Exam 14: System Administration
Exam 1: Computer Technology: Your Need To Know60 Questions
Exam 2: Introduction to Systems Architecture90 Questions
Exam 3: Data Representation100 Questions
Exam 4: Processor Technology and Architecture103 Questions
Exam 5: Data Storage Technology100 Questions
Exam 6: System Integration and Performance100 Questions
Exam 7: Input/Output Technology99 Questions
Exam 8: Data and Network Communication Technology100 Questions
Exam 9: Computer Networks75 Questions
Exam 10: Application Development76 Questions
Exam 11: Operating Systems75 Questions
Exam 12: File and Secondary Storage Management77 Questions
Exam 13: Internet and Distributed Application Services93 Questions
Exam 14: System Administration75 Questions
Select questions type
Requirements in an RFP should be categorized by ____________________ and listed completely.
(Short Answer)
4.7/5
(47)
A(n) ____________________ monitors a specific performance or resource utilization aspect of an object.
(Short Answer)
4.9/5
(36)
Most computer equipment is designed to operate reliably over a range of voltage levels.
(True/False)
4.9/5
(49)
____ are assets or resources expected to provide benefits beyond the current fiscal year.
(Multiple Choice)
4.8/5
(37)
The ____________________ model describes a computer's capability to deliver resources to application software.
(Short Answer)
4.9/5
(30)
In general, the humidity level of a room containing computer equipment should be near ____%.
(Multiple Choice)
4.8/5
(33)
The costs of technology are usually high for developers and early adopters but then decrease slowly after introduction.
(True/False)
4.9/5
(37)
In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing financial reports.
(Multiple Choice)
4.9/5
(28)
Operating systems now cooperate with one another to perform authentication and authorization.
(True/False)
4.7/5
(38)
An RFP is generally considered a(n) ____________________ offer.
(Short Answer)
4.8/5
(36)
Until recently, applying patches and upgrades was a(n) ____________________ process.
(Short Answer)
4.8/5
(32)
____ is the process of determining or verifying the identity of a user or process owner.
(Multiple Choice)
4.8/5
(35)
System administrators can use the ____ utility to monitor hardware and software resource use in real time.
(Multiple Choice)
4.8/5
(30)
Surge protectors can be purchased as separate devices or integrated into other power-conditioning devices.
(True/False)
4.8/5
(42)
A ____ is a measure of computer system performance while executing one or more processing tasks.
(Multiple Choice)
4.7/5
(44)
Discuss why disaster planning is important and what measures are normally taken.
(Essay)
4.9/5
(41)
A(n) ____________________ is defined as a set of long-range goals and a plan to attain these goals.
(Short Answer)
4.8/5
(43)
Showing 41 - 60 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)