1. An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
• clean install
• upgrade
• multi-boot
• virtualization
• clean install
• upgrade
• multi-boot
• virtualization
2. Which two statements should be included in a pre-installation checklist when upgrading an operating system? (Choose two.)
• Verify that the hardware resources have multiple partitions.
• Verify that the hardware resources meet or exceed the published minimum requirements.
• Complete a full backup of all important files and data.
• Overwrite any data currently contained on the drive to remove all contents.
• Verify that the hardware resources are certified to work with the existing operating system prior to upgrading.
• Verify that the hardware resources have multiple partitions.
• Verify that the hardware resources meet or exceed the published minimum requirements.
• Complete a full backup of all important files and data.
• Overwrite any data currently contained on the drive to remove all contents.
• Verify that the hardware resources are certified to work with the existing operating system prior to upgrading.
3. Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)
• closest server
• operating system
• IP address
• subnet mask
• default gateway
• network card driver
• closest server
• operating system
• IP address
• subnet mask
• default gateway
• network card driver
4. Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.)
• partition
• file system
• computer name
• IP address
• operating system
• partition
• file system
• computer name
• IP address
• operating system
5. Which method of interacting with an operating system involves typing commands at a command prompt?
• CLI
• GUI
• redirector
• kernel translator
• CLI
• GUI
• redirector
• kernel translator
6. What are three characteristics of an operating system that is released under the GPL (GNU Public License)? (Choose three.)
• full access to source code
• software often available free
• structured development cycle
• can be expensive to purchase
• limits what end-user can do with code
• support normally user-based and often free
• full access to source code
• software often available free
• structured development cycle
• can be expensive to purchase
• limits what end-user can do with code
• support normally user-based and often free
7. What is the purpose of a default gateway?
• physically connects a computer to a network
• provides a permanent address to a computer
• identifies the network to which a computer is connected
• identifies the logical address of a networked computer and uniquely identifies it to the rest of the network
• identifies the device that allows local network computers to communicate with devices on other networks
8. Which two statements are true about drive partitions? (Choose two.)
• Partitions are necessary in multi-boot installations.
• A hard drive can be divided into an operating system partition and a data partition.
• User data is never overwritten when a drive is partitioned.
• A disk partition is a defined section of an operating system.
• Each partition requires a different file system type.
• physically connects a computer to a network
• provides a permanent address to a computer
• identifies the network to which a computer is connected
• identifies the logical address of a networked computer and uniquely identifies it to the rest of the network
• identifies the device that allows local network computers to communicate with devices on other networks
8. Which two statements are true about drive partitions? (Choose two.)
• Partitions are necessary in multi-boot installations.
• A hard drive can be divided into an operating system partition and a data partition.
• User data is never overwritten when a drive is partitioned.
• A disk partition is a defined section of an operating system.
• Each partition requires a different file system type.
9. What occurs when computers are configured to receive their network configurations dynamically?
• Each computer receives a permanent IP address.
• A network administrator enters information on each computer.
• Each computer requests configuration information from a server.
• An NIC automatically provides configuration information to the computer and stores that configuration information.
• Each computer receives a permanent IP address.
• A network administrator enters information on each computer.
• Each computer requests configuration information from a server.
• An NIC automatically provides configuration information to the computer and stores that configuration information.
10. What are two ways that a user can interact with an operating system shell? (Choose two.)
• CLI
• OS
• GUI
• NIC
• kernel
• CLI
• OS
• GUI
• NIC
• kernel
11. Which three resource specifications are given by the manufacturer to ensure that an operating system performs as designed? (Choose three.)
• required hard disk space
• type of accelerated graphics card
• recommended amount of RAM
• printer requirements
• processor type and speed
• type of keyboard
• required hard disk space
• type of accelerated graphics card
• recommended amount of RAM
• printer requirements
• processor type and speed
• type of keyboard
Tidak ada komentar:
Posting Komentar