CDC 3D151 Comprehensive Review

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Airmanmcnair
A
Airmanmcnair
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,086
| Attempts: 2,086
SettingsSettings
Please wait...
  • 1/286 Questions

    What entails how we communicate and manage data?

    • Information systems.
    • Satellite systems.
    • Airfield systems.
    • Power systems.
Please wait...
CDC 3D151 Comprehensive Review - Quiz
About This Quiz

This is a comprehensive review of the 3D151 Client Systems Journeyman CDCs (3D151 01 1105, Edit Code 01). Answers are verified 100% correct from CDCs. This test encompasses all URE questions from all three volumes. In this test 100 out of the 286 possible questions will be displayed in random order along with the answers in random order, with only one being correct. Minimum passing score for this test is 65%, just like the EOC. Good Luck.


Quiz Preview

  • 2. 

    What devices are mostly small, lightweight, and designed for mobile use?

    • Software.

    • Hardware.

    • Computers.

    • Handhelds.

    Correct Answer
    A. Handhelds.
    Explanation
    Handhelds are mostly small, lightweight, and designed for mobile use. Unlike computers, which can be larger and less portable, handhelds are specifically designed for on-the-go use. Software and hardware are general terms that encompass a wide range of devices and components, whereas handhelds refer specifically to portable devices that can be easily carried and used while mobile.

    Rate this question:

  • 3. 

    What are minor software updates or improvements called?

    • Bundles.

    • Patches.

    • Databases.

    • Processors.

    Correct Answer
    A. Patches.
    Explanation
    Minor software updates or improvements are commonly referred to as patches. Patches are small pieces of code that are designed to fix bugs, enhance functionality, or improve security in software applications. They are typically released by software developers to address specific issues or make minor enhancements to the software without requiring a complete update or reinstall of the application. Patches are an important part of software maintenance and help to ensure that software remains stable, secure, and up-to-date.

    Rate this question:

  • 4. 

    What type of remote network provides a private tunnel through public cloud (the Internet)?

    • Virtual private network.

    • Peer to peer.

    • Broadband.

    • Three tier.

    Correct Answer
    A. Virtual private network.
    Explanation
    A virtual private network (VPN) is a type of remote network that allows users to create a secure and private connection over a public network, such as the Internet. It establishes a private tunnel through the public cloud, encrypting the data transmitted between the user's device and the network, ensuring privacy and security. This enables users to access resources on the network remotely, as if they were directly connected to it, making it an ideal solution for businesses and individuals seeking a secure remote connection.

    Rate this question:

  • 5. 

    What is an essential tool for any Client Systems Technician to find software approved for use on an AF network?

    • Certification.

    • Enterprise license.

    • Enterprise Software Agreement.

    • Evaluated/Approved Product List.

    Correct Answer
    A. Evaluated/Approved Product List.
    Explanation
    An essential tool for any Client Systems Technician to find software approved for use on an AF network is the Evaluated/Approved Product List. This list provides a comprehensive inventory of software that has been evaluated and approved for use on the network, ensuring that only authorized and secure software is installed on client systems. It helps the technician to easily identify and select software that meets the network's security and compatibility requirements, reducing the risk of introducing potential vulnerabilities or conflicts.

    Rate this question:

  • 6. 

    This practice uses tapes, electronic vaulting, or mirrored disks and should be done regularly.

    • Reconfiguration.

    • Programming.

    • Data backup.

    • Reloading.

    Correct Answer
    A. Data backup.
    Explanation
    The correct answer is "Data backup". This is because the practice mentioned in the question involves using tapes, electronic vaulting, or mirrored disks to regularly back up data. This process helps in creating copies of important data to ensure its safety and availability in case of any unforeseen events or data loss situations.

    Rate this question:

  • 7. 

    What part of client systems includes the the physical aspect of computers, telecommunications, and other devices, to include the interconnect devices?

    • Programs.

    • Processes.

    • Hardware.

    • Paperwork.

    Correct Answer
    A. Hardware.
    Explanation
    The correct answer is hardware because it refers to the physical components of client systems such as computers, telecommunications devices, and interconnect devices. Programs and processes are software components, while paperwork is not directly related to the physical aspect of client systems.

    Rate this question:

  • 8. 

    What program translates commands between a device and the programs that use the device?

    • Operating system.

    • Memory.

    • Driver.

    • Port.

    Correct Answer
    A. Driver.
    Explanation
    A driver is a program that acts as a translator between a device and the programs that use the device. It allows the operating system and applications to communicate with the device by converting the commands and instructions from the software into a language that the device can understand. The driver also enables the device to send data back to the software. Therefore, the correct answer is driver.

    Rate this question:

  • 9. 

    What is installed on a computer to act as the interface between the computer and network?

    • NIC.

    • Ethernet.

    • Transceiver.

    • Coaxial cable.

    Correct Answer
    A. NIC.
    Explanation
    A Network Interface Card (NIC) is installed on a computer to act as the interface between the computer and the network. It allows the computer to connect to a network, whether it is wired or wireless, and enables communication between the computer and other devices on the network. The NIC handles the transmission and reception of data packets, converting them into a format that can be understood by the computer and the network. Ethernet, transceiver, and coaxial cable are all components that can be associated with a network connection, but the NIC is the actual device that facilitates the connection.

    Rate this question:

  • 10. 

    What is the unique identification number a network interface card (NIC) provides to a personal computer?

    • MAC address.

    • IEEE address.

    • OUI address.

    • SAS address.

    Correct Answer
    A. MAC address.
    Explanation
    A network interface card (NIC) provides a unique identification number to a personal computer known as a MAC address. This address is assigned by the manufacturer and is used to uniquely identify the NIC on a network. The MAC address is a 48-bit number, typically represented as six pairs of hexadecimal digits, and is essential for communication between devices on a network.

    Rate this question:

  • 11. 

    What piece of equiptment is a the core of most Wi-Fi networks?

    • Client.

    • Router.

    • Network interface card.

    • Intrusion detection system.

    Correct Answer
    A. Router.
    Explanation
    The router is the core of most Wi-Fi networks because it is responsible for connecting multiple devices to the network, managing the flow of data between them, and providing access to the internet. It acts as a central hub, allowing devices to communicate with each other and facilitating the wireless connection. Without a router, devices would not be able to connect to the network or access the internet, making it an essential piece of equipment in Wi-Fi networks.

    Rate this question:

  • 12. 

    What protocol provides an almost unlimited number of Internet Protocol addresses?

    • TCP/IP.

    • VIP.

    • IPv6.

    • IPv4.

    Correct Answer
    A. IPv6.
    Explanation
    IPv6 provides an almost unlimited number of Internet Protocol addresses compared to its predecessor, IPv4. IPv4 uses a 32-bit address format, which limits the number of available addresses to approximately 4.3 billion. On the other hand, IPv6 uses a 128-bit address format, allowing for a significantly larger number of unique addresses, estimated to be around 340 undecillion. This expansion in address space is necessary to accommodate the growing number of devices connected to the internet. Therefore, IPv6 is the correct answer to the question.

    Rate this question:

  • 13. 

    What is one of the best habits a Client Systems Technician can form in order to save time, effort and prevent mistakes?

    • Working fast.

    • Minimizing tools.

    • Getting organized.

    • Remembering everything.

    Correct Answer
    A. Getting organized.
    Explanation
    Getting organized is one of the best habits a Client Systems Technician can form in order to save time, effort, and prevent mistakes. By organizing their work environment, files, and tasks, technicians can easily locate what they need, prioritize tasks efficiently, and avoid wasting time searching for information. Being organized also helps in preventing mistakes as it allows technicians to follow a systematic approach, ensuring that all necessary steps are completed accurately and in the right order. This habit promotes productivity, reduces stress, and enhances overall efficiency in the technician's work.

    Rate this question:

  • 14. 

    When troubleshooting after a system failure, this step is a last resort effort when all other avenues have been exhausted. 

    • Reboot the system.

    • Reinstall application programs.

    • Remove and replace the operating system.

    • Remove and replace the CD/DVD-ROM drive.

    Correct Answer
    A. Remove and replace the operating system.
    Explanation
    When troubleshooting after a system failure, removing and replacing the operating system is a last resort effort when all other avenues have been exhausted. This step involves completely reinstalling the operating system, which can help resolve any issues that may be causing the system failure. This is often done when other troubleshooting steps, such as rebooting the system or reinstalling application programs, have not been successful in resolving the problem. Removing and replacing the CD/DVD-ROM drive is not a typical step in troubleshooting a system failure, as it is more likely to be related to hardware issues rather than software or operating system problems.

    Rate this question:

  • 15. 

    What component in the vido teleconferencing (VTC) system converts analog signal to digital signals?

    • Camera.

    • Coder/decoder (CODEC).

    • Network termination 1.

    • Central processing unit (CPU).

    Correct Answer
    A. Coder/decoder (CODEC).
    Explanation
    The correct answer is CODEC. In a video teleconferencing (VTC) system, the CODEC component is responsible for converting analog signals to digital signals. CODEC stands for coder/decoder and it performs the encoding of the analog video and audio signals into a digital format that can be transmitted over the network. On the receiving end, the CODEC decodes the digital signals back into analog signals for display and playback. This conversion is essential for the transmission and reception of high-quality audio and video during a teleconference.

    Rate this question:

  • 16. 

    Any hardware added to a computer that expands its capabilities is referred to as a/an

    • Port.

    • Peripheral.

    • Interface.

    • I/O device.

    Correct Answer
    A. Peripheral.
    Explanation
    A peripheral refers to any hardware device that is added to a computer to enhance its capabilities or provide additional functionality. This can include devices such as printers, scanners, keyboards, and mice, among others. These peripherals are connected to the computer through ports or interfaces, allowing them to interact with the computer and expand its capabilities. Therefore, the correct answer is peripheral.

    Rate this question:

  • 17. 

    Which of these is a disadvantage of client-server networks?

    • A high level of security can be implemented at the server.

    • Users are relieved of the burden of managing resources.

    • Managing servers requires a dedicated staff.

    • More powerful resources can be shared.

    Correct Answer
    A. Managing servers requires a dedicated staff.
    Explanation
    The correct answer is "Managing servers requires a dedicated staff." This is a disadvantage of client-server networks because it requires a dedicated team or staff to manage and maintain the servers. This can be costly and time-consuming for organizations, as they need to hire and train professionals to handle server-related tasks such as installation, configuration, monitoring, and troubleshooting. Additionally, having a dedicated staff also means that there is a dependency on these individuals, and any issues or delays in server management can impact the overall network performance and availability.

    Rate this question:

  • 18. 

    What item below is not found in the Active Directory structure?

    • Domains.

    • Objects.

    • Forests.

    • Wi-Fi.

    Correct Answer
    A. Wi-Fi.
    Explanation
    The item that is not found in the Active Directory structure is Wi-Fi. Active Directory is a directory service that is used to manage and organize resources in a network environment. It provides a centralized database for storing information about network resources such as users, computers, and groups. Domains, objects, and forests are all components of the Active Directory structure, while Wi-Fi is a wireless networking technology that is not directly related to Active Directory.

    Rate this question:

  • 19. 

    With a software license agreement, who has the full rights to the software and its further distribution and reproduction?

    • Buyer.

    • Publisher.

    • US Air Force.

    • US government.

    Correct Answer
    A. Publisher.
    Explanation
    The correct answer is Publisher. In a software license agreement, the publisher retains the full rights to the software, including its distribution and reproduction. The buyer only obtains a license to use the software under certain terms and conditions specified in the agreement. The US Air Force and US government are not necessarily involved in every software license agreement and do not automatically have full rights to the software.

    Rate this question:

  • 20. 

    Use which tool to list all installed device drivers and their status, find hardware components that are not functioning properly or two devices that are in conflict on an operating system (OS)?

    • Event Viewer.

    • Control Panel.

    • Device Manager.

    • Network Connections.

    Correct Answer
    A. Device Manager.
    Explanation
    Device Manager is the correct answer because it is a tool that allows users to view and manage all installed device drivers on an operating system. It provides information about the status of each driver and can identify hardware components that are not functioning properly. Additionally, Device Manager can detect conflicts between two devices and provide options to resolve them. Event Viewer is not the correct answer as it is a tool used to view system logs and monitor events on the computer. Control Panel and Network Connections are also not the correct answers as they do not specifically provide information about installed device drivers and their status.

    Rate this question:

  • 21. 

    What provides the Secure Telephone Equipment (STE) with its security services?

    • Fortezza card.

    • Crypto ignition key.

    • Common access card.

    • Traffic Encryption Key.

    Correct Answer
    A. Fortezza card.
    Explanation
    The Fortezza card provides the Secure Telephone Equipment (STE) with its security services. The Fortezza card is a cryptographic device that is used to encrypt and decrypt sensitive information transmitted over secure telephone lines. It ensures the confidentiality, integrity, and authenticity of the communication by providing secure encryption algorithms and key management capabilities. The Fortezza card is specifically designed for secure communication and is widely used in government and military organizations to protect classified information.

    Rate this question:

  • 22. 

    Why are users required to change their passwords upon logging onto the network for the first time?

    • To ensure users don’t create vulnerability by leaving the default password in place.

    • To ensure users understand how to create a password.

    • To ensure the integrity of each user’s unique password.

    • To ensure users remember their unique password.

    Correct Answer
    A. To ensure users don’t create vulnerability by leaving the default password in place.
    Explanation
    Users are required to change their passwords upon logging onto the network for the first time to ensure they don't create vulnerability by leaving the default password in place. Default passwords are often well-known and easily accessible, making it easier for hackers to gain unauthorized access to the network. By forcing users to change their passwords, the risk of unauthorized access is reduced, as each user will have a unique password that is not easily guessed or known to others. This helps to enhance the overall security and protect sensitive information on the network.

    Rate this question:

  • 23. 

    What is the simplest and most efficient way to duplicate a computer's software, with no loss of files or configurations within the programs?

    • WinZip.

    • Norton Utilities.

    • Bundled software.

    • Imaging software.

    Correct Answer
    A. Imaging software.
    Explanation
    Imaging software is the simplest and most efficient way to duplicate a computer's software without any loss of files or configurations within the programs. Imaging software creates a complete copy or image of the computer's entire hard drive, including the operating system, applications, files, and settings. This image can then be easily transferred to another computer or restored onto the same computer, ensuring that all files and configurations remain intact. WinZip, Norton Utilities, and bundled software may have their own functionalities but they do not specifically specialize in duplicating a computer's software without any loss.

    Rate this question:

  • 24. 

    What does Wi-Fi use to carry network signals to the network access point?

    • Cable lines.

    • Radio waves.

    • Dedicated lines.

    • Telephone lines.

    Correct Answer
    A. Radio waves.
    Explanation
    Wi-Fi uses radio waves to carry network signals to the network access point. Radio waves are electromagnetic waves that transmit data wirelessly through the air. This allows devices to connect to the internet without the need for physical cables. Wi-Fi signals are transmitted and received by devices such as routers and wireless adapters, enabling wireless communication and internet access.

    Rate this question:

  • 25. 

    Who centrally manages the Air Force server updates that keep you workstation antivirus software current?

    • Enterprise Information Technology Service Desk.

    • Air Force Network Operations Center.

    • Workgroups.

    • Clients.

    Correct Answer
    A. Air Force Network Operations Center.
    Explanation
    The Air Force Network Operations Center is responsible for centrally managing the Air Force server updates that keep workstation antivirus software current. This means that they oversee and coordinate the updates to ensure that all workstations within the Air Force network have the latest antivirus software installed. They are the central authority in charge of maintaining the security and functionality of the network by ensuring that all antivirus software is up to date and capable of protecting the workstations from potential threats.

    Rate this question:

  • 26. 

    One of the main purposes of the Integrated Services Digital Network (ISDN) handset telephone test set is to 

    • Detect noise.

    • Insert tones.

    • Verify a dial tone.

    • Insert a signal delay.

    Correct Answer
    A. Verify a dial tone.
    Explanation
    The main purpose of the Integrated Services Digital Network (ISDN) handset telephone test set is to verify a dial tone. This test set allows technicians to check if a dial tone is present on the line, ensuring that the telephone line is active and ready for use. It is an essential tool for troubleshooting and testing telephone lines to ensure proper functionality.

    Rate this question:

  • 27. 

    The term used to refer to the process of launching the OS is the

    • Boot.

    • Random access memory.

    • Basic Input/Output System.

    • Complimentary Metal-Oxide Semiconductor.

    Correct Answer
    A. Boot.
    Explanation
    The term used to refer to the process of launching the OS is "boot". This term is derived from the phrase "pulling oneself up by one's bootstraps" and it refers to the process of starting up a computer system. During the boot process, the computer's hardware is initialized, the operating system is loaded into memory, and various system checks and configurations are performed. The boot process is essential for the computer to become operational and ready for use.

    Rate this question:

  • 28. 

    What type of printer software configuration option requries a new port to be created?

    • Telnet.

    • Local printer.

    • Driver printing.

    • TCP/IP printing.

    Correct Answer
    A. TCP/IP printing.
    Explanation
    TCP/IP printing requires a new port to be created because it uses the TCP/IP protocol to send print jobs over a network. In order for the printer to communicate with the computer, a specific port needs to be assigned to establish a connection. This allows the printer software to send print jobs to the correct destination and ensures proper communication between the computer and the printer.

    Rate this question:

  • 29. 

    The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system without constant problems is for the computer to have the minimum

    • Software.

    • Hardware.

    • Processors.

    • Applications.

    Correct Answer
    A. Hardware.
    Explanation
    To ensure a computer is compatible and powerful enough to run an operating system without constant problems, it is essential for the computer to have the necessary hardware. Hardware refers to the physical components of a computer system, such as the processor, memory, storage devices, and input/output devices. These components need to meet or exceed the minimum requirements specified by the operating system to ensure smooth and efficient functioning. Without adequate hardware, the computer may struggle to handle the demands of the operating system, leading to performance issues and frequent problems.

    Rate this question:

  • 30. 

    How may byte sectors is a hard disk divided into?

    • 124.

    • 248.

    • 512.

    • 1024.

    Correct Answer
    A. 512.
    Explanation
    A hard disk is typically divided into sectors, which are the smallest units of storage on the disk. These sectors are usually 512 bytes in size. This division allows for efficient organization and retrieval of data on the disk.

    Rate this question:

  • 31. 

    What form of remote network access is often the only choice for rural or remote areas?

    • Dial-up.

    • Wireless.

    • Broadband.

    • Virtual private network.

    Correct Answer
    A. Dial-up.
    Explanation
    Dial-up is often the only choice for rural or remote areas because it uses a telephone line to establish a connection to the internet. In areas where broadband or wireless networks are not available, dial-up remains a viable option as it relies on existing infrastructure. While it may be slower and less reliable compared to other forms of remote network access, it can still provide basic internet connectivity in areas where other options are limited or unavailable.

    Rate this question:

  • 32. 

    Which item is not a good practice in helping with future troubleshooting?

    • Remembering every step taken.

    • Knowing your network.

    • Documentation.

    • Gathering facts.

    Correct Answer
    A. Remembering every step taken.
    Explanation
    Remembering every step taken is not a good practice in helping with future troubleshooting because relying solely on memory can lead to inaccuracies and omissions. It is important to have documented records of the steps taken during troubleshooting to ensure accuracy and to easily refer back to them in the future. Documentation allows for better collaboration with others, enables the identification of patterns or recurring issues, and facilitates the sharing of knowledge within the team. Therefore, relying on memory alone is not a reliable method for troubleshooting.

    Rate this question:

  • 33. 

    Which media has a storage capacity of a gigabyte (GB) - terabyte (TB), has a slow to moderate speed and is moderately expensive?

    • Tape.

    • Network.

    • CD-ROM.

    • DVD-ROM.

    Correct Answer
    A. Tape.
    Explanation
    Tape is the correct answer because it has a storage capacity ranging from gigabytes (GB) to terabytes (TB), making it suitable for storing large amounts of data. It has a slow to moderate speed compared to other media options, but it is still widely used for archival purposes due to its cost-effectiveness. CD-ROM and DVD-ROM have smaller storage capacities compared to tape, while network refers to a method of connecting devices rather than a storage medium.

    Rate this question:

  • 34. 

    Which type of percipitation attenuates radio frequency (RF) energy just like rain?

    • Ice.

    • Fog.

    • Hail.

    • Snow.

    Correct Answer
    A. Fog.
    Explanation
    Fog attenuates radio frequency (RF) energy just like rain because both are composed of tiny water droplets suspended in the air. These water droplets in fog, similar to rain, scatter and absorb RF energy, causing a decrease in signal strength. This attenuation effect can disrupt wireless communications and affect the performance of RF devices. Ice, hail, and snow can also attenuate RF energy, but fog is specifically mentioned in the question.

    Rate this question:

  • 35. 

    When a security container is opened, it is inventoried at the

    • Beginning of the week.

    • Beginning of the duty day.

    • End of the week or month.

    • End of the shift or duty day.

    Correct Answer
    A. End of the shift or duty day.
    Explanation
    The correct answer is "end of the shift or duty day." This means that when a security container is opened, it is inventoried at the end of the shift or duty day. This practice ensures that any items taken or added to the container during the day are properly recorded and accounted for before the container is closed again. It helps maintain the security and integrity of the container's contents.

    Rate this question:

  • 36. 

    In Remedy, tickets can be assigned to whom?

    • A resolution group only.

    • A specific technician only.

    • A resolution group or specific technician.

    • Remedy automatically assigns tickets.

    Correct Answer
    A. A resolution group or specific technician.
    Explanation
    In Remedy, tickets can be assigned to either a resolution group or a specific technician. This means that when a ticket is created, it can either be assigned to a group of people who specialize in resolving certain types of issues, or it can be assigned to a specific individual technician who is responsible for handling the ticket. This flexibility allows for efficient ticket management and ensures that tickets are assigned to the appropriate individuals or groups based on their expertise and workload.

    Rate this question:

  • 37. 

    What describes how a computer finds a specific byte it is looking for in memory?

    • Processing.

    • Programming.

    • Memory addressing.

    • Memory segmenting.

    Correct Answer
    A. Memory addressing.
    Explanation
    Memory addressing is the process by which a computer locates a specific byte in its memory. It involves assigning unique addresses to each byte in memory, allowing the computer to easily access and retrieve the desired data. This process is essential for efficient memory management and retrieval, enabling the computer to quickly find and retrieve the specific byte it is looking for. Processing refers to the execution of tasks by the computer's central processing unit, while programming refers to the creation and implementation of software instructions. Memory segmenting, on the other hand, involves dividing the computer's memory into segments for better organization and management.

    Rate this question:

  • 38. 

    Printer hardware configuration via the web is done through

    • Hypertext transfer protocol.

    • Printer front panel controls.

    • Hewlett Packard Jetadmin.

    • Telnet.

    Correct Answer
    A. Hypertext transfer protocol.
    Explanation
    Printer hardware configuration via the web is done through hypertext transfer protocol. This means that the printer's hardware settings can be accessed and modified through a web browser using the HTTP protocol. This allows users to remotely configure and manage the printer's settings without the need for physical access to the printer or its front panel controls.

    Rate this question:

  • 39. 

    Which hardware requirement is defined as the model and the clock speed of the CPU?

    • Memory.

    • Peripherals.

    • Architecture.

    • Processing power.

    Correct Answer
    A. Processing power.
    Explanation
    The hardware requirement defined as the model and the clock speed of the CPU is processing power. This refers to the capability of the CPU to handle and execute tasks efficiently and quickly. The model of the CPU indicates its generation and features, while the clock speed represents the number of instructions the CPU can process per second. Therefore, processing power is a crucial factor in determining the overall performance and speed of a computer system.

    Rate this question:

  • 40. 

    The first sector at the beginning of a hard drive is called the master

    • Volume.

    • Cylinder.

    • Partition.

    • Boot record.

    Correct Answer
    A. Boot record.
    Explanation
    The first sector at the beginning of a hard drive is called the boot record. This sector contains important information that is necessary for the computer to start up and load the operating system. It includes the instructions for the computer to locate and load the operating system files, as well as any other necessary system files. The boot record is crucial for the proper functioning of the hard drive and the overall system.

    Rate this question:

  • 41. 

    Which file system is the best choice for data storage if the server is a dedicated Windows server?

    • NTFS.

    • FATS.

    • Neiter FATS nor NTFS.

    • Either FATS or NTFS.

    Correct Answer
    A. NTFS.
    Explanation
    NTFS (New Technology File System) is the best choice for data storage on a dedicated Windows server. NTFS offers advanced features such as file and folder permissions, encryption, compression, and support for large file sizes and volumes. It provides better security, reliability, and performance compared to the older FAT (File Allocation Table) file system. NTFS also supports features like journaling, which helps in recovering from system crashes or power failures. Therefore, NTFS is the recommended file system for a dedicated Windows server.

    Rate this question:

  • 42. 

    Which is not a valid form of identity management?

    • Iris.

    • Hair.

    • Palm.

    • Voice.

    Correct Answer
    A. Hair.
    Explanation
    Hair is not a valid form of identity management because it is not unique to an individual and can easily be altered or disguised. Unlike iris, palm, and voice, which have distinct patterns and characteristics that can be used for identification purposes, hair does not possess such distinguishing features. Therefore, it cannot be relied upon as a reliable method of identity management.

    Rate this question:

  • 43. 

    What limits a dirct wave to normally less than 20 miles?

    • Curvature of the earth.

    • Buildings in the area.

    • Topographic features.

    • Physical limitation of the frequency in use.

    Correct Answer
    A. Curvature of the earth.
    Explanation
    The correct answer is "Curvature of the earth." This is because as a direct wave propagates, it follows the curvature of the earth's surface. Due to the curvature, the direct wave gradually loses signal strength and becomes weaker over distance. This phenomenon limits the range of a direct wave to normally less than 20 miles.

    Rate this question:

  • 44. 

    The primary reason you measure the voltage across terminal or distribution frame protectors before removing and replacing them is to 

    • Make sure dangerous voltages are not present on the line.

    • Prevent interruptions to critical circuits.

    • Avoid activating alarm circuits.

    • Verify the circuit is not in use.

    Correct Answer
    A. Make sure dangerous voltages are not present on the line.
    Explanation
    Before removing and replacing terminal or distribution frame protectors, it is important to measure the voltage across them to ensure that dangerous voltages are not present on the line. This is crucial for the safety of the person performing the task as well as to prevent any potential damage to the equipment or circuits. By measuring the voltage, one can identify if there is any risk of electric shock or other hazards, allowing them to take appropriate precautions before proceeding with the replacement.

    Rate this question:

  • 45. 

    What condition occurs when a signal is induced into one circuit from another?

    • Noise.

    • Jabber.

    • Crosstalk.

    • Intelligence.

    Correct Answer
    A. Crosstalk.
    Explanation
    Crosstalk is the condition that occurs when a signal is induced into one circuit from another. It happens when there is an unwanted coupling of signals between two or more circuits, resulting in interference. This interference can cause distortion or degradation of the original signal, leading to errors or reduced performance. Crosstalk is a common issue in electronic systems, especially in high-speed communication or densely packed circuits. It is important to minimize crosstalk to ensure proper signal integrity and reliable operation of the circuits.

    Rate this question:

  • 46. 

    What is the newest generation of secure voice telephone?

    • Secure Telephone Unit (STU).

    • Cryptographic Telephone (CT).

    • Secure Terminal Equipment (STE).

    • Pretty Good Privacy Phone (PGPfone).

    Correct Answer
    A. Secure Terminal Equipment (STE).
    Explanation
    The newest generation of secure voice telephone is the Secure Terminal Equipment (STE). This is a secure communication device that provides encrypted voice communication, ensuring the confidentiality and integrity of the conversation. It is designed to protect against eavesdropping and unauthorized access, making it suitable for sensitive and classified communications. The other options mentioned, such as the Secure Telephone Unit (STU), Cryptographic Telephone (CT), and Pretty Good Privacy Phone (PGPfone), may also provide secure communication capabilities, but the STE is specifically mentioned as the newest generation.

    Rate this question:

  • 47. 

    What are the two types of accounts supported by Windows operation systems?

    • Network and domain.

    • Network and local.

    • Domain and local.

    • User and email.

    Correct Answer
    A. Domain and local.
    Explanation
    Windows operating systems support two types of accounts: domain accounts and local accounts. A domain account is used to access resources on a network and is managed by a domain controller. It allows users to access shared files, printers, and other network resources. On the other hand, a local account is specific to a single computer and is managed locally. It is used for logging into the computer itself and accessing local resources. Therefore, the correct answer is domain and local.

    Rate this question:

  • 48. 

    Which type of memory is used to duplicate frequently used information stored elsewhere or computer earlier, because the original data is time consuming to retrieve or to compute?

    • RAM.

    • ROM.

    • Buffer.

    • Cache.

    Correct Answer
    A. Cache.
    Explanation
    Cache is a type of memory used to duplicate frequently used information stored elsewhere or computed earlier. It is used to improve the speed and efficiency of data retrieval by storing a copy of the most frequently accessed data. This helps to reduce the time-consuming process of retrieving the original data from the main memory or storage devices. Cache memory is faster than RAM and provides quicker access to the data, making it an ideal choice for storing frequently used information.

    Rate this question:

  • 49. 

    What are the two major way to implement a client server network?

    • First/last.

    • High/low.

    • Thick/thin.

    • Client/workstation.

    Correct Answer
    A. Thick/thin.
    Explanation
    The two major ways to implement a client-server network are through thick and thin clients. A thick client refers to a computer or device that has a significant amount of processing power and can perform complex tasks locally. It relies less on the server for processing and storage. On the other hand, a thin client is a device that relies heavily on the server for processing and storage. It has minimal processing power and relies on the server to perform most tasks. Therefore, the correct answer is thick/thin.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 09, 2012
    Quiz Created by
    Airmanmcnair
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.