• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred to as:

Boot sequence

After a normal system shutdown, when the computer is turned off, contents of the memory used to store BIOS settings are:

Stored in page file

What is LoJack?

Security feature used for locating stolen desktops, laptops, or tablets

Which of the following terms refers to a technology that allows for storing passwords, certificates, or encryption keys in a hardware chip?

Trusted Platform Module (TPM)

Which of the following are power management specifications? (Select two answers)

.

In modern PCs, the procedure of replacing BIOS contents in order to upgrade to a newer version is sometimes referred to as:

Flashing the BIOS

Which of the following acronyms refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?

POST

What kind of security features can be set in BIOS? (Select all that apply)

.

A computer supporting LoJack technology has two main components installed: an Application Agent residing in the operating system which sends tracking signals to the monitoring center allowing the law enforcement to locate and recover stolen device, and Persistence Module which restores the Application Agent and allows it to survive operating system re-installation or hard drive format. The highest level of security offered by LoJack can be achieved when Persistence Module resides in:

Partition gap on the hard drive

Which of the following is an example of firmware?

Basic Input / Output System (BIOS)