Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 6. A user has opened a word processor, typed the numbers 123456789, and stored the document as a file called report1.
A. used for short-term memory E. is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? A. The CPU tells the RAM which address holds the data that the CPU wants to read 6.
The power lines in the system bus transfer power from the motherboard’s connection to the power supply to the integrated circuits (ICs or chips) and expansion boards connected to the motherboard. The control lines in the system bus controls the transmission and movement of information between devices connected to the motherboard. The address bus is used to “pick up” information from the correct memory location among the gigabytes of RAM in computer systems and “deliver” new programs and changes to the
The actual machinery - wires, transistors and circuits is called hardware; the instructions and data are called software. All general purpose computers require the following hardware components: (i) Central Processing Unit (CPU): The ‘brain’ of the computer, the component that actually executes instructions. (ii) Memory : It enables a computer to store, at least temporarily, data and programs. (iii) Input device : Usually a keyboard or mouse is used to read data and programs into the computer. (iv) Output device: A display screen, printer, etc.
Firmware is software contained in ……. chips. 7. Instructions that control much of the computer’s input/output functions, such as communicating with disks, RAM, and the monitor kept in the System ROM chips, are known as the……. .
To boot from an image transmitted over the network by a WDS server, a workstation must have a network adapter that supports _____. PXE – Pre-boot Execution Environment 9. The deployment scenario in which you save a workstation's user state data, wipe its disk, install Windows 7, and then restore the user state data is called the _____ scenario. Refresh of the computer 10. A _____ image enables a workstation to boot from a disk and connect to a WDS server.
1) Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine? RAM * CPU video card sound card operating system 2) What are two advantages of purchasing a preassembled computer? (Choose two.) * usually a lower cost exact components may be specified extended waiting period for assembly * adequate for performing most general applications suited for customers with special needs 3) A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
This has led to a plethora of more or less standardized file structures for all imaginable purposes, from the simplest to the most complex. Most computer files are used by computer programs which create, modify or delete the files for their own use on an as-needed basis. The programmers who create the programs decide what files are needed, how they are to be used and (often) their names. Explain how an operating system manages multiple processes… Memory management is the function of a computer operating system responsible for managing the computer's primary memory. The memory management function keeps track of the status of each memory location, either allocated or free.
Malware Policy Procedure Guide Being malware-free means your computer is free from malicious malware such as viruses, worms, Trojan horses, ransomware, spyware, adware. Users can demonstrate their computers or device are malware-free by ensuring they have up-to-date antivirus protection system installed on the computer and running a scan of the computer. Ensure you have up-to-date antivirus software; perform a complete scan of all network drives at least weekly; and enable boot time protection. Perform quick scans daily. IT department should ensure firewalls are in place and configured to filter the traffic as it comes through.
Manages Applications – each OS installs, uninstalls, runs applications and manages the interface to the hardware for an application. 4. Manages Hardware – each OS manages the permanent programs and memory. All three OS’s also diagnose software and hardware problems and interpret the needs of each. With the similarities in the forefront of our minds, let us delve into the depth of the differences in the Linux, Mac, and Windows operating systems.