... substantial speedup by doubling
its RAM.
B.
The swap space may be safely eliminated.
C.
The administrator should use the swapon command to activate
more use of the existing swap space.
D.
Available ... computers—which are actu-
ally far more powerful than the mainframes of just a few years ago. Because
of its mainframe heritage, Unix (and hence also Linux) scales well to perform
today’s demanding ... Chapter 4 for more
information.
8.
B. In 2001, all major Debian-based distributions use not just the
Debian package system but many Debian component packages as a
starting base. Debian is available...
... reading the book. The answers
to this test appear on a separate page after the last question. Each answer
also includes an explanation and a note telling you in which chapter this
material appears.
In ... this training material and specifically disclaims any warranties of merchantability or fitness for
a particular purpose. CompTIA makes no guarantee concerning the success of persons using any such ... workgroups. A
workgroup
is a collection of individuals (a sales department, for example)
who share the same files and databases over the LAN. Figure 1.1 shows an
example of a small LAN and its...
... financial and publicity-related implications of an effective DoS attack are
hard to measure—at best they are embarrassing, and at worst they are a deathblow.
Companies reliant on Internet traffic and ... Instant
Messaging (IM), Oracle, and almost any other password that is trans-
mitted in the clear. Another tool, mailsnarf, will grab any and all e-mail
messages it sees, and store them in a standard ... Accounts and create a
new account. In the appropriate screens, enter e-mail
sam.carter@sgc.com, name Sam Carter, mail.destinationdomain.com as
the mail server, and anything in the username/password...
... aspects and importance of safety and environmental issues
Identify potential safety hazards and take preventative action
Use Material Safety Data Sheets (MSDS) or equivalent documentation and ... upgrade and optimize hardware, software and data security for example:
BIOS
Smart cards
Authentication technologies
Malicious software protection
Data access (basic local security ... you’ll find sample exams
for each of the A+ exams. Take these practice exams just as if you were actually taking the A+
exams (without any reference material).
Depending on what edition of...
... bidirectional parallel port has one important advantage over a standard
parallel port: It can both transmit and receive data. These parallel ports are capable of interfac-
ing with such devices as external ... and Characteristics
of Adapter Cards
An adapter card (also known as an expansion card) is simply a circuit board you install into
a computer to increase the capabilities of that computer. Adapter ... multithreading (SMT). SMT takes advantage of a modern CPU’s super-
scalar architecture. Superscalar processors are able to have multiple instructions operating on
separate data in parallel.
HTT-capable...
... ThinkPad series of laptops?
A. Touchpad
B. Touchball
C. Touchpoint
D. Touchway
5. Which laptop accessory allows you to power your laptop from a car or airplane?
A. AC adapter
B. DC adapter
C. Battery ... examining some preventative maintenance recommen-
dations and issues.
Exam Essentials
Know how many pins an IDE/PATA/ATA-5/ATA-6 cable has. A cable for use with these
technologies has 40 pins. You’re ... Another primary concern is heat. Restricted space means less airflow, meaning parts
can heat up and overheat faster.
To overcome space limitations, laptop parts are physically much smaller and lighter,...
... see what updates are available. It compares the
update list to the updates that have already been applied to the computer or have been
refused by the administrator.
3. If updates are available, ... you make
a backup, ensure that you can read from it. If you’ve just backed up a small amount of data,
restore it to an alternate location and make sure you can read it. If you are backing up ... HAL, or the Hardware Abstraction Layer, is the translator between the hardware and the
operating system.
20. B. Task Manager will show you a list of running processes and applications and allow...
... local and wide area. Local wireless is usually available
within a particular room or building only. Once you leave that area, it is no longer available. Local
wireless has an operating range ... through a layer, the layer tacks its information
TABLE 8.1 Topologies—Advantages and Disadvantages
Topology Advantages Disadvantages
Bus Cheap. Easy to install. Difficult to reconfigure. Break in ... data, and controls the flow of data. It can also receive and translate data
into bytes for the CPU to understand. It communicates at the Physical layer of the OSI model and
comes in many shapes...
... potential safety hazards and take preventative
action
Use Material Safety Data Sheets (MSDSs) or equivalent
documentation and appropriate equipment documentation
Use appropriate repair ... body and
keeps it at a zero charge. Figure 10.3 shows the proper way to attach an anti-static strap. There
are several varieties of wrist straps available. The one in Figure 10.3 uses a banana ... in any way for exercising their rights
under the Occupational Safety and Health Act.
Safety Plans
It’s recommended that your company create and follow a workplace safety plan. Having a
safety...
... were all the rage a few years ago and are still popular today. Also readily
available are infrared keyboards and printers. Perhaps some of the most useful infrared
devices are keyboards for PDAs. ... occur and the
device is unavailable.
Certain DMA channels are assigned to standard AT devices. DMA is no longer as pop-
ular as it once was, because of advances in hardware technology, but it is ... access (DMA) allows a device to bypass the CPU and place data directly into
RAM. To accomplish this, the device must have a DMA channel devoted to its use.
All DMA transfers use a special area of...
... active partition. Often this is also a primary partition
and the first partition created on a hard drive.
4. D. A logical partition is any partition that has a drive letter. It can be primary, active, ... to install over an application that already exists, or when you’re trying
to replace a file that already exists but that another application is using. When you’re
installing an application, ... fixed easily, or the fix may result
in only a temporary solution. Usually such a case calls for a complete formatting and reinstalla-
tion of the OS and applications, and restoration of data. However,...