• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back

A PC problem diagnosis utility suite is designed to identify problems with:




A. hardware


B. Application Software


C. Operating system software


D. all of these

all of these

T or F? Disk fragmentation indicates that a PC's hard drive may be about to fail?

F

T or F? Open source, freeware, and shareware utilities are not commercial products.

F



A _______ is a legal contract between a vendor and a user that governs the use of a software package, such as a utility program.

License agreement, software license, EULA

T or F? a software utility advertised as a free download is freeware that can be used without paying a license fee.

F

A software utility tool of primary use to a support specialist who assembles or installs hardware systems is:




A. a patch utility


B. a software audit tool


C. a file backup utility


D. a burn-in utility

burn-in utility

Which category of utility tools prepares documents tha would likely be included in a site installation notebook?




A. system information


B. rootkit monitor


c. bandwidth tester


D. network analyzer

system information

Which of these actions should be performed on a PC prior to using a Windows Registry edit utility?




A. defragment the hard drive


B. Back up the registry onto a disk drive


C. Temporarily disable the system's firewall


D. Verify that the system patch status is up-to-date.

back up the registry onto a disk drive

A type of utility tool that can modify which software is launched automatically at start-up is;




A. a benchmark utility


B. an autoruns utility


C. an audit utility.


D. a bootinfo utility.

an autoruns utility

T or F? Versions of the windows operating system after windows 2000 do not have a command-line prompt feature.



F

T or F? a dashboard is a display of network performance information and fault warnings that a network administrator uses to monitor network operation.

T

A _______ tool is a utility that inventories the software versions installed on a PC to determine compliance with licensing agreements.

audit

T or F? a PC may be vulnerable to attacks from the internet if some patches have not yet been downloaded and installed.

T

a utility software tool designed to clean up a failed software installation is:




A. an undelete utility


B. a disk clean utility


C. an uninstaller utility


D. a diagnostic utility

an uninstaller utility

List two examples of common network bottlenecks that utility software tools might be able to delete.

heavy packet volumes, external denial-of-service attacks, processor or memory overload, contention for disk accesses

T or F? before a user recycles a PC, he or she must physically destroy the hard disk in order to obliterate sensitive personal information.

F

a backup utility can write copies of important data files and folders on:




A. an internal hard disk


B. a network server's disk drive


C. an internet server


D. any of these



any of these

A _____ utility rewrites all the files and folders on a disk drive so they are stored in contiguous sectors in order to improve disk performance.

DEFRAGMENTATION

A ______ is software that can attach itself to other software or to disk media and caus eharm to the programs and data stored on a PC.

VIRUS

List three activities that can be performed by a system tune-up utility to improve system performance.

defragment disks, clean registry, manage start-up applications, analyze and repair disk and file errors, optimize windows configuration and settings

T or F? a firewall is hardware or software designed to prevent unauthorized attempts to penetrate a computer system from outside a network.

T