Flylib.com
Review
Previous page
Table of content
Next page
[Previous] [Next]
Name four methods of overcoming the 528-MB hard disk limitation.
How do multiple block reads speed up a computer?
How many devices can be installed on a SCSI chain?
What is the effect of improper termination on a SCSI chain or device?
What is the BIOS protocol for SCSI devices?
Sometimes the SCSI device driver conflicts with other drivers. What steps need to be taken to resolve the problem?
Describe three advantages of using a CD-ROM drive.
What are the four steps required to install a CD-ROM drive?
Is a 16X CD-ROM drive 16 times faster than a 1X? Why?
How would you determine which type of CD-ROM to install in a computer?
Why would you use the MSCDEX.EXE real-mode driver with Windows 95?
Instead of using magnetic energy for storing data, a CD-ROM uses ___________________ technology.
Name some possible controller card combinations.
What software is required for a CD-ROM drive installation?
Answers
Previous page
Table of content
Next page
Microsoft Corporation - A+ Certification Training Kit
ISBN: N/A
EAN: N/A
Year: 2000
Pages: 127
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Cryptography
Operations Security
The Certification Phase
Appendix A Answers to Assessment Questions
Appendix E The Information System Security Management Professional (ISSMP) Certification
FileMaker Pro 8: The Missing Manual
Modeling Your Database
Printing
Advanced Scripting
Commenting Scripts
Server Hardware
Systematic Software Testing (Artech House Computer Library)
Detailed Test Planning
Analysis and Design
Some Final Thoughts…
Appendix B Testing Survey
Appendix C IEEE Templates
Cisco IOS Cookbook (Cookbooks (OReilly))
Filtering Routes with RIP
Compressing Frame Relay Data with Maps
Using an Internal T1 CSU/DSU
Routing Multicast Traffic with PIM-SM and BSR
IPv6 Route Filtering and Metric Manipulation in RIP
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Tcpdump
Internet Security Systems RealSecure
Incident Response
Policy and Procedures
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
VBScript Basics
Processing Collections of Data
Appendix A WSH Administrative Scripting
Appendix B Built-In VBScript Functions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies