Vous êtes sur la page 1sur 12

Final

Matching Match each term with the correct statement below. a. Monitor f. Hertz b. CPU g. Keyboard c. Megahertz d. Flash ROM e. Mouse ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. Writes data and instructions in storage devices and performs calculations and other data processing 2. The primary input device of a computer 3. Pointing device used to move a pointer on the screen and to make selections 4. The visual device that displays the primary output of the computer 5. Contains a socket to hold the CPU 6. One cycle per second 7. One million cycles per second 8. One billion cycles per second 9. Non-volatile memory and can be reprogrammed Match each term with the correct statement below. a. Briefcase f. Parent folder b. Virtual machine g. Legacy c. Desktop d. Service pack e. Compressed folder ____ 10. The initial screen that is displayed when an OS has a GUI interface loaded ____ 11. A major update or fix to an OS occasionally released by Microsoft ____ 12. Minor updates or fixes that are released frequently ____ 13. Older hardware and software ____ 14. An environment created by software that works as though it is a standalone computer system ____ 15. Contains the child folder ____ 16. Creates a folder with a .zip extension h. File attributes i. Patches h. Gigahertz i. Motherboard

____ 17. Creates a folder that can be used to sync up files in this folder with its corresponding folder on another computer ____ 18. Properties assigned to a file Match each term with the correct statement below. a. Technical retail associate f. Bench technician b. Acronyms g. Jargon c. Help-desk technician d. PC support technician e. Expert system ____ 19. Works on site, closely interacting with users, and is responsible for ongoing PC maintenance ____ 20. Goes to a customer site in response to a service call and, if possible, repairs the PC on site ____ 21. Those responsible for selling computers and related equipment ____ 22. Works in a lab environment, might not interact with users of the PCs being repaired, and is not permanently responsible for them ____ 23. Provides telephone or online support ____ 24. Software that is designed and written to help solve problems ____ 25. Entered into the call-tracking system and stays open until the issue is resolved ____ 26. Technical language that only technical people can understand ____ 27. Initial letters that stand for words Match each term with the correct statement below. a. Volt f. Form factors b. BTX g. ATX c. NLX d. Watt e. MicroBTX ____ 28. The standards that describe the size, shape, and major features of components so that they work together ____ 29. Can have up to seven expansion slots ____ 30. Has up to four expansion slots ____ 31. None or one expansion slot ____ 32. Used in low-end systems with a riser card ____ 33. The most commonly used form factor today ____ 34. A measure of electrical pressure differential h. PicoBTX i. Amp h. PC service technician i. Ticket

____ 35. A measure of electrical current ____ 36. A measure of electrical power Match each term with the correct statement below. a. LGA775 or Socket T f. Socket 478 b. F2 or F1 g. Del c. LGA1366 or Socket B d. Socket 423 e. boot sequence ____ 37. Has 1366 pins that touch pads on the processor ____ 38. Has 771 pins that touch pads on the processor ____ 39. Has 775 lands or pads ____ 40. Uses a dense micro PGA (mPGA) ____ 41. Has a 39 x 39 SPGA grid ____ 42. Key(s) to press during the boot process to access the AMI BIOS ____ 43. Key(s) to press during the boot process to access the Newer Phoenix BIOS ____ 44. Key(s) to press during the boot process to access the Dell computers using Phoenix BIOS ____ 45. The order in which the system tries to boot from certain devices Match each term with the correct statement below. a. Field replaceable units f. Overclocking b. Processor frequency g. C states c. Memory cache d. Registers e. P states ____ 46. Small holding areas on the processor chip that work much as RAM does outside the processor ____ 47. The portion of the internal bus that connects the processor to the internal memory cache ____ 48. The speed at which the processor operates internally ____ 49. Running a motherboard or processor at a higher speed than the manufacturer suggests ____ 50. RAM that holds data and instructions that the memory controller anticipates the processor will need next ____ 51. Groups of instructions that accomplish fundamental operations ____ 52. Save power by lowering the CPU frequency and voltage ____ 53. Used by the processor to stop its internal operations to conserve power ____ 54. Items that can be exchanged without returning the motherboard to the factory h. Back-side bus i. Microcode h. LGA771 or Socket J i. Ctrl+Alt+Enter

Match each term with the correct statement below. a. MicroDIMMs f. Re-marked chips b. 72-pin SIMM g. SO-DIMM c. SRAM d. 240-pin DDR3 DIMM e. 168-pin SDRAM DIMM ____ 55. Holds its data as long as the RAM has power ____ 56. Loses its data rapidly ____ 57. Used on laptops ____ 58. Used on subnotebook computers ____ 59. Currently the fastest memory and can support triple or dual channels or be installed as a single DIMM ____ 60. Has two notches on the module ____ 61. Must be installed two modules to a bank of memory ____ 62. Must be installed four modules to a bank of memory ____ 63. Have been used, returned to the factory, marked again, and then resold Match each term with the correct statement below. a. Hybrid hard drive f. Cluster b. FAT g. Actuator c. File system d. Block mode e. Solid state drive ____ 64. Has no moving parts ____ 65. Moves the read/write heads across the disk surfaces in unison ____ 66. Uses both solid state and magnetic technologies ____ 67. A single hard drive that works independently of other hard drives ____ 68. The overall structure an OS uses to name, store, and organize files on a drive ____ 69. The smallest unit of space on a disk for storing a file and is made up of one or more sectors ____ 70. A table on a hard drive or floppy disk that tracks how space on a disk is used to store files ____ 71. Designed to provide greater security and to support more storage capacity than the older file system ____ 72. Speeds up access time by allowing blocks of data to be read from the drive at one time Match each term with the correct statement below. h. NTFS i. Basic disk h. 30-pin SIMM i. DRAM

a. 1394b (FireWire) b. Parallel c. SuperSpeed USB 3.0 d. Original USB (USB 1.1) e. 1394a (FireWire)

f. Hi-Speed USB 2.0 g. IEEE 1394.3 h. eSATA-300 (eSATA Version 2) i. Serial

____ 73. Has a maximum speed of 5.0 Gbps (gigabits per second) ____ 74. Has a maximum speed of 3.0 Gbps ____ 75. Has a maximum speed of 1.2 Gbps or 800 Mbps (megabits per second) ____ 76. Has a maximum speed of 480 Mbps ____ 77. Has a maximum speed of 400 Mbps ____ 78. Has a maximum speed of 12 Mbps or 1.5 Mbps ____ 79. Has a maximum speed of 1.5 Mbps ____ 80. Has a maximum speed of 115.2 Kbps (kilobits per second) ____ 81. Designed for peer-to-peer data transmission Match each term with the correct statement below. a. Stereo f. SATA connections b. BNC g. Master c. Slave d. Sound card e. FireWire input/output port ____ 82. An expansion card with sound ports ____ 83. Sound ports embedded on a motherboard ____ 84. Sound on two channels ____ 85. Can be used to receive data from a video camera ____ 86. Round connectors used by coaxial cable ____ 87. Port for a monitor ____ 88. The second drive installed on the cable ____ 89. The only drive on the cable ____ 90. Used for all hard drives. Match each term with the correct statement below. a. Preventive maintenance f. MSDS b. Backup g. EULA h. DVI i. Onboard sound

c. Trip hazard d. Hard-disk loading e. Site license

h. Copyrights i. Piracy

____ 91. Includes information such as physical data, toxicity, health effects, first aid, storage, shipping, disposal, and spill procedures ____ 92. Loose cables or cords in a traffic area ____ 93. Selling counterfeit software by installing unauthorized software on computers for sale ____ 94. Intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software ____ 95. Archive copy of software ____ 96. Unauthorized copies of original software ____ 97. Allows companies to distribute software to PCs from network servers or execute software directly off the server ____ 98. Usually displayed during installation and requires that you agree to it before continuing with the installation ____ 99. Keeps computer problems from occurring in the first place Match each term with the correct statement below. a. Windows Vista Business f. Windows Vista Starter b. Windows XP Tablet PC g. Windows Vista Enterprise c. Windows Vista Ultimate d. Windows Vista Home Basic e. Windows XP Media Center Edition ____ 100. Has the most limited features and is intended to be used in developing nations ____ 101. Designed for low-cost home systems that dont require full security and networking features ____ 102. Includes additional features such as the Aero user interface ____ 103. Intended for business users ____ 104. The major additional security feature is BitLocker ____ 105. Includes every Windows Vista feature ____ 106. Includes additional support for digital entertainment hardware such as video recording integrated with TV input ____ 107. Supports 4 GB of memory in the 32-Bit version and does not support the 64-Bit version ____ 108. Designed for laptops. Match each term with the correct statement below. a. Dynamic volumes f. Chkdsk utility h. Windows XP Home Edition i. Windows Vista Home Premium

b. Virtual memory c. Defragmenting d. Backup e. Mounted drive

g. Pagefile.sys h. Basic disk i. System state data

____ 109. Rearranges files on the drive into as few segments as possible ____ 110. Searches for bad sectors on a volume and recovers the data from them if possible ____ 111. Used to enhance the amount of RAM in a system ____ 112. A hidden file stored in the root directory of drive C ____ 113. An extra copy of a data or software file that you can use if the original file becomes damaged or destroyed ____ 114. The files critical to a successful operating system load ____ 115. A volume that can be accessed by way of a folder on another volume so that the folder has more available space ____ 116. Can span more than one hard drive ____ 117. Can be partitioned and formatted as a stand-alone hard drive Match each term with the correct statement below. a. Task Scheduler f. Safe Mode b. Event Viewer g. Gadgets c. Windows Vista ReadyBoost d. Task Manager e. Registry ____ 118. Lets you view the applications and processes running on your computer as well as information about process and memory performance, network activity, and user activity ____ 119. A program that runs in the background and is called on by other programs to perform a background task ____ 120. A window that consolidates several Windows administrative tools that you can use to manage the local PC or other computers on the network ____ 121. A Windows tool useful for troubleshooting problems with Windows, applications, and hardware ____ 122. A database designed with a treelike structure that contains configuration information for Windows, users, software applications, and installed hardware devices ____ 123. Miniapplications ____ 124. Uses a flash drive or secure digital (SD) memory card to boost hard drive performance ____ 125. Loads a minimum configuration of hardware and software ____ 126. Can be set to launch a task or program at a future time, including at startup h. Computer Management i. Service

Match each term with the correct statement below. a. Emergency Repair Process f. Emergency Repair Disk b. Windows RE g. Fixmbr c. Fixboot d. System File Checker e. Systemroot ____ 127. A Windows Vista and XP utility that protects system files and keeps a cache of current system files in case it needs to refresh a damaged file ____ 128. Structured the same as a registry file and contains configuration information about how Vista is started ____ 129. An operating system launched from the Vista DVD that provides a graphical and command-line interface ____ 130. Restores the master boot program in the MBR ____ 131. Repairs the OS boot record ____ 132. Displays the current drive letters ____ 133. Make the Windows directory the default directory ____ 134. Should be used only as a last resort because it restores the system to the state it was in immediately after the Windows 2000 installation ____ 135. Contains information about your current installation Match each term with the correct statement below. a. Chkdsk f. Automated System Recovery b. Startup Repair g. Secondary logon c. Emergency Repair Process d. Task Manager e. Digital signature ____ 136. Used to end a locked up program ____ 137. Running an application with administrator privileges ____ 138. Verifies that an application is not a rogue application ____ 139. Can sometimes fix drastic problems with system files and boot records ____ 140. Can be used to remove an application from the list of startup programs ____ 141. Command used to scan the hard drive for errors ____ 142. Used to restore a Windows XP system to the last ASR backup ____ 143. Used to restore Windows 2000 to its state immediately after it was installed ____ 144. Used to perform an in-place upgrade of Windows 2000/XP h. Software Explorer i. Windows 2000/XP setup CD h. Boot Configuration Data file i. Map

Match each term with the correct statement below. a. WLAN f. Data throughput b. Broadband g. WAN c. Bandwidth d. MAN e. PAN ____ 145. Consists of personal devices at close range such as a cell phone, PDA, and notebook computer in communication ____ 146. Covers a small local area such as a home, office, other building, or small group of buildings ____ 147. Covers a limited geographical area, and is popular in places where networking cables are difficult to install, such as outdoors, in public places, and in homes that are not wired for networks ____ 148. Covers a large campus or city ____ 149. Covers a large geographical area and is made up of many smaller networks ____ 150. The theoretical number of bits that can be transmitted over a network at one time ____ 151. The actual speed of a network ____ 152. Refers to a networking technology that carries more than one type of signal, such as DSL and telephone ____ 153. A computer or other device, such as a router, that allows a computer on one network to communicate with a computer on another network Match each term with the correct statement below. a. Private profile f. Public profile b. Jitter g. Quality of Service c. Man-in-the-middle attack d. Proxy server e. VoIP ____ 154. Offers the highest level of protection when you are connected to a public network ____ 155. Offers moderate protection when you are connected to a private network ____ 156. Lets you read information from the Internet name space by requesting information about domain name resolutions from the DNS servers zone data ____ 157. A computer that intercepts requests that a client makes of a server ____ 158. Eavesdropping on data in transit and/or changing that data ____ 159. Transfer files between two computers using the same or different operating systems ____ 160. Provides voice communication over a network ____ 161. The term used to describe a voice conversation that is mingled with varying degrees of delays h. Nslookup i. FTP h. LAN i. Gateway

____ 162. Refers to the success of communication over the Internet Match each term with the correct statement below. a. Rootkit f. Macro viruses b. File virus g. Trojan horse c. Logic bomb d. Authentication e. Spam ____ 163. Proves that an individual is who he says he is and is accomplished by a variety of techniques ____ 164. Determines what an individual can do in the system ____ 165. Junk e-mail that you dont want, you didnt ask for, and that gets in your way ____ 166. A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself. ____ 167. Dormant code added to software and triggered at a predetermined time or by a predetermined event ____ 168. Substitutes itself for a legitimate program ____ 169. Hides in an executable program having an .exe, .com, .sys, .vbs, or other executable file extension, or in a word-processing document that contains a macro ____ 170. The most common viruses spread by e-mail ____ 171. Malware that loads itself before the OS boot is complete Match each term with the correct statement below. a. Everyone group f. Authenticated Users group b. Drive lock password g. Local shares c. Permission propagation d. Rootkit e. Anonymous users ____ 172. Includes all user accounts that can access the system except the Guest account ____ 173. Includes the Authenticated Users group as well as the Guest account ____ 174. Those users who have not been authenticated on a remote computer ____ 175. Permissions that are attained from a parent object ____ 176. Is when permissions are passed from parent to child ____ 177. Folders on a computer that are shared with others on the network using a folders Properties box ____ 178. Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system ____ 179. Designed to do varying degrees of damage to data and software, although it does not damage PC hardware h. Inherited permissions i. Malicious software h. Phishing i. Authorization

____ 180. A program that uses unusually complex methods to hide itself on a system, and many spyware and adware programs are also rootkits Match each term with the correct statement below. a. Port replicator f. Notebook b. Touch pad g. Hibernation c. Solid State Device d. Wake on LAN e. Graphics tablet ____ 181. A computer designed to be portable ____ 182. Provides ports to allow a notebook to easily connect to a full-sized monitor, keyboard, AC power adapter, and other peripheral devices ____ 183. Saves all work to the hard drive and powers down the system ____ 184. Allows wired or wireless network activity to power up a computer ____ 185. Most common pointing device on a notebook ____ 186. The primary input device for a laptop ____ 187. Input device that can be used to hand draw ____ 188. Works like a pencil on the tablet ____ 189. Use memory chips to hold data, have no moving parts, cost more, use less power, and are more rugged Match each term with the correct statement below. a. Windows GDI f. Extension magnet brush b. Defragmenter g. Laser printer c. Inkjet printer d. Raw data e. Ghosted images ____ 190. A type of electrophotographic printer that can range from a small, personal desktop model to a large, network printer capable of handling and printing large volumes continuously ____ 191. Popular because it is small and can print color inexpensively ____ 192. Creates a printed page by using some mechanism that touches or hits the paper ____ 193. Builds the page and then sends it to the printer ____ 194. Text data that contains no embedded control characters is sent to the printer as is, and the printer can print it without any processing ____ 195. Long-handled brush made of nylon fibers that are charged with static electricity ____ 196. Used to verify that the hard drive does not have errors h. Impact printer i. Chkdsk h. Keyboard i. Stylus

____ 197. Used to optimize the hard drive ____ 198. Are usually caused by a problem with the image drum or toner cartridge

Vous aimerez peut-être aussi