IT Essentials Final Exam Chapter 11-16 Ujian Jurusan TKJ

0
3/04/2013 03:40:00 PM


1.Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
•    23;
•    25;
•    107;
•    110;
•    143;
•    212.
2.Which interface can transfer data at a maximum speed of 480 Mbps?
•    Parallel;
•    Serial;
•    SCSI;
•    USB 2.0;
•    IEE 1394.
3.  Refer to the exhibit. Based on the information shown, which statement is true?
•    The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.
•    The only PC allowed to make changes on the wireless router is the one with the MAC address 00:05:4E:49:64:87;
•    The only PC that has its data encrypted when sending traffic over the wireless network is the one with the MAC address 00:05:4E:49:64:87;
•    The only PC that has to authenticate with a userid and password to gain access to the wireless network is the one with the MAC address 00:05:4E:49:64:87.
4.When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
•     lubricating grease;
•    thermal compound;
•    adhesive gel;
•    penetrating oil.
5.Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
•    card keys;
•    security guards;
•    security key fobs;
•    biometric devices.
6.Which Startup type must be selected for a service that should run each time the computer is booted?
•    automatic;
•    boot;
•    manual;
•    start;
•    startup.

Continue reading →

0 komentar:

IT Essentials Chapter Windows 7

0
3/04/2013 03:03:00 PM

1. A PC that running the Windows 7 operating system has slowed down over a period of time and now takes a long time to launch applications and open various documents. What can be done to remedy the problem?
•    Run CHKDSK;
•    Run Dr.Watson;
•    Run System Restore;
•    Run Disk Defragmenter.
2.After using a Windows7 installation DVD to upgrade a PC from Windows Vista to Windows7, a user finds that the DVD drive is no longer recognized. What is the probable cause of the problem?
•    The Windows registry cannot initialize;
•    The file system does not support the DVD drive;
•    The UAC setting is too high  for basic computing;
•    A registry error prevents Windows 7 from recognizing the DVD drive.
3.A user notices that some of the programs that are installed before upgrading to Windows7 no longer function properly. What can the user do to fix this problem?
•    Change the file system to FAT16;
•    Update the driver for the graphics card;
•    Reinstall the programs in Compatibility Mode;
•    Lower the UAC setting in the Change User Account Control settings dialog box of the  User Accounts control.

Continue reading →

0 komentar:

IT Essentials Chapter 16

0
3/04/2013 03:01:00 PM

1. Which two advanteges are attributed to a hardware firewall when compared to a software firewall?(chose two)
• It costs less because it is more efficient;
• It does not impact the processing performance of the equipment it protects;
• It always protects both the computer it is installed on as well as the rest of the network;
• It is designed to protect more than one computer; 
• It is a free windows operating system component.
2.Why would security application software be implemented on a network?
• To protect the operating system;
• To limit physical acces to a network;
• To define acceptable computer usage within an organization;
• To identify appropriate hardware firewalls that are used to filter incoming data.
3.Which important feature is offered by the USB standard?
• A single USB connection to a computer can support up to 255 separate devices;
• It offers rates of around 580Mb/sec in low-speed mode;
• It allows up to 920Mb/sec in the 2.0 version;
• It can supply power from the computer to devices.
4.Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (choose two)
• ARP
• DLC
• MD5
• NTP
• SHA
• TCP
Continue reading →

0 komentar:

Ebook PHP

0
3/03/2013 02:26:00 PM
Buat yang mau belajar PHP dan HTML dasar. Ditambah Lagi dengan materi MySQL bisa download Ebook di bawah ini.




Continue reading →

0 komentar:

Penyebab CPU Usage Tinggi

0
3/03/2013 01:41:00 PM
CPU Usage 100% pada komputer adalah hal yang umum terjadi setelah penggunaan yang sekian lama.Hal ini bisa terjadi karena terlalu tinggi dan terus menerus CPU harus menyelesaikan permintaan proses sehingga memakan resource hingga mencapi usage maksimal alias 100%.

Jika Anda memang sedang menjalankan banyak aplikasi secara bersamaan sih mungkin wajar saja.Namun yang menjadi masalah adalah jika komputer masih dalam keadaan idle saja CPU Usage sudah tinggi,dan tiba tiba melonjak menjadi 100% hanya karena membuka explorer.Kalau sudah begini komputer tidak lagi bersahabat,performance menjadi lambat dan sering hang karena prosesor kepanasan.
Jika Komputer anda mengalami masalah CPU USAGE 100% seperti ini,jangan didiamkan saja karena akibatnya bisa merembet merusak hardware tertentu.Segera lakukan tindakan agar kerusakan tidak menjadi lebih parah lagi.


Continue reading →

0 komentar: