modify, and delete files, as well as navigate through directories to access and manage data efficiently. The file system ensures data integrity, security, and accessibility in the UNIX operating system.

    Rate this question:

  • 39. 

    (221) Which UNIX shell is the most compact and is often used for writing shell scripts? 

    • C shell.

    • Bourne shell.

    • Korn shell.

    • D shell.

    Correct Answer
    A. Bourne shell.
    Explanation
    The Bourne shell is the most compact UNIX shell and is commonly used for writing shell scripts. It was developed by Stephen Bourne and is known for its simplicity and efficiency. Many scripting languages and tools are designed to be compatible with the Bourne shell, making it a popular choice for scripting tasks. The C shell, Korn shell, and D shell are also commonly used shells in UNIX, but they are not as compact or widely used for scripting purposes as the Bourne shell.

    Rate this question:

  • 40. 

    (228) Which UNIX default command starts the X windows system? 

    • Xwnds.

    • Xstart.

    • Xinit.

    • X.

    Correct Answer
    A. Xinit.
    Explanation
    The correct answer is "xinit." The xinit command is used to start the X Window System on UNIX systems. It is responsible for launching the X server and initializing the graphical user interface. By running xinit, users can start the X Windows system and access the graphical desktop environment.

    Rate this question:

  • 41. 

    (229) What action puts unneeded windows out of the way without quitting the program insidethem? 

    • Iconifying.

    • Previewing.

    • Paging.

    • Desktop management.

    Correct Answer
    A. Iconifying.
    Explanation
    Iconifying refers to the action of minimizing or reducing the size of a window to an icon or thumbnail, typically located on the taskbar or desktop. This action puts unneeded windows out of the way without quitting the program inside them, allowing the user to easily access and restore the window when needed. It is a common feature in desktop environments and operating systems that helps in managing multiple open windows efficiently.

    Rate this question:

  • 42. 

    (201) What is considered to be a computer’s main storage?

    • Random access memory (RAM).

    • Read only memory (ROM).

    • Basic input/output system (BIOS).

    • Complementary metal-oxide semiconductor (CMOS).

    Correct Answer
    A. Random access memory (RAM).
    Explanation
    Random access memory (RAM) is considered to be a computer's main storage because it is responsible for temporarily storing data that the computer is actively using. Unlike other types of memory such as ROM, BIOS, or CMOS, RAM can be both read from and written to, making it ideal for storing and accessing data quickly. It allows the computer to quickly retrieve and manipulate data, which is essential for running programs and performing tasks efficiently.

    Rate this question:

  • 43. 

    (202) Which interrupt request (IRQ) line number is normally used for the floppy disk controller?

    • 2.

    • 4.

    • 6.

    • 8.

    Correct Answer
    A. 6.
    Explanation
    IRQ line number 6 is normally used for the floppy disk controller. The floppy disk controller is a device that manages the reading and writing of data to a floppy disk. IRQ lines are used to signal the CPU when a device needs attention or when a specific event occurs. IRQ line 6 is typically assigned to the floppy disk controller, allowing it to communicate with the CPU and perform its functions effectively.

    Rate this question:

  • 44. 

    (204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as 

    • One single hard drive.

    • A collection of hard drives.

    • A single RAID array.

    • A single RAID array.

    Correct Answer
    A. One single hard drive.
    Explanation
    The correct answer is one single hard drive. In a redundant array of independent disks (RAID) array, multiple hard drives are combined to appear as a single hard drive to the server. This is done through a technique called disk striping, where data is divided and distributed across the drives in the array. The server sees and interacts with the RAID array as if it were a single drive, providing increased performance, fault tolerance, and storage capacity.

    Rate this question:

  • 45. 

    (204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained? 

    • Small computer system interface (SCSI).

    • Serial attached (SAS) SCSI.

    • Serial advanced technology attachment (SATA).

    • Peripheral component interconnect express (PCIe).

    Correct Answer
    A. Small computer system interface (SCSI).
    Explanation
    SCSI (Small Computer System Interface) is often used in redundant array of independent disks (RAID) arrays that can be daisy chained. SCSI allows multiple devices to be connected in a chain, with each device having its own unique identifier. This allows for easy expansion and scalability in RAID arrays, as additional disks can be added to the chain without disrupting the existing setup. SCSI also offers high data transfer rates and supports multiple devices on a single bus, making it a suitable technology for RAID arrays.

    Rate this question:

  • 46. 

    (210) Which type of backup would you use at the end of the week to save all data that you select on your systems? 

    • Incremental.

    • Differential.

    • Daily.

    • Normal.

    Correct Answer
    A. Normal.
    Explanation
    At the end of the week, a normal backup would be used to save all the selected data on the systems. A normal backup involves backing up all the selected data regardless of whether it has been modified or not. This ensures that a complete copy of all the data is saved and can be restored if needed. Incremental backups only save the data that has changed since the last backup, differential backups save all the data that has changed since the last normal backup, and daily backups save all the data that has changed within a day.

    Rate this question:

  • 47. 

    (211) What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user? 

    • Access control lists.

    • Access policy objects.

    • Group policy objects.

    • Group rules sets.

    Correct Answer
    A. Group policy objects.
    Explanation
    Group policy objects are a set of rules that can be set to affect active directory leaf objects to control what can be done by a user. These objects allow administrators to manage and enforce various settings, such as security settings, software installation, and user preferences, across a network. By applying group policy objects, administrators can ensure consistent and centralized control over the configuration and behavior of user accounts and computers in an active directory environment.

    Rate this question:

  • 48. 

    (212) Which of the following is not one of the elements that most graphical user interfaces are composed of? 

    • Windows.

    • Icons.

    • Menus.

    • Programs.

    Correct Answer
    A. Programs.
    Explanation
    Most graphical user interfaces are composed of windows, icons, and menus. Programs, on the other hand, are not an element of the graphical user interface itself, but rather the software applications that run within the interface. While programs may be accessed and interacted with through the interface, they are not considered a fundamental element of the interface itself.

    Rate this question:

  • 49. 

    (214) Which software program manages an IP address allocation for a network?

    • Dynamic host configuration protocol (DHCP).

    • Domain name service (DNS).

    • Active directory (AD).

    • DHCP server.

    Correct Answer
    A. Dynamic host configuration protocol (DHCP).
    Explanation
    The correct answer is Dynamic host configuration protocol (DHCP). DHCP is a software program that manages the allocation of IP addresses for a network. It automatically assigns IP addresses to devices on a network, eliminating the need for manual configuration. DHCP also handles other network configuration parameters such as subnet masks, default gateways, and DNS server addresses. It allows for efficient management and allocation of IP addresses, making it an essential component of network administration.

    Rate this question:

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 25, 2014
    Quiz Created by
    KrownedK
Back to Top Back to top
Advertisement