• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/191

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

191 Cards in this Set

  • Front
  • Back
Changes that you make in virtual machines do not affect your physical computer.
TRUE
The size of a bus determines how much data can be transmitted at one time.
TRUE
Like RAM memory, mass storage devices do not retain data when the computer is turned off.
FALSE
Peripheral devices are internal to the PC.
FALSE
The internal workings of a computer, and especially the hard drive, are extremely susceptible to static electricity.
TRUE
A desktop is the main workspace in a graphical user interface.
TRUE
The DOS user interface is a command-line interface (CLI).
TRUE
All modern operating systems support multithreading and multitasking.
TRUE
A program with a very small amount of memory usage must have a memory leak.
FALSE
The ____, which is located in the desktop computer case, is the main circuit board for a PC.
Motherboard
All buses consist of two parts: a data bus and a(n) ____ bus.
address
ROMs, PROMs, EPROMs, and EEPROMs that contain recorded programs are called ____.
firmware
You can connect up to ____ USB peripherals with five levels of hubs to a single USB host controller.
127
Fedora 13 owes its parentage to ____.
UNIX
Which Windows 7 kernel mode component provides basic OS services, such as memory management, process and thread management, and security?
executive
In ____ multitasking, the OS executes an application for a specific period of time, according to its assigned priority.
preemptive
The amount of memory that can be addressed by the processor is called ____ memory.
physical
An antivirus agent uses a(n) ____ driver to intercept files that contain viruses.
filter
Windows-based operating systems support file-sharing traffic across a network by using the ____ communications protocol.
Server Message Block (SMB)
You can use the Fedora 13 ____ to review summary information about the system.
System Profiler
From the Fedora 13 System Monitor ____ tab, you can view CPU usage and current percentage of CPU usage.
Resources
A(n) ____________________ uses rigid rotating platters to read and write on magnetic media.
hard drive
Newer operating systems like Windows 7 and Fedora 13 were designed to allow multiple programs to run at the same time, a process called ____________________.
multitasking
In Fedora 13, you can use the ____________________ command to review processor activity in real time.
System Monitor
One benefit of using GUIs is that they standardize how you use computer programs.
TRUE
The taskbar is a key element in using the Windows 7 interface.
FALSE
If you decrease screen resolution, text and other displayed information will appear smaller.
FALSE
The Windows 7 contents list shows the folder trail to the current folder.
TRUE
The task bar in the Fedora 13 File Browser includes many helpful options.
FALSE
You can control which items appear on the Windows 7 Start menu by right-clicking it and opening the ____ dialog box.
Properties
Which Fedora 13 top panel menu provides options for configuring the system and desktop environment?
System
To remove an item from a panel, right-click it on the panel and then click ____ from Panel.
Remove
Display resolution is defined as the total number of ____ displayed horizontally and vertically.
pixels
Items that appear on the Fedora 13 desktop are grouped as ____ in the form of desktop launchers (shortcuts).
applets
Within the Windows 7 contents list, the path to a folder is indicated by the ____ symbol, which is actually a pop-up menu.

triangle

A(n) ____ is a navigation aid used in an address bar and other parts of the GUI to help keep track of your locations.
breadcrumb
Which Windows Explorer control allows you to connect a drive letter to a shared resource on another computer?
Map network drive
In Windows 7, you need ____ privileges to access the Documents folders of other users.
administrator
By default, the Recycle Bin can only hold ____ percent of the hard drive’s capacity.
10
You can use the Windows 7 ____ feature when you need to locate a file or folder.
Search
If you see the entry you want in your Windows 7 search results, ____ the entry to open it.
double-click
When searching from the Start menu, Windows usually displays about ____ search results depending on the size of your monitor.
15
The Fedora 13 location bar corresponds to the ____ in Windows 7.
address bar
Which Fedora 13 Side Pane drop-down list option displays a hierarchical representation of your file system that you can use to navigate through your files?
Tree
A valid digital signature guarantees that the software is without problems.
FALSE
Third-party cookies are stored by a Web server from the same Internet domain.
FALSE
When installing ActiveState Perl in Fedora 13 you use the same installation options as Windows 7. {miss this one and you are in trouble)
FALSE
In Windows 7, the ____ provides summary information for your computer.
System Information tool
In the Firefox Web browser, you can move from one Web page to another by clicking the ____.
hyperlinks
A(n) ____ is a piece of software that automatically follows hyperlinks from one document to the next around the Web.
bot
When using a Web search engine, use the ____ character to include other keywords that you would expect to find in relevant documents.
"+"
____ is a feature in Internet Explorer that helps you avoid malware sites when you browse the Web.
SmartScreen Filter
You can set up security ____ from the Security tab of the Internet Options dialog box.
zones
When you first install Internet Explorer 8, it corrals all Web sites into the Internet zone and stands guard with a ____ level of security according to Microsoft.
Medium-high
You define the location of the security zones relative to the ____.
firewall
____ are software components that interact with each other in a networked environment.
ActiveX controls
____ cookies are deleted when you close your browser.
Session
You exchange certificates with servers using a secure transmission protocol, which provides ____ and unaltered information.
encrypted
Use the ____ tab of the Internet Options dialog box to set up an Internet connection and configure LAN settings.
Connections
You can use the ____ menu in Firefox to customize toolbars, the status bar, sidebars, text size, and other particulars.
View
In Firefox, cookies usually expire in ____ days if you keep them.
30
The ____ options in Firefox refer to navigation and security features.
Advanced
Most applications are ____ to reduce the size of the setup file.
compressed
Scripts used in ActiveState Perl have a file extension of ____.
pl
In Windows 7, a drive letter must be assigned to each hard drive and optical drive installed in a PC.
TRUE
In Windows 7, a file can be both encrypted and compressed on a hard disk.
FALSE
In the context of creating storage on a disk, an unallocated area is one that does not contain a primary or extended partition.
TRUE
Windows 7 and Fedora 13 have the same approaches to mounting a file system.
FALSE
Unlike Windows 7, Fedora 13 does not automatically check the file systems at boot time.
FALSE
In Windows 7, a(n) ____ partition contains an OS.
active
NTFS uses a ____ for managing access to files.
master file table (MFT)
The ____ option in NTFS provides a fail-safe mechanism by using transactions to ensure that data is written to the hard drive.
journalizing
For copyright reasons, Fedora 13 does not automatically recognize ____, and sometimes it requires kernel updates for the driver.
NTFS
____ creates the root of the directory structure and the file system for use.
Formatting
In Fedora 13, if you need to create a mount point on the current file system, you first create a directory in the file system using the ____ command.
mkdir
Which tab in the Local Disk Properties dialog box would you select to perform disk cleanup?
General
In Windows 7, by default, the hidden share ____ is displayed in the Sharing tab of the Local Disk Properties dialog box.
C$
In Windows 7, if you have ____ privileges, you can create additional shares for the entire contents of the local disk (C).
administrative
From the ____ tab of the Windows 7 Local Disk Properties dialog box, you can set the NTFS permissions that control access to data on the hard drive.
Security
You can use both input and output redirection with the same Fedora 13 command.
TRUE
The Fedora 13 tail command reads an entire file before printing it.
FALSE
Any Windows 7 command you use at the command prompt can also be used in a batch program.
TRUE
When a command that is typed on the keyboard passes through the ____, the characters are echoed on the console.
STDIN
You can ____ text in the Windows 7 command prompt Edit Menu using the Shift key and cursor movement keys.
mark
To redirect the output to a network printer, specify the printer using the UNC (Universal Naming Convention) format of ____.
\\servername\printername
The MORE filter displays one screen (____ lines) of information at a time followed by -- More --.
24
To see a list of available commands at the Windows 7 command prompt, type ____ at the command prompt and press Enter.
HELP
Use the ____ command in the Windows 7 CLI to display the contents of a text file on the standard output device.
TYPE
In Fedora 13, you can use the ____ command to search a file and then print all the lines that match your search.
grep
In Windows 7, the ____ command is specifically designed for batch programs.
FOR
Within a batch program, the ____ command directs Windows 7 to a line identified by a label.
GOTO
If you suspect that a batch program is “running away” because of an infinite loop, or you change your mind about allowing the program to complete, press ____ to stop the program.
Ctrl+C
The ____ command enables you to include comments (remarks) in a batch file.
REM
____ environment variables are preset in the operating system and are available to all Windows 7 processes.
System
In Fedora 13, the ____ command modifies the permissions of a file.
chmod
With both if command constructs, the decision is made by testing a ____.
variable
In Fedora 13, use the ____ command to enable multiple executions of a set of instructions while a certain condition exists.
while
In the Windows 7 CLI, if you omit the path in the TREE command, the command displays an error message.
TRUE
As a Fedora 13 superuser, you can arrange information anywhere in the directory structure.
TRUE
Directories cannot be removed using the Windows 7 CLI.
FALSE
The RENAME and REN commands do not allow you to specify a new drive or path for your destination file.
TRUE
Windows 7 requires quotation marks to enclose filenames that contain spaces.
TRUE
In Windows 7, you can open the command prompt console by clicking Start, pointing to All Programs, clicking Accessories, and clicking ____.
Command Prompt
In Windows 7, to view a graphical representation of the directories on a disk, you use the ____ command.
TREE
To include filenames in the structure shown by the Windows 7 TREE command, you can add the ____ switch.
/F
The Navigation pane in Windows Explorer, which can display the directory structure of one or more drives, is the ____.
The left pane.
____ space is any blank area of a window.
White
A(n) ____ path does not begin with a backward slash, and its starting address is the current directory.
absolute
In Windows 7, you can use the ____ command to copy one or more files to an alternative location.
COPY
To remove files and directories in the Fedora 13 directory tree, use the ____ command.
rm
Before using a disk in Fedora 13, you must ____ and format it.
mount
In Fedora 13, you can copy files to a formatted disk or a USB drive with the ____ command.
cp
A Fedora 13 filename requires an extension when you use a command to list, view, or execute the file.
FALSE
Every file in DOS has four attributes.
TRUE
The compression and encryption attributes for disk files are mutually exclusive.
TRUE
The FINDSTR command offers more control over the search process than the FIND command.
TRUE
The Fedora 13 find command returns a status of less than zero if an error occurs.
FALSE
A long file extension has more than ____ characters.
three
Windows 7 uses file extensions to identify file ____.
associations
Unlike Windows 7, when you save a file in Fedora 13, the application stores file and directory attributes in a(n) ____.
inode
The Fedora 13 ____ command allows you to view file contents.
ls
By default, the DIR command does not list files when the ____ attribute is set to on.
hidden
To hide a directory named Secret, you would type: ____.
ATTRIB +H Secret
The administrator account is called a recovery agent because it has a global key that can ____ any file.
decrypt
In Fedora 13, you cannot modify a directory or file that has the ____ attribute.
i
The DOS FIND command is case sensitive unless used with the ____ switch.
/I
Use the ____ sign with the DOS FIND command to redirect the output of a program.
>
The FINDSTR command can find the exact text you are looking for in any ____ file or files.
ASCII
When using dates and date ranges with Windows Search, you can use ____ dates such as today, tomorrow, or yesterday in a search.
relative
Every file in DOS has four attributes.
TRUE
The compression and encryption attributes for disk files are mutually exclusive.
TRUE
The DOS Edit (32 Bit Windows) and vi programs are installed by default when you install the operating system.
TRUE
The default mode of the Vim editor is Visual.
FALSE
To perform a Vim editor search-and-replace operation on an entire document, place a $ sign before the :substitute command.
FALSE
A long file extension has more than ____ characters.
three
Unlike Windows 7, when you save a file in Fedora 13, the application stores file and directory attributes in a(n) ____.
inode
In Fedora 13, you cannot modify a directory or file that has the ____ attribute.
i
Use the ____ sign with the DOS FIND command to redirect the output of a program.
>
To create a file in DOS Edit, type ____ at the command prompt to start DOS Edit, and then begin typing in the document window.
edit
If you are not sure which file you are using in Vim, type ____ to place brackets around the active file.
:args
To ____ text in DOS Edit, press Alt+E and then press the T key.
cut
To paste text from the Windows Clipboard, you can use the keyboard shortcut Ctrl+ ____.
V
To cut a line from a document in the Vim editor, use the arrow keys to position the cursor anywhere on the line you want to cut and then type the ____ command.
dd
To save a Vim file and quit the editor, type ____ and then press Enter.
:wq
To search for more than one word or command in Vim, use regular ____.
expressions
To shut down a virtual machine, click System, click Shut Down, and then click the ____ button.
Shut Down
In the Vim editor, to recall the last typed command, type ____ and then press the Up arrow key.
:
To quit the Vim editor without saving your changes, type ____.
:q!

The Windows 7 Task Manager Networking Tab only appears when a Network Card is present.

True

A low rate of page file activity indicates that more RAM is required.

False

Disk access is much slower than RAM(random access memory).

True

In Windows 7, you can use the___feature to access system tools that require administrative privileges and determine the cause of a problem.

Run As

From the Windows 7 Task Manager__ tab, you can determine if a program is running.

Applications

To stop a process, select the program and click the__button.

End Process

You use__to monitor active applications, view graphs, and manipulate the running applications on your Fedora 13 computer.

System Monitor

The four tabs in the Fedora 13 System Monitor are System, Processes, Resources and__.

File Systems.

When you use the___option the kill command is considered stronger.

-9

If the % Processor Time counter’s value continually exceeds ____ percent, you might need to upgrade the processor.

>85

The number of ____ that a disk can accomplish per second should not exceed the manufacturer’s specifications.

writes

The ____ counter indicates the amount of memory that is left after operating system allocations.

Available Mbytes

A sustained processor queue of less than ____ threads per processor is normally acceptable.

10

The /proc file system is known as a ____-file system, which directly interfaces with the kernel and is stored in memory.

pseudo

To use the Fedora 13 free command, simply type ____.

free

A program with an abnormally high CPU value could be hung, or a program with an extremely large amount of memory usage might have a memory ____________________, meaning that a process uses memory without bounds.

leak

A(n) ____________________ is anything that slows down a virtual machine’s performance.

bottleneck

SOHO is the standard used by home and business computers and all networking software, and is the foundation of the Internet Protocol Suite.

False

The Internet Protocol Suite Network layer allows the IP to transfer packets across a link.

False

In the absence of DHCP, all hosts on a network must be manually configured with static IP addresses.

True

By default, the Network icon is not on the Start menu of the Windows 7 Network Connection Details window.

True

Between the NTFS Full Control and Modify permissions, the more restrictive permission is Full Control.

False

Fedora 13 provides peer-to-peer networking with ____, which is based on the common client/server protocol of Server Message Block (SMB).

Samba

A VPN (virtual private network) uses a technique known as ____ to transfer data securely on the Internet to a remote access server on your workplace network.

Tunneling

The Internet Protocol uses unique addresses, simply called ____ addresses, to identify computers or devices in a network.

IP

The Internet Protocol Suite is divided into ____ “layers” of communication from bottom to top.

Four

POP3 (Post Office Protocol 3) operates in the ____ layer of the Internet Protocol Suite.

Application

____ is the division of a network into groups of computers that have a common, designated IP address routing prefix.

Subnetting

The ____ IP address is a node (a router) on a TCP/IP network that serves as an access point to another network.

gateway

The ____ IP address of the server provides domain name resolution.

DNS

One way to view the Fedora 13 IPv4 settings is to use the ____ command in a Terminal window.

nm-tool

You can join an existing Windows 7 network workgroup, by default called ____, or you can create a new one.

WORKGROUP

The homegroup is protected with a(n) ____, so you can always choose what you share with the group.

password

Using UNC notation requires that you know the name or ____ of the server and share.

IP address

To access a Fedora 13 share, you must ____ the share.

mount

____ are responsible for setting up shared printers on the network.

Network Administrators

Only ____ permits user accounts and user groups to be linked to folder and file permissions.

NTFS

Which Windows 7 shared folder permission allows you to change file permissions and take ownership of the file resources?

Full Control

Permissions assigned at the ____ level override those assigned at the folder level.

file

NTFS permissions are ____ when a file or folder is moved or copied to a FAT16 or FAT32 formatted partition.

removed

Which Fedora 13 file and directory permission provides read and execute authority?

r-x

When the Fedora 13 execute bit is set for the owner, the SUID bit is set to ____.

s

A(n) ____ appears as the third character of the Fedora 13 Others permission bits when the sticky bit is set.

t