Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
41 views5 pages

HALO

The document consists of multiple sets of questions and answers related to computer systems, networking, and hardware specifications. It covers topics such as Windows operating system requirements, network configurations, security protocols, and troubleshooting commands. Each set contains various technical terms and concepts relevant to IT professionals and students in the field.

Uploaded by

villasanlovely78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views5 pages

HALO

The document consists of multiple sets of questions and answers related to computer systems, networking, and hardware specifications. It covers topics such as Windows operating system requirements, network configurations, security protocols, and troubleshooting commands. Each set contains various technical terms and concepts relevant to IT professionals and students in the field.

Uploaded by

villasanlovely78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CSS

SET A
1. what is the minimum requirement for hard disk drive capacity in Windows 10. 16 GB
for 32 -bit OS or 20 GB for 64-bit OS
2. a single physical hard drive can divide into multiple _____ Hard drives. Logical
3. consist of the user matrices, and capability tables that govern the rights and
privileges of users. Access control list
4. is a collection of devices connected together in one physical location. Local Area
Network (LAN)
5. is a network cable where one end is T568-A while the other is T568-B Configuration.
Cross-over cable
6. in windows 7, when Lan connection has a cross and red indicator signifies that there is
______. Problem with the LAN driver
7. what is the common color for the USB 3.0 connector Standard A receptacles and
plugs? Blue
8. it monitors the initial security accreditation of an information system for tracking of
changes.
Continuous Assessment
9. two types of interface use to communicate between the hard drive and the computer
motherboard. Advanced Technology Attachment (ATA) and Serial Advanced
Technology
10. type of memory used in the Solid-State Drive (SSD) as a storage? Flash Memory
11. not appropriate to enter BIOS setup. F5
12. starts up recovery options in a computer that essentially RECOVERY partition of the
main hard drive. Repair Computer
13. type of version that protects unauthorized network access by utilizing a set-up
password. WPA2-Personal
14. Wi-Fi is a trademark phase, which means _____. IEEE.802.11
15. volt rating of the RED wire in a power supply. +5V
16. it occurs when an attacker or trusted insider steaks data from computer system
and demands compensation for its return. Information extortion
17. a utility tool that test whether a particular host is reachable across an IP Network.
Ping
18. where do Windows device drivers store? Registry
19. is a two or more PCs are connected and share resources without going through a
separate server computer. Per to Peer Network
20. a type of network that interconnects multiple local area network. Wide Area
Network
21. which of the following hardware components can connect over a computer
network? Network Interface Card
22. is a networking device that forward data packets between computer networks.
Router
23. application group that contains a Client Access Point and with at least one
application specific resource. Virtual Cluster Server
24. computer program use to prevent, detect, and remove possible threats to the
system. Anti-Virus Software
25. IP address used by the virtual machine to communicate over the physical network.
Provider Address
26. is the spider-like interconnection in millions of pieces of information located on
computers around the cyber space. World Wide Web
27. is a complete copy of everything store in a physical optical disc. ISO image
28. enables users of Windows that correct any problems preventing from booting up
normally. Safe mode
29. it is originally where the BIOS stored in a standard PC. Read Only Memory
(ROM)
30. services in Windows Server that enables administrator to migrate data to a lower-
cost and tape media on file servers. Remoted Storage Service

SET B
1. is used to store the user documents with a large amount of memory and storage
space. File server
2. what Ip address used by the virtual machine to communicate over the physical
network? Provider address
3. the computer system is function if it is in ____. Normal booting
4. in server 2008, Local Area Network (LAN) connection icon in a yellow color
indicator is signifies ____? No connectivity
5. what is the volt rating of the YELLOW wire in a power supply? +12V
6. who is assign to monitor the network security, operation and network users?
Network administrator
7. an Automated Software Program that executes certain commands when it receives
a specific input is____. Bot
8. what windows update that downloads and install latest version? Fully Automatic
9. light Emitting Diode (LED) in Network Interface Card (NIC) has____ Lights. 2
10. a compound used to prevent overheating of CPU. Terminal Paste
11. an extension of Microsoft management console use to mange hardware
devices including device drivers. Device Manager
12. the Recovery Console Command the examines the volume for errors and
repairs it. Chkdsk
13. what is the physically damage cluster of storage on the hard drive? Bad
sector
14. what the type of version that verifies network users through a server and
requires a more complicated setup, but provides additional security? WPA2-
Personal
15. ____ is a way to identify a specific process to which an Internet or other
network message forwarded when it arrives at a server. Port Number
16. ____ enables administrator to configure storage thresholds on a particular
sets of data store on server NTFS volumes. File System Quota
17. What log files that record performance statistics based on the various
performance object and instances available in Performance Monitor? Counter
Logs
18. What Recovery Console Commands that writes a new master boot record on
the hard disk drive? Fixmbr
19. What feature in Windows Server provides the ability to migrate workloads
between a source and target cluster? Failover
20. What is the maximum cable length for USB 2.0? 5 meters
21. What is the minimum hardware requirements of the computer RAM, for
Windows 10? 1 gigabyte (GB for 32-bit or 2 GB for 64-bit
22. Port ___ is an application of network address translation (NAT) that redirects a
communication request from one address and port number combination to
another. Forwarding
23. What is the alternative for wired connection that users radio frequencies to
send signals between devices and a router? wireless Fidelity
24. It occurs when two or more devices connected with the same IP address in a
computer network. IP Address Conflict
25. What software program store into a Read Only Memory (ROM)? Firmware
26. A Yost cable, Cisco cable, and a Console cable also known as ____. Roll-over
27. ____ is a computer network made up of an interconnection of local area
networks (LANs)within a limited geographical area, e.g corporate buildings.
Campus Area Network
28. What storage device should replace if frequent error messages appear while
moving files and booting up operating system? Hard Disk
29. Disc image also known as ____. ISO image

SET C
1. A router that is design to operate in the internet backbone. Core
2. what Windows edition as a program capable of restricting other users to access
certain programs in a computer? Windows Ultimate
3. what command-line tool used to find IP Address that correspond to a host or
domain name? NSlookup
4. it is used as a substitute for actual dics, allowing users to run software without
having to loa a CD or DVD. ISO file
5. what class of IP address is 192.168.0.1? Class C
6. an ideal voltage range on the hotwires of a Molex connector? Red=5V,
yellow=12V
7. which of the following is the most efficient in transferring large files? Files
Transfer Protocol
8. M.2 is a form factor for ____. Storage Drive
9. ____ allows to define a list of devices and only allow those devices on Wi-fi network.
MAC Address Filtering
10. A progress of scanning, identifying, diagnosing and resolving problems,
errors and bugs in software. Software Troubleshooting
11. what is the problem of a computer if the time and date keeps on resetting
even after fixing in the BIOS? CMOS Battery Failure
12. what type of network that connects through signals, e.g infrared? Wired
Equivalent Privacy
13. ___ is an enterprise-level heterogeneous backup and recovery suite.
NetBackup
14. The network security standard that tries to make connections between a
router and wireless devices faster and easier. WPS
15. ____ is an information asset suffering damage, unintended modification or
disclosure. Loss
16. A _____ should be upgraded to received and transmit strong signals to and
from other computers. Network card
17. A protocol that provides quick, automatic, and central management for the
distribution of IP Address within a network. Dynamic Host Control Protocol
(DHCP)
18. A network interface controller also known as ___. LAN Card
19. What is the minimum cable length for USB 3.0 using a non-twisted pair wire?
3 meters
20. What log files that conserves disk space by ensuring that the performance
log file will not continue growing over certain limits? Circular logging
21. What kind of chip stores the settings in the BIOS? Real Time Clock/Non
Volatile Random Access Memory (RTC/NVRAM) chip
22. It enables administrators to define the types of file that can save within a
Windows Volume and folder. File Screening
23. ____ allows users to move around the coverage area in a line of sight while
maintaining a network connection. Wireless Local Area Network
24. A task to do after planning to fix the network is ____? Implementing the
solution
25. What second clustering technology provides by corresponding client requests
across several servers with replicated configurations? Network Load Balancing
26. A type of server that allows the central the administration and management
of network users and network resources. Directory Server
27. What Ethernet cable used to connect computers to hubs and switches?
Straight-thru
28. In what folder that the devices can be found? System32
29. What technique used to gain unauthorized access to computers, wherein the
intruder sense messages with a source IP Address? Spoofing
30. A tool used for checking the condition of the hard drive with sign “GOOD”.
“Caution” and “BAD”. Crystal Disk Info

SET D
1. term used to refer when a system is unavailable. Downtime
2. networking tool that monitor an intercepts traffic over the computer network. Packet
analyzer
3. verifies the operation of communication device by sending and receiving data from
the same port. Loopback test
4. enables administrators to configure storage thresholds on particular sets of data
store on server NTFS volumes. File System Quota
5. it facilitates communication between the CPU and other devices in the system.
Chipset
6. type of peripheral card having media access control address. Network interface
card
7. minimum byte capacity of a bootable flash drive for Windows 10. 8GB
8. is a 24 pin USB connector system with a rotationally symmetrical connector.
Universal Serial Bus (USB) C Thunderbolt
9. defined as structured network cabling system standards for commercial buildings,
and between buildings in campus environments. ANSI/TIA-568
10. active directory protocol; used to access data from database. Lightweight
Directory Access Protocol (LDAP)
11. resistance reading of an open wire? Infinite ohms
12. is a way to identify a specific process to which an internet or other network
message forwarded when it arrives at a server. Port number
13. media types of 10-megabit Ethernet that compose of broadband coaxial cable
carrying multiple baseband channels for a maximum length of 3,600 meters.
10BASE-36
14. in the context of security, ___ is a privilege or assigned permission for the use of
computer data or resources. Access
15. is a computer network made up of an interconnection of local area networks (LANs)
within a limited geographical area, e.g corporate buildings. Campus Area Network
16. is used to store the user documents with a large amount of memory and storage
space. File server
17. in Windows 7, Windows update security is located in ___. Settings
18. the following displays the measures and various real-time statistics on the
system’s performance. View Current Activity
19. commands used to certify the peer name resolution Active Directory. NSLOOKUP
20. is a term for the main patch panel that links to every telecommunication room
inside the building. Vertical cross-connect
21. a network security system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. Firewall
22. a material that slid before crimping both ends of a patch cable and acts to reduce
strain in a cable. Boot
23. type of router that enables an internal network to connect to external network.
Edge
24. type of a high-speed network/subnetwork that composed of hosts and
interconnects using a variety of technology/topology. Storage Area Network
25. is a process of recognizing a user’s identity. Authentication
26. in networking ___ refers to pieces of related information that are transferred
through a network. Connections
27. a type of server that occupies a large portion of computing territory between the
database server and end user. Application server
28. class of IP addressing is 172.168.10.1 Class B
29. an enclosed or semi-enclosed channel that protects, routes and hides cables and
wires. Raceway
30. it acts like a border router to connect corporate sited to wired access lines.
Customer Premises Equipment (CPE)

SET E
1. used to run commands for troubleshooting unbootable operation system. Windows
Recovery Environment
2. in Windows 7, and indicator tells that a video driver has not installed. Only
Standard video is displayed
3. two command-line utilities used to export and import Active Directory Object
Information. Ldifde.exe and csvde.exe
4. command-line network utility that displays network connections for TCP and routing
tables.
Netstat
5. a logical subnetwork that groups collection of devices from the same network switch.
Virtual Local Area Network
6. set of rules that describes how software and hardware should interact within a
network.
Communications protocol
7. type of backup used in hard drive, disc, flash drive and external drive that are housed
on site. Local Backup
8. electronic components need to discharge electrically before the replacement of parts.
Capacitor
9. it ensures that information and programs are changing only in a specifies ad
authorized manner. Integrity
10. a microchip to manage data communication between CPU and a motherboard.
Input/Output Controller Hub
11. it is a time lapse between data sent and when received, it can have a big impact
on performance. Latency
12. is the minimum Random Access Memory (RAM) requirement of Server 2008 R2.
512MB
13. traditional method used to access server data and using the server message block
protocol over TCP/IP. Windows Folder Sharing
14. which means pushing components to its limits and extremes. Stress Test
15. attack includes the execution of viruses, worms, Trojan horses, and active Web
scripts with the intent to destroy or steal information. Malicious Code
16. type of server that enables large numbers users to exchange information near
instantaneously and formerly known as Internet Relay Chat (IRC) Servers. Real-Time
Communication Server
17. a text based on command used for creating bootable flash drive. Diskpart
18. devices can connect to a wireless router. 250
19. what recovery tool in Windows fixes and scans computer problem that prevents
computer from booting repeatedly. Startup Repair Access Point
20. a device that acts as a bridge between wireless clients and wired network. Access
point
21. a setup option in Unified Extensible Firmware Interface (UEFI)/ Basic Input Output
System (BIOS) that allows security settings to perform such task as locating the
device. LoJack
22. set of rules for transferring files such as text, graphic images, sound, video and
other multimedia files, on the World Wide Web (WWW. Hypertext Transfer
Protocol (HTTP)
23. the most current wireless networking standard and can communicate with the
older network standards. 802.11n
24. a volt meter reading of a shorted diode. Zero volt
25. is the process of joining two cables ends together. Cable splicing
26. electrical quantities measures when performing continuity testing of twisted pair
cable. Resistance
27. is a hardware device that enables to connect serial devices across a network.
Terminal Server
28. is an interface standard for a serial bus for high-speed communications also
referred as Institute of Electrical and Electronics Engineers (IEEE) 1394 interface.
Firewire
29. class of IP addressing is 10.10.10.1. Class A
30. a node in computer network that allows data to flow from one discrete network to
another.
31.
32. Gateway

You might also like