• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Why is it important to monitor a drive's temperature?

To counter over-heating.

Why might you want to test your drives?

To make sure everything is running efficiently.

Does a higher capacity drive generally perform faster or slower than a lower capacity drive?

Slower.

Why shouldn't you use your computer while you are testing one of its components?

Using resources will result in non-accurate results.

What important information can you consistently find on the label of a hard drive?

-Data


-Storage


-Usage


-Warranty

What information about the hard drive cannot be found on the label of the hard drive?

-Temperatures


-Status


-RPM

What four methods do you have at your disposal to learn about your hard drive?

-Inspect it


-System BIOS


-Manufacturer's Website


-3rd-Party Software

What is the advantage of an SSD or a regular, magnetic Hard drive?




Are there any advantages with using a magnetic hard drive over an SSD?

-No moving parts.




-None.

What are some symptoms of hard drive problems?

-Broken


-Outdated


-Not installed correctly.

What were the two most common methods used to run drive-diagnostic utilities?

-CD


-USB

Why is it useful to run the drive-diagnostic utility from a bootable CD rather than from Windows?

Windows does not need to be operational.

(T/F)


The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.

False

(T/F)


Wireless networks are either public, unsecured hotspots or private, secured hotspots.

True

(T/F)


A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.

False

What is the name of a 32-bit or 128-bit number that is used to identify a device?

IP Address

What is used to identify the network portion and the host portion of an IP address?

Subnet Mask

What protocol makes a connection, checks whether the data is received, and resends it if it hasn't?

TCP

What wireless networking radio frequency yields faster speeds but offers shorter range?

5 GHz

A __________ is the name of a computer and can be used in place of its IP address?

Host name

Describe the user datagram protocol (UDP).

An alternative protocol to TCP, used primarily for establishing low-latency and loss tolerating connections between applications on the Internet.