100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SEC 275 GFACT EXAM QUESTIONS AND ANSWERS $12.99   Add to cart

Exam (elaborations)

SEC 275 GFACT EXAM QUESTIONS AND ANSWERS

 0 view  0 purchase
  • Course
  • GFACT
  • Institution
  • GFACT

SEC 275 GFACT EXAM QUESTIONS AND ANSWERS

Preview 3 out of 25  pages

  • November 1, 2024
  • 25
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • GFACT
  • GFACT
avatar-seller
GEEKA
SEC 275 GFACT EXAM QUESTIONS AND ANSWERS
The key component of a computer system, which contains the circuitry necessary to
interpret and execute program instructions - Answers- CPU (Central Processing Unit)

Motherboards typically come in different, but standard, sizes. PC cases usually come
with holes pre-drilled for motherboards to attach to with screws.
The various sizes of a motherboard are: - Answers- E-ATX: The largest size, known as
'extended ATX'.
ATX: The 'standard' size.
micro-ATX: Smaller than ATX.
mini-ITX: Even smaller still.

On the motherboard, the connection points for chips are referred to as _____. -
Answers- Sockets

Collection of wires that carry signals between various components of the computer
system _____ - Answers- buses

What are the nearby peripherals to the CPU? - Answers- Arithmetic Logic Unit
Control Unit
Address Generation Unit
Memory Managment Unit

CPU Cores - Answers- A multi-core processor is a single computing component with
two or more independent actual central processing units which are the units that read
and execute program instructions.

What does USB stand for? - Answers- Universal Serial Bus

How many bits are in a byte? - Answers- 8 bits in a byte

______________________ is a way to fit data of a specific format, shape and size and
make sure it works over a specific transfer mechanism or storage mechanism. Think of
it as packaging. - Answers- Encoding

A file header is which of the following?
A. A unique set of characters at the beginning of a file that identifies the file type
B. A unique set of characters following the file name that identifies the file type
C. A 128-bit value that is unique to a specific file based on its data
D. Synonymous with the file extension - Answers- A. A unique set of characters at the
beginning of a file that identifies the file type

Boolean logic - Answers- A form of mathematics in which an expression is reduced to
either True or False.

,File Systems and Hard Drives - Answers- NTFS, FAT32, ext4, HFS+, APFS

NFTS permissions - Answers- A Windows method to share a folder or file over a
network and can apply to local users and network users. The folder or file must be on
an NTFS volume. Compare with share permission.

exFAT (Extended File Allocation Table) - Answers- A 64-bit version of the file allocation
table file system designed for use on large USB flash drives.

HFS+/APFS - Answers- HFS+ is a journaling system developed by Apple Inc. and
APFS is another but more encrypted Apple journaling system

ext3 and ext4 - Answers- File systems commonly used by Linux/Unix

SaaS (Software as a Service) - Answers- Services for delivering and providing access
to software remotely as a web-based service

IaaS (Infrastructure as a Service) - Answers- A service model in which hardware
services are provided virtually, including network infrastructure devices such as virtual
servers.

PaaS (Platform as a Service) - Answers- A service model in which various platforms are
provided virtually, enabling developers to build and test applications within virtual, online
environments tailored to the specific needs of a project.

What can you manage on an IaaS? - Answers- Applications, Data, Execution,
Middleware, O/S

_____________ provides the capabilities to normal applications for hardware
interactions or more core functions on your system, like opening data on a disk. -
Answers- The kernel

The Kernel - Answers- The kernel is the first part of the operating system code to be
loaded, and has complete control over the computer. It is responsible for controlling
access to the computer's most sensitive information and functionality, and is loaded into
a protected region of memory to prevent accidental or malicious corruption by other
programs.
The kernel is responsible for the loading of new programs, handling input and output
between peripherals, and managing access to the hardware's shared resources, such
as the RAM and hard drive.

What is a Process? - Answers- A series of actions or steps taken in order to achieve a
particular end.

, Each time you run a program on your computer, a new process will be created in order
for the program to serve the purpose you intend, which, in this case, would be surfing
the internet. Some programs even create many processes in order to get more work
done.

____________ are a key part of how computers switch tasks and ask for things to
happen. - Answers- Interrupts

What is an interrupt? - Answers- Signal from hardware or software indicating that an
event has occurred or that a process needs attention.

Hardware Interrupt - Answers- A signal to the CPU indicating a device needs attention.
For example, a mouse click or a keystroke.

Software Interrupt - Answers- In general, any instruction that causes exception
processing to occur when it is executed; such instructions may be used to request the
use of system services/resources

The bootloader is - Answers- a program that is loaded by the BIOS when a computer is
first turned on, and is responsible for loading the operating system.

A bootloader is necessary due to the complexity that would be involved in creating a
BIOS capable of loading hundreds of different operating systems. Due to this, the
bootloader is usually installed at the same time as the operating system, and is loaded
from a known place on the hard drive by the BIOS.

BIOS/UEFI - Answers- is a program stored on the motherboard of your computer.
When the computer is first turned on, it is the first program that is loaded, and prepares,
or initializes, the hardware ready to load the bootloader.

What is virtualization? - Answers- is a layer that separates the hardware and OS,
enabling more than one OS to share the same resources.

is where we create a virtual computer or 'virtual machine' out of software that behaves
like a separate computer.

What is a hypervisor? - Answers- software that creates and manages a virtual machine
on a host machine

What is a USB connection type that is reversible when connecting to it?
USB A
USB B
USB C
Micro USB
Mini USB - Answers- USB C

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85169 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart