A classification method used for optical drives that is based on multiples of a standard transfer rate is called

A) Average seek time
B) Average access time
C) X factor
D) Buffering rate
E) None of these answers are true.


C

Computer Science & Information Technology

You might also like to view...

____ need a different set of acceptable use policies because of their enhanced authority.

A. End-users B. Managers C. Executives D. Administrators

Computer Science & Information Technology

A(n) class cannot be instantiated.

a. final. b. concrete. c. abstract. d. polymorphic.

Computer Science & Information Technology

While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC. The user has successfully opened a command prompt.   What command will you have the user type at the command line to determine these two addresses?

A. ipconfig /all B. tracert C. ipconfig /release D. ping E. netstat F. net use

Computer Science & Information Technology

A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected with multiple worms and other forms of known malware. The second VM is a clean installation of Windows. The technician has been tasked with logging the impact on the clean Windows VM when the infected VM attempts to infiltrate the clean VM through the network.   What should the technician do to best protect the company LAN while performing these tests?

A. Encrypt each VM and the host OS using disk-based encryption. B. Enable the software firewalls on each VM OS and on the host OS. C. Place both VMs on virtual NICs that are isolated from the company LAN. D. Disable the virtual network interface controller in each VM OS.

Computer Science & Information Technology