Exam 14: System Administration
Exam 1: Computer Technology: Your Need To Know60 Questions
Exam 2: Introduction to Systems Architecture90 Questions
Exam 3: Data Representation100 Questions
Exam 4: Processor Technology and Architecture103 Questions
Exam 5: Data Storage Technology100 Questions
Exam 6: System Integration and Performance100 Questions
Exam 7: Input/Output Technology99 Questions
Exam 8: Data and Network Communication Technology100 Questions
Exam 9: Computer Networks75 Questions
Exam 10: Application Development76 Questions
Exam 11: Operating Systems75 Questions
Exam 12: File and Secondary Storage Management77 Questions
Exam 13: Internet and Distributed Application Services93 Questions
Exam 14: System Administration75 Questions
Select questions type
Antivirus software uses data files, sometimes called "____," containing information about known viruses.
(Multiple Choice)
4.9/5
(37)
IS resource acquisition and deployment should occur only in the context of a well-defined strategic plan for the organization as a whole.
(True/False)
4.9/5
(39)
A vendor's response to an RFP is a(n) ____________________ of the offer.
(Short Answer)
4.8/5
(37)
The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.
(Multiple Choice)
4.8/5
(39)
____ is the process of determining whether an authenticated user or process has enough rights to access a resource.
(Multiple Choice)
4.8/5
(32)
____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.
(Multiple Choice)
4.9/5
(38)
A(n) ____ is a server that handles service requests from external users of applications.
(Multiple Choice)
4.8/5
(29)
____________________ expenditures provide benefits only in the current fiscal year.
(Short Answer)
4.7/5
(35)
Infrastructure management tends to concentrate on providing short-term services at minimal cost.
(True/False)
4.7/5
(37)
Protection against power loss requires a(n) ____________________ power source.
(Short Answer)
4.8/5
(39)
The resources devoted to most organizational activities can be classified into two categories: ____.
(Multiple Choice)
4.9/5
(35)
Signatures are the basis for determining users' authorization to access resources the OS manages.
(True/False)
4.9/5
(36)
Typical operating expenditures include buildings, land, equipment, and research and development costs.
(True/False)
4.8/5
(33)
The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.
(True/False)
4.8/5
(37)
Showing 61 - 75 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)