Deck 14: System Administration

ملء الشاشة (f)
exit full mode
سؤال
Fire detection is a special problem in computer facilities.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
IS resource acquisition and deployment should occur only in the context of a well-defined strategic plan for the organization as a whole.
سؤال
Most computer equipment is designed to operate reliably over a range of voltage levels.
سؤال
Signatures are the basis for determining users' authorization to access resources the OS manages.
سؤال
Monitors can operate continuously or intermittently.
سؤال
Surge protectors can be purchased as separate devices or integrated into other power-conditioning devices.
سؤال
Standardization tends to encourage innovation and produce solutions that are optimal for most users.
سؤال
​Computer performance is measured in terms of application tasks that can be performed in a given time frame.
سؤال
The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.
سؤال
Infrastructure management tends to concentrate on providing short-term services at minimal cost.
سؤال
An IS strategic plan tends to lead, rather than follow, the strategic plans of other units in the organization.
سؤال
Electrical fires often generate heat and smoke as quickly as conventional fires do.
سؤال
Operating systems now cooperate with one another to perform authentication and authorization.
سؤال
Surge protection is normally an add-on to a UPS.
سؤال
Typical operating expenditures include buildings, land, equipment, and research and development costs.
سؤال
The costs of technology are usually high for developers and early adopters but then decrease slowly after introduction.
سؤال
Computer and software purchases are capital expenditures, even though the expected useful lifetime of computer hardware and software has decreased in recent years because of rapid technological change.
سؤال
Application firewalls improve security by shielding internal servers and resources from direct access by outside users.
سؤال
Accurate data is the most important requirement for good configuration decisions.
سؤال
​Some UPSs, particularly those with long delivery times, are designed to work with a computer's OS.
سؤال
Typical ____ include salaries, rent, lease payments, supplies, and equipment maintenance.

A) capital expenditures
B) operating expenditures
C) infrastructure expenditures
D) infrastructure expenditures
سؤال
____ is the process of determining whether an authenticated user or process has enough rights to access a resource.

A) Access
B) Accounting
C) Authorization
D) Authentication
سؤال
____ is the process of determining or verifying the identity of a user or process owner.

A) Authentication
B) Authorization
C) Accounting
D) Access
سؤال
A ____ is a measure of computer system performance while executing one or more processing tasks.

A) benchmark
B) requirement
C) standard
D) watermark
سؤال
The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.

A) performance requirements
B) storage requirements
C) user requirements
D) hosting requirements
سؤال
The starting point for determining hardware requirements is the ____ that will run on the hardware platform.

A) operating system
B) application software
C) transaction monitor
D) database system
سؤال
A ____ describes the resource or service utilization of an application program during execution.

A) transaction monitor
B) program profiler
C) software monitor
D) limit monitor
سؤال
In all cases, strategic plans must address the basic question "____?"

A) How did we get here
B) Where should we go
C) How do we get there from here
D) What brought us here
سؤال
A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.

A) program profiler
B) transaction monitor
C) software monitor
D) limit monitor
سؤال
​The main responsibility of ____ is to ensure efficient and reliable delivery of information services.

A) software administration​
B) system administration
C) ​system development
D) ​software development
سؤال
The ____ represents units of work application software performs in terms of its demand for low-level hardware services.

A) resource contention model
B) resource overage model
C) application demand model
D) application utilization model
سؤال
A(n) ____ is a formal document sent to vendors that states requirements and solicits proposals to meet these requirements.

A) invitation to negotiate
B) request for quotation
C) request for bid
D) request for proposal
سؤال
System administrators can use the ____ utility to monitor hardware and software resource use in real time.

A) Task Manager
B) Performance List
C) Task List
D) Performance Monitor
سؤال
____ are programs or hardware devices that detect and report processing or I/O activity.

A) Monitors
B) Metrics
C) Benchmarks
D) Transactions
سؤال
The resources devoted to most organizational activities can be classified into two categories: ____.

A) capital expenditures and operating expenditures
B) capital investments and operating expenditures
C) capital controls and operating controls
D) capital resources and capital gains
سؤال
In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing financial reports.

A) Access
B) auditing
C) monitoring
D) certifying
سؤال
In computers, a ____ is a program or program fragment that infects a computer by installing itself permanently, usually in a hard-to-find location.

A) log
B) packet
C) packet
D) virus
سؤال
____ are assets or resources expected to provide benefits beyond the current fiscal year.

A) Operating resources
B) System resources
C) Manage resources
D) Capital resources
سؤال
The ____ composes the majority of an RFP.

A) requirements statement
B) performance statement
C) design statement
D) specifications statement
سؤال
The term ____ describes the way in which an organization uses resources to give it a major edge over its competitors.

A) strategic value
B) tactical value
C) competitive advantage
D) comparable advantage
سؤال
The simplest firewall type is a(n) ____ firewall, which examines each packet and matches header content to a list of allowed or denied packet types.

A) packet-filtering
B) stateful
C) application
D) inspecting
سؤال
The term ____________________ refers to execution speed.
سؤال
Capital resources are referred to as ____________________.
سؤال
____ can be seen in the home when air conditioners, refrigerators, and electric dryers are started and cause a momentary dimming of lights.

A) Power sags
B) Power spikes
C) Power loops
D) Power blocks
سؤال
A(n) ____ is a device that provides power to attached devices in the event of external power failure.

A) generator
B) uninterruptible power supply
C) power filter
D) rectifier
سؤال
A(n) ____ tracks the progress of complex client/server interactions.

A) application firewall
B) stateful firewall
C) packet-filtering firewall
D) proxy
سؤال
A(n) longer-term power sag that is often caused by the power provider is known as a ____.

A) blackout
B) grayout
C) brownout
D) green down
سؤال
Information systems are a combination of hardware, system software, and ____________________ software.
سؤال
Antivirus software uses data files, sometimes called "____," containing information about known viruses.

A) behaviors
B) heuristics
C) signature files
D) packets
سؤال
An RFP is generally considered a(n) ____________________ offer.
سؤال
Providing infrastructure-based services to a wide variety of users requires adopting service ____________________.
سؤال
____________________ expenditures provide benefits only in the current fiscal year.
سؤال
In general, the humidity level of a room containing computer equipment should be near ____%.

A) 15
B) 25
C) 40
D) 50
سؤال
____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.

A) Viruses
B) Signatures
C) Logs
D) Infectors
سؤال
The ____________________ model describes a computer's capability to deliver resources to application software.
سؤال
A(n) ____ is a server that handles service requests from external users of applications.

A) packet-filtering firewall
B) proxy
C) stateful firewall
D) application firewall
سؤال
A ____ is stored in a stand-alone executable program, is usually sent as an e-mail attachment and runs automatically when the attachment is opened.

A) Trojan
B) worm
C) macro
D) signature
سؤال
A vendor's response to an RFP is a(n) ____________________ of the offer.
سؤال
Requirements in an RFP should be categorized by ____________________ and listed completely.
سؤال
A(n) ____________________ is defined as a set of long-range goals and a plan to attain these goals.
سؤال
​List the three broad categories in which a typical information system (IS) administrator's tasks may be grouped.
سؤال
Hardware must also be protected against ____________________ resulting from excessive humidity.
سؤال
In computer security, a(n) ____________________ is a hardware device, software, or a combination of hardware and software that prevents unauthorized users in one network from accessing resources on another network.
سؤال
Until recently, applying patches and upgrades was a(n) ____________________ process.
سؤال
Protection against power loss requires a(n) ____________________ power source.
سؤال
List three common capabilities of antivirus software.
سؤال
Why is a raised floor often used in a room with multiple computer hardware cabinets?
سؤال
____________________ authentication methods are sometimes used instead of password-based authentication.
سؤال
A(n) ____________________ detects incoming power surges and diverts them to ground in nanoseconds.
سؤال
A(n) ____________________ monitors a specific performance or resource utilization aspect of an object.
سؤال
Excessive heat can cause intermittent or total failure of electrical circuits, so all computer equipment needs some means of heat ____________________.
سؤال
Discuss why disaster planning is important and what measures are normally taken.
سؤال
​What, at a minimum, should goals for a strategic plan include?
سؤال
A(n) ____________________ monitor is a device attached directly to the communication link between two hardware devices, often used to monitor the use of communication channels, disk drives, and network traffic.
سؤال
Low humidity levels increase the buildup of ____________________ electricity, which increases the likelihood of circuit damage caused by inadvertent static discharges.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: System Administration
1
Fire detection is a special problem in computer facilities.
True
2
IS resource acquisition and deployment should occur only in the context of a well-defined strategic plan for the organization as a whole.
True
3
Most computer equipment is designed to operate reliably over a range of voltage levels.
True
4
Signatures are the basis for determining users' authorization to access resources the OS manages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
Monitors can operate continuously or intermittently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
Surge protectors can be purchased as separate devices or integrated into other power-conditioning devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
Standardization tends to encourage innovation and produce solutions that are optimal for most users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
​Computer performance is measured in terms of application tasks that can be performed in a given time frame.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
Infrastructure management tends to concentrate on providing short-term services at minimal cost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
An IS strategic plan tends to lead, rather than follow, the strategic plans of other units in the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
Electrical fires often generate heat and smoke as quickly as conventional fires do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
Operating systems now cooperate with one another to perform authentication and authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
Surge protection is normally an add-on to a UPS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
Typical operating expenditures include buildings, land, equipment, and research and development costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
The costs of technology are usually high for developers and early adopters but then decrease slowly after introduction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
Computer and software purchases are capital expenditures, even though the expected useful lifetime of computer hardware and software has decreased in recent years because of rapid technological change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
Application firewalls improve security by shielding internal servers and resources from direct access by outside users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
Accurate data is the most important requirement for good configuration decisions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
​Some UPSs, particularly those with long delivery times, are designed to work with a computer's OS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
Typical ____ include salaries, rent, lease payments, supplies, and equipment maintenance.

A) capital expenditures
B) operating expenditures
C) infrastructure expenditures
D) infrastructure expenditures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
____ is the process of determining whether an authenticated user or process has enough rights to access a resource.

A) Access
B) Accounting
C) Authorization
D) Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ is the process of determining or verifying the identity of a user or process owner.

A) Authentication
B) Authorization
C) Accounting
D) Access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
A ____ is a measure of computer system performance while executing one or more processing tasks.

A) benchmark
B) requirement
C) standard
D) watermark
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.

A) performance requirements
B) storage requirements
C) user requirements
D) hosting requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
The starting point for determining hardware requirements is the ____ that will run on the hardware platform.

A) operating system
B) application software
C) transaction monitor
D) database system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
A ____ describes the resource or service utilization of an application program during execution.

A) transaction monitor
B) program profiler
C) software monitor
D) limit monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
In all cases, strategic plans must address the basic question "____?"

A) How did we get here
B) Where should we go
C) How do we get there from here
D) What brought us here
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.

A) program profiler
B) transaction monitor
C) software monitor
D) limit monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
​The main responsibility of ____ is to ensure efficient and reliable delivery of information services.

A) software administration​
B) system administration
C) ​system development
D) ​software development
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
The ____ represents units of work application software performs in terms of its demand for low-level hardware services.

A) resource contention model
B) resource overage model
C) application demand model
D) application utilization model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
A(n) ____ is a formal document sent to vendors that states requirements and solicits proposals to meet these requirements.

A) invitation to negotiate
B) request for quotation
C) request for bid
D) request for proposal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
System administrators can use the ____ utility to monitor hardware and software resource use in real time.

A) Task Manager
B) Performance List
C) Task List
D) Performance Monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ are programs or hardware devices that detect and report processing or I/O activity.

A) Monitors
B) Metrics
C) Benchmarks
D) Transactions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
The resources devoted to most organizational activities can be classified into two categories: ____.

A) capital expenditures and operating expenditures
B) capital investments and operating expenditures
C) capital controls and operating controls
D) capital resources and capital gains
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing financial reports.

A) Access
B) auditing
C) monitoring
D) certifying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
In computers, a ____ is a program or program fragment that infects a computer by installing itself permanently, usually in a hard-to-find location.

A) log
B) packet
C) packet
D) virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
____ are assets or resources expected to provide benefits beyond the current fiscal year.

A) Operating resources
B) System resources
C) Manage resources
D) Capital resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
The ____ composes the majority of an RFP.

A) requirements statement
B) performance statement
C) design statement
D) specifications statement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
The term ____ describes the way in which an organization uses resources to give it a major edge over its competitors.

A) strategic value
B) tactical value
C) competitive advantage
D) comparable advantage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
The simplest firewall type is a(n) ____ firewall, which examines each packet and matches header content to a list of allowed or denied packet types.

A) packet-filtering
B) stateful
C) application
D) inspecting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
The term ____________________ refers to execution speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
Capital resources are referred to as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
____ can be seen in the home when air conditioners, refrigerators, and electric dryers are started and cause a momentary dimming of lights.

A) Power sags
B) Power spikes
C) Power loops
D) Power blocks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
A(n) ____ is a device that provides power to attached devices in the event of external power failure.

A) generator
B) uninterruptible power supply
C) power filter
D) rectifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
A(n) ____ tracks the progress of complex client/server interactions.

A) application firewall
B) stateful firewall
C) packet-filtering firewall
D) proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
A(n) longer-term power sag that is often caused by the power provider is known as a ____.

A) blackout
B) grayout
C) brownout
D) green down
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
Information systems are a combination of hardware, system software, and ____________________ software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
Antivirus software uses data files, sometimes called "____," containing information about known viruses.

A) behaviors
B) heuristics
C) signature files
D) packets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
An RFP is generally considered a(n) ____________________ offer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
Providing infrastructure-based services to a wide variety of users requires adopting service ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
____________________ expenditures provide benefits only in the current fiscal year.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
In general, the humidity level of a room containing computer equipment should be near ____%.

A) 15
B) 25
C) 40
D) 50
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.

A) Viruses
B) Signatures
C) Logs
D) Infectors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
The ____________________ model describes a computer's capability to deliver resources to application software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
A(n) ____ is a server that handles service requests from external users of applications.

A) packet-filtering firewall
B) proxy
C) stateful firewall
D) application firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
A ____ is stored in a stand-alone executable program, is usually sent as an e-mail attachment and runs automatically when the attachment is opened.

A) Trojan
B) worm
C) macro
D) signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
A vendor's response to an RFP is a(n) ____________________ of the offer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
Requirements in an RFP should be categorized by ____________________ and listed completely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n) ____________________ is defined as a set of long-range goals and a plan to attain these goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
​List the three broad categories in which a typical information system (IS) administrator's tasks may be grouped.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
Hardware must also be protected against ____________________ resulting from excessive humidity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
In computer security, a(n) ____________________ is a hardware device, software, or a combination of hardware and software that prevents unauthorized users in one network from accessing resources on another network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
Until recently, applying patches and upgrades was a(n) ____________________ process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
Protection against power loss requires a(n) ____________________ power source.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
List three common capabilities of antivirus software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
Why is a raised floor often used in a room with multiple computer hardware cabinets?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
____________________ authentication methods are sometimes used instead of password-based authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
A(n) ____________________ detects incoming power surges and diverts them to ground in nanoseconds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
A(n) ____________________ monitors a specific performance or resource utilization aspect of an object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
Excessive heat can cause intermittent or total failure of electrical circuits, so all computer equipment needs some means of heat ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
Discuss why disaster planning is important and what measures are normally taken.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
​What, at a minimum, should goals for a strategic plan include?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
A(n) ____________________ monitor is a device attached directly to the communication link between two hardware devices, often used to monitor the use of communication channels, disk drives, and network traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
Low humidity levels increase the buildup of ____________________ electricity, which increases the likelihood of circuit damage caused by inadvertent static discharges.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.