What is the purpose of the boot loader

Assignment Help Basic Computer Science
Reference no: EM13840659

Question 1. What is the purpose of the boot loader during the boot-up process? A. It finds the computer operating system and loads it into memory. B. It scans the hard drives for disk errors that will prevent the OS from loading. C. It loads the BIOS into memory to allow configuration changes to be made. D. It scans the computer for malware and viruses to protect the BIOS.

Question 2. Your organization wants to implement a 5-year rotation plan of your computing devices. What percentage of your computer fleet will you have to replace every year in order to achieve this? A. 5 B. 10 C. 20 D. 50

Question 3. You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next? A. The computer will restart the boot process from the beginning. B. The computer will immediately load the boot loader. C. The computer will save the changes in the computer's registry also. D. The computer will check for firmware updates on the Internet.

Question 4. Data for which there is temporarily no room in RAM is diverted to where on your computer? A. The paging file on the hard drive B. The system file on the hard drive C. The memory file on the hard drive D. The CPU cache

Question 5. Which selection below has the greatest storage capacity? A. 30 CDs B. 2 DVD DLs C. 7 DVDs D. 1 BD

Question 6. You want to set up your computer so that it attempts to boot from your USB drive before it boots from the internal hard drive. Where would you configure this? A. Windows Control Panel B. Windows Computer Manager C. Computer BIOS D. The CPU Control Application

Question 7. Which of the devices below is an input device? A. A plotter B. A Digital Scanner C. A monitor D. A flat panel

Question 8. Your mom found some optical drives that are labeled as "R." She asks you what that means. What do you tell her? A. The R indicates that the disks are Read Only. B. The R indicates that the disks are Radiant compliant. C. The R indicates that the disks can only be written to once. D. The R indicates that they are 3rd generation and take 64-bit only.

Question 9. What type of product does AMD manufacture? A. Power supply B. CPU C. Motherboard D. SATA drive

Question 10. In order to install a device, the operating system needs the required __________ for that device. A. certificate B. digital signature C. plotter D. driver Question 11 of 20 0.0/ 5.0 Points Which type of device below would you most likely consider installing a SCSI disk in? A. A server B. A notebook C. A laptop D. A desktop

Reference no: EM13840659

Questions Cloud

Do directors face for a breach of fiduciary duty : What consequences, if any, do directors face for a breach of fiduciary duty? Brown, the president and director of a corporation engaged in owning and operating a chain of motels, was advised, on what seemed to be good authority that a superhighway wa..
How does an individual form a corporation : Why would an individual choose to form a business as a corporation as opposed to a sole proprietorship? How does an individual form a corporation? How does a company become a "public" company? What are some of the differences between private and publ..
Principles of respect for autonomy-nonmaleficence-beneficenc : Major principles of health care ethics include the principles of respect for autonomy, nonmaleficence, beneficence, and justice. Consider the following ethical dilemma: Your patient was recently diagnosed with a rare cancer that has invaded his liver..
Create an original code of ethics and evaluation paper : create an original Code of Ethics and Evaluation Paper
What is the purpose of the boot loader : What is the purpose of the boot loader during the boot-up process
Why time-series designs useful in criminal justice studies : Why are time-series designs useful in Criminal Justice Studies
Appellate court respond to mills constructions argument : How did the appellate court respond to Mills Construction’s argument? Who are the stakeholders in the Miller case, and how might they be impacted by this breach? What are some differences and examples of material and immaterial breaches you can think..
Prepare a detailed design document for the user interface : Prepare a detailed design document for the user interface for your project. Your design document should be based on your Project Requirements and Scope document and your Project Design proposal.
Create production plan and calculate the cost of the plan : Demand for Quigley Pops follows an up-and-down pattern over the four quarters of a year, with peaks in the spring and winter months when special promotions are held. Production is handled by a highly skilled local workforce during a regular 40-hour w..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that reads a number n

Write a program that reads a number n from the keyboard and then reads n2 integers into an n-by-n two dimensional array and checks to see if the numbers form a magic square.

  How to simulate

Here, each line is a process. First int is ID, second integer is CPU time. CPUunitQ is a queue that stores the index # for available cpu units. How to simulate?

  Wal-marts stance on corporate social responsibility

Describe the Wal-Mart's stance on corporate social responsibility (CSR) and Discuss the connection between the CSR program and why it is necessary to the specific industry.

  Activity diagram of each step of ordering pizza

Draw an activity diagram representing each step of the process; from the moment you pick up the phone to the point where you are eating the pizza.

  Ease of access or speed of processing

Security of your data is of utmost importance to Jamie, even more so than ease of access or speed of processing. Which type of application category would you recommend Jamie use?

  Write a paper that defining computer science

Write a paper that defining Computer Science and the kinds of jobs that computer scientists do.

  Briefly explain who a hacker is

Briefly explain who a hacker is and what the activities of a hacker are?

  Write java statement display string 100 in dialogbox

Write a Java statement to display the string "The value is 100" to a user in a plain dialog box.

  Sort the arraylist using the sort method associated

Sort the ArrayList using the sort method associated with the ArrayList and then display the sorted data in a second control. It should use visual basic langage.

  Write a checkout class that stores a three digit patron id

Write a checkout class that stores a three digit patron id, a ten character string for books id, a long showing the time that the book was checked out. the class should provide output and input operations and also equal() function.

  Assignment concerns consumer profiling

The third participation assignment concerns consumer profiling! The attached article "What do firms know about you? FTC would pull back the curtain," by Craig Timberg from the Washington Post of 5-28-14 has some details. There are three questions ..

  Write a technical report for m-globals upper management

Write a technical research report for M-GLOBAL's upper management. The topic you have been assigned is the wireless sensor network industry.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd