Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits
The CompTIA 220-901 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover topics like networking, mobile devices and hardware and network troubleshooting.
One of your users travels often for work, utilizing their laptop as their main device. When in the office they desire more full functionality such as using additional monitors, a full-sized keyboard and a conventional mouse. Which of the following would best allow the user to have these things?
A docking station allows for peripherals to be connected by simply connecting a laptop via a docking port. Docking stations allow for conventional Desktop hardware to be used with a laptop.
In computing, a docking station or port replicator (hub) or dock provides a simplified way to plug-in a mobile device, such as a laptop, to common peripherals. Because a wide range of dockable devices—from mobile phones to wireless mouse—have different connectors, power signaling, and uses, docks are unstandardized and are therefore often designed for a specific type of device.A dock can allow some laptop computers to become a substitute for a desktop computer, without sacrificing the mobile computing functionality of the machine. Portable computers can dock and undock hot, cold or standby, depending on the abilities of the system. In a cold dock or undock, one completely shuts the computer down before docking/undocking. In a hot dock or undock, the computer remains running when docked/undocked. Standby docking or undocking, an intermediate style used in some designs, allows the computer to be docked/undocked while powered on, but requires that it be placed into a sleep mode prior to docking/undocking.
Docking_station - Wikipedia, the free encyclopediaYour business has purchased a facility across the street and will need an office set up there. You've spoken to the city and contractors about establishing network connectivity, but all physical methods of connectivity will require that the street be excavated, which is cost prohibitive. You suggest __________, which would be the most effective and reliable connection in the absence of physical connectivity.
Line-of-site wireless, utilizing microwave dishes is a reliable and high-bandwidth solution to establish connectivity between nearby facilities. While carrier pigeons have been known to have excellent bandwidth and data-transfer rate when a 4TB drive is strapped to their legs, nobody likes to feed them.
Line-of-sight propagation is a characteristic of electromagnetic radiation or acoustic wave propagation which means waves can only travel in a direct visual path from the source to the receiver without obstacles. Electromagnetic transmission includes light emissions traveling in a straight line. The rays or waves may be diffracted, refracted, reflected, or absorbed by the atmosphere and obstructions with material and generally cannot travel over the horizon or behind obstacles. In contrast to line-of-sight propagation, at low frequency (below approximately 3 MHz) due to diffraction, radio waves can travel as ground waves, which follow the contour of the Earth. This enables AM radio stations to transmit beyond the horizon. Additionally, frequencies in the shortwave bands between approximately 1 and 30 MHz, can be refracted back to Earth by the ionosphere, called skywave or "skip" propagation, thus giving radio transmissions in this range a potentially global reach. However, at frequencies above 30 MHz (VHF and higher) and in lower levels of the atmosphere, neither of these effects are significant. Thus, any obstruction between the transmitting antenna (transmitter) and the receiving antenna (receiver) will block the signal, just like the light that the eye may sense. Therefore, since the ability to visually see a transmitting antenna (disregarding the limitations of the eye's resolution) roughly corresponds to the ability to receive a radio signal from it, the propagation characteristic at these frequencies is called "line-of-sight". The farthest possible point of propagation is referred to as the "radio horizon". In practice, the propagation characteristics of these radio waves vary
Line-of-sight_propagation - Wikipedia, the free encyclopediaA projector in a conference room has been shutting down randomly during meetings. You've checked the operational hours for the bulb and they remain well within it's lifespan. You have also verified the seating and integrity of the bulb. You hear the whir of the fan from the projector from several feet away, but no grinding or knocking. There are no power-saving settings turned on. There are heat-warnings visible on the interface. You suspect that you may need to replace:
Dust filters past their life-span or cycles on projectors are a common cause of overheating and shutdowns. Replacing the dust filter should be the first step in troubleshooting this issue.
A video projector is an image projector that receives a video signal and projects the corresponding image on a projection screen using a lens system. Video projectors use a very bright ultra-high-performance lamp (a special mercury arc lamp), Xenon arc lamp, LED or solid state blue, RB, RGB or remote fiber optic RGB lasers to provide the illumination required to project the image, and most modern ones can correct any curves, blurriness, and other inconsistencies through manual settings. If a blue laser is used, a phosphor wheel is used to turn blue light into white light, which is also the case with white LEDs. (White LEDs do not use lasers.) A wheel is used in order to prolong the lifespan of the phosphor, as it is degraded by the heat generated by the laser diode. Remote fiber optic RGB laser racks can be placed far away from the projector, and several racks can be housed in a single, central room. Each projector can use up to two racks, and several monochrome lasers are mounted on each rack, the light of which is mixed and transmitted to the projector booth using optical fibers. Projectors using RB lasers use a blue laser with a phosphor wheel in conjunction with a conventional solid state red laser. Video projectors are used for many applications such as conference room presentations, classroom training, home cinema, movie theaters and concerts, having mostly replaced overhead, slide and conventional film projectors. In schools and other educational settings, they are sometimes
Video_projector - Wikipedia, the free encyclopediaWithout the use of dongles, modern Apple phones utilize the ______ type of connector for data transfer.
The Lightning connector is the standard data-transfer and charging cable for modern iPhones.
The iPhone 8 and iPhone 8 Plus are smartphones designed, developed, and marketed by Apple Inc. They are the eleventh generation of the iPhone. The iPhone 8 was released on September 22, 2017, succeeding the iPhone 7 and iPhone 7 Plus respectively and preceding the iPhone XR. The iPhone 8 and iPhone 8 Plus were discontinued by Apple on April 15, 2020 with the release of the second-generation iPhone SE. Except for the addition of a glass back, the designs of the iPhone 8 and 8 Plus are largely similar to that of their predecessors. Notable changes include the removal of the rose gold and jet black color variants, addition of inductive charging, a faster processor, and improved cameras and displays. The iPhone 8 and 8 Plus share most of their internal hardware with the iPhone X. The iPhone 8 and 8 Plus were discontinued as of February 2020, having sold 86.3 million units worldwide, making them one of the best-selling smartphones of all time.The iPhone 8 and 8 Plus were the final models of the flagship iPhone model to feature the Home Button and Touch ID. The entry-level iPhone SE second and third generations share the iPhone 8's exterior dimensions.
IPhone_8 - Wikipedia, the free encyclopediaA PC you are working on fails to boot it's OS. The OS is installed, but the PC cannot seem to access it. Your first course of action should be to:
Ensuring that the BIOS is selecting the primary storage partition with the OS installed via boot sequence should be verified when this issue occurs.
In computing, BIOS (, BY-oss, -ohss; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process (power-on startup). The BIOS firmware comes pre-installed on an IBM PC or IBM PC compatible's system board and exists in some UEFI-based systems to maintain compatibility with operating systems that do not support UEFI native operation. The name originates from the Basic Input/Output System used in the CP/M operating system in 1975. The BIOS originally proprietary to the IBM PC has been reverse engineered by some companies (such as Phoenix Technologies) looking to create compatible systems. The interface of that original system serves as a de facto standard. The BIOS in modern PCs initializes and tests the system hardware components (Power-on self-test), and loads a boot loader from a mass storage device which then initializes a kernel. In the era of DOS, the BIOS provided BIOS interrupt calls for the keyboard, display, storage, and other input/output (I/O) devices that standardized an interface to application programs and the operating system. More recent operating systems do not use the BIOS interrupt calls after startup.Most BIOS implementations are specifically designed to work with a particular computer or motherboard model, by interfacing with various devices especially system chipset. Originally, BIOS firmware was stored in a ROM chip on the PC motherboard. In later computer systems, the BIOS contents are stored on flash
BIOS#Boot_priority - Wikipedia, the free encyclopediaYou have been asked to select access points for a new office. The office is largely constructed of dry-wall and metal studs with many partition walls in place for noise reduction in work areas. There will also be significant amounts of glass walling between meeting rooms. A colleague suggests deploying access points operating on the 5 GHz spectrum. Is this the best choice for the new office?
5 GHz offers increased speeds over short distances but does not work well with obstacles between the access points and client devices. Due to the obstructions in the new office, it would be better to deploy on the 2.4 GHz spectrum.
Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves. These are the most widely used computer networks in the world, used globally in home and small office networks to link devices together and to a wireless router to connect them to the Internet, and in wireless access points in public places like coffee shops, hotels, libraries, and airports to provide visitors with Internet connectivity for their mobile devices. Wi-Fi is a trademark of the Wi-Fi Alliance, which restricts the use of the term "Wi-Fi Certified" to products that successfully complete interoperability certification testing. As of 2017, the Wi-Fi Alliance consisted of more than 800 companies from around the world. As of 2019, over 3.05 billion Wi-Fi-enabled devices are shipped globally each year.Wi-Fi uses multiple parts of the IEEE 802 protocol family and is designed to work seamlessly with its wired sibling, Ethernet. Compatible devices can network through wireless access points with each other as well as with wired devices and the Internet. Different versions of Wi-Fi are specified by various IEEE 802.11 protocol standards, with different radio technologies determining radio bands, maximum ranges, and speeds that may be achieved. Wi-Fi most commonly uses the 2.4 gigahertz (120 mm) UHF and 5 gigahertz (60 mm) SHF radio bands; these bands are subdivided into multiple channels. Channels can be shared between networks, but,
Wi-Fi#Range - Wikipedia, the free encyclopediaA fuser unit heats the paper up to allow the ink to bind with the fibers that make up the paper.
Laser printing is an electrostatic digital printing process. It produces high-quality text and graphics (and moderate-quality photographs) by repeatedly passing a laser beam back and forth over a negatively charged cylinder called a "drum" to define a differentially charged image. The drum then selectively collects electrically charged powdered ink (toner), and transfers the image to paper, which is then heated to permanently fuse the text, imagery, or both, to the paper. As with digital photocopiers, laser printers employ a xerographic printing process. Laser printing differs from traditional xerography as implemented in analog photocopiers in that in the latter, the image is formed by reflecting light off an existing document onto the exposed drum. Invented at Xerox PARC in the 1970s, laser printers were introduced for the office and then home markets in subsequent years by IBM, Canon, Xerox, Apple, Hewlett-Packard and many others. Over the decades, quality and speed have increased as prices have decreased, and the once cutting-edge printing devices are now ubiquitous.
Laser_printing - Wikipedia, the free encyclopediaUsers cannot remotely access any servers via RDP on the network. You should ensure that the port ______ is open on the firewall.
Port 3389 is the primary port for Remote Desktop Protocol (RDP), which allows users to start remote sessions on servers.
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft Corporation which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. Clients exist for most versions of Microsoft Windows (including Windows Mobile but the support has ended), Linux (for example Remmina), Unix, macOS, iOS, Android, and other operating systems. RDP servers are built into Windows operating systems; an RDP server for Unix and OS X also exists (for example xrdp). By default, the server listens on TCP port 3389 and UDP port 3389.Microsoft currently refers to their official RDP client software as Remote Desktop Connection, formerly "Terminal Services Client". The protocol is an extension of the ITU-T T.128 application sharing protocol. Microsoft makes some specifications public on their website.
Remote_Desktop_Protocol - Wikipedia, the free encyclopediaPCI Express, often shortened to PCI-E is the modern, high-speed expansion slot used in most desktop PC's.
PCI Express (Peripheral Component Interconnect Express), officially abbreviated as PCIe or PCI-e, is a high-speed serial computer expansion bus standard, designed to replace the older PCI, PCI-X and AGP bus standards. It is the common motherboard interface for personal computers' graphics cards, sound cards, hard disk drive host adapters, SSDs, Wi-Fi and Ethernet hardware connections. PCIe has numerous improvements over the older standards, including higher maximum system bus throughput, lower I/O pin count and smaller physical footprint, better performance scaling for bus devices, a more detailed error detection and reporting mechanism (Advanced Error Reporting, AER), and native hot-swap functionality. More recent revisions of the PCIe standard provide hardware support for I/O virtualization. The PCI Express electrical interface is measured by the number of simultaneous lanes. (A lane is a single send/receive line of data. The analogy is a highway with traffic in both directions.) The interface is also used in a variety of other standards — most notably the laptop expansion card interface called ExpressCard. It is also used in the storage interfaces of SATA Express, U.2 (SFF-8639) and M.2. Format specifications are maintained and developed by the PCI-SIG (PCI Special Interest Group) — a group of more than 900 companies that also maintains the conventional PCI specifications.
PCI_Express - Wikipedia, the free encyclopediaMulti-factor authentication can be accomplished in conjunction with a password via all of the following peripherals, except for:
A keyboard would not allow for multi-factor authentication in conjunction with a password. The keyboard would only be able to meet the knowledge factor of MFA, which is already met by a password.
Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something only the user knows), possession (something only the user has), and inherence (something only the user is). MFA protects user data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password. A third-party authenticator (TPA) app enables two-factor authentication, usually by showing a randomly generated and frequently changing code to use for authentication.
Multi-factor_authentication - Wikipedia, the free encyclopediaWhich of the following systems would you most likely assign a static IP address to in an office environment?
Servers are typically assigned a static IP address for continuity in terms of accessing the server's resources. While servers often use DNS, it's a good idea to also statically assign the IP address so any associated applications or systems that may not support DNS can reliably access the server via same IP address at all times. Don't assign a static IP address to receptionists, they're human-beings and do not appreciate being networked.
An Internet Protocol address (IP address) is a numerical label such as 192.0.2.1 that is connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the mid-2000s. IP addresses are written and displayed in human-readable notations, such as 192.0.2.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated in CIDR notation by suffixing the address with the number of significant bits, e.g., 192.0.2.1/24, which is equivalent to the historically used subnet mask 255.255.255.0. The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by five regional Internet registries (RIRs) responsible in their designated territories for assignment to local Internet registries, such as Internet service providers (ISPs), and other end users. IPv4 addresses were distributed by IANA to the RIRs in blocks of approximately 16.8 million addresses each, but have been exhausted at the IANA level since 2011. Only one of the RIRs still has a supply for local assignments in Africa. Some IPv4 addresses are reserved for private networks and are not globally unique. Network administrators assign an IP address to each device connected to a
IP_address#Static_IP - Wikipedia, the free encyclopediaThe act of sharing internet connectivity via the use of a cellular device's internet connection is called:
Sharing a device's cellularly connected internet to nearby devices is called tethering.
Tethering, or phone-as-modem (PAM) is the sharing of a mobile device's Internet connection with other connected computers. Connection of a mobile device with other devices can be done over wireless LAN (Wi-Fi), over Bluetooth or by physical connection using a cable, for example through USB. If tethering is done over WLAN, the feature may be branded as a personal hotspot or mobile hotspot, which allows the device to serve as a portable router. Mobile hotspots may be protected by a PIN or password. The Internet-connected mobile device can act as a portable wireless access point and router for devices connected to it.
Tethering - Wikipedia, the free encyclopediaParity RAM will detect when an error occurs, but will not correct the issue. ECC or Error Correction Code RAM is necessary to correct errors.
RAM parity checking is the storing of a redundant parity bit representing the parity (odd or even) of a small amount of computer data (typically one byte) stored in random-access memory, and the subsequent comparison of the stored and the computed parity to detect whether a data error has occurred. The parity bit was originally stored in additional individual memory chips; with the introduction of plug-in DIMM, SIMM, etc. modules, they became available in non-parity and parity (with an extra bit per byte, storing 9 bits for every 8 bits of actual data) versions.
RAM_parity - Wikipedia, the free encyclopediaA server has experienced a hard drive failure in your data center. The server is utilizing a RAID 6 configuration. How many drives can fail and still remain fault-tolerant?
In a RAID 6 configuration, two drives can fail and fault tolerance will still remain.
In computer storage, the standard RAID levels comprise a basic set of RAID ("redundant array of independent disks" or "redundant array of inexpensive disks") configurations that employ the techniques of striping, mirroring, or parity to create large reliable data stores from multiple general-purpose computer hard disk drives (HDDs). The most common types are RAID 0 (striping), RAID 1 (mirroring) and its variants, RAID 5 (distributed parity), and RAID 6 (dual parity). Multiple RAID levels can also be combined or nested, for instance RAID 10 (striping of mirrors) or RAID 01 (mirroring stripe sets). RAID levels and their associated data formats are standardized by the Storage Networking Industry Association (SNIA) in the Common RAID Disk Drive Format (DDF) standard. The numerical values only serve as identifiers and do not signify performance, reliability, generation, or any other metric. While most RAID levels can provide good protection against and recovery from hardware defects or defective sectors/read errors (hard errors), they do not provide any protection against data loss due to catastrophic failures (fire, water) or soft errors such as user error, software malfunction, or malware infection. For valuable data, RAID is only one building block of a larger data loss prevention and recovery scheme – it cannot replace a backup plan.
Standard_RAID_levels#Comparison - Wikipedia, the free encyclopediaA user has requested a DVD-ROM drive be added to their desktop PC so they can watch videos sent in by vendors. You only have a Blu-Ray player in inventory. Is it likely you deploy this to the user and meet their requirement?
The Blu-ray specification recommends but does not require backwards compatibility with DVDs. However in practice most Blu-Ray drives are backwards compatible with DVD discs and can play their content. You should check to be completely sure, but it is true that the likely scenario is your Blu-ray player will support DVDs.
Blu-ray (Blu-ray Disc or BD) is a digital optical disc data storage format. It was invented and developed in 2005 and released worldwide on June 20, 2006. It was designed to supersede the DVD format, capable of storing several hours of high-definition video (HDTV 720p and 1080p). The main application of Blu-ray is as a medium for video material such as feature films and for the physical distribution of video games for the PlayStation 3, PlayStation 4, PlayStation 5, Xbox One, and Xbox Series X. The name "Blu-ray" refers to the blue laser (actually a violet laser) used to read the disc, which allows information to be stored at a greater density than is possible with the longer-wavelength red laser used for DVDs. The polycarbonate disc is 120 millimetres (4.7 in) in diameter and 1.2 millimetres (0.047 in) thick, the same size as DVDs and CDs. Conventional or pre-BD-XL Blu-ray Discs contain 25 GB per layer, with dual-layer discs (50 GB) being the industry standard for feature-length video discs. Triple-layer discs (100 GB) and quadruple-layer discs (128 GB) are available for BD-XL re-writer drives.High-definition (HD) video may be stored on Blu-ray Discs with up to 1920 × 1080 pixel resolution, at 24& 50/60 progressive or 50/60 interlaced frames per second. DVD discs were limited to a maximum resolution of 480 (NTSC, 720×480 pixels) or 576 lines (CCIR 625/50, 720×576 pixels, commonly used with PAL). Besides these hardware specifications, Blu-ray is associated with a set of multimedia formats. The BD format was developed by the Blu-ray Disc Association, a group
Blu-ray - Wikipedia, the free encyclopediaThere is a loud clicking noise coming from a user's PC and they've noticed that the PC is running slower than it normally would. These symptoms mean that you should focus your diagnosis on the:
Loud clicking and general slowness are typical symptoms of a failing hard disk drive.
Click of death is a term that had become common in the late 1990s referring to the clicking sound in disk storage systems that signals a disk drive has failed, often catastrophically.The clicking sound itself arises from the unexpected movement of the disk's read/write actuator. At startup, and during use, the disk head must move correctly and be able to confirm that it is correctly tracking data on the disk. If the head fails to move as expected or upon moving cannot track the disk surface correctly, the disk controller may attempt to recover from the error by returning the head to its home position and then retrying, at times causing an audible "click". In some devices, the process automatically retries, causing a repeated or rhythmic clicking sound, sometimes accompanied by the whirring sound of the drive plate spinning.
Click_of_death - Wikipedia, the free encyclopediaSingle-mode fiber, per TIA-598C standards should be yellow for easy identification.
Multi-mode optical fiber is a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Multi-mode links can be used for data rates up to 100 Gbit/s. Multi-mode fiber has a fairly large core diameter that enables multiple light modes to be propagated and limits the maximum length of a transmission link because of modal dispersion. The standard G.651.1 defines the most widely used forms of multi-mode optical fiber.
Multi-mode_optical_fiber#Comparison_with_single-mode_fiber - Wikipedia, the free encyclopediaA ticket has been escalated to you regarding a client that is not holding BIOS configurations between shutdowns and is experiencing system-time issues. The first thing you should attempt is:
Replacing the CMOS battery should alleviate issues of settings not being saved and time changes. A CMOS battery is necessary to ensure that BIOS configurations are kept in memory after the PC has been shut down.
Nonvolatile BIOS memory refers to a small memory on PC motherboards that is used to store BIOS settings. It is traditionally called CMOS RAM because it uses a volatile, low-power complementary metal–oxide–semiconductor (CMOS) SRAM (such as the Motorola MC146818 or similar) powered by a small "CMOS" battery when system and standby power is off. It is referred to as non-volatile memory or NVRAM because, after the system loses power, it does retain state by virtue of the CMOS battery. The typical NVRAM capacity is 256 bytes.The CMOS RAM and the real-time clock have been integrated as a part of the southbridge chipset and it may not be a standalone chip on modern motherboards. In turn, the southbridge have been integrated into a single Platform Controller Hub. Today's UEFI motherboards use NVRAM to store configuration data (NVRAM is a part of the UEFI flash ROM), but by many OEMs' design, the UEFI settings are still lost if the CMOS battery fails.
Nonvolatile_BIOS_memory - Wikipedia, the free encyclopediaA user has reported that their laptop screen flickers for a few seconds and turns black. They can still see an image in the background. The following has likely failed and will need to be replaced:
The symptoms describe a failing inverter, which provides power to the screen's backlight.
A laptop computer or notebook computer, also known as a laptop or notebook for short, is a small, portable personal computer (PC). Laptops typically have a clamshell form factor with a flat panel screen (usually 11–17 in or 280–430 mm in diagonal size) on the inside of the upper lid and an alphanumeric keyboard and pointing device (such as a trackpad and/or trackpoint) on the inside of the lower lid, although 2-in-1 PCs with a detachable keyboard are often marketed as laptops or as having a "laptop mode". Most of the computer's internal hardware is fitted inside the lower lid enclosure under the keyboard, although many laptops have a built-in webcam at the top of the screen and some modern ones even feature a touch-screen display. In most cases, unlike tablet computers which run on mobile operating systems, laptops tend to run on desktop operating systems which have been traditionally associated with desktop computers. Laptops run on both an AC power supply and a rechargeable battery pack and can be folded shut for convenient storage and transportation, making them suitable for mobile use. Today, laptops are used in a variety of settings, such as at work (especially on business trips), in education, for playing games, web browsing, for personal multimedia, and for general home computer use. The names "laptop" and "notebook" refer to the fact that the computer can be practically placed on (or on top of) the user's lap and can be used similarly to a notebook. As of 2022, in American English,
Laptop#Display - Wikipedia, the free encyclopediaYou are attempting to image a computer from a PXE server but the PC is defaulting to checking the DVD drive for an image disk. You know you should change the __________ in BIOS to select the PXE server as the image location.
Adjusting the boot sequence to utilize the network connection to connect with the PXE server will then treat it as the boot device.
In computing, booting is the process of starting a computer as initiated via hardware such as a button or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system. Restarting a computer also is called rebooting, which can be "hard", e.g. after electrical power to the CPU is switched from off to on, or "soft", where the power is not cut. On some systems, a soft boot may optionally clear RAM to zero. Both hard and soft booting can be initiated by hardware such as a button press or by a software command. Booting is complete when the operative runtime system, typically the operating system and some applications, is attained. The process of returning a computer from a state of sleep (suspension) does not involve booting; however, restoring it from a state of hibernation does. Minimally, some embedded systems do not require a noticeable boot sequence to begin functioning and when turned on may simply run operational programs that are stored in ROM. All computing systems are state machines, and a reboot may be the only method to return to a designated zero-state from an unintended, locked state. In addition to loading an operating system or stand-alone utility, the boot process can also load a storage dump program
Booting#Modern_boot_loaders - Wikipedia, the free encyclopediaLooks like thats it! You can go back and review your answers or click the button below to grade your test.