[Free] 2017(Nov) Dumps4cert Testinsides CompTIA FC0-U41 Dumps with VCE and PDF Download 21-30

Dumps4cert 2017 Nov CompTIA Official New Released FC0-U41
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/FC0-U41.html

CompTIA Strata IT Fundamentals

Question No: 21 – (Topic 1)

Which of the following types of parental controls is used to limit access to the Internet contents?

  1. Content filter control

  2. Bandwidth control

  3. Usage management tool

  4. Monitoring control

Answer: A Explanation:

Content filter control is a type of parental control that is used to limit access to the Internet content.

Answer option D is incorrect. Monitoring control is a type of parental control that is used to track locations and activities whenusing the device. Answer option C is incorrect. Usage management tool is a type of parental control that allows parents to enforce learning time

into child computing time.

Answer option B is incorrect. There is no parental control such as bandwidth control. Reference: quot;http://en.wikipedia.org/wiki/Parental_controls quot;

Question No: 22 HOTSPOT – (Topic 1)

IEEE 1394b is faster than USB 2.0. IEEE 1394b has a maximum data transfer rate of 800 Mbps/sec. In the image of the motherboard given below, identify the area to which you connect a hard disk drive.

Dumps4Cert 2017 PDF and VCE

Answer:

Dumps4Cert 2017 PDF and VCE

Explanation:

Dumps4Cert 2017 PDF and VCE

Hard disk drive uses 40 or 80 wire cables to connect to a motherboard that has an integrated IDE controller. A hard disk drive can also connect to a 40-pin connector on an

IDE controller adapter using 40 or 80 wire cables. Hard disk drives are magnetic storage devices that contain several disks, known as platters. These platters are attached to the spindle motor. The read/write heads are responsible for reading and writing to theplatters. The read/write heads are attached to the head actuator, which is in charge of moving the heads around the platters.

Question No: 23 – (Topic 1)

Which of the following can be installed in an AGP slot?

  1. Video card

  2. RAM

  3. Microprocessor

  4. Modem card

Answer: A Explanation:

An AGP slot is used to install a videocard. What is AGP (Accelerated Graphics Port)?

AGP is a high speed 32-bit bus designed for high performance graphics and video support. It allows a video card to have direct access to a computer#39;s RAM, which enables fast video performance. AGP provides a bandwidth of up to 2,133 MB/second.

Answer option C is incorrect. An AGP slot cannot be used to install a microprocessor. Different types of microprocessors use different types of sockets and slots such as Socket 7, Slot A, etc.

Answer option B is incorrect. An AGP slot cannot be used to install RAM. The motherboard has a separate slot for RAM.

Answer option D is incorrect. Modem card is generally installed in a PCI slot. Reference: quot;http://en.wikipedia.org/wiki/Accelerated_Graphics_Portquot;

Question No: 24 – (Topic 1)

Which of the following are the most likely causes of a virus attack?

Each correct answer represents a complete solution. Choose all that apply.

  1. Installing anapplication from an unreliable source

  2. Downloading a file from an unknown Website

  3. Installing a .DLL file from an unreliable source

  4. Using a floppy, a compact disk, or a pen drive from an unreliable source

Answer: A,B,C,D Explanation:

Thefollowing are the most likely causes of a virus attack.

Using a floppy, a compact disk, or a pen drive from an unreliable source Downloading file(s) from an unknown WebsiteInstalling an application or a .DLL file from an unreliable source

A virus is aprogram code that is written for the destruction of data. This program requires writable media. A virus can infect boot sectors, data files, and system files. A computer virus passes from one computer to another on the network in the same way as a biological virus passes from one person to another.

Question No: 25 – (Topic 1)

Which of the following protocols handles the reliable delivery of data?

  1. TCP

  2. ARP

  3. IPX

  4. UDP

Answer: A Explanation:

TCP handles the reliable delivery of data.

Transmission Control Protocol (TCP) is a reliable, connection-oriented protocol operating at the transport layer of the OSI model. It provides a reliable packetdelivery service encapsulated within the Internet Protocol (IP). TCP guarantees the delivery of packets, ensures proper sequencing of data, and provides a checksum feature that validates both the packet header and its data for accuracy. If the network corrupts or loses a TCP packet during transmission, TCP is responsible for retransmitting the faulty packet. It can transmit large amounts of data. Application-layer protocols, such as HTTP and FTP, utilize the services of TCP to transfer files between clientsand servers.

Answer option D is incorrect. User Datagram Protocol (UDP) is often used for one-to-many communications, using broadcast or multicast IP datagrams. Microsoft networking uses UDP for logon, browsing, and name resolution. UDP is a connectionless and unreliable communication protocol. It does not guarantee delivery, or verify sequencing for any datagram. UDP provides faster transportation of data between TCP/IP hosts than TCP. Answer option C is incorrect. Internetwork Packet Exchange (IPX) is the OSI-model Network layer protocol in the IPX/SPX protocol stack. It is a connectionless protocol.

Answer option B is incorrect. Address Resolution Protocol (ARP) is a network maintenance protocol of the TCP/IP protocol suite. It is responsible for the resolution of IP addresses to media access control (MAC) addresses of a network interface card (NIC). The ARP cache is used to maintain a correlation between a MAC address and its corresponding IP address. ARP provides the protocol rules for making this correlation and providing address conversion in both directions. ARP is limited to physical network systems that support broadcast packets.

Reference. quot;http.//en.wikipedia.org/wiki/Transmission_Control_Protocolquot;

Question No: 26 – (Topic 1)

What is the maximum data transmission speed of IEEE 802.11b wireless networks?

  1. 54 Mbps

  2. 600 Mbps

  3. 600 Gbps

  4. 11 Mbps

Answer: D Explanation:

The maximum data transmission speed of IEEE 802.11b networks is 11 Mbps.

The IEEE 802.11b standard applies to wireless LAN networks that use radio waves as the transmission medium. These networks each have a separate media access control mechanism, known as Carrier Sense Multiple Access with Collision Avoidance (CSMS/CA), that works like the CSMA/CD mechanism used by the Ethernet. The difference is that in this protocol, when a computer sends its signals, the receiving computer performs a cyclical redundancy check and sends an acknowledgement message to the sending computer if no error is detected. Answer option A is incorrect. The IEEE 802.11a and IEEE 802.11g networks have data transmission speeds of 54

Mbps.Answer option B is incorrect. The IEEE 802.11n network has maximum data transmission speed of 600 Mbps.Answer option C is incorrect. There is no such standard that has a maximum data transmission speed of 600 Gbps.

Reference: quot;http://en.wikipedia.org/wiki/IEEE_802.11quot;

Question No: 27 HOTSPOT – (Topic 1)

Identify the CNR slot in the image given below.

Dumps4Cert 2017 PDF and VCE

Answer:

Dumps4Cert 2017 PDF and VCE

Explanation:

Dumps4Cert 2017 PDF and VCE

Communication and Networking Riser (CNR) is a hardware device developed by Intel. It plugs into the motherboard and holds chips for the functioning of devices such as modems and audio devices.

It supports V.90 analog modem, multi-channel audio, phone-line-based networking, and 10/100 Ethernet-based networking. CNR also minimizes electrical noise interference through the physical separation of noise-sensitive elements from the motherboard#39;s communication systems.

Dumps4Cert 2017 PDF and VCE

Question No: 28 – (Topic 1)

Which of the following are the basic options in Windows XP for putting your laptop to sleep when you are not actively using it, but do not want to completely shut it down?

Each correct answer represents a complete solution. Choose two.

  1. Low-power state

  2. Sleeper state

  3. Standby

  4. Hibernate

Answer: C,D Explanation:

The following are two basic options in Windows XP for putting your laptop to sleep when you are not actively using it, but do not want to completely shut it down. Standby, Hibernate What isstandby mode?

The standby mode is a power saving feature for computers. In this mode, a computer does not shut down completely. The computer goes to low power state and, as a result, it consumes less power.

When the computer resumes from the standby mode,full power is restored to its devices.

During the standby mode, if the power supply is disconnected or interrupted, data might be lost. The standby mode is available automatically on ACPI-enabled or APM-enabled computers. Users do not need to enable this mode manually. This mode is not available in non-ACPI and non-APM based computers.

What is hibernate mode?

Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a computer is saved to the hard disk, and the computershuts down. A user will have to power on the computer to restore the previous settings.

When a computer resumes from hibernate mode, it reads the saved settings from the disk and restores the system state as it was before it entered hibernate mode. By default, hibernate mode is disabled. If a computer is not ACPI-enabled or APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer to automatically hibernate after a certain time. With ACPI-enabled and APM-enabled computers, users are able to set hibernate mode automatically.

Answer options A and B are incorrect. There are no such options in Windows XP as Low- power state and Sleeper state.

Reference. quot;http.//www.microsoft.com/windowsxp/using/setup/learnmore/russel_02march25.mspxquot;

Question No: 29 – (Topic 1)

Which of thefollowing can be used to accomplish authentication?

Each correct answer represents a complete solution. Choose all that apply.

  1. Biometrics

  2. Encryption

  3. Password

  4. Token

    Answer: A,C,D Explanation:

    The following can be used to accomplishauthentication.

    1. Password

    2. Biometrics

    3. Token

      A password is a secret word or string of characters that is used for authentication, to prove identity, or gain access to a resource.

      What is authentication?

      Authentication is a process of verifying the identity of a person, network host, or system

      process.

      The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.

      What is biometrics?

      Biometrics is a method of authentication that uses physical characteristics, such as fingerprints, scars, retinal patterns, and other forms of biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming more common in the business environment. A token may be a physical device or software token that an authorized user of computer services is given to ease authentication.

      Answer option B is incorrect. Encryption can be used to accomplish security and not authentication.

      QUESTIONNO: 4

      Which of the following devices can cause great harm to one#39;s life with lethal electric shocks?

      Each correct answer represents a complete solution. Choose two.

      1. SMPS

      2. Floppy drive

      3. Monitor

      4. Keyboard.

Answer:A, C

A computer monitor and SMPS are at high voltage. Therefore, these devices can be fatal. They usually have large amount of electric charge stored in capacitors for days after they have been unplugged from power source.

What is SMPS?

Switch Mode Power Supply (SMPS) is a device that converts raw input power to controlled voltage and current for the operation of electronic equipment. SMPS uses switches for high efficiency.

Answer options D and B are incorrect. Keyboards and floppy drives do not store electric charge.

Therefore, they cannot cause lethal electric shocks.

Question No: 30 – (Topic 1)

What is the maximum cable length to connect a device to an IEEE 1394a port?

  1. 12 meters

  2. 10 meters

  3. 4.5 meters

  4. 5 meters

Answer: C Explanation:

The maximum cable length to connect a device to an IEEE 1394a port is 4.5 meters. What is IEEE 1394?

Institute of Electrical and Electronics Engineers (IEEE) 1394 is astandard for high-speed serial bus that provides enhanced PC connectivity for a wide range of devices. These devices include consumer audiovisual components, traditional PC storage devices, and handheld devices. IEEE 1394 is also known as Fire wire.

Answer option D is incorrect. The maximum cable length to connect a device to USB 1.1 and USB 2.0 ports is 5 meters.

What is USB?

Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel, Microsoft, NEC, and Northern Telecom.It provides the Plug and Play capability of Windows to external hardware devices. USB supports hot plugging, which means that a USB device can be installed or removed while the computer is running. A single USB port can be used to connect up to

127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1 has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer rate of 480

Mbps. USB 2.0 is fully backward compatible with USB 1.1.

100% Free Download!
Download Free Demo:FC0-U41 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert FC0-U41 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *