Purpose of the boot loader during the boot-up process?

Assignment Help Basic Computer Science
Reference no: EM13842001

Question 1  What is the purpose of the boot loader during the boot-up process?

A. It finds the computer operating system and loads it into memory.

B. It scans the hard drives for disk errors that will prevent the OS from loading.

C. It loads the BIOS into memory to allow configuration changes to be made.

D. It scans the computer for malware and viruses to protect the BIOS.

Question 2  Your organization wants to implement a 5-year rotation plan of your computing devices. What percentage of your computer fleet will you have to replace every year in order to achieve this?

A. 5

B. 10

C. 20

D. 50

Question 3  You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next?

A. The computer will restart the boot process from the beginning.

B. The computer will immediately load the boot loader.

C. The computer will save the changes in the computer's registry also.

D. The computer will check for firmware updates on the Internet.

Question 4  Data for which there is temporarily no room in RAM is diverted to where on your computer?

A. The paging file on the hard drive

B. The system file on the hard drive

C. The memory file on the hard drive

D. The CPU cache

Question 5  Which selection below has the greatest storage capacity?

A. 30 CDs

B. 2 DVD DLs

C. 7 DVDs

D. 1 BD

Question 6  You want to set up your computer so that it attempts to boot from your USB drive before it boots from the internal hard drive. Where would you configure this?

A. Windows Control Panel

B. Windows Computer Manager

C. Computer BIOS

D. The CPU Control Application

Question 7  Which of the devices below is an input device?

A. A plotter

B. A Digital Scanner

C. A monitor

D. A flat panel

Question 8  Your mom found some optical drives that are labeled as "R." She asks you what that means. What do you tell her?

A. The R indicates that the disks are Read Only.

B. The R indicates that the disks are Radiant compliant.

C. The R indicates that the disks can only be written to once.

D. The R indicates that they are 3rd generation and take 64-bit only.

Question 9  What type of product does AMD manufacture?

A. Power supply

B. CPU

C. Motherboard

D. SATA drive

Question 10  In order to install a device, the operating system needs the required __________ for that device.

A. certificate

B. digital signature

C. plotter

D. driver


Question 11  Which type of device below would you most likely consider installing a SCSI disk in?

A. A server

B. A notebook

C. A laptop

D. A desktop

Reference no: EM13842001

Questions Cloud

Explain the importance of data integrity : Describe strategies that are used to ensure the accuracy and safety of data entered into information systems used in nursing practice. Explain the importance of data integrity for health care institutions. Summarize how information technology contri..
What is a chief concern of cloud computing : What is a chief concern of cloud computing
Create a project transition plan : When a project is ready to be deployed, a transition plan can help the transfer of ownership from the project team to the customer or organization that requested the project. Complete the following: For the given scenario, create a project transiti..
Describe some way that lei could have avoided this situation : Based on the section about Communication Pitfalls in the Bateman and Snell text, describe some ways that Lei could have avoided this situation
Purpose of the boot loader during the boot-up process? : purpose of the boot loader during the boot-up process?
Identify communications problems to avoid : Watching a scenario about Sandwich Blitz, Inc. and composing a paper about communication about a major change in Sandwich Blitz's use of technology to resolve a problem. Identify communications problems to avoid
What management errors were committed : What management errors were committed. What other options could Kathy and Sam have considered to fill this position that might have led to a more successful hiring decision
Propose an hr strategy : Propose an HR strategy that would help ensure mangers know what type of information should be documented and what information they should avoid putting in an employee file. Be sure to support your recommendations with information from the text or..
Prepare a program for business automation application : Normal 0 false false false EN-US X-NONE X-NONE a business automation applic..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate and display the total income of the abc car shop

Write an algorithm in structured English (pseudocode) that describes the steps required to perform the task specified. Some examples of pseudocode can be found at http://www.unf.edu/~broggio/cop2221/2221pseu.htm.

  Frequent shopper program

Frequent Shopper Program

  Limitations of the use of ai technologies

Determine some of the limitations or dangers you see in the use of AI technologies such as expert systems, virtual reality, and intelligent agents?

  What are the estimated cell yield coefficients based

The composition of the off-gas on a volumetric basis is listed below. What are the estimated cell yield coefficients based on ammonia and oxygen for the consumption of glucose? 4.7 PROBLEMS 115 Substrate % nitrogen % carbon dioxide % oxygen glucos..

  What are the overall benefits of having professional codes

What are the overall benefits of having professional codes? Do the benefits outweigh the disadvantages of not having them? Find a current case involving ethical standards.

  The sum of a geometric sequence to calculate

Use the formula for the sum of a geometric sequence to calculate

  Criteria for adaptive approaches to system development

Let the criteria for choosing among adaptive approaches to system development. Which CSS project characteristics favor predictive approach? Which favor UP?

  What steps would karina take to validate and globalize

What steps would Karina take to validate and globalize the website?

  Relates part of the grammar to a requirement

question1: Given the following grammars with start symbol , specify the type (0, 1, 2 or 3) of each  one and give a reason that relates part of the grammar to a requirement for the grammar type. Note:  while technically any grammar is Type 0, the..

  News article regarding denial of service attack

Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.Summarize the article using at least 500 words.The key to this assignment is to demonstrate your understanding of th..

  Create a plot of a cubic spline fit

Create a plot of a cubic spline fit of following data with natural end conditions: x 0 100 200 400f(x) 0 0.82436 1.00000 0.73576. compare the plot with the following equation which was used to create data.

  Newly released vulnerabilities on a daily basis

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber security professionals to stop that from happening.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd