Your browser does not support JavaScript!

Electronics 1: Electronic Devices and Circuits

Showing 1-75 of 169 answers

A 4-layer pnpn device similar to Shockley diode except it has three terminals.
  • SCR Correct
A circuit of half-wave voltage doubler with the addition of another diode-capacitor section.
  • Voltage tripler Correct
A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
  • availability Correct
A consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After successfully logging into the cloud account, the customer is automatically given access to the third party online printing service. What allowed this automatic authentication to occur?
  • The cloud storage service is an approved application for the online printing service. Correct
A device that is like a diac with a gate terminal.
  • Triac Correct
A diode clamper that inserts a positive dc level in the output waveform.
  • Positive clamper Correct
A four-terminal thyristor that has two gate terminals that are used to trigger the device on and off
  • SCS Correct
A material that easily conducts electrical current.
  • Conductor Correct
A material that has no bandgap.
  • Conductor Correct
A medical office employee sends emails to patients about recent patient visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
  • patient records Correct
A mode wherein either one signal is applied to an input with the other input grounded or two opposite-polarity signals are applied to the inputs.
  • Differential mode Correct
A network administrator is conducting a training session to office staff on how to create a strong and effective password. Which password would most likely take the longest for a malicious user to guess or break?
  • mk$$cittykat104# Correct
A pentavalent impurity is added to silicon to create
  • An n-type semiconductor Correct
A pn junction is formed by
  • The boundary of a p-type and an n-type material Correct
A semiconductor operates in the reverse-breakdown region and provides stable reference voltages
  • Zener diode Correct
A single pn junction device and therefore, does not belong to the thyristor family.
  • UJT Correct
A solid material in which the atoms are arranged in a symmetrical pattern.
  • Crystal Correct
A special purpose diode uses graded doping where the doping level of the semiconductive materials is reduced as the pn junction is approached.
  • Step-recovery diode Correct
A special purpose diode which consists of heavily doped p and n regions separated by an intrinsic region.
  • PIN diode Correct
A trivalent impurity is added to silicon to create
  • A p-type semiconductor Correct
A type of current wherein holes are moving because of the vacancy left in every move of free electrons.
  • hole current Correct
A type of FET that operates with a reverse-biased pn junction to control current in a channel.
  • JFET Correct
A type of input signal mode wherein either one signal is applied to an input with the other input grounded or two opposite-polarity signals are applied to the inputs.
  • Differential mode Correct
A type of limiter which the level to which an ac voltage can be adjusted by adding a bias voltage in series with a diode.
  • Biased Limiter Correct
A user is having difficulty remembering passwords for multiple online accounts. What is the best solution for the user to try?
  • Save the passwords in a centralized password manager program. Correct
A user is surfing the Internet using a laptop from a public WiFi cafe. What should be checked first when the user connects to the public network?
  • if the laptop requires user authentication for file and media sharing Correct
A voltage multiplier that produces an output voltage from the input voltage with a multiplication factor of four.
  • Voltage quadrupler Correct
A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?
  • confidentiality Correct
Alicia, a company employee, has lost her corporate identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to obtain a temporary badge. You lend her your identification badge until she can obtain a replacement.
  • unethical Correct
Also known as diode limiter.
  • Diode Clipper Correct
Also known as the 4-layer diode.
  • Shockley diode Correct
An American Physicist who first describe the properties of breakdown voltage.
  • Clarence Melvin Zener Correct
An employee is at a restaurant with friends and describes an exciting new video game that is under development at the company the employee works for. Is the behavior of the employee ethical or unethical?
  • unethical Correct
An employee is laid off after fifteen years with the same company. The employee is then hired by another company within a week. In the new company, the employee shares documents and ideas for products that the employee proposed at the original company.
  • unethical Correct
An employee points out a design flaw in a new product to the department manager.
  • ethical Correct
Another application of diode circuit which used to clip a portion of signal voltages above or below certain levels.
  • Diode Limiter Correct
Another name is SUS.
  • Shockley diode Correct
Another name of constant-current diode.
  • Current regulator diode Correct
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
  • data encryption Correct
Diode clamper is also known as __________.
  • DC restorer Correct
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year.
  • ethical Correct
Fill in the blank. _________ is a group of compromised or hacked computers (bots) controlled by an individual with malicious intent.
  • botnet Correct
Fill in the blank. Any device that controls or filters traffic going in or out of the network is known as a ____
  • firewall Correct
Fill in the blank.The individual user profile on a social network site is an example of a/an_____identity.
  • online Correct
For what purpose would a network administrator use the Nmap tool?
  • detection and identification of open ports Correct
Free electrons are also called __________.
  • Conduction electrons Correct
gather intelligence or commit sabotage on specific goals on behalf of their government
  • state-sponsored attackers Correct
High-current diodes used primarily in high-frequency and fast-switching applications.
  • Schottky diode Correct
Holes in an n-type semiconductor are
  • Minority carriers that are thermally produced Correct
How can a user prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hot spot?
  • Connect with a VPN service. Correct
How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?
  • Operate the web browser in private browser mode Correct
It adds a dc level to an ac voltage.
  • Diode Clamper Correct
It determines the effectiveness of the filter.
  • Ripple factor Correct
It has a single pn junction and therefore, does not belong to the thyristor family.
  • UJT Correct
It has a small transparent window that allows light to strike the pn junction.
  • Photodiode Correct
It is a field-effect transistor that has no pn junction.
  • MOSFET Correct
It is a four-terminal thyristor that has two gate terminals that are used to trigger the device on and off.
  • SCS Correct
It is a two-terminal four-layer semiconductor device that conducts current in either direction when activated
  • Diac Correct
It is also known as tuning diodes.
  • Varactor diode Correct
It is another name for MOSFET because of the polycrystalline silicon used instead of metal for the gate materials.
  • IGFET Correct
It is created from the addition of a trivalent impurity in silicon.
  • A p-type semiconductor Correct
It is represented like a switch.
  • Ideal diode model Correct
It is the difference of the input bias currents, expressed as an absolute value.
  • Input offset current Correct
It is the voltage variation in the capacitor.
  • Filter voltage Correct
It is used as a dc-controlled microwave switch operated by rapid changes in bias or as a modulating device that takes advantage of the variable forward-resistance characteristic.
  • PIN diode Correct
It means there are no impurities.
  • Intrinsic Correct
It only conducts current in one direction and block the other direction.
  • Diode Correct
It produces an output voltage from the input voltage with a multiplication factor of two.
  • Voltage Doubler Correct
It states how much change occurs in the output voltage over a certain range of load current values.
  • Load Regulation Correct
It symbolizes the broken lines of E-MOSFETs.
  • Absence of a physical channel Correct
make political statements in order to create an awareness of issues that are important to them
  • hacktivists Correct
make political statements, or create fear, by causing physical or psychological damage to victims
  • terrorists Correct
Refer to the exhibit. Rearrange the letters to fill in the blank The behavior-based analysis involves using baseline information to detect _______that could indicate an attack.
  • anomaly Correct
Special purpose diode that is monochromatic and also emits coherent light.
  • Laser diode Correct
The _____________ produces a depletion region along the pn junction.
  • Reverse-biased Correct
All courses