Exam 14: System Administration
Exam 1: Computer Technology: Your Need To Know60 Questions
Exam 2: Introduction to Systems Architecture90 Questions
Exam 3: Data Representation100 Questions
Exam 4: Processor Technology and Architecture103 Questions
Exam 5: Data Storage Technology100 Questions
Exam 6: System Integration and Performance100 Questions
Exam 7: Input/Output Technology99 Questions
Exam 8: Data and Network Communication Technology100 Questions
Exam 9: Computer Networks75 Questions
Exam 10: Application Development76 Questions
Exam 11: Operating Systems75 Questions
Exam 12: File and Secondary Storage Management77 Questions
Exam 13: Internet and Distributed Application Services93 Questions
Exam 14: System Administration75 Questions
Select questions type
Low humidity levels increase the buildup of ____________________ electricity, which increases the likelihood of circuit damage caused by inadvertent static discharges.
Free
(Short Answer)
4.8/5
(35)
Correct Answer:
static
A(n) ____________________ monitor is a device attached directly to the communication link between two hardware devices, often used to monitor the use of communication channels, disk drives, and network traffic.
Free
(Short Answer)
4.9/5
(40)
Correct Answer:
hardware
Standardization tends to encourage innovation and produce solutions that are optimal for most users.
Free
(True/False)
4.8/5
(41)
Correct Answer:
False
Typical ____ include salaries, rent, lease payments, supplies, and equipment maintenance.
(Multiple Choice)
4.8/5
(32)
The term ____ describes the way in which an organization uses resources to give it a major edge over its competitors.
(Multiple Choice)
4.9/5
(33)
____ can be seen in the home when air conditioners, refrigerators, and electric dryers are started and cause a momentary dimming of lights.
(Multiple Choice)
4.9/5
(33)
A ____ describes the resource or service utilization of an application program during execution.
(Multiple Choice)
4.9/5
(31)
A ____ is stored in a stand-alone executable program, is usually sent as an e-mail attachment and runs automatically when the attachment is opened.
(Multiple Choice)
4.8/5
(39)
Information systems are a combination of hardware, system software, and ____________________ software.
(Short Answer)
4.7/5
(35)
____________________ authentication methods are sometimes used instead of password-based authentication.
(Short Answer)
4.9/5
(32)
A(n) ____ is a formal document sent to vendors that states requirements and solicits proposals to meet these requirements.
(Multiple Choice)
4.7/5
(38)
Why is a raised floor often used in a room with multiple computer hardware cabinets?
(Essay)
4.9/5
(38)
In computers, a ____ is a program or program fragment that infects a computer by installing itself permanently, usually in a hard-to-find location.
(Multiple Choice)
4.7/5
(27)
A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.
(Multiple Choice)
4.8/5
(34)
Hardware must also be protected against ____________________ resulting from excessive humidity.
(Short Answer)
4.9/5
(37)
____ are programs or hardware devices that detect and report processing or I/O activity.
(Multiple Choice)
4.9/5
(31)
A(n) longer-term power sag that is often caused by the power provider is known as a ____.
(Multiple Choice)
4.9/5
(28)
Providing infrastructure-based services to a wide variety of users requires adopting service ____________________.
(Short Answer)
5.0/5
(37)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)