Free Essay

Tb143 Review Questions Chapter 4

In:

Submitted By xreymason
Words 289
Pages 2
1. A,B,C,E The motherboard is essential to computer operation in large part because of the two major buses it contains: the system bus and the I/O bus. Together, these buses carry all the information between the different parts of the computer. 2. A,C Motherboards use expansion slots to provide support for additional I/O devices and high- speed video/graphic cards. The most common slots are PCI, AGP, and PCI-Express. 3. A,B,C,D SCSI is a more diversified driver interface that can use non-hard disk drives. 4. A,B,C The ATX family of motherboards has beat desktop comp. designs since late 1990. ATX- Advanced Technology Extended, replaces AT and Baby-AT. 5. G Motherboards in the ATX and BTX families have integrated I/O ports; including including serial, parallel, USB, PS/2, etc. 6. D Install the sound card then connect 1/8 in mini-jack cables from speakers and microphone to sound card. 7. B DDR SDRAM has 184 corresponding pins, the older version SDRAM has 168 pins. 8. A The most common speed for PCI is 33MHz, although it can vary determined by different variables. 9. C PCI Express has 4 major types of ports; x1,x4,x8,x16. 10. B AGP x4 can transmit 1066 MBps, but PCIe x1 can only transmit 500 MBps. 11. A SATA 2nd gen. goes at 3GBps 12. A,C Always turn off power before unplugging the ribbon cables. 13. A,D If comp. doesn't start check all connections; main power, CPU, RAM, and video card. 14. B The headphone connection is a shade of green. 15. C Before turning on the computer connect all the cords for the card.

Similar Documents

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18