Your browser does not support JavaScript!

Electronics 1: Electronic Devices and Circuits

Showing 76-150 of 169 answers

The 4-layer diode.
  • Shockley diode Correct
The addition of impurities to an intrinsic semiconductive material.
  • Doping Correct
The bias wherein the negative side of external voltage is connected to the n region of the diode and its positive side is connected to the p region.
  • Forward Bias Correct
The bias wherein the positive side is connected to the p region and the negative side of external voltage is connected to the n region of the diode.
  • Reverse Bias Correct
The bias wherein the positive side of external voltage is connected to the n region of the diode and its negative side is connected to the p region.
  • Reverse Bias Correct
The circuit wherein the during the negative alternation of the ac input voltage, the diode is reverse-biased and there is no current.
  • Full-wave rectifier Correct
The condition that allows current through the pn junction
  • Forward Bias Correct
The configuration that has high input impedance and low output impedance.
  • Common Collector Configuration Correct
The connection wherein the negative terminal of the source is connected to the anode side of the circuit and the positive terminal is connected to the cathode side.
  • Reverse-bias connection Correct
The depletion region is created by
  • Diffusion Correct
The differential dc voltage required between the inputs to force the output to 0 V.
  • Input offset voltage Correct
The following are examples of trivalent atoms except ___________,
  • Carbon Correct
The four terminals of SCS.
  • Cathode gate, anode gate, anode and cathode Correct
The fuse rating that must be used
  • should be at least 20% larger than the calculated Ipri. Correct
The ideal diode model is represented like a/an __________.
  • simple switch Correct
The inventor of Shockley diode.
  • William Shockley Correct
The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
  • DDoS Correct
The JFET always operates with the gate-source on junction _____________.
  • Reversed-biased Correct
The JFET operates as a _______________.
  • Voltage-controlled, constant-current device Correct
The JFET three terminals.
  • Drain, source and gate Correct
The limit of external reverse-bias voltage wherein the reverse current will drastically increase.
  • Breakdown voltage Correct
The majority carriers in an p-type semiconductor are
  • Holes Correct
The meaning of MOSFET.
  • Metal Oxide Semiconductor Field Effect Transistor Correct
The n region of the diode.
  • Cathode Correct
The p region of the diode.
  • Anode Correct
The process of adding impurities is called ___________.
  • Doping Correct
The process of imparting impurities to an intrinsic semiconductive material in order to control its conduction characteristics.
  • Doping Correct
The resistance from the output.
  • Output impedance Correct
The reverse voltage is ____________ in practical diode model.
  • equal to bias voltage Correct
The SCS means ________________.
  • Silicon controlled switch Correct
The smallest particle of an element that possesses the unique characteristics of that element.
  • Atom Correct
The surge current initially occurs during ________.
  • The first turn on of the power Correct
The three terminals of SCR.
  • Anode, cathode and gate Correct
The total resistance between the base terminals.
  • Interbase resistance Correct
The transistor configuration that has a 180 out of phase relationship.
  • Common Emitter Configuration Correct
The two basic methods to turn off the SCR.
  • Anode current interruption and forced commutation Correct
The two main types of field effect transistor.
  • JFET and MOSFET Correct
The two types of JFET.
  • N-channel and P-channel Correct
The value of barrier potential of a diode.
  • 0.7 V Correct
The value of the forward voltage in practical diode model.
  • 0.7 V Correct
The value of the voltage gain of a Common Base Configuration.
  • Low (WRONG) Correct
The VGS must be __________ to have channel conductivity in n-channel E-MOSFETS in enhancement mode,
  • Positive Correct
These are family of devices constructed of four semiconductor layers.
  • Thyristors Correct
These are the two types of JFET.
  • N-channel and P-channel Correct
This term refers to the depletion region formed in the channel of a FET because of the voltage imposed on the gate.
  • Field-effect Correct
To have channel conductivity in n-channel E-MOSFETS in enhancement mode, The VGS must be __________.
  • Positive Correct
True or False?An employee does something as a company representative with the knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action.
  • true Correct
Two basic methods to turn off the SCR.
  • Anode current interruption and forced commutation Correct
Type of MOSFET that can operate in either enhancement mode or depletion mode.
  • Depletion MOSFET Correct
Type of MOSFET that operates only in enhancement mode.
  • Depletion MOSFET (WRONG) Correct
What action will an IDS take upon detection of malicious traffic?
  • create a network alert and log the detection Correct
What are the terminals of SCS?
  • Cathode gate, anode gate, anode and cathode Correct
What are the terminals of UJT?
  • Emitter, base 1 and base 2 Correct
What are three methods that can be used to ensure confidentiality of information? (Choose three.)
  • data encryption username ID and password two factor authentication Correct
What are two objectives of ensuring data integrity? (Choose two.)
  • Data is unaltered during transit. Data is not changed by unauthorized entities. Correct
What are two security implementations that use biometrics? (Choose two.)
  • voice recognition fingerprint Correct
What does SCS means?
  • Silicon controlled switch Correct
What does UJT means?
  • Unijunction transistor Correct
What happens to the depletion region during forward bias?
  • Narrows Correct
What is a reason that internal security threats might cause greater damage to an organization than external security threats?
  • Internal users have direct access to the infrastructure devices. Correct
What is an example of “hacktivism”?
  • A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill. Correct
What is an example of the a Cyber Kill Chain?
  • a planned process of cyberattack Correct
What is another name for confidentiality of information?
  • privacy Correct
What is called to a diode clamper which inserts a negative dc level in the waveform?
  • Negative clamper Correct
What is one main function of the Cisco Security Incident Response Team?
  • to ensure company, system, and data preservation Correct
What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network?
  • Place all IoT devices that have access to the Internet on an isolated network. Correct
What is the best method to avoid getting spyware on a machine?
  • Install software only from trusted websites. Correct
What is the best method to prevent Bluetooth from being exploited?
  • Always disable Bluetooth when it is not actively used. Correct
What is the last stage of the Cyber Kill Chain framework?
  • malicious action Correct
What is the main purpose of cyberwarfare?
  • to gain advantage over adversaries Correct
What is the meaning of JFET?
  • Junction field-effect transistor Correct
What is the most common goal of search engine optimization (SEO) poisoning?
  • to increase web traffic to malicious sites Correct
What is the motivation of a white hat attacker?
  • discovering weaknesses of networks and systems to improve the security level of these systems Correct
What is the purpose of a rootkit?
  • to gain privileged access to a device while concealing itself Correct
What JFET stands for?
  • Junction field-effect transistor Correct
All courses