Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/173

Click to flip

173 Cards in this Set

  • Front
  • Back
21. Why is it unlikely that you will find the IP address 192.168.250.10 on the Internet?
Because this address is in one of the IP address ranges that RFC 1918 recommends be reserved for private networks.
22. On an isolated LAN, why would you choose to use the NetBEUI protocol over TCP/IP?
NetBEUI is faster and easier to configure
5. What is one advantage of using repeaters? What is a disadvantage?
Repeaters amplify signals on a network, enabling the signal to travel over longer distances and reducing signal degradation. A disadvantage is that on Ethernet networks, there is a maximum amount of time that a signal can take to reach a network, and repeaters slow down travel time.
6. What topology does a token ring network use?
Star ring
14. What type of connection does a telephone jack use?
RJ-11
1. What layer of Windows NT/2000/XP is most responsible for interacting with hardware?
The HAL (hardware abstraction layer)
2. What is one reason that interaction with hardware is limited to only one or two components of Windows NT/2000/XP?
Limiting hardware interaction with OS components enables Windows NT/2000/XP to be ported easily to different hardware platforms and increases OS integrity by providing more control over resources and better performance.
3. What are the two modes of the Windows NT/2000/XP architecture?
User mode and kernel mode
4. Which of these two modes contains the NTVDM?
User mode
5. Can an application or device driver specify which physical memory or memory addresses it wants in Windows NT/2000/XP? Why or why not?
Windows NT/2000/XP does not allow a device driver to specify physical memory or memory addresses but instead uses the VMM to interface between the application or driver and the physical or virtual memory that it controls. This enables the OS to exercise more control over memory resources and prevent conflicts.
6. Before you install Windows 2000, how can you determine if the OS supports all the hardware on your PC?
The best way is to search the HCL on the Microsoft Web site, or, if you have an Intel-based computer, by using the NTHQ (NT Hardware Qualifier) program found on the Windows installation CD.
7. What is one reason not to upgrade from Windows 98 to Windows NT?
Their registries are not compatible.
8. What file systems does Windows NT support? Windows 2000?
FAT16 and NTFS
FAT16, FAT32 and NTFS
8. What file systems does Windows NT support? Windows 2000?
FAT16 and NTFS
FAT16, FAT32 and NTFS
9. If you have Windows 98 installed on a PC using FAT32 and you are creating a dual boot with Windows NT, what must you do first so that Windows NT can access the entire hard drive?
Convert to FAT16 or use third-party software to manage the interface between Windows NT and FAT32
10. How many bits are used to store a cluster number in the Windows NT NTFS file system?
64
11. What is the file system that is common to DOS, Windows 9x, and Windows NT?
FAT16
12. Windows NT/2000/XP is installed using a system partition and a boot partition. Which of these partitions must be the active partition of the hard drive?
The system partition
23. What are the two ways an IP address can be assigned to a PC? What is one advantage of each?
IP addresses can be assigned through static addressing (in which IP addresses are permanently assigned to workstations) or dynamic addressing (in which IP addresses are assigned for the current session only. An advantage of static IP addressing is that it doesn’t require a DHCP server. An advantage of dynamic IP addressing is that fewer IP addresses than the total number of workstations can satisfy the needs of a network.
24. What are the Ping, Ipconfig, and Winipcfg utilities used for?
The Ipconfig (on Windows NT/2000/XP) and Winipcfg (on Windows 9x) commands are used to display a machine’s IP address and the MAC address of its NIC. The Ping command is used to send a signal to a remote computer and test connectivity.
25. What two Windows components are required to share resources on a network and access those shared resources?
Client for Microsoft Networks and File and Printer Sharing
26. How is a router a more intelligent device than a switch?
A router can route data to the correct network in a way that is similar to a switch’s method. However, a router can also forward a message to its correct destination over the most efficient available route to destinations far removed from the LAN it is connected to.
27. Why is a router called a stateless device?
Because it is unconcerned about the data that it is routing and is only concerned with the destination address of the data
28. Of IPX/SPX, TCP/IP, and NetBEUI, which is routable and which is not?
IPX/SPX and TCP/IP are routable, and NetBEUI is not.
29. Place the following bandwidth technologies in the order of their highest speed, from slowest to fastest: DSL, ISDN, regular telephone lines, cable modem, T1, Ethernet.
Regular telephone lines, ISDN, DSL, cable modem, T1, Ethernet
30. Give two examples of broadband technology.
Possible answers: Cable modem and DSL
1. Name three different types of Ethernet. What transmission speed does each support?
10-Mbps Ethernet (10 Mbps), Fast Ethernet (100 Mbps), and Gigabit Ethernet (1000 Mbps)
2. What is the maximum length of a cable on a 100BaseT network?
100 meters (328 feet)
3. What does the 100 in the name 100BaseT indicate?
The transmission speed (100 Mbps)
4. What is broadcasting? Name a network connection device that uses it and one that does not.
Hubs and bridges use broadcasting, and switches and routers do not
13. In a Windows NT/2000/XP workgroup, where is access to an individual workstation on the network controlled?
In a workgroup, access to an individual workstation is controlled from that workstation
14. In a Windows NT/2000/XP domain, where is access to an individual workstation on the network controlled?
In a domain, access to an individual workstation can be controlled from the centralized domain server.
15. What is the term for the 4K segments in which Windows NT/2000/XP allocates memory?
Pages
16. What is the first Windows NT/2000/XP program that is loaded and run when Windows NT is booted?
Ntldr
17. How many floppy disks are needed in order to boot Windows NT from disk?
Three
18. In what two places can the Windows NT/2000/XP virtual memory manager store memory pages?
In RAM or on the hard drive in the swap file called Pagefile.sys
19. What is required before Windows 2000 can provide full power management functionality?
The system BIOS must be ACPI-compliant.
20. Name three manufacturers responsible for the initial development of ACPI?
Intel, Microsoft, and Toshiba
21. Explain the difference between Windows 2000 native mode and mixed mode.
Windows 2000 can run in native mode and mixed mode. Native mode is used when all domain servers are Windows 2000 servers. Mixed mode is used when a domain has both Windows 2000 and Windows NT servers controlling the domain.
22. If you are installing Windows 2000 on a new hard drive and your system cannot boot from a CD, how do you begin the installation?
Create a set of Windows 2000 setup disks on another computer to boot the PC and begin the installation process.
23. If you install Windows 2000 on an 8 GB hard drive, use a single partition for the drive, and choose not to use the NTFS file system, what file system will Windows 2000 automatically use?
FAT32
7. How is a FDDI network like a token ring network? How is it different?
FDDI uses a token that travels in a ring like on a Token Ring network. However, data frames can travel on the ring without the token, and multiple nodes can have data on the ring at the same time.
24. What is the command to create a set of Windows 2000 boot disks?
Makeboot
8. What IEEE standards describe Ethernet? What IEEE standards describe wireless LAN?
Ethernet: 802.3
Wireless LAN: 802.11, 802.11b, 802.11a, 802.11g
25. If your BIOS is not ACPI-compliant, what should you do before you install Windows 2000?
Flash your BIOS to make it ACPI-compliant
26. If an administrator is concerned by security on a system, which file system is appropriate?
NTFS
27. Can you perform an upgrade of Windows 2000 from a remote computer on the network? Explain your answer.
You cannot perform an upgrade of Windows 2000 from a remote computer, because to perform an upgrade, you must begin the installation while you are in the current OS.
28. For a person to be able to install hardware, what privileges or permissions must be assigned to their user account?
Administrative
29. When there is a problem booting to Windows NT and the Last Known Good configuration is used, what is lost?
All changes made to the Windows NT configuration since the Last Known Good configuration was saved.
30. What is the name of the folder on the Windows NT/2000 CD where the installation files are stored?
\i386
1. In the Windows NT/2000/XP boot process, what file reads and loads the boot menu?
Ntldr
2. Where is the Boot.ini file stored?
Root directory of the system partition (usually C:\)
3. What does %SystemRoot% mean?
Indicates the Windows NT/2000/XP folder on the boot partition, usually C:\Winnt
4. List the steps to restore the Windows 2000 system state from the backup made with the Backup utility.
To use the backup to restore the system state after a system failure or the registry becoming corrupted, begin the same way you did to make the backup by clicking Start, pointing to Programs, Accessories, and System Tools and then clicking Backup. From the Restore tab, you select the backup you want to restore and, in the drop-down menu in the bottom left corner, the location to which it is to be restored. Click the Start Restore button in the bottom right corner to start the process.
5. In what folder does Windows 2000 store a backup of the registry when backing up the system state?
The %SystemRoot%\System32\Config folder
6. Under what circumstances would you use the Enable VGA Mode option on the Advanced Option menu?
When the video setting has problems that prevent you from seeing well enough to fix it
7. What key do you press to display the Advanced Option menu during startup?
F8
8. What is the purpose of safe mode with networking under the Advanced Options menu?
This mode is used when there is a problem with the boot process that requires access to the network to solve, or when the Windows 2000 installation files are loaded from the network and access to those files is required.
9. What is the name of the log file that Windows 2000 uses when booting in safe mode?
Ntbtlog.txt
10. List the steps to load the Recovery Console when using the four Windows 2000 rescue disks
· Insert the first of the four setup disks and restart the PC. You are directed to insert each of the four disks in turn, and then the Setup screen appears.
· Type R to select the To repair a Windows 2000 installation option. The Windows 2000 Repair Options window opens. Type C to select the Recovery Console.
· The Windows 2000 Recovery Console window opens. The Recovery Console looked at the hard drive and determined that there was only a single Windows 2000 installation on the drive installed in the C:\Winnt folder. (The Winnt folder might be on a different drive on your machine.) Press 1 and press Enter to select that installation.
· Enter the Administrator password and press Enter. If you don’t know the password, you cannot use the console.
· You now have a command prompt. You can use a limited group of DOS-like commands at this point to recover a failed system.
11. Why is the Administrator password required in order to use the Recovery Console?
The Administrator password is necessary to use the Recovery Console to access an NTFS volume and make changes to the system.
12. In Question 11, under what circumstances is the password not required?
If the registry is so corrupted that it cannot read the Administrator password in order to validate it, you are not asked for the password, but you are limited as to what you can do in the Recovery Console.
13. What is the purpose of the Systemroot command under the Recovery Console?
Sets the current directory to the directory where Windows 2000 is installed
14. Under the Recovery Console, what is the command that gives the same results as Fdisk/MBR?
Fixmbr, which rewrites the master boot record boot program
15. What is the command to install the Recovery Console on the startup menu?
winnt32 /cmdcons
16. Before you can perform the Windows 2000 Emergency Repair Process, what disk must you have? What is contained on the disk?
The ERD (Emergency Repair Disk), which contains enough data to restore the system state to the state it was in immediately after the Windows 2000 installation
17. When would you use System File Checker? What is the command to execute it?
The SFC, which runs automatically after an unattended installation, can be activated manually at the command prompt and used to verify that the system is using correct versions of all protected system files. The command to execute it is Sfc.exe.
18. What is the command to install the Windows 2000 Support Tools?
D:\Support\Tools\Setup.exe (substituting the drive letter of the CD-ROM drive for D in the command line)
19. What is the name of the log file created by Dr. Watson?
Drwtsn32.exe
20. Name two Windows utilities that can be used to monitor the OS performance
Task Manager and System Monitor
21. What tool can you use to create a console containing Device Manager and Event Viewer?
MMC (Microsoft Management Console)
22. What is the file extension assigned to the console file?
. msc
23. Name one snap-in contained in the Computer Management console
Event Viewer, System Information
24. What is the program filename for System File Checker?
Sfc.exe
25. Give one reason why you should make the paging file maximum size the same as the paging file initial size.
To prevent the disk fragmentation that can result from making the maximum and initial sizes different values
26. List the steps to change the size of the paging file.
· Open the Control Panel.
· Double-click the System icon.
· The System Properties window opens. Click the Advanced tab.
· Click the Performance Options button.
· The Performance Options window opens. Click the Change… button.
· The Virtual Memory window opens. In this window, you can change the size of the paging file and view information about the paging file and the registry.
27. List three ways to access the Task Manager.
· Press the Ctrl, Alt, and Delete keys simultaneously. The Windows Security window will open. Click the Task Manager button.
· Right-click a blank area on the taskbar and select Task Manager from the shortcut menu.
· Press the Ctrl, Shift, and Esc keys simultaneously.
28. List the steps used to end an application when the application refuses to respond to keystrokes or the mouse action.
Open Task Manager, select the application, and click the End Task button at the bottom of the Task Manager window.
29. What are the three logs kept by Event Viewer?
Application, security, and system
30. In what folder do you put a console file that you want displayed when you click Start, Programs, Administrative Tools when you are logged on as an administrator?
C:\Documents and Settings\user\Start Menu\Programs\Administrative Tools
1. Name the three main versions of Windows XP
Windows XP Home Edition
Windows XP Professional
Windows XP 64-bit Edition
2. What are at least three similarities between Windows XP and Windows 2000? At least three differences?
Similarities:
· Both use the same basic architecture.
· Some low-level device drivers have direct access to hardware.
· Both use the same kernel architecture.
· Both support the same file systems (FAT16, FAT32, and NTFS).
· You can back up the system state.
Differences:
· Windows XP is generally more stable.
· Windows XP installation is easier.
· Windows XP has increased security, including a built-in Internet firewall
· The GUI is different.
· Only the Recycle Bin shows on the Windows XP desktop by default
3. How much free space on a partition does Windows XP require for installation? How much does it require for acceptable operation?
Windows 9x
4. How much memory is required to install Windows XP? How much is recommended to run applications under Windows XP?
64 MB, 128 MB
4. How much memory is required to install Windows XP? How much is recommended to run applications under Windows XP?
64 MB, 128 MB
4. How much memory is required to install Windows XP? How much is recommended to run applications under Windows XP?
64 MB, 128 MB
5. When you are trying to determine if your computer can support Windows XP, list the steps to know how much RAM is currently installed.
Right click on My Computer icon and select Properties from the menu. Click the General tab. RAM is displayed on this tab.
6. Which version of Windows XP must be installed on a system that is using the Intel Itanium processor? Why?
Windows XP 64-bit Edition. Because the Itanium is a 64-bit processor.
15. What two things does the MNP-5 standard control?
Error correction and data compression
7. How many processors in a system can Windows XP support?
2
8. List two different ways to check hardware and software compatibility for Windows XP.
Check the hardware and software compatibility lists on the Microsoft Web site, or run the Readiness Analyzer from the Windows XP CD.
9. If you find out that one of your applications is not supported by Windows XP and you still want to use XP, what can you do to solve this incompatibility problem?
Upgrade the application or install XP as a dual boot so the application can still work under the old OS
10. What file system do you use if you are installing Windows XP as a dual boot with Windows 9x? Windows NT? Windows 2000?
FAT32, FAT16, NTFS
11. Name at least four things you should do before performing an upgrade to Windows XP
· Verify that the system meets the minimum and recommended requirements.
· Check the Hardware Compatibility List (HCL) to verify that all installed hardware components are compatible with Windows XP.
· Decide how you will partition your hard drive and what file system you will use.
· For a PC on a network, decide whether the PC will be configured as a workstation in a workgroup or as part of a domain.
· Make a final checklist to verify that you have done all the above and are ready to begin the installation.
· Clean up the hard drive: erase unneeded or temporary files, empty the Recycle Bin, run Disk Defragmenter, and do a ScanDisk of the drive.
· If you have determined that you must upgrade hardware or software and that these upgrades are compatible with your old OS, perform the upgrades and verify that the hardware or software is working.
· If you do not have the latest BIOS for your motherboard, flash your BIOS.
· Back up important files.
· Scan the hard drive for viruses using a current version of antivirus software.
· If you have a compressed hard drive, uncompress the drive. The only exception to this is that if you are using Windows NT file compression on an NTFS drive, you do not need to uncompress.
· Uninstall any hardware or software that you know will not be compatible with Windows XP and for which you do not have an upgrade available.
12. What are the two upgrade options for Windows XP? Explain the difference between them
· Express Upgrade – This upgrade uses existing Windows folders and uses all existing settings it can.
· Custom Upgrade – This upgrade allows you to change the installation folder and the language options. Using this option, you can also change the file system to NTFS.
13. How long do you have to activate Windows XP? What happens if you don’t?
You have up to 30 days after installation to activate Windows XP, after which time the system will refuse to boot.
14. What is the first Microsoft product to use product activation?
Microsoft Office XP
15. Explain the purpose of the USMT utility and list the three steps needed to use it.
The User State Migration Tool (USMT) transfers user files and folders, display properties, taskbar options, and browser and email settings from a Windows 9x or Windows NT/2000/XP computer. This utility can help in making a smooth transition for a user who is moving from one PC to another without having to copy files and reconfigure OS settings. The process involves these three steps:
· Use a Windows XP computer to create a disk that contains the Files and Settings Transfer Wizard. This PC does not need to be the same PC that will later receive the transfer.
· Use the disk on the source computer (the user’s old computer) to run the wizard and copy the user state to a server hard drive or removable media such as a Zip drive.
· On the destination computer (the user’s new computer), use the wizard to transfer the user state to this computer.
16. What two commands can you use from the command prompt to perform the same functions as the Files and Settings Transfer Wizard?
Instead of using the wizard, you can also use two commands at the command prompt. Scanstate copies the information to a server or removable media, and Loadstate copies the information to the destination computer.
17. How are the Windows XP desktop and Start menu different from those in Windows 2000?
When Windows XP is first installed, the Recycle Bin is the only shortcut on the desktop. The Start menu is organized with a more graphical look than in Windows 2000.
18. Give two different ways to create shortcuts in Windows XP
You can add a program shortcut to the desktop by right-clicking a program name in the Start, All Programs list and then selecting Copy from the Shortcut menu. Then right-click anywhere on the desktop and select Paste from the shortcut menu. A shortcut is created and placed on the desktop. You can also use Windows Explorer to create a shortcut. From Explorer, right-click a program file name or the filename of a document or data file and select Create Shortcut from the shortcut menu. Then drag the shortcut created to the desktop.
19. What are two ways you can access the Windows XP Device Manager?
One way is to click Start, right-click My Computer, and select Manage from the shortcut menu. Another way to access Device Manager is to open the System applet in Control Panel, select the Hardware tab, and click Device Manager.
20. Name the two files that are needed to copy an older driver from another PC or a backup medium to your Windows XP PC for a device driver rollback.
Two files are needed: a .sys file and an .inf file. The .sys file is the actual driver, and the .inf file contains information about the driver.
21. What is the path for the report file created when you run Readiness Analyzer?
C:\Windows\compat.txt
22. Which OS are DOS applications more likely to work under: Windows 2000 or Windows XP?
Windows XP
23. List at least three things you can do if a legacy application does not start up and run correctly after you install it under Windows XP.
· Check the Microsoft Web site for updates (windowsupdates.microsoft.com)
· Check the software manufacturer’s Web site for updates or suggestions as to how to run the software under Windows XP
· Consider upgrading the software to a later version
· Use the Windows XP Compatibility Mode utility
24. What legacy applications should you not attempt to run under Windows XP?
Some legacy applications that you should not attempt to run under Windows XP are older versions of antivirus software, and maintenance and cleanup utilities.
25. Where should you place a shortcut if you want the associated application to start automatically on startup for all users? Give the entire path.
For each user, this folder is Documents and Settings\Username\Start Menu\Programs\Startup
1. Which operating system has the most security: Windows 9x or Windows XP?
Windows XP
2. What is the difference between joining a workgroup and joining a domain?
In a workgroup, each user account is set up on the local computer independent of other accounts on other PCs, and there is no centralized control of resources. In a domain, user accounts and system resources are controlled by a centralized domain controller.
3. Where is user account information stored on a Windows 2000 domain?
In the SAM which is part of Active Directory on the Windows 2000 domain controller
4. When is the local user profile created?
When the user first logs onto the system.
5. How are a roaming profile and a mandatory profile the same? How are they different?
A roaming profile and a mandatory profile are the same in that they follow users from one computer to another in a workgroup. They are different in that a user can change a roaming profile that applies only to this one user, but a mandatory profile is the same for a group of users and cannot be changed by the user.
6. What is the difference between the tools ASR and System Restore?
The Automated System Recovery (ASR) process allows you to restore an entire hard drive volume or logical drive to its state at the time the backup of the volume was made. The System Restore utility, which is new to Windows XP, can be used to restore the system state to the time a snapshot was taken of the system settings and configuration.
7. What are two important criteria that make for a good password?
The password is not easy to guess and it contains numbers, letters, and non-alphanumeric characters.
8. What can a user do to keep from having the administrator reset a forgotten password?
Create a forgotten password floppy disk that can be used if the password is forgotten.
9. Which user group has more rights, Power Users or Administrators?
Administrator
10. When using Group Policy on a computer in a workgroup, which type of configuration do you use?
Computer Configuration
11. What do you implement to control how much disk space a user can take up?
Disk quotas
12. Suppose a user has encrypted important data files and now is no longer working for your company. How do you decrypt these files so they can be read?
Log on as an administrator and decrypt the files, either by changing the properties of the folder the files are in or by moving the files to an unencrypted folder
13. What is the easiest way to give others access to a file that you have encrypted?
Move the file to a folder that is not encrypted.
14. What command can you use at the command prompt to encrypt a file?
Cipher
15. If your computer at home is connected to the Internet by way of your spouse’s computer, which is connected to the Internet using cable modem, which computer should have Internet Connection Firewall enabled?
Your spouse’s computer
16. Which applet in Control Panel is used to enable and disable Internet Connection Firewall?
Network Connections
17. Which Windows registry subtree contains information about the currently logged-on user?
HKEY_CURRENT_USER
18. Which Windows registry subtree gets all its information from the HKEY_LOCAL_MACHINE subtree?
HKEY_CURRENT_CONFIG
19. In Windows NT/2000/XP, a file that contains part of the Windows registry is called a
Hive
20. What is the Windows XP command to access the registry editor?
Regedit
21. How are Dr. Watson and the registry editor different in Windows XP from how they were in Windows 2000?
The name of the Dr. Watson log file is different in Windows XP (Drwatson.log) than it was in Windows 2000 (Drwtsn32.log). Windows 2000 included two versions of the Registry Editor, Regedit.exe and Regedit32.exe, and Windows XP includes only one (Regedit.exe) but allows you to access it using either name.
22. What is the name of the snap-in file for Disk Defragmenter?
Dfrg.msc
23. Looking at a program filename and file extension, how can you tell if the program is a MMC snap-in or a command-line program?
The file extension .msc indicates a snap-in and the file extension .exe indicates a command-line program.
24. What is the name of the log file created when boot logging is enabled from the Advanced Options startup menu?
Ntbtlog.txt
25. Place these tools in the order in which you should try them when troubleshooting the boot process: Recovery Console, Advanced Options Menu, System Restore.
Advanced Options Menu, System Restore, Recovery Console
26. What is a restore point, and what is it used for?
A restore point is a snapshot of the system state that was created earlier and is used to restore the system state to the time a snapshot was taken of the system settings and configuration
9. Can a NIC be designed to use more than one network architecture? More than one type of cabling? Explain.
A NIC can be designed to use only one network architecture but can be designed to use more than one type of cabling. The NIC and the device drivers are the only components in the PC that are aware of the type of network being used.
10. What connecting device do you use for a small LAN? Two network segments? Two or more connected networks? Give reasons for your answers.
For a small network, hubs are sufficient. If a network is divided into two segments, a bridge is better, because hubs broadcast packets everywhere, and bridges will only broadcast a packet to segments other than the one from which it originated. The more segments there are in a network, the better it is to have a switch, which sends a packet only to the segment for which it is intended. Routers are needed when two or more networks are connected to each other, as they can make more specific decisions about where to route packets.
11. How do switches route packets differently from bridges?
Both bridges and switches keep routing tables for each network segment to which they are connected. When a bridge receives a packet, it searches the routing table only of the segment from which it received the packet. If the packet is destined for a node on its own segment, the bridge does not broadcast it; if it is not, the bridge broadcasts the packet to every other segment. In contrast, a switch searches the routing tables of all the segments to which it is connected and sends the packet only to the segment to which it is addressed.
12. Describe the structure of an IP address. How is it different from a MAC address?
An IP address is a series of four numbers, each no larger than 255, separated by periods. A MAC address is expressed as six pairs of hex numbers separated by dashes. A MAC address cannot change, and an IP address can; a MAC address is like a local address, and an IP address is like a long-distance address.
13. Name two networking devices that transmit packets based on MAC addresses
Bridges, switches
14. How many potential IP addresses are there?
4.3 billion
15. How many networks and addresses are available for Class A IP addresses? Class B? Class C?
Class A: 127 networks; 16 million addresses
Class B: 16,000 networks; 65,000 addresses
Class C: 2 million networks; 254 addresses
16. Why are Class D and E addresses not available to individuals and companies?
Class D addresses are used for multicasting, and Class E addresses are reserved for research
17. Which octets are used for the network address and for host addresses in Class A? Class B? Class C?
Class A: H.N.N.N
Class B: H.H.N.N
Class C: H.H.H.N
18. In what class is the IP address 185.75.255.10?
Class B
19. In what class is the IP address 193.200.30.5?
Class C
20. Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on that network access the Internet?
Public IP addresses are available for use on the Internet. Private IP addresses are used on private intranets that are isolated from the Internet. Networks that use private IP addresses can access the Internet through a proxy server, which substitutes its IP address for the address of the device trying to access the Internet.
8. Name two standards that pertain to data compression.
MNP Class 5 and CCITT V.42bis
9. Why is a modem required to support more than one standard for transmission speed?
The more standards a modem supports, the more likely it will be able to establish good communication with any other modem.
10. What happens when the receiving modem finds that the checksum is incorrect during data transmission with error checking?
It asks for retransmission of the data
11. Using Windows XP, list the steps to control the port settings for an external modem connected to a serial port.
Click Start and right click on My Computer. Select Properties. Click the Hardware tab. Click the Device Manager button. In Device Manager, click the plus sign (+) beside Modems and then right click on the modem. In the modem properties box, click Modem. At the top of this pane, find out the COM port the modem is using. Then, still in Device Manager, click the plus sign (+) beside Ports (COM & LPT) and then right click the COM port the modem is using. On the COM port properties dialog box, click the Port Settings tab. Change the port settings and click OK to apply. Then close all windows.
12. What type port is most often used to connect an external modem to a PC?
Serial
13. Describe the difference between port speed and modem speed
Port speed is the speed between a modem and its PC, and modem speed is the speed between two modems.
27. ScanReg has been replaced by System Restore in Windows XP. What is the main advantage that ScanReg has over System Restore?
Scanreg can be executed from a command prompt, whereas System Restore cannot
28. Can you use an MS-DOS startup disk to launch Windows XP? To recover data files? To recover from a failed installation of Windows XP?
You can use an MS-DOS startup disk to recover data files but not to launch Windows XP or recover from a failed installation of Windows XP.
29. When trying to restore a failed system, what should you do next if Recovery Console does not work?
If the Recovery Console fails, then use the Automated System Recovery process to restore the hard drive to its state as of the last ASR backup
16. Why is it best to not have the serial port UART perform parity checking?
In most cases, error correction is best done by the modem.
30. What are two recovery tools new to Windows XP that are used to recover from a failed boot?
System Restore and Automated System Recovery
17. What company invented the AT command set for a PC to communicate with a modem?
Hayes Microcomputer Products
1. Explain why a modem is considered both hardware and firmware.
The modem is essentially a hardware device but also contains firmware on ROM chips that contains the protocol and instructions needed to format and convert data so that it can be transmitted over phone lines to a receiving modem on the other end.
2. Converting a digital signal to analog is called ___. Converting analog back to digital is called ___.
Modulation, demodulation
3. Communication in only one direction at a time is ___ communication. Communication in both directions at the same time is ___ communication.
Half-duplex, full-duplex
4. Why is the maximum transmission rate of today’s modems limited to 56.6 Kbps? Why might a modem not transmit at this speed?
Modem transmission rates are limited by the design of the phone lines as well as the method that phone companies use to convert analog to digital. The overhead of data transmission must also be taken into account. All these factors combine to limit modem transmission over a regular phone line to around 56.6 Kbps. Line noise and available wiring can further limit transmission speed so that 56.6 Kbps cannot be attained.
5. How does the V.34 standard differ from the V.92 standard?
The V.34 standard transmits at 28.8 Kbps, with optional higher speeds of 31.2 Kbps and 33.6 Kbps. V.92 is the current standard used to attain speeds of 56 Kbps.
6. What two standards did the V.90 standard replace?
K56flex and x2
7. What organization is responsible for setting telecommunications standards?
The ITU (International Telecommunications Union), which in 1992 absorbed the functions of the CCITT.
18. List three hardware reasons why a modem might not respond
· The modem is not plugged into the phone jack.
· The modem is not plugged into the computer or the connection is not solid.
· The phone line from the wall is not connected to the line-in RJ-11 port on the modem
19. What is the complete AT command to cause a modem to reinitialize itself to the settings defined at power on?
ATZ0
20. What is the complete AT command to cause a modem to reconfigure itself to factory default settings?
AT&F
21. What is the purpose of the AT command ATM0?
Sets the modem so that the speaker is always off
22. List the steps in Windows 98 to have Windows run a diagnostic test on the modem.
From Control Panel, click the Modems icon. A Modems Properties box displays. Select the COM port the modem is installed on and click More Info…
23. List the steps in Windows 2000/XP to have Windows run a diagnostic test on the modem.
Open Device Manager, right-click on the modem, and select Properties from the shortcut menu. The modem’s Properties box opens. Click the Diagnostics tab and then click the Query Modem button.
24. When Windows performs these diagnostic tests, what command set is it using?
AT commands
25. What Windows utility can be used to issue AT commands to a modem?
HyperTerminal