Which drive technology uses serial connections?
Which storage drive technology uses point-to-point serial links to make its connections, and does not require any special ribbon cable wiring configurations?
Which storage drive technology uses point-to-point serial links to make its connections, and does not require any special ribbon cable wiring configurations?
You’ve recently upgraded the RAM modules in a personal computer by adding an additional 1 GB stick of memory to increase the amount of available memory from 1 GB to 2 GB. However, when rebooting the system you find that the computer will only recognize the original 1 GB of memory. What might be a cause of this problem? Pick the two best answers.
One of your customers needs to move their old printer from one computer to another, and they tell you that this printer uses a parallel port to interface to the computer. How many pins does the parallel port have on the computer’s motherboard?
You’re working on the installation of a new application at an end-users desk, and the user has stepped away for a few minutes. The user left their mobile phone on their desk, and it has started to ring. What should you do?
On the back of your new computer, you notice a port labeled DVI. What is the DVI port used for?
What kind of software tool boots to a standalone operating system and is usually focused around providing specific functionality such as diagnostics or troubleshooting?
What software tool can help with diagnostics and troubleshooting? Read More »
While at work, you receive a call from Brian from the company help desk in New York. Brian informs you that during the backup process last night, your user account was apparently damaged during the file transfer. To resolve the issue, Brian asks for your username and password so he can login and recover the damaged files. What kind of security problem is this?
You’re planning to disable the USB port on all of the computers in your organization, but you’re concerned about your end user community re-enabling the ports on individual systems. What’s the easiest way to ensure that the hardware changes are protected from any end-user modifications?
How can you secure your computer’s hardware configuration? Read More »
You have a small remote office with a limited number of users that needs to have network access to the corporate headquarters location. The remote site has an Internet connection, but you don’t want to connect your sites using an insecure public network. What’s the best technology for securing network connections between locations, even over public network links?