Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
80 Cards in this Set
- Front
- Back
The computing part of the computer is the central processing unit, also called the..
|
microprocessor
|
|
What two main components make up the central processing unit?
|
Control unit and arithmetic logic unit
|
|
What is the type of memory that retains data after power is removed or lost?
|
Non-volatile
|
|
Which landline transmission medium is the primary carrier of voice communications? |
Twisted pair cable
|
|
An optical communications system is comprised of a.. |
transmitter, cable, and receiver
|
|
Which of the following is not one of the three advantages to using wireless technology? |
Safety
|
|
The ability to move about without being tethered by wires in wireless technology is called... |
mobility
|
|
Which of the following is not one of the four security threats to Wireless Local Area Networks?
|
Direct Connections
|
|
Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
|
Employee
|
|
What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?
|
Institute of Electrical Electronics Engineers (IEEE)
|
|
How many peripherals can a Universal Serial Bus handle at once? |
127
|
|
How many devices can connect to a Fire Wire bus? |
63
|
|
What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property? |
Voltage
|
|
What is A Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
|
Bridge
|
|
What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment? |
80/20 rule
|
|
This type of bridge is used to convert one Data Link layer protocol to another.. |
Translational
|
|
What is the method called when the entire frame is received an placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?
|
Store-and Forward
|
|
What forwarding method is also known as runtless switching?
|
Fragment-Free
|
|
What layer of the open system interconnection model do routers operate?
|
Layer 3
|
|
What do routing algorithms initialize and maintain to aid the process of path determination? |
Routing tables
|
|
Which of these is an example of an Exterior Gateway Protocol? |
Border Gateway Protocol
|
|
Dynamic routing automatically calculates the best path between how many nodes? |
2
|
|
What encryption device may you rarely see due to its lower maximum data rate? |
TSEC/KIV-7
|
|
What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high speed circuits? |
TSEC/KIV-19
|
|
What encryption device is capable of loading up to 500 keys?
|
AN/CYZ-10/DTD
|
|
The classification of a fill device is..
|
classified as soon as a key is loaded, and holds the classification of the loaded key
|
|
A modem is a device that modulates.. |
digital data onto a analog carrier for transmission over an analog medium
|
|
Analog modems are used over the voice band range of... |
20 Hz to 20 kHz
|
|
The main function of the Data Service Unit is to... |
adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment
|
|
Software is generally divided into... |
systems software, operating software, and applications software
|
|
Which one is not a category of the operating system's task categories? |
Troubleshoot Interface
|
|
The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a... |
driver
|
|
The core operating-system function is the management of the computer system which resides with the...
|
kernel
|
|
Applications are software programs designed to perform what type of tasks?
|
specific
|
|
What are two anti-virus programs that the Air Force uses?
|
Norton and McAfee
|
|
Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts? |
Workgroup
|
|
Which system provides support for features such as Windows System Resource Manager and Metadirectory Services? |
Enterprise Edition
|
|
One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it? |
Datacenter Edition
|
|
What was the first disk operating system developed to operate on a wide range of computer systems? |
UNIX
|
|
What is the name of the standard all-purpose shell most commonly used? |
Bourne shell
|
|
What directory is always identified by the slash symbol (/) and is in the "a" partition?
|
root
|
|
What pathnames begin at the current working directory?
|
Relative
|
|
What does the acronym RAM mean?
|
Random-access memory
|
|
What is the difference between ROM and RAM?
|
ROM is a type of memory that can only be read, as opposed to RAM which can be both read and written. The data stored in ROM is always there, whether there is power or no power. RAM will retain their data s long as stable power is applied.
|
|
Name the special type of memory used to store the BIOS settings in a PC. |
Complementary metal oxide semiconductor memory
|
|
What speed enhancement is a small amount of memory placed inside the CPU or between the CPU and the main memory computer? |
Cache
|
|
Name four integrated/internal peripheral devices |
Hard disk, CD/DVD, Sound Card, Graphics/Video Card
|
|
How much data can a CD-ROM store? CD-R? DVD-ROM? |
650MB, 700MB, 4GB
|
|
Most high volume printers can connect to a network directly using what internal device? |
Integrated NIC
|
|
What is the primary use for a bridge?
|
To decrease network congestion
|
|
What two basic issues must be considered before implementing a bridge? |
The 80/20 rule and the elimination of bridging loops
|
|
Name the type of bridging used on Ethernet networks |
Transparent Bridging
|
|
Name the 5 functions that must occur for transparent bridging |
Learning, flooding, filtering, forwarding, aging
|
|
What do LAN switches provide between network devices? |
Collision-free, high speed communication
|
|
Can a switch connect LAN's of different bandwidths? If so give an example |
Yes, Buffering
|
|
What type of switching is required when a frame must be moved from a low-speed LAN to a high-speed LAN? |
Store-and-Forward Switching
|
|
Name 3 metrics that routers use to determine the best route
|
Path length, reliability, routing delay, bandwidth, load and communication cost
|
|
What routing protocols manage traffic within an autonomous system? |
Interior Gateway Protocols
|
|
Name 2 methods for directing data on the network |
Static or Dynamic Routing
|
|
What is static routing? |
A technique in which a network administrator programs a router to use specific paths between nodes.
|
|
What is dynamic routing? |
A router automatically calculates the best path between 2 nodes and compiles this into a routing table
|
|
What are 2 types of encryption? |
Data and Voice
|
|
What are 2 devices used for data encryption?
|
TSEC KIV-7 and TSEC KIV-19
|
|
What 2 telephone devices are used for voice encryption? |
Secure telephone unit (STU) and the secure terminal equipment (STE)
|
|
What are 2 types of data encryption fill devices? |
AN/CYZ-10 and the Secure DTD 2000 System
|
|
How can encryption be applied? |
Link-by-link, end-to-end, bulk
|
|
What are the 2 types of modems used? |
Dial-up or Dedicated
|
|
What is one of the principal functions of a CSU? |
To provide a barrier for electrical interference from either side of the unit
|
|
What is the main function of a DSU? |
To adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment and vice versa
|
|
At the simplest level, state the two things done by an operating system
|
1) It manages the hardware and software resources of the computer system. 2) It provides a stable, consistent way for applications to deal with the hardware without having to know all the details of the hardware |
|
Name the six categories of an operating systems tasks
|
Processor, Memory, Device, and Storage management. Application interface, and User interface
|
|
Applications are called what types of programs? |
End-User
|
|
What is a domain?
|
A collection of computers defined by the administrator of a Windows Server Network that share a common directory/database.
|
|
When did Bell Labs develop the UNIX operating system? |
Early 1970's
|
|
What is the program called that you interact with directly from your terminal or workstation? |
Shell
|
|
Name 4 common shells in UNIX
|
Bourne shell, Korn shell, C shell, Restricted shell
|
|
Define partitions |
Physical areas of disk allocated with specific sizes to hold file systems
|
|
When are partitions established? |
During system configurations
|
|
In which directory are application programs contained? |
usr (user) directory
|
|
What is the firmware prompt called on Sun machines? |
"ok" (often called the OK prompt)
|