Shared Flashcard Set

Details

CIT 162 PTEST2
CIT
100
Computer Science
Graduate
11/02/2014

Additional Computer Science Flashcards

 


 

Cards

Term
Most computer problems are simple and easy to solve.
Definition
True
Term
Sometimes a Windows update solves a problem with a hardware device.
Definition
True
Term
When installing a device, you must always run the setup CD for the device after you physically install the device.
Definition
False
Term
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted.
Definition
True
Term
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.
Definition
False
Term
Individuals are always free to decide what security measures they want to use.
Definition
False
Term
It’s best to use three-factor authentication.
Definition
False
Term
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.
Definition
True
Term
Don’t use the same password on more than one system (computer, network, or application).
Definition
True
Term
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.
Definition
False
Term
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups.
Definition
True
Term
Allowing users full control of a folder is always required by job requirements.
Definition
False
Term
Permissions manually set for a subfolder or file cannot override inherited permissions.
Definition
False
Term
It is necessary that all computers belong to the same workgroup in order to share resources.
Definition
False
Term
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
Definition
True
Term
A notebook is currently considered a “black box” to PC support technicians.
Definition
False
Term
A tablet PC has more features than a notebook, including a touch screen that also allows you to handwrite on it with a stylus.
Definition
True
Term
Notebook computer cases tend to be similar to one another, and components in notebook systems tend to be interchangeable among manufacturers.
Definition
False
Term
In a notebook, replacing the motherboard probably means you’ll need to fully disassemble the entire notebook except the LCD assembly.
Definition
True
Term
Sometimes, a notebook LCD panel, including the entire cover and hinges, is considered a single field replaceable unit, and sometimes components within the LCD assembly are considered an FRU.
Definition
True
Term
If you can afford it, the best practice is to purchase one machine for one purpose, instead of bundling many functions into a single machine.
Definition
True
Term
The last four steps of the laser printing process use the printer components that undergo the most wear.
Definition
False
Term
Routine printer maintenance procedures are generally the same from manufacturer to manufacturer and printer to printer.
Definition
False
Term
An older PC and printer should never have a problem with bidirectional communication.
Definition
False
Term
If loose toner comes out with your printout, the fuser is not reaching the proper temperature and professional service is required.
Definition
True
Term
In Event Viewer, the ____ log shows only warnings and error events
a.
Program Events
c.
Active Events
b.
Administrative Events
d.
Network Events
Definition
b.
Administrative Events
Term
Check ____ to verify that a device is enabled and Windows thinks the device should be working.
a.
Computer Management
c.
Hardware Manager
b.
System Manager
d.
Device Manager
Definition
d.
Device Manager
Term
Errors or warnings in Device Manager are displayed as a ____.
a.
red triangle or question mark
b.
red triangle or yellow question mark
c.
yellow triangle or question mark
d.
red question mark or yellow exclamation mark
Definition
c.
yellow triangle or question mark
Term
To uninstall a program, in Device Manager ____ the device and select Uninstall.
a.
left-click
c.
shift+right-click
b.
right-click
d.
ctrl+right-click
Definition
b.
right-click
Term
If you can identify the approximate date the error started and that date is in the recent past, use ____.
a.
System Restore
c.
System Recovery
b.
Safe Mode
d.
Safe Recovery
Definition
a.
System Restore
Term
If the system is caught in an endless loop of restarts, boot into ____.
a.
System Restore
c.
Safe Mode
b.
System Recovery
d.
Conditional Mode
Definition
c.
Safe Mode
Term
For essential hardware devices, use the ____ to verify and replace system files.
a.
System Restore mode
c.
Safe Boot mode
b.
System File Checker
d.
File Integrity Checker
Definition
b.
System File Checker
Term
Reverting to a ____ point can solve problems with registry entries the application uses that have become corrupted.
a.
safe
c.
restore
b.
recovery
d.
solution
Definition
c.
restore
Term
Use the ____ tool to test memory.
a.
Memory Diagnostics
c.
Hardware Integrity
b.
File Checker
d.
Boot Integrity
Definition
a.
Memory Diagnostics
Term
Press ____ at startup to display the Advanced Boot Options menu.
a.
F4
c.
F10
b.
F8
d.
F12
Definition
b.
F8
Term
During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder.
a.
\Windows.sav
c.
\Windows.prv
b.
\Windows.old
d.
\Windows.rst
Definition
b.
\Windows.old
Term
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation.
a.
visible partition
c.
hidden partition
b.
preserved partition
d.
conspicuous partition
Definition
c.
hidden partition
Term
When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded.
a.
Windows core
c.
Windows driver layer
b.
Windows abstraction layer
d.
Windows kernel
Definition
d.
Windows kernel
Term
The ____ Configuration is updated after you log on normally to Vista.
a.
Last Known Good
c.
Last Known Usable
b.
Last Known Bootable
d.
Last Known Accessible
Definition
a.
Last Known Good
Term
The command ____ searches for and replaces corrupted system files.
a.
sfc /scan /now
c.
sfc /now /sfcscan
b.
sfc /scannow
d.
svc /now /sfcscan
Definition
b.
sfc /scannow
Term
The error ____ is caused by a driver or service making an illegal access to memory.
a.
Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
b.
Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL
c.
Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA
d.
Stop 0x7B or INACCESSIBLE_BOOT_DEVICE
Definition
b.
Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL
Term
The error ____ means a bad driver or service has performed an illegal action.
a.
Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
b.
Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL
c.
Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA
d.
Stop 0x7B or INACCESSIBLE_BOOT_DEVICE
Definition
a.
Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
Term
For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by ____.
a.
the computer manufacturer
b.
Microsoft
c.
some third-party vendors
d.
the computer manufacturer through Microsoft
Definition
a.
the computer manufacturer
Term
The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
a.
BS 7799 and ISO 17799
c.
ISO 17799 and ISO 27001
b.
ISO 17799 and ISO 27002
d.
ISO 27001 and ISO 7799
Definition
b.
ISO 17799 and ISO 27002
Term
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
a.
reset
c.
vault
b.
recovery
d.
conversion
Definition
a.
reset
Term
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
a.
password
c.
digital certificate
b.
token
d.
credential
Definition
c.
digital certificate
Term
A ____ is made of several words with spaces allowed.
a.
password
c.
token
b.
passphrase
d.
credential
Definition
b.
passphrase
Term
A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.
a.
service
c.
privileged
b.
administrator
d.
user
Definition
b.
administrator
Term
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data.
a.
user
c.
limited
b.
administrator
d.
privileged
Definition
c.
limited
Term
Most encryption software products use a method called ____.
a.
Private Key Encryption
c.
Shared Secret Encryption
b.
Symmetric Key Encryption
d.
Public Key Encryption
Definition
d.
Public Key Encryption
Term
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
a.
backdoor
c.
helper
b.
release
d.
beneficial routine
Definition
a.
backdoor
Term
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
a.
polymorphic
c.
multipartite
b.
boot sector
d.
macro
Definition
c.
multipartite
Term
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
a.
multipartite
c.
polymorphic
b.
macro
d.
boot sector
Definition
b.
macro
Term
Generally speaking, the weakest link in setting up security in a computer environment is ____.
a.
the network
c.
people
b.
the operating system
d.
the hardware
Definition
c.
people
Term
Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.
a.
partition utility
c.
cloning utility
b.
diagnostic utility
d.
zero-fill utilitya.
the network
c.
people
b.
the operating system
d.
the hardware
Definition
d.
zero-fill utility
Term
Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file.
a.
network
c.
directory
b.
simple
d.
user
c.
directory
b.
simple
d.
user
Definition
b.
simple
Term
The best way to change inherited permissions is to change the permissions of the ____.
a.
child object
c.
parent object
b.
inherited objects
d.
inheriting objects
Definition
c.
parent object
Term
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
a.
Security
c.
Actual Permissions
b.
Derived Permissions
d.
Effective Permissions
Definition
d.
Effective Permissions
Term
If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista Start Search box.
a.
\\computername\Financial$
c.
\\computername\shares\financial$
b.
\\financial$\computername
d.
\\shares\computername\financial$
Definition
a.
\\computername\Financial$
Term
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost.
a.
Decipher
c.
Decode
b.
Cipher
d.
Transcode
Definition
b.
Cipher
Term
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption.
a.
publicly-signed
c.
system-signed
b.
network-signed
d.
self-signed
Definition
d.
self-signed
Term
Certificates are managed using the ____ console.
a.
Certificate Store
c.
Certificate Manager
b.
Certificate Preparation
d.
Digital Certificate
Definition
c.
Certificate Manager
Term
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) ____ certificate.
a.
recovery
c.
backup
b.
restoration
d.
administrator
Definition
c.
backup
Term
Many notebook computers have a chip on the motherboard called the ____.
a.
MPM
c.
UPM
b.
CPM
d.
TPM
Definition
d.
TPM
Term
____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.
a.
Software
c.
Blocks
b.
BIOS
d.
Chipsets
Definition
b.
BIOS
Term
A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources.
a.
unrestricted
c.
isolated
b.
restricted
d.
quarantined
Definition
b.
restricted
Term
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.
a.
HKLM\System\CurrentControlSet\Control\SafeBoot
b.
HKLM\System\CurrentControlSet\System\SafeBoot
c.
HKCU\System\CurrentControlSet\Control\SafeBoot
d.
HKLM\System\CurrentControlSet\Services\SafeBoot
Definition
a.
HKLM\System\CurrentControlSet\Control\SafeBoot
Term
Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.
a.
Computer Manager
c.
System Manager
b.
Task Manager
d.
Event Viewer
Definition
b.
Task Manager
Term
The term ____ applies to a kit or set of tools used originally on UNIX computers.
a.
rootkit
c.
stealthkit
b.
botkit
d.
worm
Definition
a.
rootkit
Term
In UNIX, the lowest and most powerful level of UNIX accounts is called the ____ account.
a.
God
c.
universal
b.
master
d.
root
Definition
b.
master
Term
Most notebook manufacturers provide ____ software that can help you test components to determine which component needs replacing.
a.
diagnostic
c.
development
b.
management
d.
installation
Definition
a.
diagnostic
Term
When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive.
a.
development
c.
diagnostic
b.
management
d.
recovery
Definition
d.
recovery
Term
A(n) ____ is about the size of a credit card, but thicker.
a.
ExpressCard
c.
PCI card
b.
CardBus card
d.
PC Card
Definition
d.
PC Card
Term
A(n) ____ is an electrical device that changes DC to AC.
a.
inverter
c.
converter
b.
exciter
d.
voltage shifter
Definition
a.
inverter
Term
In ____ sleep, all work is saved to the hard drive, but the system still maintains a trickle of power.
a.
standby
c.
pure
b.
deep
d.
hybrid
Definition
d.
hybrid
Term
In Windows XP, ____ mode is similar to Vista sleep mode and corresponds to ACPI S3 mode.
a.
standby
c.
hibernation
b.
hybrid
d.
rescue
Definition
a.
standby
Term
IBM and Lenovo ThinkPad notebooks use a unique and popular pointing device embedded in the keyboard called a ____ or point stick.
a.
TrackPad
c.
TrackKnob
b.
TrackPoint
d.
TrackStick
Definition
b.
TrackPoint
Term
You can adjust the way the touch pad or works on a laptop using the ____ box.
a.
Mouse Properties
c.
Control Properties
b.
Display Properties
d.
Track Properties
Definition
a.
Mouse Properties
Term
For tablet PCs, the stylus can be controlled from the ____ box.
a.
Input Devices
c.
Mouse and Input Devices
b.
Pen and Input Devices
d.
Pen and Stick Devices
Definition
b.
Pen and Input Devices
Term
The brightness is a function of the ____ component of the LCD panel.
a.
forelight
c.
backlight
b.
inverter
d.
diverter
Definition
c.
backlight
Term
To substitute an internal device with an external device, first go into ____ setup and disable the internal device.
a.
BIOS
c.
system
b.
device
d.
computer
Definition
a.
BIOS
Term
A MicroDIMM that contains SDRAM has ____ pins.
a.
120
c.
144
b.
124
d.
172
Definition
c.
144
Term
A MicroDIMM that contains DDR SDRAM has ____ pins.
a.
120
c.
144
b.
124
d.
172
Definition
d.
172
Term
A notebook drive is ____ inches wide.
a.
2.5
c.
3.5
b.
3.0
d.
4.0
Definition
a.
2.5
Term
Mini PCI Express slots have ____ pins on the edge connector.
a.
25
c.
52
b.
68
d.
100
Definition
c.
52
Term
____ printers work by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning.
a.
Inkjet
c.
Dye-sublimation
b.
Thermal
d.
Laser
Definition
d.
Laser
Term
A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology called ____.
a.
REt
c.
VART
b.
REx
d.
eRT
Definition
a.
REt
Term
____ printers tend to smudge on inexpensive paper, and they are slower than laser printers.
a.
Laser
c.
Thermal
b.
Dye-sublimation
d.
Inkjet
Definition
d.
Inkjet
Term
Automatically printing on both sides of the page is called ____ printing.
a.
duplex
c.
duo
b.
simplex
d.
complex
Definition
a.
duplex
Term
A dedicated device or computer called a print ____ can control several printers connected to a network.
a.
queue
c.
manager
b.
server
d.
client
Definition
b.
server
Term
When you print to the Microsoft XPS Document Writer printer, it creates a(n) ____ file.
a.
.xps
c.
.xml
b.
.pdf
d.
.doc
Definition
a.
.xps
Term
Several print jobs can accumulate in the queue, which you can view in the Vista Printers window or the XP Printers and Faxes window in a process called ____.
a.
banking
c.
storing
b.
spooling
d.
pooling
Definition
b.
spooling
Term
Manufacturers of high-end printers provide ____ kits, which include specific printer components, step-by-step instructions for performing maintenance, and any special tools or equipment you need to do maintenance.
a.
toner maintenance
c.
imaging management
b.
printer development
d.
printer maintenance
Definition
d.
printer maintenance
Term
To find out how many pages a printer has printed so that you know if you need to do the maintenance, you need to have the printer give you the ____ count since the last maintenance.
a.
page
c.
coverage
b.
sheet
d.
image
Definition
a.
page
Term
In a laser printer, the fuser should last for about ____ pages.
a.
450
c.
45,000
b.
4500
d.
450,000
Definition
c.
45,000
Term
Printer ____ is updated by replacing the printer’s DIMM that contains the code or by downloading the update from the manufacturer’s Web site.
a.
BIOS
c.
firmware
b.
logic
d.
controller
Definition
c.
firmware
Term
A printer ____ page generally prints some text, some graphics, and some information about the printer, such as the printer resolution and how much memory is installed.
a.
menu map
c.
configuration
b.
test
d.
management
Definition
b.
test
Term
Check ____ for recorded events that have to do with the printer or the port it is using.
a.
Event Log
c.
Resource Monitor
b.
System Monitor
d.
Event Viewer
Definition
d.
Event Viewer
Term
If symbols or other special characters don’t print correctly on a laser printer, try using ____ printing rather than asking the printer to interpret the characters.
a.
binary
c.
image
b.
text
d.
decimal
Definition
a.
binary
Term
Do not use less than ____-LB paper in any type of printer, unless the printer documentation specifically says that a lower weight is satisfactory.
a.
14
c.
20
b.
16
d.
24
Definition
c.
20
Supporting users have an ad free experience!