Which of the following is not a step in the post process

Assignment Help Computer Engineering
Reference no: EM13946513

Part A:

1. True or false? The BIOS and CMOS are the same thing.

2. The battery shown in the following graphic is used to provide power to what component?

A. BIOS

B. CMOS

C. Firmware

D. RAM

3. True or false? The same key combination will get you access to the system utility on all personal computers, except laptops.

4. Which is not a reason to update your system BIOS?

A. Your system has device problems or other bugs that your PC manufacturer identifies as being caused by BIOS problems.

B. Your system has device problems that you can attribute to no other cause than the BIOS.

C. You need to use new hardware options that, while supported by your motherboard, aren't supported by your BIOS.

5. True or false? Every BIOS manufacturer uses the same flashing utility.

6. What is the best source for BIOS updates?

7. Which of the following is not a step in the POST process?

A. BIOS identification

B. Core hardware test

C. Main system memory test

D. Master boot record being read from the boot drive

E. Video subsystem test

8. True or false? The boot processes for a cold boot and a warm boot are exactly the same.

9. True or false? To boot the computer, your boot device must bean internal hard disk, internal optical drive, internal floppy drive, or USB flash drive.

10. Why does your computer use beep codes to indicate an error, rather than simply displaying a message on the monitor?

Part B:

1. The actual storage locations on a memory chip are called what?

A. Bits

B. Cells

C RAM

D. Word

2. Which memory unit's size depends on the processor?

A. Bit

B. Byte

C. Nibble

D. Word

3. Which term refers to the type of memory that loses its contents when power isn't present?

A. Asynchronous

B. Dynamic

C. Non-volatile

D. Static

E. Synchronous

F Volatile

4. Which of the following memory types are non-volatile? [Choose all that apply.]

A. CMOS

B. EPROM

C. EEPROM

D. Flash

E. PROM

F. RAM

G. ROM

5. What type of RAM loses its contents quickly, even when power is present?

A. DRAM

B. Flash

C. RAM

D. SRAM

6. Which type of memory is tied to the system clock?

A. Asynchronous

B Dynamic

C. Non-volatile

D. Static

E. Synchronous

F. Volatile

7. Which of the following is defined as "the amount of data that can be transferred to or from memory per second"?

A. Access time

B. Bandwidth

C. Memory speed

D. Overall speed

8. Which of the following memory packages are used in laptop or notebook computers? [Choose all that apply.]

A. 144-pin MICRODIMM

B 168-pin DIMM

C. 184-pin RIMM

D. 200-pin SODIMM

E. 240-pin DIMM

9. True or false? Parity permits your computer not only to detect that an error has occurred, but also to correct that error.

10. Which tab in Task Manager can you use to monitor the performance of memory in your computer system?

A. Applications

B. Networking

C. Performance

D. Processes

E. Services

11. As measured in Task Manager, what's kernel memory?

Reference no: EM13946513

Questions Cloud

How is active directory implemented? : How is Active Directory implemented?
Evaluate the facilitators to adoption of utility computing : What are the benefits of ‘utility computing' according to the article? How significant does the article suggest utility computing will become? Evaluate the facilitators and barriers to the adoption of utility computing.
How does anti-virus software detect malware : What is a malware? List four harm that malware can cause to an information system. How does Anti-virus software detect malware. What is the difference between Polymorphic and Metamorphic malware. Explain in details the difference between worm and vir..
Statement on developmentally appropriate practice : After reading the NAEYC's Key Messages of the Position Statement on developmentally appropriate practice (DAP), describe at least two challenges in implementing DAP in early childhood classrooms. Why do you think these would be challenging? Your i..
Which of the following is not a step in the post process : True or false? Every BIOS manufacturer uses the same flashing utility. What is the best source for BIOS updates? Which of the following is not a step in the POST process
Problem regarding the second heat exchanger : A shell-and-tube heat exchanger with one shell pass and two tube passes is used as a regenerator, to pre- heat milk before it is pasteurized. Cold milk enters the regenerator at Tc,i 5°C, while hot milk, which has completed the pasteurization process..
Can we justify the claim that the new method is better than : The old operation to restore hearing is known to be 30%sucessful. A new operation that restores hearing is being researched. It is known that 88 out of 225 operations using this new method have been successful. Can we justify the claim that the new m..
Determine the length of the exchanger : Determine the UA product of a counterflow heat exchanger required for the chilling process. Determine the length of the exchanger if the inner pipe has a 50-mm diameter and the overall heat trans- fer coefficient is U 1000 W/m2 · K.
What is the maximum load when one of the members break : what is the maximum load when one of the members break and what is the internal force in member AB when one of the members break?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Implementing the code

Write down a program which utilizes a structure named MovieData in order to store the following information about the movieInvolve a constructor which allows all four of these member data values to be specified at the time a MovieData variable is g..

  Questiona declare principles behind object oriented

questiona declare principles behind object oriented software development and describe why it is considered better than

  Make use of method iteration to find a formula expressing

How several elementary operations are used in the following algorithm? The elementary operations are comparison operations (such as > and

  Describe the program development cycle

Describe the importance of using a structured, modular approach when creating program requirements, design, and code.

  How to provide a cost-effective means of protection

What will be an appropiate outlined for this and provide a cost-effective means of protection.

  Print the console pane of the mars simulator

Find the memory location and print the console pane of the MARS simulator.

  Questiondata mining for business intelligence1 why do you

questiondata mining for business intelligence1. why do you think that consulting companies are more likely to utilize

  Questionselect any one model related to information

questionselect any one model related to information management in support of digital firm.research and cite at least

  Explain an instance of a two-dimensional character array

describe an example of a two-dimensional character array that could be used to hold a set of text data that might be

  Assess how section 508 affects developing user interfaces

building a user interface that meets the needs of a diverse population can be incredibly difficult. research the best

  According to return-on-investment analysis which candidate

you are designing a web-based system where your regional offices can submit their sales reports online instead of

  How important is the internet to most companies

How significent is the Internet to most companies? How have companies improved the sales / service / performance process utilizing the Internet.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd