5.11.2011

Algoritma Teori

Posting ini dibuat untuk memnuhi tugas algoritma teori ...( wew resmi bgt )
tugas algoritma teori pertemuan ke -9 smster 2 :
apakah yang di maksud dengan :
1. Searching
2. Pengurutan
3. Penjumlahan Matrix
4. Perkalian Matrix

Searching
searching ( pencarian ) adalah menemukan nilai (data) tertentu di dalam sekumpulan data yang bertipe sama (baik bertupe dasar atau bertipe bentukan. Metoe yang di pakai bisa pencarian beruntun ( sequential search) hingga algoritma pencarian yang lebih maju yaitu pencarian bagidua (binary search).
Pengurutan
Pengurutan (sorting) adalah proses mengatur sekumpulan objek menurut urutan dan susunan tertentu. Masalah pengurutan dapat ditulis sebagai berikut:
Diberikan larik L dengan n elemen yang sudah terdefinisi elemen-elemennya.
Urutan larik tersebut sehingga tersusun secara menaik (ascending):
L[1] ≤ L[2] ≤ L[3] ≤....≤ L[n]

Atau secara menurun (descending):
L[1] ≥ L[2] ≥ L[3] ≥ ....≥ L[n]

Data yang diurut dapat berupa data bertipe dasar atau tipe terstruktur (record).

Penjumlahan 2 Buah Matrix

Penjumlahan dua buah matriks A dan B menghasilkan matriks C, atau A+B = C. Penjumlahan dua buah matriks dapat dilakukan bila ukuran matriks A dan ukuran matriks B sama dan kedua matriks sudah terdefinisi nilainya. Matriks C akan berukuran sama dengan matriks A dan B.
Penjumlahan matriks A dan B didefinisikan sebagai berikut :
C [i,j] = A [i,j] + B [i,j] untuk semua i dan j.
Perkalian 2 Buah Matrix
Perkalian dua buah matriks A dan B menghasilkan matriks C, yaitu C = A x B. mengalikan dua buah matriks lebih rumit daripada menjumlahkan keduanya. Syarat perkalian matriks A dan matriks B, jumlah kolom matriks A harus sama dengan jumlah baris matriks B.

Misalkan A [1..m,1..n] dan B [1..n,1..p], yang dalam hal ini,
m adalah jumlah baris matriks A,
n adalah jumlah kolom matriks A dan jumlah baris matriks B,
p adalah jumlah kolom matriks B.
hasil perkalian A dan B menghasilkan matriks c[1..m,1..p]

algoritma perkalian matriks:
inisialisasi C [i,j] dengan 0, untuk i = 1,2,...,m dan j = 1,2,...,p.
untuk setiap baris i = 1,2,...,m pada matriks A lakukan:
untuk setiap baris j = 1,2,...,p pada matriks B lakukan:
untuk setiap baris k = 1,2,...,n pada matriks B lakukan:
C [i,j] = C [i,j] + A [i,k] * B [k,j]


Sumber : Modul Algoritma semester II disusun oleh : Try Ginanjar S.Kom,M.Si

5.04.2011

konversi bilangan ke string dalam pascal



Posting Ini di buat untuk memenuhi tugas algoritma teori .
pertemuan ke 8 smster 2 tugas ttg , menampilkan hasil berbentuk tulisan , dari inputan berupa bilangan.
program nya :
program cetak_nilai_uang;
var
uang : integer ;
begin
writeln('program konversi bilangan');
writeln('===================');
writeln;
write('nilai uang yang ingin di konversi :');readln(uang);
if uang div 100 > 0 then begin
write(uang div 100 , 'ratus');
uang := uang mod 100;
end
else if uang div 10 > 0 ) and (uang > 20) then begin
write(uang div 10, 'puluh');
uang := uang mod 10;
end
else if (uang < 20) and (uang > 10 ) then begin
write('uang mod 10 ,'belas rupiah');
uang := uang mod 10;
else write(uang ,'rupiah');
end.


contoh hasil :


sumber materi pembuatan tugas ini dari program konversi mata uang nu sinau

4.15.2011

KOMd4T

kmrn dapet tugas komdat dari aki asep ... buat temend* yg dah pada plg and blm tau soalnya.. ini soalnya :
1 . Apa yang di maksud dengan komunikasi data ?
2. mengapa kita perlu komunikasi data & apa saja manfaat yang telah anda rasakan ?
3. Jelaskan model-model komunikasi data? dan mengapa demikian ?
4. jelaskan dan gambarkan bagan komunikasi data , serta metode-metodenya?
5. jelaskan kelebihan dan kekurangan data analog dan data digital ?
6. jelaskan komponen-komponen jaringan : hardware , software , brainware secara terperinci . dan jelaskan fungsi masing-masing !
7. Selesaikan dan buktikan soal berikut :
a. 863 (Decimal) = ..... ?(hexadecimal)=......?(oktal)=......?(biner)
b. 3FBS(hexa)=....?(decimal)=....?(oktal)=....?(biner)
8.Selesaikan dan buktikan operasi bilangan di bawah ini :
a . 11111111 + 111011 + 11111 + 111 = (bilangan biner)
b. 767564 + 1476 + 1345 + 177 = (bilangan oktal)
c. ABCDEF + DEFC + FBF + 3F = (bilangan hexa)
9. Terangkan istilah-istilah dibawah ini , dan jelaskan manfaatnya ?
a. gateway
b. GSM
c. GPRS
d. BTS
e. Multiflexter
f. Bandwith
g. Access Point
h. Router
i. Bridge
j. Switch

Selamat mengerjakan ....
ini jawabann ya tapi belum semua ... klick disini

3.31.2011

Pengertian variable lokal,global,daftar parameter, fungsi dan procedure

Tugas Ke 2 algoritma ....

Pengertian variable lokal dan global
(1) Variabel lokal: adalah variabel yang hanya aktif dalam suatu fungsi atau subroutine di dalam visual basic. Caranya dituliskan secara langsu di dalam suatu fungsi satu subroutine tanpa pendefinisian atau dengan definisi variabel di dalam fungsi.
(2) Variabel global dalam form: adalah variabel yang aktif selam satu form berjalan, bila pindah ke form yag lain maka variabel ini tidak aktif. Ini dapat dilakukan dengan mendefinisikan variabel di luar subroutine, biasanya diletakkan pada baris paling atas dari suatu form. Contohnya Dim a as integer diletakkan pada baris paling atas, maka variabel a selalu aktif selama form aktif.
(3) Variabel global dalam aplikasi: adalah variabel yang aktif selama aplikasi masih aktif. Variabel ini masih aktif meskipun form yang berjalan sudah berganti. Untuk mendefinisikan variabel ini dilakukan dengan menambahkan modul dan pendefinisian dengan global.

baca sumber lengkap pada badaiardiat.blogspot.com

Pengertian parameter :
Parameter adalah data masukan untuk subprogram yang nantinya akan diproses lebih lanjut dalam subprogram tersebut. Dalam Pascal, dikenal dua macam parameter yaitu :

1) Parameter nilai (value parameter), dan

2) Parameter referensi (reference parameter).

baca sumber lengkap erikgundar.wordpress.com

pengertian fungsi :

Fungsi adalah subprogram yang menerima masukan dan mempunyai keluaran secara langsung. Cara mendeklarasikan sebuah fungsi adalah sebagai berikut :

function B : integer; { nama fungsi adalah B dengan }

begin { tipe data keluaran adalah integer }

{ statement }

B := 3; { nilai yang dikeluarkan fungsi }

end;

baca sumber lengkap erikgundar.wordpress.com

Procedure dan daftar parameter :

Prosedur adalah subprogram yang menerima masukan tetapi tidak mempunyai keluaran secara langsung. Cara mendeklarasikan sebuah prosedur adalah sebagai berikut :

procedure A; { nama prosedur adalah A }

begin

{ statement }

end;

Pendeklarasian prosedur di atas adalah untuk prosedur yang tidak memerlukan parameter. Parameter adalah data masukan untuk subprogram yang nantinya akan diproses lebih lanjut dalam subprogram tersebut. Dalam Pascal, dikenal dua macam parameter yaitu :

1) Parameter nilai (value parameter), dan

2) Parameter referensi (reference parameter).

Cara mendeklarasikan parameter tersebut adalah sebagai berikut :

procedure B(X : integer; var Y : integer);

baca sumber lengkap erikgundar.wordpress.com

3.25.2011

Pengodean character Data

Character Data Beberapa aplikasi menggunakan data yang bukan hanya bilangan tetapi juga huruf dari alfabet dan karakter khusus lainnya. Data semacam ini disebut dengan data alfanumerik dan mungkin dapat ditunjukkan dengan kode numerik. Jika bilangan-bilangan dimasukkan dalam data, maka bilangan-bilangan tersebut juga dapat ditunjukkan dengan kode khusus.
Set karakter alfanumerik secara khusus mencakup 26 huruf alfabet (termasuk huruf besar dan huruf kecil), angka dalam digit sepuluh desimal, dan sejumlah simbol seperti +, =, *, $, …, dan !. Dua kode alfabet yang paling umum dipakai adalah ASCII (American Standard Code for Information Interchange) dan EBCDIC (Extended Binary Coded Decimal Interchange Code). ASCII merupakan kode 7-bit dan EBCDIC berupa kode 8- bit. Jika suatu komputer menangani 8-bit (1-byte) kode lebih efisien, versi 8-bit, disebut dengan ASCII-8 juga telah dikembangkan. Selain itu ada juga beberapa kode spesial didalam penambahan set karakter alfanumerik. Kode simpanan ini digunakan sebagai signal komunikasi dalam aplikasi dimana data transfer terjadi antara komputer yang dihubungkan melalui baris komunikasi. Misalnya, LF (line feed) dan CR (carriage return) dihubungkan dengan printer, BEL digunakan untuk mengaktifitaskan bell; ACK (acknowledge), NAK (negative acknowledge), dan DLE (data link escape) berupa signal yang dapat diubah dalam baris komunikasi.
Bagi yang sudah cukup lama berkecimpung di dunia komputer, pasti pernah bekerja dengan ‘kode ASCII’. Dan bagi yang bekerja dengan mesin-mesin mainframe IBM, pasti pernah menjumpai ‘kode EBCDIC’ (dibaca: eb-si-dik). Di luar ASCII dan EBCDIC, besar kemungkinan anda paling tidak pernah mendengar istilah-istilah lain seperti berikut ini: ISO-8859-1, UCS-2, UTF-8, UTF-16, atau windows-1252. Kode-kode apakah itu? ASCII, EBCDIC, ISO-8859-x, UCS-2, UTF-x, dan windows-x merupakan sebagian dari kumpulan character set (set karakter) yang ada di dunia komputer. Sistim Binary Coded Decimal (BCD): Sebelum ASCII dan EBCDIC berkembang terlebih dahulu dikembangkan Binary Coded Decimal (BCD). Metode ini awalnya digunakan pada komputer mainframe IBM. Pada grup ini karakter diwakili oleh 64 - ( 26) lambang. Dengan kode ini, setiap huruf/angka diberikan kode yang terdiri dari enam bit, dua untuk zone dan empat untuk angka. Huruf A sampai dengan I diberikan tanda 11 pada tempat zone. Karena A adalah huruf pertama dalam kelompok ini, maka kodenya adalah: 0001, B sebagai huruf kedua dengan kode: 0010, C adalah 0011 dan seterusnya. Dengan perkataan lain, zone bit yang mempunyai formasi 11 harus juga disertakan pada kode lengkap masing-masing pada grup ini. Grup alfabetik kedua adalah J hingga R, ditetapkan kode awalnya 10, yang juga posisi masingmasing huruf ditentukan oleh angkanya masing-masing. Huruf S hingga Z dibentuk dengan menambahkan angka bit 0010 hingga 1001 berurutan pada kode 01 dimana pada grup ini hanya ada delapan huruf. Angka-angka 0 hingga sembilan diberikan kode 00 di depannya diikuti oleh angka itu sendiri dalam sistim binary. Angka 0 (nol) harus dibedakan dengan tanda kosong (spasi) guna mempermudah cara penggunaan kode.
Sistim Extended Binary Coded Decimal Interchange Code (EBCDIC): EBCDIC merupakan set karakter yang merupakan ciptaan dari IBM. Salah satu penyebab IBM menggunakan set karakter di luar ASCII sebagai standar pada komputer ciptaan IBM adalah karena EBCDIC lebih mudah dikodekan pada punch card yang pada tahun 1960-an masih jamak digunakan. Penggunaan EBCDIC pada mainframe IBM masih terbawa hingga saat ini, walaupun punch card sudah tidak digunakan lagi. Seperti halnya ASCII, EBCDIC juga terdiri dari 128 karakter yang masing-masing berukuran 7-bit. Bila menggunakan ukuran 8-bit maka karakternya menjadi 256 – (28). Hampir semua karakter pada ASCII juga terdapat pada set karakter EBCDIC.

Sistim American Standard Code for Information Interchange (ASCII): ASCII dan EBCDIC merupakan cikal bakal dari set karakter lainnya. ASCII merupakan set karakter yang paling umum digunakan hingga sekarang. Set karakter ASCII terdiri dari 128 – (27) buah karakter yang masing-masing memiliki lebar 7-bit atau gabungan tujuh angka 0 dan 1, dari 0000000 sampai dengan 1111111. Mengapa 7-bit? Karena komputer pada awalnya memiliki ukuran memori yang sangat terbatas, dan 128 karakter dianggap memadai untuk menampung semua huruf Latin dengan tanda bacanya, dan beberapa karakter kontrol. ASCII telah dibakukan oleh ANSI (American National Standards Institute) menjadi standar ANSI X3.4-1986.
Adapun kode-kode pada sistim-sistim tersebut di atas dapat dilihat pada tabel di bawah ini:


Sumber : gieonline.blogspot.com

3.19.2011

Tugas Komunikasi Data

Pengertian Komunikasi data

komunikasi data adalah proses pengiriman dan penerimaan data/informasi dari dua atau lebih device (alat,seperti komputer/laptop/printer/dan alat komunikasi lain)yang terhubung dalam sebuah jaringan. Baik lokal maupun yang luas, seperti internet

Secara umum ada dua jenis komunikasi data, yaitu:

Melalui Infrastruktur Terestial
Menggunakan media kabel dan nirkabel sebagai aksesnya. Membutuhkan biaya yang tinggi untuk membangun infrastruktur jenis ini. Beberapa layanan yang termasuk teresterial antara lain: Sambungan Data Langsung (SDL),Frame Relay, VPN Multiservice dan Sambungan Komunikasi Data Paket (SKDP).
Melalui Satelit
Menggunakan satelit sebagai aksesnya. Biasanya wilayah yang dicakup akses satelit lebih luas dan mampu menjangkau lokasi yang tidak memungkinkan dibangunnya infrastruktur terestrial namun membutuhkan waktu yang lama untuk berlangsungnya proses komunikasi. Kelemahan lain dari komunikasi via satelit adalah adanya gangguan yang disebabkan oleh radiasi gelombang matahari (Sun Outage) dan yang paling parah terjadi setiap 11 tahun sekali.
Sumber : Wikipedia

Sedangkan Menurut Faisal Akib dalam Blognya

Komunikasi data merupakan transmisi data elektronik melalui sebuah media. Media tersebut dapat berupa kabel tembaga, fiber optic, radio frequency dan micro wave (gelombang mikro) dan sebagainya (dibahas pada komponen jaringan). Sistem yang memungkinkan terjadinya transmisi data seringkali disebut jaringan komunikasi data.

Gambar Komunikasi data sederhana :


di Posting oleh faisal akib.
lebih lengkapnya dapat dilihat Di sini

Tugas Algoritma Teori Pengertian PRogram aRray

Pengertian Array

Array (larik) merupakan tipe data tersetruktur dimana didalamnya terdiri dari komponen – komponen yang mempunyai tipe data yang sama. Didalam suatu array jumlah komponen banyaknya adalah tetap. Didalam suatu larik atau array setiap kompoenen ditunjukan oleh suatu index yang unik. Index dari setiap komponen array menunjukan urutan data atau identitas yang mewakili data yang ada didalamnya.
Logika sederhananya array itu bisa disamakan dengan dua orang dengan nama yang sama didalam suatu komunitas, untuk membedakan antara nama yang satu atau dengan nama yang lain maka diberikan initial tambahan untuk setiap nama.

Deklarasi Array

Didalam penulisan bahasa pemograman setiap penggunaan array harus dideklarsikan terlebih dahulu. Pendeklarasian array diawali dengan nama variabel array diikuti dengan indeks array yang dituliskan didalam tanda “[]” , diikuti dengan kata cadangan of dan tipe data yang dibutuhkan.

Bentuk Umum Penulisan

Tanda_pengenal : array [..tipe index ..] of tipe data;

Contoh :

Var
A : array[1..4] of integer;
B : array[1..5] of string;
C: array[1..10] of real;

Keterangnan :
A,B,C merupakan tanda pengenal/ nama variabel dari array;
1..4 : merupakan tipe indek dari array, yang menunjukan banyaknya data yang mampu disimpan.
Integer : menunjukan bahwa data yang diinput berupa bilangan bulat.


sumber materi :
Belajar Program Komputer

3.03.2011

practice final exam 11-16

di modul ini sya dapet:

Max point : 73

earned point : 57
percentage : 80,3 %


soal dan jawaban lengkapnya
di sini

ini soalnya :

1. What are two characteristics of the IEEE 1284 parallel interface standard?
* The two available operative modes are EPP and ECP
* Bi-directional communication is allowed
2. The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
* VPN
3. What are two problems that are caused by setting an incorrect boot order in the system BIOS?
* The computer displays an "Invalid Boot Disk" error after POST
* The computer displays a "Missing NTLDR" error after POST
4. A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
* RAM
5. The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
*Defragment the hard disk
6.Which safety precaution should an installer take when installing cable in the ceiling of a building?
* Wear thick gloves to minimize damage to the cable
7. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
*22
8. Which action should be taken first if a card key is lost or stolen?
*Disable the lost card key.
9. Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
*biometric devices
10. Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
*The Intel Core i7 processor supports a maximum bus speed of 1600MHz
11. A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
*USB 2.0
12. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network
*mesh
13. Which three ports should be left open to avoid filtering e-mail traffic?
*25
*143
*212
14. What is the highest risk associated with improperly charged or mishandled batteries?
*The battery can explode.
15. A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
* Stop the print spooler
16. A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
* Enable the Graphics Options "Tray Icon" in the Taskbar and Menu Properties window
17. Which Startup type must be selected for a service that should run each time the computer is booted?
* automatic
18.The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
* Disable the broadcast of the SSID on the access point
19. When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
* thermal compound
20. A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
*USB 2.0 is forty times as fast as USB 1.1.
21. A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?
* Enable the touchpad in the system BIOS
* Ensure that the operating system has the correct driver for the touchpad
22. Which Windows hard drive partition is referred to as the C: drive?
* the first primary partition
23. A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem?
* The monitor Power Scheme settings are incorrect.
* The monitor cable connector is loose or disconnected because the retaining screws are missing
24. A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
*Change the startup type for the utility to Automatic in Services
25. Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard di
*3 logical, 1 extended, 1 free space, 1 primary
26. Which two hazards are related to fiber optic installations?
* glass splinters that can penetrate the skin
* risk of explosion when installed close to combustible substances
27. Which interface can transfer data at a maximum speed of 480 Mbps?
*USB 2.0
28. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
*Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point
29. For a default installation of Windows XP Professional, which two settings are customizable?
*regional settings
30. Refer to the exhibit. Which utility has the IT department started on each computer?
* Defragment
31. Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
* SODIMM
32. Which two characteristics describe a software firewall?
* It typically protects only the computer it is installed on.
* It uses the CPU in the host computer
33. Which feature is characteristic of the ntbackup command?
* It can be executed from a batch file.
34. Which recommendation should be observed when replacing existing memory?
* The new memory should be as fast or faster as the cache found in the processor.
35. Refer to the exhibit. Based on the information shown, which statement is true?
* The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87

practice final exam 1-10

Di modul ini nilai sya
Max Points: 101
Earned Points: 80
Percentage: 79.2%
tepatnya salah 11 soal , jadi tolong di cek lagi jangan di tiru smua.. ini cuma mau ngebantu posting soal.
soal jawaban lebih lengkap di sini
iini soalnya :

Maxx point :101
earn point : 80
percentages : 79.2%


1. Refer to the exhibit. What type of device is highlighted in white?

*touch pad

2. Refer to the exhibit. Which type of removable media is depicted?

*flash drive

3. A user is experiencing slow print rates when printing files that contain large complex graphics. What could be done to improve performance?

Change the printr cabling from paralel to serial

4. A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?

*Device manager

5. Which type of power connector is used to connect devices such as optical drives and hard drives?

*P8

6. A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation?

*NTBOOTDD

7. Which program checks for installed hardware during the Windows XP boot process?

*NTLDR

8. Which Registry file contains information about all software that is installed on a Windows XP computer?

* HKEY_LOCAL_MACHINE

9. Which two security tasks should be included in a computer preventive maintenance plan?

* an update of spyware removal tools

* an update of antivirus scanner software

10. A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacked and packaged for shipping. What advice should a technician give the customer?

* Immediately after printing, the ink is wet

11. A technician is repairing Windows XP and wants to keep all of the application settings in the operating system. The technician is using the Repair XP option and has rebooted the computer. A message appears on the screen stating "Press any key to boot from the CD or DVD." What should the technician do?

* The technician should ignore the message and allow XP to repair the operating system without deleting any of the applications

12. A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?

* The ribbon cable is installed incorrectly

13. A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing?

*3 GHz

14. A customer requests advice about the type of storage device to use for 20 new computers. For which two conditions should SSDs be recommended as replacements for magnetic hard drives?

* external flash drives that are required to be connected by USB

* locations where redundant disks are required to appear as one logical disk to the operating system

15. A technician powers on a computer and opens a web page. A message that the web page could not be found appears. After checking the URL, the technician verifies that this is the problem that was reported by the computer owner. What would be the next step in the troubleshooting process for the technician

*Verify the computer IP address information

16. What characterizes a DDoS attack?

* Many hosts participate in a coordinated attack

17. Which two ports on a laptop allow connection or removal of external devices, such as hard drives or printers, without powering off the computer?

* USB

*VGA

18. What are two functions of a VPN gateway?

*establish secure VPN connections

* manage VPN tunnels

19. At which TCP/IP model layer would a MAC address be found?

*network access

20. A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?

*BIOS

21. A customer wants to produce video recordings to sell to the public. Which two types of media should be used to accomplish this type of recording?

* DVD+/-R

* BD-R

22. A customer complains that a scanner has suddenly stopped producing clear images. Which preventive maintenance task has the customer most likely forgotten to do?

* visually inspect the scanner glass

23. A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem?

* The computer has an invalid default gateway address

24. What is the best way to fully ensure that data is unable to be recovered from a hard drive?

* formatting the drive

25. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

* DHCP

26. Which network device uses a MAC address table to segment the network?

*switch

27. Which type of standard interface allows users to connect and disconnect peripheral devices while the computer is running without having to restart?

* PATA

28. A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?

* CHKDSK

29. A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem?

*Power cycle the printer

30. When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?

* BIOS reads the MBR

31. A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?

*Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer

32. Refer to the exhibit. Which two port types are shown in the graphic?

*network

*USB

33. Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?

*hibernate

34.When starting a computer, a customer can no longer select two of the operating systems that are installed. Which file may be corrupted and causing this error

*BOOT.INI

35. The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?

* manufacturer's website

36. A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network media should be recommended?

*UTP

37. In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system?

*System Restore (SR)

38. What guideline should be followed when establishing a password security policy?

* An expiration period should be established so that passwords frequently change

39. A new application fails to install from a CD known to be virus-free and compatible with the operating system. What is a possible solution to this problem?

* Run the installation application under Windows XP compatibility mode.

40. A user cannot log in to the network with a computer that worked yesterday. Other computers on the same network are working fine. Which troubleshooting process would be most logical to try first?

* Use Device Manager to check for a resource conflict

41. A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make?

* Inkjet printers are less expensive than laser printers.

* The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

42. Which three tasks should a computer preventive maintenance plan contain?

* the defragmentation of the hard drive

* an update of antivirus and other protective software

* an evaluation of the methods for gathering information about problems and the solutions to be implemented

43. A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?

* Interrupt the customer and ask whether the customer would mind going on hold for a few minutes

44. What should always be done prior to replacing components that are not hot-swappable in a laptop?

* Unplug the laptop and remove the battery

45. Which protocol adds security to remote connections

*SSH

46. A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?

* Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.

47. A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?

* Schedule and document routine maintenance tasks.

48. A technician is planning to convert a file system from FAT32 to NTFS. What step should be taken before doing the conversion?

Create a complete system backup.

49. A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?

* The computer emits a pattern of beeps indicating the failing device

50. A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?

* Restore the data files that were backed up in preparation for the conversion


2.28.2011

IT essential 4.1 chapter 16

1
A computer user cannot access the Internet. A technician, attempting to resolve the problem, can ping the proxy server, but Internet access is still denied. What is the problem?
#The computer browser proxy server settings are wrong.

2
What are two features of Windows Vista Backup? (Choose two.)
#The backup files can be saved to another connected computer or server.
#The backup files have an extension of .bkf and a maximum uncompressed file size of 200 MB.

3
On a computer in the lab, a student can access e-mail. However, from a laptop that is owned by the student, the wireless connection to the e-mail server fails. What is the problem?
#Windows Firewall is blocking the port that is used by the e-mail application.

4
A network administrator has noticed that users without administrative rights are installing unauthorized applications on the Windows Vista computers. What could the administrator do to prevent the installation of these applications?
#Reinstall the operating system and use the 64-bit version.

5
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
#Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

6
Which encryption technology provides secure tunnels?
#VPN

7
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
#Audit the event logs on the server to check for unauthorized network access.

8
A business has a policy to automatically update and run the antivirus software on all computers each day. When is the best time to perform this security maintenance?
#when the computers are not being used

9
Refer to the exhibit. Which Firewall Settings tab would be used to allow an FTP connection through a Vista-based computer?
#Advanced

10
Which simple wireless configuration technique can make the network invisible to unauthorized users?
#Disable SSID broadcasting.

11
Which two file-level permissions allow a user to delete a file? (Choose two.)

#modify
#full control

12
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
#ports
#protocols

13
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
#All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

14
Which Windows XP command initiates a backup from the command line?
#ntbackup


15
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
#It does not impact the processing performance of the equipment it protects.
#It is designed to protect more than one computer.

16
What is the result of changing the default username and password on a wireless access point?
#It reduces the chance of someone accessing the device and changing settings.

17
A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
#NTFS

18
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
#the manufacturer FAQ for network devices
#technical websites

19
What is the default setting for Windows XP operating system updates?
#automatic

20
On a Windows Vista computer, which CLI command is used to repair the master boot record that has been damaged by a virus?
#bootrec.exe/fixmbr

21
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
#The computer has been infected with spyware.

22
Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
#conduit
#card key
#security guard

23
The ABC Company network designers are designing the new corporate WiFi network. Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
#Disable broadcast of the SSID.
#Configure WPA on access points.

24
A student has a Windows XP laptop firewall set with the Don't Allow Exceptions option enabled. What is the consequence of setting this option?
#No applications on an outside network are allowed access to the laptop.

25
Which method can a technician use to make sure that only specific computers connect to a wireless router?
#MAC address filtering

26
A network administrator has moved encrypted files from one computer to another computer on the network and now the files are not encrypted. What does the administrator need to do to correct the problem?
#Convert the destination computer partition to NTFS.

27
A network administrator is trying to allow everyone access to a data folder while limiting access to individual subfolders to individuals. The administrator is having problems with all users being able to view and edit all files and folders. What should the administrator look at to solve the problem?
#Check to see if the subfolders have inherited rights from the main folder.

28
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
#security key fob

29
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
#The administrator does not have the correct permissions to make the change.