Study Guide Exam 220-1101- Wiley Learning Flashcards

(171 cards)

1
Q

Name three of the standard DC voltages supplied by a power supply.

A

+3.3VDC, +5VDC, −5VDC, +12VDC, or −12VDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is jitter?

A

Variable latency on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What causes image smudging from a laser printer?

A

The fuser isn’t heating the toner and fusing it into the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name of the Apple proprietary connector used on the iPhone 12?

A

Lightning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What two categories of materials will 3D printers use to create images?

A

Filament and resin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FTP uses ports ___ and ___, and Telnet uses port ____.

A

20, 21, 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the term for cloud service where the provider offers applications?

A

software as a service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When Windows quits unexpectedly, you may get a _________.

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are three SSD communications interfaces?

A

NVMe, SATA, PCIe

NVMe - non-volate Memory Express, is a device specification introduced by Intel in 2007. It standardizes the way that non-volatile memory devices, such as SSDs, can connect to a computer’s PCI Express (PCIe) bus.

Traditionally, SSDs are connected to the computer using a disk drive interface, such as SATA. However, SATA was designed for older data storage devices, such as HDDs (hard disk drives), and its data transfer speed is limited. Beginning in about 2005, when SSDs first became popular with consumers, the fastest SSDs were reading data quicker than SATA could transfer it. Manufacturers began producing SSDs that could be installed in a PCIe slot, but their interfaces varied widely. The NVMe standard allows any of these devices to be attached to a computer without requiring separate, and possibly conflicting, operating system device drivers.

Traditionally, SSDs are connected to the computer using a disk drive interface, such as SATA. However, SATA was designed for older data storage devices, such as HDDs (hard disk drives), and its data transfer speed is limited. Beginning in about 2005, when SSDs first became popular with consumers, the fastest SSDs were reading data quicker than SATA could transfer it. Manufacturers began producing SSDs that could be installed in a PCIe slot, but their interfaces varied widely. The NVMe standard allows any of these devices to be attached to a computer without requiring separate, and possibly conflicting, operating system device drivers.

SATA - Short for serial AT attachment, SATA 1.0 was first released in August 2001 and is a replacement for the parallel ATA interface used in IBM compatible computers. SerialATA can deliver 1.5 Gbps (approximately 187 MBps) of performance to each drive within a disk array. It is backward-compatible with ATA and ATAPI devices, and offers a thin, small cable solution, as seen in the “SATA Data Cable” picture. This cable helps makes cable routing easier and offers better airflow in the computer compared to the earlier ribbon cables used with ATA drives.

SATA also supports external drives through External SATA more commonly known as eSATA. eSATA offers many more advantages compared to other solutions. For example, it is hot-swappable, supports faster transfer speeds with no bottleneck issues like USB and FireWire, and supports disk drive technologies (e.g., S.M.A.R.T.).

However, eSATA does have some disadvantages, such as not distributing power through the cable like USB, which means drives require an external power source. The eSATA cable also supports a maximum length of up to 2 meters. Because of these disadvantages don’t plan on eSATA becoming the only external solution for computers.

PCie - Originally known as 3rd Generation I/O (3GIO), PCI Express, or PCIe, was approved in July 2002 as a serial computer expansion bus standard. PCI Express was designed as a high-speed replacement for the aging PCI and AGP standards and is available in different formats. The data transmitted over PCI Express is sent over wires (called lanes) in full duplex mode (both directions at the same time). Each lane can transfer speeds around 250 MB/s and each slot can be scaled from 1 to 32 lanes. With 16 lanes, PCI Express supports a bandwidth of up to 4,000 MB/s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

STP designed for use outdoors or underground is called what?

A

Direct burial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If one end of an Ethernet patch cable is configured as T568B, the other end needs to be configured as _____.

A

T568B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DDR3 SODIMMs have ____ pins.

A

204

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multipart forms are used with this type of printer.

A

impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which service helps manage corporate applications on mobile devices?

A

Mobile application management (MAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Class C private IP addresses are in the ____ range.

A

192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The series of print jobs waiting to use the printer is called the _________.

A

print queue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ___ protocol is used to send mail and operates on port ___.

A

SMTP, 25

SMPT - Simple Mail Transfer Protocol, SMTP is an Internet standard for the sending of e-mail messages over port 25. While it is mostly used for transfer from one mail server to another, some client mail applications use SMTP for relaying messages; whereas receiving happens via POP or IMAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Thunderbolt is a combination of which two technologies?

A

DisplayPort and PCIe

Displayport - is a digital audio and video interface created by VESA. Its connections come in two varieties: standard, (shown in the picture) and the smaller Mini DisplayPort. Despite the difference in size, both connection types transmit identical signals. These cables are used to a display device like a computer monitor or projector to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Two common types of internal expansion slots for laptops are ____ and ____.

A

Mini PCIe, M.2

PCI - peripheral component interconnect

M.2 - is a connection type specification for computer expansion cards, introduced in 2014. The two major types of M.2 devices are the SATA M.2 and the significantly faster (and more expensive) PCIe M.2.

M.2 is often used for storage devices, such as SSDs, and high-performance non-volatile memory storage, such as Intel Optane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The functional components of a chipset are known as __________and __________.

A

Northbridge and Southbridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A ______ is a device primary used for storage on a network.

A

fileshare (or file server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_________________ drives can be inserted and removed without turning off the system.

A

Hot-swappable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The roaming list on a mobile device is established by what?

A

The PRL (preferred roaming list)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The most secure encryption protocol for 802.11 is ____.

A

WPA3

WI-FI protected access 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In order to communicate on a network, TCP/IP hosts must have a unique _____ and valid _______. TCP - Transmission Control Protocol, TCP is a standard that dictates how to establish and maintain a connection through which two programs may exchange data. Invented in 1978 and driven by Bob Kahn and Vint Cerf, TCP is a core component in the TCP/IP protocol, which dictates how information is sent over the Internet. The IP (Internet Protocol) is the fundamental protocol for communications on the Internet. It specifies the way information is packetized, addressed, transferred, routed, and received by networked devices.
IP address, subnet mask Subnet mask - a subnet mask is data used for bitwise operations on a network of IP addresses that is divided into two or more groups. This process, known as subnetting, divides an IP network into blocks of logical addresses. Subnetting can improve security and help to balance overall network traffic. A common example of a subnet mask for class C IP addresses is 255.255.255.0, the default subnet mask for many computers and network routers. When applied to subnet, a subnet mask shows the routing prefix.
26
Three connector types for fiber-optic cable are ___, ___, and ___.
ST, SC, LC
27
The macOS proprietary crash screen is called what?
Pinwheel
28
If you want to plug your laptop into a power outlet in your car, you need a _________ power adapter.
DC
29
The component of a laptop’s video system responsible for sending the video signal is the ___.
Video card
30
What is another name for hard disk mirroring?
RAID 1
31
__________ and __________ modules both have 288 pins but are distinguished by the location of their keying notch.
DDR4, DDR5 DDR4 - double data rate four, DDR4 is a type of system memory known as SDRAM and was released in September 2014 as the successor to DDR3. DDR4 has bus clock speeds that range from 800 to 1600 MHz and range in storage capacity from 4 to 128 GB per DIMM. DDR4 is also more efficient at 1.2 V compared to DDR3's 1.5 to 1.65 V range.
32
Inkjet and laser printers are examples of _______ because they receive their print job instructions one page at a time.
page printers
33
CPU cache is most commonly implemented using what type of memory?
Static RAM (SRAM) SRAM is computer memory that requires a constant power flow to hold information. Power consumption varies widely based on how frequently the memory is accessed. Although quicker than DRAM, SRAM is more expensive and holds less data per unit volume. Therefore, it is more commonly used in cache and video card memory only.
34
Wireless networks use ____ to identify themselves.
SSIDs SSID - service set identifier, SSID is a 32 alphanumeric identification given to devices on a wireless network. A device wanting to connect to a wireless network with an SSID enabled must have the same SSID to communicate. When connecting to a home network, you may see multiple SSIDs from your neighbor's wireless routers.
35
When a Bluetooth network is created with a printer on the fly, what type of network is it?
ad hoc
36
TCP is a _______ protocol that operates at the ____ layer of the OSI model. TCP - Transmission Control Protocol, TCP is a standard that dictates how to establish and maintain a connection through which two programs may exchange data. Invented in 1978 and driven by Bob Kahn and Vint Cerf, TCP is a core component in the TCP/IP protocol, which dictates how information is sent over the Internet.
connection-oriented, transport
37
Consistently light or faded characters on output from an impact printer likely indicates what?
The print ribbon is old and needs to be replaced.
38
To save heat, processors can use ____ to slow down and consume less energy.
Throttling
39
WPA2 employs what security method? WPA2 (Wi-Fi Protected Access II) provides security and encryption for data transmissions and general computer connectivity. It is a more secure replacement for the original WPA. WPA2 was made available in 2004 and all network devices from 2006 and on are required to be WPA2 certified. Devices before 2006 may or may not be compatible with WPA2.
AES-CCMP
40
What is the third step in the best practice troubleshooting methodology?
Test the theory to determine the cause
41
What type of hypervisor is also referred to as a bare-metal hypervisor?
Type 1
42
A ____ server can block objectionable content from users.
proxy
43
Which type of DNS TXT record authenticates an email server via IP address?
SPF
44
A device that combines firewall, IPS, and antimalware software in one is called what?
Unified Threat Management (UTM)
45
What is the name of the consumable in a 3D printer that comes on a spool and needs to be replaced periodically?
filament
46
Two connector types used with twisted pair cabling are ____ and ____.
RJ-11 and RJ-45
47
Class B private IP addresses are in the ____ range.
172.16.0.0 to 172.31.255.255
48
What is a name for a legacy system that manages industrial processes such as manufacturing or HVAC?
SCADA
49
What is the fifth step in the best practice troubleshooting methodology?
Verify full system functionality and, if applicable, implement preventive measures
50
A firewall configuration where every computer is denied access except certain computers on a list is called a ___list.
White (or allow)
51
If when the computer is turned on, the fan spins but no devices seem to have power, which component is most likely at fault?
Power supply
52
As opposed to a WLAN, a Bluetooth network is referred to as a ____.
wireless personal area network (WPAN)
53
When troubleshooting and identifying the problem, what two things should you do?
Gather information from the user and inquire regarding environmental or infrastructure changes
54
What connector type provides power to an IDE hard drive?
Molex
55
Mini PCIe cards have ____ connectors.
52-pin card edge
56
What does RAID 0 not provide that other RAID levels do?
Fault tolerance
57
Name three places network scan services can send files?
Scan to email, scan to network folder (with SMB), scan to cloud
58
The language of communication spoken between computers on a network is called a _______.
protocol
59
What are the two socket types that require little to no force during CPU installation?
Zero Insertion Force (ZIF) and Land Grid Array (LGA)
60
What two things are combined in a hybrid drive?
A magnetic drive and a solid-state drive
61
Unexpected shutdowns, system lockups, or continuous reboots are most often caused by which hardware components?
Motherboard, CPU, or RAM
62
__________ is essentially software implemented in hardware.
Firmware
63
A paper jam in an inkjet printer is usually caused by what two things?
Worn pickup rollers or the wrong type of paper
64
Two types of devices used to keep computer components cool are __________ and __________.
heat sinks, cooling fans
65
A DB-9 connector is found on which type of cable?
Serial
66
Two analog video connectors are ___ and ___.
VGA and DVI-A
67
DNS server records for IPv4 and IPv6 hosts are ____ and ____.
A and AAAA
68
Name three types of internal hard drive cables.
SATA, IDE (PATA), and SCSI
69
A passive connectivity device that amplifies a signal is called a ______.
repeater or active hub
70
A ____ server provides IP configuration information to clients on the network.
DHCP (Dynamic Host Configuration Protocol)
71
Unevenly spaced characters in output from an impact or inkjet printer could indicate what?
A problem with the stepper motor
72
How many pins are on a standard (Type-A) HDMI connector?
19
73
Where is the boot sequence stored in the computer?
BIOS/UEFI settings
74
What is a network dedicated to storage devices called?
storage area network (SAN)
75
If the video on a laptop is not working, what should you should plug in?
An external monitor
76
Class A IP addresses will have a first octet of between ____ and ___.
1 and 126
77
The CPU feature that allows for multiple operating systems to run at once is called what?
Virtualization (or virtual technology)
78
What tool can be used to discover wireless network traffic?
A Wi-Fi analyzer or wireless locator
79
Firewalls filter packets based on a set of rules called _____.
an ACL (access control list)
80
____ is the form factor designed for laptop expansion devices and small hard drives.
mSATA
81
DHCP uses ports ____ and _____.
UDP port 67 and UDP port 68
82
Which TCP ports are used for unsecure and secure POP3?
110 and 995, respectively
83
How do you fix a swollen battery on a mobile device?
Replace it
84
The last step in the EP imaging process is____.
cleaning
85
Copying data, such as calendars, contacts, photos, and music, between a computer and a mobile device is referred to as what?
Synchronization
86
The add-on card that allows your computer to project on a monitor is called what?
Video card
87
A simple hardware device that allows for longer cable runs is called a(n) ________.
Repeater or extender
88
Which TCP ports are most commonly used for unsecure and secure SMTP over SSL?
Port 25 and port 465, respectively
89
When using the troubleshooting best practice methodology, what should you always consider?
Corporate policies, procedures, and impacts
90
Two common types of laptop displays are ___ and ___.
LCD, OLED
91
The network connectivity device that can connect multiple networks to each other is a ______.
router
92
What is the first step in the best practice troubleshooting methodology?
Identify the problem
93
A 10BaseT network uses _____ cabling and can transmit data at _______ (speed).
twisted pair (or UTP), 10 Mbps
94
What are the three components of an LCD?
Inverter, screen, and backlight
95
How many more pins does a dual-link DVI-D connector have than a single-link DVI-D connector?
6
96
TCP/IP is based on the ______ model.
United States Department of Defense (DoD)
97
What type of cloud is completely owned by a company like Google but used by business clients?
Public
98
DDR4 and DDR5 DIMMs have how many pins?
288
99
What step of the EP imaging process uses a laser to discharge selected areas of the photosensitive drum, thus forming an image on the drum?
exposing
100
Name six types of data that get synchronized between a mobile device and a desktop.
Contacts, applications, email, pictures, music, videos, calendar, bookmarks, documents, location data, social media data, E-books, and passwords
101
The first step in the EP printing process is ______.
processing
102
The method that translates between private nonroutable IP addresses and public IP addresses is ____.
network address translation (NAT)
103
What in the name of a Blu-ray disc indicates that it can be rewritten multiple times?
BD-RE
104
Which system component is most likely to overheat?
CPU
105
Name three of the available memory-card formats
SD, micro-SD, mini-SD, xD, and CF
106
What is the function of the corona assembly?
The corona assembly gets the toner from the photosensitive drum onto the paper.
107
What is the difference between USB 3.1 and USB-C?
USB 3.1 is a standard, and USB-C is a connector type.
108
Two examples of 4G technology are _____ and ______.
WiMAX, LTE
109
The service that formats jobs for the printer is called the ________.
print spooler
110
Order these from slowest to fastest: SAS-3, IDE, SATA 3.0
IDE (100 Mbps), SATA 3.0 (6 Gbps), SAS-3 (12 Gbps)
111
With EP imaging process laser printers, the laser discharges the charged photosensitive drum to ____________________ VDC.
−100
112
What hardware tool is used to trace cables through a wall?
Toner and probe
113
To use a wireless network, clients must connect to what type of device?
wireless access point or wireless router
114
Name one of the common rotational speeds of a magnetic hard drive.
5400 rpm, 7200 rpm, 10,000 rpm, and 15,000 rpm
115
_____ is a term that refers to a 32-bit Intel CPU architecture.
x86
116
Smoke or a burning smell is most likely the fault of which component?
Power supply
117
The cable type with the longest range is _____.
fiber-optic
118
What tool is used to test a network card, without using a network cable?
Loopback adapter or plug
119
Name two ways you can manually configure your laser printer’s IP address?
Through the control panel on the printer and using management software on your computer
120
A card with expansion slots on it that installs into a motherboard is known as a(n) __________ card.
riser
121
The database containing information the DHCP server gives to clients is called what?
scope
122
APIPA addresses are in the ____ range with a subnet mask of ___.
169.254.0.0 to 169.254.255.255, 255.255.0.0
123
Where is the Wi-Fi antenna typically found in a laptop?
In the display
124
The wireless networking standard 802.11n operates at ____ (frequency) and supports _____ (speed).
2.4 and 5GHz, up to 600 Mbps
125
The process that an inkjet printer goes through after installing a new print cartridge is called ________.
printhead alignment
126
UTP cable has a maximum segment length of _____.
100 meters
127
What type of device provides network connections through an electrical outlet?
Ethernet over Power
128
Which TCP ports are used for unsecure and secure IMAP?
Port 143 and port 993, respectively
129
The ___ protocol is used to retrieve mail and operates on port ___.
IMAP, 143 or POP3, 110
130
What technology allows pairing of mobile devices and, on occasion, the ability to transfer files between them?
Bluetooth
131
If all computers on the network are in the same office, then the office is a ______.
local area network (LAN)
132
What is a configured range of available IP addresses on a DHCP server called?
Scope
133
ATX and ITX are examples of what?
motherboard form factors
134
The seven steps in the EP printing process, in order, are ______.
processing, charging, exposing, developing, transferring, fusing, and cleaning
135
The wireless networking standard 802.11a operates at ____ (frequency) and supports _____ (speed).
5 GHz, 54 Mbps
136
______ are examples of print communication languages.
Printer Control Language (PCL), PostScript (PS), and Graphics Device Interface (GDI)
137
Which troubleshooting device can help determine problems during the boot process?
POST card
138
What is the name of the network type that is segmented using a managed switch?
VLAN
139
The address fe80::/10 is an example of an IPv6 _____ address.
link-local
140
To secure a laptop from theft, use a _____.
Cable lock (or physical laptop lock)
141
When configuring an Internet email account on a mobile device, what are the standard pieces of information required?
Username and password, outbound mail server and port (often based on secure SMTP), and inbound mail server and port (often based on secure POP3 or secure IMAP4)
142
Ethernet uses _____ to send information on the network.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
143
Which voltage is applied to the paper to transfer the toner to the paper in an EP process laser printer?
+600VDC
144
RAID 5 requires a minimum of how many hard drives?
3
145
The diagnostic routine built into the BIOS is called the _______.
Power-on self-test (POST)
146
What should you apply between the CPU and heat sink to avoid overheating?
thermal compound, thermal paste, thermal pads, or thermal gel
147
What is the maximum speed of USB 3.0?
5 Gbps
148
What technology is built into hard drives to detect problems?
S.M.A.R.T.
149
Using an employee’s physical ID to authenticate to a printer is called what?
badging
150
Which metric should be used to ensure that the PSU can power all components?
Wattage rating
151
A DVD-R SS, DL has how much capacity?
8.5 GB
152
The four common types of broadband are _______.
DSL (Digital Subscriber Line), cable, satellite, and fiber-optic
153
The e in eSATA stands for ______.
external
154
The part of the LCD that is responsible for providing enough light is called the ____.
backlight
155
If a laptop will not power up on battery power, you should try _____.
plugging it into an AC adapter
156
Technology that allows for electricity to be supplied over network cables is called ______.
Power over Ethernet (PoE)
157
A RADIUS server is an example of what type of server?
Authentication
158
Vertical white lines on the output of a laser printer are caused by what?
Foreign matter (more than likely toner) caught on the transfer corona wire
159
Which protocol in TCP/IP is responsible for resolving IP addresses to MAC addresses?
ARP (Address Resolution Protocol)
160
To communicate on a TCP/IPv4 network, which two things do you need?
A unique IP address and a valid subnet mask
161
What technology is built into hard drives to detect problems?
S.M.A.R.T.
162
The ability to access extra cloud resources quickly is called what?
Rapid elasticity
163
DDR4 and DDR5 DIMMs have how many pins?
288
164
With EP imaging process laser printers, the laser discharges the charged photosensitive drum to ____________________ VDC.
−100
165
Name three types of internal hard drive cables.
SATA, IDE (PATA), and SCSI
166
STP designed for use outdoors or underground is called what?
Direct burial
167
Which TCP ports are most commonly used for unsecure and secure SMTP over SSL?
Port 25 and port 465, respectively
168
If when the computer is turned on, the fan spins but no devices seem to have power, which component is most likely at fault?
Power supply
169
Which TCP ports are used for unsecure and secure IMAP?
Port 143 and port 993, respectively
170
Two examples of 4G technology are _____ and ______.
WiMAX, LTE
171
The four common types of broadband are _______.
DSL (Digital Subscriber Line), cable, satellite, and fiber-optic