skip to main | skip to sidebar

apporo ginz

apapun yang terjadi, berjuang sampai akhir adalah pilihan.

  • Entries (RSS)
  • Comments (RSS)
  • Home
  • About Us
  • Archives
  • Contact Us

Selasa, April 10, 2012

EVALUASI CCNA Discovery 1 chapter 1

Diposting oleh apporo ginz di 11:15:00 AM


Nama     :Egi Nurjito
Kelas     : 2P46
NIM      :11.240.0282
Evaluasi CCNA Discovery 1 Chapter 1
Chapter 1 - Personal Computer Hardware 
1. Applications can be grouped into general use software or industry specific software. What is example of industry specific software?


an educational tool
presentation
spreadsheet
word processing
database management


2. What characteristic of word processing software would make it a local application?


The application is shared between users.
The software is stored on the local hard drive.
The software is accessible through a web page.
The software has the ability to manipulate text and graphics.


3. Which three terms describe different types of computers?


operating system, network, desktop
laptop, desktop, Windows
laptop, desktop, mainframe
network, desktop, mainframe
laptop, desktop, mainframe
operating system, Windows, Linux


4. What are two benefits of connecting a laptop computer to a docking station?


Mobility is increased and less power is required.
Mobility is increased and an external monitor can be used.
An external monitor can be used and more wireless security options are available.
More wireless security options are available and alternate connectivity options may be available.
Alternate connectivity options may be available and an external monitor can be used.


5. Why do servers often contain duplicate or redundant parts?


Servers require more power and thus require more components.
Servers should be accessible at all times.
Servers can be designed as standalone towers or rack mounted.
Servers are required by networking standards to have duplicate parts.


6. What measurement is commonly associated with computer processing speed?


bits
pixels
hertz
bytes


7. What are two advantages of purchasing a preassembled computer?


usually a lower cost and exact components may be specified
usually a lower cost and extended waiting period for assembly
extended waiting period for assembly and adequate for performing most general applications
adequate for performing most general applications and usually a lower cost
suited for customers with special needs and exact components may be specified


8. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?


RAM
NIC
Video Card
Sound Card
Storage Device


9. Which adapter enables a computer system to exchange information with other systems on a local network?


Video Card
Sound Card
Modem Card
Network Interface Card


10. What is the main storage drive used by servers, desktops, and laptops?


tape drive
hard drive
optical drive (DVD)
floppy disk drive


11. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?


CPU
surge suppressor
motherboard
hard drive


12. What two functions does a UPS provide that a surge protector does not?


It protects the computer from voltage surges and it provides backup power from an internal battery.
It protects the computer from voltage surges and it protects the computer from sudden voltage spikes.
It provides backup power from an internal battery and it gives the user time to safely shut down the computer if the power fails.
It protects the computer from sudden voltage spikes and it gives the user time to phone the electrical company.
It provides backup power through a generator provided by the wall outlet and it gives the user time to phone the electrical company.


13. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?


RAM
CPU
Video Card
Sound Card
Operating System


14. What can be used to prevent electrostatic discharge (ESD)?


dry and non humid conditions
carpeted floor
grounding strap
uncluttered work space


15. Because of the potentially dangerous voltage levels, which two devices should you not open unless you have been specifically trained to work on them?


mouse and power supply
hard drive and monitor
microprocessor and keyboard
monitor and power supply
hard drive and power supply


16. In newer operating systems, how are system resources assigned by default when components are installed?


manually assigned by the operating system
manually assigned by the administrator
statically assigned by the component to a preset resource
dynamically assigned between the component and the operating system


17. A user reports that a peripheral device that was installed correctly last week has not been functioning since the PC was booted today. All other PC functions are working properly. What are three things a service technician should do to solve the problem?


  • Use the testing functionality on the peripheral itself, if available.
  • Verify that all cables are connected properly.
  • Disconnect all cables connected to the computer except those connected to the peripheral.
  • Disconnect all cables connected to the computer except those connected to the peripheral.
  • Ensure that the peripheral is powered on.
  • Disconnect the peripheral and verify that the computer is operating normally.
  • Use the testing functionality on the peripheral itself, if available.
  • Verify that all cables are connected properly.
  • Ensure that the peripheral is powered on.
  • Disconnect the peripheral and verify that the computer is operating normally.
  • Reload the computer operating system.
  • Disconnect all cables connected to the computer except those connected to the peripheral.
  • Disconnect all cables connected to the computer except those connected to the peripheral.
  • Use the testing functionality on the peripheral itself, if available.
  • Reload the computer operating system.


18. Which two steps should be performed when installing a peripheral device?


  • Download and install the most current driver.
  • Connect the peripheral using any cable and any available port on the computer.
  • Connect the peripheral using any cable and any available port on the computer.
  • Test the peripheral on another machine before installing it on the one where it will be used.
  • Test the peripheral on another machine before installing it on the one where it will be used.
  • Download and install the most current driver.
  • Download and install the most current driver.
  • Connect the peripheral using an appropriate cable or wireless connection.
  • Connect the peripheral using an appropriate cable or wireless connection.
  • Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.


19. How is a server different from a workstation computer?


The server works as a standalone computer.
The server provides services to clients.
The workstation has fewer applications installed.
The workstation has more users who attach to it.


20. Administrators at a multicampus college need access to their schedules wherever the administrators go. Which computing device would be the most appropriate?


PDA
Laptop
Desktop
Mainframe
Gaming Device


21. How many unique values are possible using a single binary digit?


1
2
255
256
Kirimkan Ini lewat Email BlogThis! Bagikan ke X Berbagi ke Facebook

0 komentar:

Posting Komentar

Posting Lebih Baru Posting Lama Beranda
Langganan: Posting Komentar (Atom)

Sponsored

  • banners
  • banners
  • banners
  • banners

Blog Archive

  • ►  2013 (3)
    • ►  Juni (2)
    • ►  Maret (1)
  • ▼  2012 (6)
    • ►  Juli (1)
    • ►  Juni (2)
    • ▼  April (3)
      • tugas jaringan komputer
      • EVALUASI CCNA Discovery 1 chapter 1
      • kode etik hacker

Followers

Pages

  • Beranda

Text Widget

apporo ginz. Diberdayakan oleh Blogger.
  • PERINTAH SHOW PADA ROUTER CISCO
    NAMA  : EGI NURJITO NIM      : 11.240.0282 KELAS :  4P45 PERINTAH PENUH PERINTAH SINGKAT KETERANGAN show r...
  • jarkom praktek powerlink
    NAMA  : Egi Nurjito NIM      : 11.240.0282 KELAS : 2P46 Denah lokasi  perhitungan anggaran link   ...
  • tugas jarkom chapter 3
    Nama : Egi Nurjito Kelas : 2P46 NIM  : 11.240.0282 JARINGAN KOMPUTER     Chapter 3 - Connecting to the Network 1. Which t...
  • tugas jarkom
    Nama : Egi Nurjito Kelas : 4p45 Nim : 11.240.0282 Kebutuhan terbesar adalah 58 host, maka dapat di akomodir dengan /26. De...
  • tugas jarkom chapter 4
    Nama : Egi Nurjito Kelas : 2P46 NIM  : 11.240.0282 JARINGAN KOMPUTER Evaluasi CCNA Discovery 1 Chapter 4 Chapter 4 ...
  • Tugas Jarkom3 Review Static Routing
    nama      : Egi Nurjito kelas      : 4P45 NIM      : 11.240.0282   Berikut adalah konfigurasi dari Router 1 , 2 dan 3 1. Ko...
  • tugas jaringan komputer
    Nama    : Egi Nurjito Kelas    : 2P46 NIM     : 11.240.0282 SISTEM OPERASI CCNA DISCOVERI BAGIAN 1   1. Pengantar B...
  • kode etik hacker
    Sebenarnya hacker memiliki manifesto dan kode etik yang menjadi patokan bagi hacker di seluruh dunia, tapi sayangnya budaya itu sudah mulai...
  • EVALUASI CCNA Discovery 1 chapter 1
    Nama     :Egi Nurjito Kelas     : 2P46 NIM      :11.240.0282 Evaluasi CCNA Discovery 1 Chapter 1 Chapter 1 ...

Mengenai Saya

Foto saya
apporo ginz
kebahagiaan tidak akan pernah habis jika anda membaginya, karena kebahagian akan hadir jika anda mau berbagi.
Lihat profil lengkapku

Pengikut

Blog Archive

  • ►  2013 (3)
    • ►  Juni (2)
    • ►  Maret (1)
  • ▼  2012 (6)
    • ►  Juli (1)
    • ►  Juni (2)
    • ▼  April (3)
      • tugas jaringan komputer
      • EVALUASI CCNA Discovery 1 chapter 1
      • kode etik hacker

Definition List




apporo ginz

Download

 

© 2010 My Web Blog
designed by DT Website Templates | Bloggerized by Agus Ramadhani | Zoomtemplate.com