3d052 Vol 2 Ure

100 Questions | Attempts: 107
Share

SettingsSettingsSettings
3d052 Vol 2 Ure - Quiz


Questions and Answers
  • 1. 
    (201) What is considered to be a computer’s main storage?
    • A. 

      Random access memory (RAM).

    • B. 

      Read only memory (ROM).

    • C. 

      Basic input/output system (BIOS).

    • D. 

      Complementary metal-oxide semiconductor (CMOS).

  • 2. 
    (201) Which original components were very susceptible to damage from electrostatic discharge? 
    • A. 

      Read only memory (ROM).

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 3. 
    (201) What is considered as nonvolatile permanent memory? 
    • A. 

      Read only memory (ROM).

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 4. 
    (201) What is a form of firmware that contains the computer’s startup instructions?
    • A. 

      Cache.

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 5. 
    (202) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
    • A. 

      Cache.

    • B. 

      Buffer.

    • C. 

      Interface.

    • D. 

      Interrupt.

  • 6. 
    (202) Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)? 
    • A. 

      Disk request.

    • B. 

      Utility resource.

    • C. 

      Priority interrupt.

    • D. 

      Integrated resource.

  • 7. 
    (202) Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
    • A. 

      2.

    • B. 

      4.

    • C. 

      6.

    • D. 

      8.

  • 8. 
    (202) Which is a term used to describe that data is whole or complete?
    • A. 

      Driver.

    • B. 

      Parity bit.

    • C. 

      Data integrity.

    • D. 

      Error correction.

  • 9. 
    (202) What is considered as a technique or method of checking data integrity?
    • A. 

      Fault.

    • B. 

      Parity.

    • C. 

      Interrupt.

    • D. 

      Asynchronous.

  • 10. 
     (202) Which is a very simple example of an error detecting code?
    • A. 

      Interrupt.

    • B. 

      Parity bit.

    • C. 

      Asynchronous.

    • D. 

      Data integrity.

  • 11. 
    (203) What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not? 
    • A. 

      Network attached storage (NAS).

    • B. 

      Storage area network (SAN).

    • C. 

      Redundant array of independent disks (RAID).

    • D. 

      Array storage.

  • 12. 
    (203) What is an advantage of using a storage area network (SAN) architecture?
    • A. 

      Ease of replacing the hard drive.

    • B. 

      Ease of replacing network connectivity.

    • C. 

      Ease of replacing server.

    • D. 

      Multiple users can access the server at once.

  • 13. 
    (203) What is the connection type of choice for storage area networks (SAN)?
    • A. 

      Fibre channel.

    • B. 

      ATA over Ethernet (AoE).

    • C. 

      Small computer system interface (SCSI).

    • D. 

      Internet small computer system interface (iSCSI)

  • 14. 
    (203) Which storage device can be easily connected to a network and appears as a network drive? 
    • A. 

      Storage area network (SAN).

    • B. 

      Redundant array of independent disks (RAID).

    • C. 

      Network attached storage (NAS).

    • D. 

      RHD.

  • 15. 
    (204) Which storage device has the means of providing data storage reliability using multiple hard drives? 
    • A. 

      Storage area network (SAN).

    • B. 

      Network attached storage (NAS).

    • C. 

      Small computer system interface (SCSI).

    • D. 

      Redundant array of independent disks (RAID).

  • 16. 
    (204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as 
    • A. 

      One single hard drive.

    • B. 

      A collection of hard drives.

    • C. 

      A single RAID array.

    • D. 

      A single RAID array.

  • 17. 
    (204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained? 
    • A. 

      Small computer system interface (SCSI).

    • B. 

      Serial attached (SAS) SCSI.

    • C. 

      Serial advanced technology attachment (SATA).

    • D. 

      Peripheral component interconnect express (PCIe).

  • 18. 
     (205) Which is not a characteristic of high-order languages?
    • A. 

      They are nearly self-documenting.

    • B. 

      They use English-like statements.

    • C. 

      Source codes that are written closest to machine language.

    • D. 

      Programs are transportable between computers with few changes.

  • 19. 
    (205) What best describes programming machine code?
    • A. 

      Another term for firmware.

    • B. 

      Statements that correspond to complex actions.

    • C. 

      Instructions in a form that is acceptable to the computer.

    • D. 

      Source code that, when compiled, is appropriate for the computer.

  • 20. 
    (206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
    • A. 

      Standard Generalized Markup Language (SGML).

    • B. 

      Extensible Markup Language (XML).

    • C. 

      HyperText Markup Language (HTML).

    • D. 

      Dynamic HTML (DHTML).

  • 21. 
    (206) Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
    • A. 

      Dynamic HTML (DHTML).

    • B. 

      Extensible Markup Language (XML).

    • C. 

      Standard Generalized Markup Language (SGML).

    • D. 

      Extensible HTML (XHTML).

  • 22. 
    (206) A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a 
    • A. 

      Transport layer security (TLS).

    • B. 

      Common gateway interface (CGI).

    • C. 

      Data encryption standard (DES).

    • D. 

      Public key infrastructure (PKI).

  • 23. 
    (206) Which protocol is commonly used for managing the security of a message transmission on the Internet? 
    • A. 

      Secure socket layer (SSL).

    • B. 

      Public key infrastructure (PKI).

    • C. 

      Data encryption standard (DES).

    • D. 

      Transport layer security (TLS).

  • 24. 
    (207) Which program can be used to automatically launch programs on a preset schedule?
    • A. 

      Check disk.

    • B. 

      Disk quotas.

    • C. 

      Disk defragmenter.

    • D. 

      Task scheduler.

  • 25. 
    (207) Which error-checking tool allows you to monitor the file system for errors? 
    • A. 

      Check disk.

    • B. 

      Disk quotas.

    • C. 

      Task scheduler.

    • D. 

      Disk defragmenter.

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.