css deck

Subdecks (2)

Cards (92)

  • BLUE - Set A: 1. What is the common color for the USB 3.0 connector for Standard A receptacles and plugs?
  • Flash memory - Set A: 2. What type of memory used in the Solid State Drive (SSD) as a storage?
  • Random Access Memory (RAM) - Set A: 3. it is originally, where the BIOS stored in a standard PC.
  • ISO image - SET A: 4. __is a complete copy of everything stored on a physical optical disc.
  • 16 GB for 32-bit OS or 20 GB for 64-bit OS - SET A: 5. What is the minimum requirement for hard disk drive capacity in Windows 10?
  • Registry - SET A: 6. Where do Windows device drivers store?
  • +5V - SET A: 7. What is the volt rating of the RED wire in a power supply?
  • cross over - SET A: 8. is a network cable where one end is T568-A while the other is configuration.
  • problem with the LAN driver - SET A: 9. In Windows 7, when LAN connection has a cross and red indicator signifies t there is
  • Network Interface Card - SET A: 10. Which of the following hardware components can connect over a computer network?
  • Router - SET A: 11. It is a networking device that forwards data packets between computer networks.
  • IEEE 802.11 - SET A: 12. Wi-Fi is a trademarked phrase, which means
  • Local Area Network (LAN) - SET A: 13. is a collection of devices connected together in one physical location.
  • Wide Area Network - SET A: 14. A type of network that interconnects multiple local area network.
  • Anti-virus software - 15. A computer program used to prevent, detect, and remove possible threats to the system.
  • Peer to peer network - 16.is a two or more PCs are connected and share resources without going through a separate server computer.
  • Provider address - 17. What IP address used by the virtual machine to communicate over the physical network?
  • WPA2-Personal - 18. What type of version that protects unauthorized network access by utilizing a set-up password?
  • Access control list - 19.consists of the user matrices, and capability tables that govern the right and privileges of users.
  • Information Extortion - 20. It occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return.
  • Continuous Assessment - 21. It monitors the initial security accreditation of an information system for tracking changes.
  • Remote Storage Service - 22. What services in Windows Server that enables administrators to migrate data to a lower-cost and tape media on file servers?
  • Virtual cluster server - 23. What Application group that contains a Client Access Point and with at least one application specific resource?
  • Ping - 24. A utility tool that test whether a particular host is reachable across an IP network
  • F5 - 25. Which of the following keys is not appropriate to enter BIOS setup?
  • Safe mode - 26. What enables users of Windows that corrects any problems preventing from booting up normally?
  • Repair Computer - 27. What Starts up recovery options in a computer that essentially boot into the RECOVERY partition of the main hard drive?
  • Logical - 28. A single physical hard drive can divide into multiple__hard drive
  • Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA) - 29. What are the two types of interface used to communicate between the hard drive and the computer motherboard?
  • World wide web - 30. What is the spider-like interconnection in millions of pieces of information located on computers around the cyber space