• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/80

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

80 Cards in this Set

  • Front
  • Back
The computing part of the computer is the central processing unit, also called the..
microprocessor
What two main components make up the central processing unit?
Control unit and arithmetic logic unit
What is the type of memory that retains data after power is removed or lost?
Non-volatile

Which landline transmission medium is the primary carrier of voice communications?
Twisted pair cable

An optical communications system is comprised of a..
transmitter, cable, and receiver

Which of the following is not one of the three advantages to using wireless technology?
Safety

The ability to move about without being tethered by wires in wireless technology is called...
mobility
Which of the following is not one of the four security threats to Wireless Local Area Networks?
Direct Connections
Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
Employee
What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?
Institute of Electrical Electronics Engineers (IEEE)

How many peripherals can a Universal Serial Bus handle at once?
127

How many devices can connect to a Fire Wire bus?
63

What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
Voltage
What is A Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
Bridge

What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?
80/20 rule

This type of bridge is used to convert one Data Link layer protocol to another..
Translational
What is the method called when the entire frame is received an placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?
Store-and Forward
What forwarding method is also known as runtless switching?
Fragment-Free
What layer of the open system interconnection model do routers operate?
Layer 3

What do routing algorithms initialize and maintain to aid the process of path determination?
Routing tables

Which of these is an example of an Exterior Gateway Protocol?
Border Gateway Protocol

Dynamic routing automatically calculates the best path between how many nodes?
2

What encryption device may you rarely see due to its lower maximum data rate?
TSEC/KIV-7

What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high speed circuits?
TSEC/KIV-19
What encryption device is capable of loading up to 500 keys?
AN/CYZ-10/DTD
The classification of a fill device is..
classified as soon as a key is loaded, and holds the classification of the loaded key

A modem is a device that modulates..
digital data onto a analog carrier for transmission over an analog medium

Analog modems are used over the voice band range of...
20 Hz to 20 kHz

The main function of the Data Service Unit is to...
adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment

Software is generally divided into...
systems software, operating software, and applications software

Which one is not a category of the operating system's task categories?
Troubleshoot Interface

The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a...
driver
The core operating-system function is the management of the computer system which resides with the...
kernel
Applications are software programs designed to perform what type of tasks?
specific
What are two anti-virus programs that the Air Force uses?
Norton and McAfee

Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts?
Workgroup

Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?
Enterprise Edition

One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it?
Datacenter Edition

What was the first disk operating system developed to operate on a wide range of computer systems?
UNIX

What is the name of the standard all-purpose shell most commonly used?
Bourne shell
What directory is always identified by the slash symbol (/) and is in the "a" partition?
root
What pathnames begin at the current working directory?
Relative
What does the acronym RAM mean?
Random-access memory
What is the difference between ROM and RAM?
ROM is a type of memory that can only be read, as opposed to RAM which can be both read and written. The data stored in ROM is always there, whether there is power or no power. RAM will retain their data s long as stable power is applied.

Name the special type of memory used to store the BIOS settings in a PC.
Complementary metal oxide semiconductor memory

What speed enhancement is a small amount of memory placed inside the CPU or between the CPU and the main memory computer?
Cache

Name four integrated/internal peripheral devices
Hard disk, CD/DVD, Sound Card, Graphics/Video Card

How much data can a CD-ROM store? CD-R? DVD-ROM?
650MB, 700MB, 4GB

Most high volume printers can connect to a network directly using what internal device?
Integrated NIC
What is the primary use for a bridge?
To decrease network congestion

What two basic issues must be considered before implementing a bridge?
The 80/20 rule and the elimination of bridging loops

Name the type of bridging used on Ethernet networks
Transparent Bridging

Name the 5 functions that must occur for transparent bridging
Learning, flooding, filtering, forwarding, aging

What do LAN switches provide between network devices?
Collision-free, high speed communication

Can a switch connect LAN's of different bandwidths? If so give an example
Yes, Buffering

What type of switching is required when a frame must be moved from a low-speed LAN to a high-speed LAN?
Store-and-Forward Switching
Name 3 metrics that routers use to determine the best route
Path length, reliability, routing delay, bandwidth, load and communication cost

What routing protocols manage traffic within an autonomous system?
Interior Gateway Protocols

Name 2 methods for directing data on the network
Static or Dynamic Routing

What is static routing?
A technique in which a network administrator programs a router to use specific paths between nodes.

What is dynamic routing?
A router automatically calculates the best path between 2 nodes and compiles this into a routing table

What are 2 types of encryption?
Data and Voice
What are 2 devices used for data encryption?
TSEC KIV-7 and TSEC KIV-19

What 2 telephone devices are used for voice encryption?
Secure telephone unit (STU) and the secure terminal equipment (STE)

What are 2 types of data encryption fill devices?
AN/CYZ-10 and the Secure DTD 2000 System

How can encryption be applied?
Link-by-link, end-to-end, bulk

What are the 2 types of modems used?
Dial-up or Dedicated

What is one of the principal functions of a CSU?
To provide a barrier for electrical interference from either side of the unit

What is the main function of a DSU?
To adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment and vice versa
At the simplest level, state the two things done by an operating system

1) It manages the hardware and software resources of the computer system.




2) It provides a stable, consistent way for applications to deal with the hardware without having to know all the details of the hardware

Name the six categories of an operating systems tasks
Processor, Memory, Device, and Storage management. Application interface, and User interface

Applications are called what types of programs?
End-User
What is a domain?
A collection of computers defined by the administrator of a Windows Server Network that share a common directory/database.

When did Bell Labs develop the UNIX operating system?
Early 1970's

What is the program called that you interact with directly from your terminal or workstation?
Shell
Name 4 common shells in UNIX
Bourne shell, Korn shell, C shell, Restricted shell

Define partitions
Physical areas of disk allocated with specific sizes to hold file systems

When are partitions established?
During system configurations

In which directory are application programs contained?
usr (user) directory

What is the firmware prompt called on Sun machines?
"ok" (often called the OK prompt)