Hardware A+ Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bijoy3
B
Bijoy3
Community Contributor
Quizzes Created: 3 | Total Attempts: 3,910
Questions: 20 | Attempts: 1,531

SettingsSettingsSettings
Computer Hardware Quizzes & Trivia

Learn for life give A+ test


Questions and Answers
  • 1. 

    What should be done if CMOS contains a password you don’t know?

    • A.

      Keep typing different password combinations

    • B.

      Install the COMS shorting jumper to erase the CMOS data

    • C.

      Find a machine that does not use password protection

    • D.

      Enter the CMOS program and reset or erase the password

    Correct Answer
    B. Install the COMS shorting jumper to erase the CMOS data
    Explanation
    If the CMOS contains a password that you don't know, the best course of action would be to install the COMS shorting jumper to erase the CMOS data. This is a common method used to reset the CMOS settings and remove any passwords that may be set. By installing the jumper, it completes a circuit that clears the CMOS memory, effectively erasing any password that was previously set.

    Rate this question:

  • 2. 

    Which of the following technique is used to troubleshoot if the adapter card and its slots are working fine, but services are unavailable?

    • A.

      Replace adapter card that is electronically damaged

    • B.

      Visually inspect cards and cables and reconnect if necessary

    • C.

      Resolve hardware resource conficts

    • D.

      Replace adapter card that is physically damaged

    Correct Answer
    B. Visually inspect cards and cables and reconnect if necessary
    Explanation
    Visually inspecting cards and cables and reconnecting if necessary is the appropriate technique to troubleshoot if the adapter card and its slots are working fine but services are unavailable. This is because there may be loose connections or faulty cables causing the services to be unavailable, and by visually inspecting and reconnecting them, any issues can be identified and resolved.

    Rate this question:

  • 3. 

    1. How will you grather information about the modems installed in the computer and the network configuration without checking in the control panel utility?

    • A.

      By using the registry sub tree HKEY_CFLASSES_ROOT

    • B.

      By using the registry sub tree HKEY_LOCAL_MACHINE

    • C.

      By using the registry sub tree HKEY_CURRENT_USER

    • D.

      By using the registry sub tree HKEY_USERS

    Correct Answer
    B. By using the registry sub tree HKEY_LOCAL_MACHINE
    Explanation
    The correct answer is by using the registry sub tree HKEY_LOCAL_MACHINE. The HKEY_LOCAL_MACHINE registry sub tree contains information about the hardware and software configuration of the computer, including information about installed modems and network configuration. Therefore, by accessing this registry sub tree, one can gather information about the modems installed in the computer and the network configuration without checking in the control panel utility.

    Rate this question:

  • 4. 

    Which of the following is not a function of fully uninterruptible Power Supply system?

    • A.

      Long term data backup

    • B.

      Keeping the batteries online

    • C.

      Monitor the power input line

    • D.

      Switch to output of battery power when a loss in power is detected

    Correct Answer
    A. Long term data backup
    Explanation
    A fully uninterruptible Power Supply (UPS) system is designed to provide continuous power to critical devices in the event of a power outage. It ensures that the devices connected to it remain operational without any interruption. The functions of a UPS system include keeping the batteries online, monitoring the power input line, and switching to the output of battery power when a loss in power is detected. However, long term data backup is not a function of a UPS system. Backup of data is typically handled by separate data storage systems or backup solutions.

    Rate this question:

  • 5. 

    Salman need to attache an external CD-Rom drive. Which option needs to be verified when installing an external drive that in not checked normally on installing a internal drive on a notebook?

    • A.

      Close the screen of the notebook PC

    • B.

      Verify that the power switch, or power supply, is turned off.

    • C.

      Verify that proper device drives are installed.

    • D.

      Verify that Hard drive is disconnected

    Correct Answer
    B. Verify that the power switch, or power supply, is turned off.
    Explanation
    When installing an external CD-Rom drive on a notebook, it is important to verify that the power switch or power supply is turned off. This is not normally checked when installing an internal drive on a notebook because the internal drive is already connected to the power supply. However, when attaching an external drive, it is necessary to ensure that the power switch or power supply is turned off to avoid any potential damage or electrical shock.

    Rate this question:

  • 6. 

    .---------------------------lasera are capable of creating eye damage through chronic, continous exposure; this classs include barcode readers.

    • A.

      Class 5

    • B.

      Class 3

    • C.

      Class 1

    • D.

      Class 2

    • E.

      Class 4

    Correct Answer
    D. Class 2
    Explanation
    Class 2 lasers are considered safe for eye exposure because they emit low power levels that are not likely to cause damage, even with chronic and continuous exposure. Class 1 lasers are also safe, but they are limited to very low power levels. Class 3 lasers can cause eye damage with direct exposure, while Class 4 lasers can cause eye damage and also pose a fire hazard. The statement in the question suggests that barcode readers, which are commonly used in various industries, fall under the Class 2 category.

    Rate this question:

  • 7. 

    Port COM1 is type of---------------------------------------.

    • A.

      Parallel Port

    • B.

      PS/2 Port

    • C.

      USB port

    • D.

      Serial Port

    Correct Answer
    D. Serial Port
    Explanation
    The correct answer is Serial Port. A serial port is a type of port that enables serial communication, which means data is transferred one bit at a time. It is commonly used to connect devices such as modems, mice, and printers to a computer. Unlike parallel ports, which transfer multiple bits simultaneously, a serial port transfers data sequentially. PS/2 ports are used for connecting keyboards and mice, USB ports are used for connecting various devices, and parallel ports are used for connecting printers and other parallel devices.

    Rate this question:

  • 8. 

    Sushil is planning to create a data processing-intensive crossword generator software. He had recently purched a good quality processor with L1 and L2 caches but want to increase its speed to allow his software to be tested well. Which of the following methods can he use to increase the speed of his processor at minimal cost?

    • A.

      Purchase another processor with L3 cache also.

    • B.

      Buy a new processor that supports MMX

    • C.

      Use Throttling

    • D.

      Use overclocking

    Correct Answer
    D. Use overclocking
    Explanation
    Overclocking is a method that Sushil can use to increase the speed of his processor at minimal cost. Overclocking involves increasing the clock speed of the processor beyond its default specifications, which can result in improved performance. This can be done by adjusting the settings in the computer's BIOS or using specialized software. By overclocking his processor, Sushil can achieve a higher processing speed without having to purchase additional hardware or software.

    Rate this question:

  • 9. 

    Identify which of thew following is not a condition when adapter’s icon shows an exclamation mark on a yellow background?

    • A.

      The PC Card slot has been disabled in the CMOS

    • B.

      The card may be faulty

    • C.

      Th edevice is physically not present

    • D.

      The PC controller in the PC may be faulty

    Correct Answer
    A. The PC Card slot has been disabled in the CMOS
    Explanation
    When the adapter's icon shows an exclamation mark on a yellow background, it indicates that there is an issue with the adapter or the device it is connected to. The other options listed are all possible conditions that can cause this problem, except for "The PC Card slot has been disabled in the CMOS." If the PC Card slot is disabled in the CMOS (Complementary Metal-Oxide-Semiconductor), it means that the system's BIOS settings have been configured to disable the slot, which is not related to the adapter showing an exclamation mark on a yellow background.

    Rate this question:

  • 10. 

    36.Missing NTLDR is a type of _____________________________________________.

    • A.

      Application Error

    • B.

      Boot Error

    • C.

      System Lockup Error

    • D.

      System Stop Error

    Correct Answer
    B. Boot Error
    Explanation
    Missing NTLDR is a type of boot error. NTLDR (NT Loader) is a crucial component of the Windows operating system that is responsible for loading the operating system. When the NTLDR file is missing or corrupted, the computer cannot boot properly, resulting in a boot error. This error typically occurs when the computer's boot sector is damaged or when there is an issue with the hard drive or the operating system's files.

    Rate this question:

  • 11. 

    Which statement is NOT TRUE about Disk Management Tool?

    • A.

      Disk Management Tool is used to convert partitions from the FAT or FAT32 file to NTFS

    • B.

      Disk Management Tool is used to determine the amount of free space on a partition

    • C.

      Disk Management Tool is used to display, create, and remove partitions on the drives

    • D.

      Disk Management Tool is used to view file and folder properties stored on the disk

    Correct Answer
    D. Disk Management Tool is used to view file and folder properties stored on the disk
    Explanation
    The Disk Management Tool is not used to view file and folder properties stored on the disk. It is primarily used to display, create, and remove partitions on the drives, convert partitions from FAT or FAT32 to NTFS, and determine the amount of free space on a partition.

    Rate this question:

  • 12. 

    Untill yesterday, ypur windows based computer was working fine. But today you receive “Boot record Not found” error massage. What is the first thing that you should do?

    • A.

      Create an emergency ntlr disk

    • B.

      Create an emergency boot disk

    • C.

      Replace the hard drive

    • D.

      Run the FDISK program and reformat the hard drive

    • E.

      Run the FDISK program with MRR option

    Correct Answer
    D. Run the FDISK program and reformat the hard drive
  • 13. 

    Kamal has built a custom computer using individual hardware components. When he start up the computer, one long beep and one short beep is produced. How should he troubleshoot this problem?  

    • A.

      He should check if RAM chips are seated propely

    • B.

      He should check for moniter power, video cable nad display adapter

    • C.

      He should swap the RAM chips

    • D.

      He should replace the hard disk

    Correct Answer
    B. He should check for moniter power, video cable nad display adapter
  • 14. 

    For a node on a network following information are given: IP Address is equal to 139.87.140.76 Subnet mask is equal to 255.255.255.0 Which is the correct network ID for this system?

    • A.

      139.87.255.255

    • B.

      255.255.255.76

    • C.

      139.87.140.0

    • D.

      139.87.140.255

    Correct Answer
    C. 139.87.140.0
    Explanation
    The correct network ID for this system is 139.87.140.0 because the subnet mask is 255.255.255.0, which means that the first three octets of the IP address are the network address and the last octet can be any value within the network. Therefore, the network ID is obtained by setting the last octet to 0.

    Rate this question:

  • 15. 

    Which of the following statement is NOT TRUE about software based firewall security issues?

    • A.

      Browser used for the communication is firewall security issue in software based firewall as some browser bypass software base firewall

    • B.

      Disabling is firewall security issue, because it isn’t integrated into a hardware device it can be disabling by mistake

    • C.

      Open ports is firewall security issue, As it’s sometimes difficult to configure FTP or other internetwork communication through a firewall

    • D.

      Outgoing traffic is a firewall security issue because firewall controls only incoming traffic

    Correct Answer
    A. Browser used for the communication is firewall security issue in software based firewall as some browser bypass software base firewall
    Explanation
    The statement "Browser used for the communication is firewall security issue in software based firewall as some browser bypass software base firewall" is not true because software-based firewalls are designed to control and monitor the traffic that passes through the browser as well. They are capable of filtering and blocking unwanted or malicious traffic, including traffic from browsers. Therefore, the statement is incorrect as it suggests that browsers can bypass the firewall, which is not the case.

    Rate this question:

  • 16. 

    Program Name Installation is a type of restore point that is created:

    • A.

      Before installing any update from the Microsoft websitre that is autamatically downloaded with the Auto Update Feature

    • B.

      When Windows XP is installed. It can be used to roll the system back to its state just after installation

    • C.

      After every 24 hours. If the computer is off more than 24 hours, one is created at the next reboot

    • D.

      When programs are installed with installer tools such as installshield and Windows XP installer

    Correct Answer
    D. When programs are installed with installer tools such as installshield and Windows XP installer
    Explanation
    Program Name Installation is a type of restore point that is created when programs are installed with installer tools such as installshield and Windows XP installer. This means that whenever a program is installed using these installer tools, a restore point is automatically created. This restore point can be used to roll the system back to its state just after the installation of the program.

    Rate this question:

  • 17. 

    A user is trying to start the system. During the boot process he receives a message of type “Non bootable/Non accessible disk”. As a PC technician what could not be the possible cause of the error?

    • A.

      NTLRD file might be missing or corrupt. Application Error

    • B.

      CMOS boot sequence is not correct

    • C.

      Hardware problem with the hard disk or hard disk controller.

    • D.

      There is bisk in the floppy disk drive

    Correct Answer
    A. NTLRD file might be missing or corrupt. Application Error
    Explanation
    The possible cause of the error mentioned in the question is "NTLRD file might be missing or corrupt." This means that the NTLRD file, which is a crucial system file responsible for the boot process, is either not present or damaged. This can result in the system being unable to boot properly. The other options mentioned, such as CMOS boot sequence, hardware problems with the hard disk or controller, and a disk in the floppy disk drive, are all potential causes of boot issues, but they are not mentioned as the possible cause in this question.

    Rate this question:

  • 18. 

    In a laser printer, a thermal fuse is used to prevent--------------------------------------------------------.

    • A.

      Heat sink failure

    • B.

      A fuser from overheating

    • C.

      A high-voltage power supply from overheating

    • D.

      A low-voltage power supply from overheating

    Correct Answer
    B. A fuser from overheating
    Explanation
    A thermal fuse is used in a laser printer to prevent the fuser from overheating. The fuser is a component in the printer that heats up to melt the toner onto the paper. If the fuser were to overheat, it could cause damage to the printer or even start a fire. The thermal fuse is designed to break the electrical circuit if the temperature exceeds a certain threshold, thus preventing the fuser from overheating and ensuring the safe operation of the printer.

    Rate this question:

  • 19. 

    MR Dawa owned a laptop computer, which he used extensively in his office. Now his son, Wally, is insisting him to buy a desktop for he wants to play his favorite MP3 music on the system. Suggest him analternative such that he can avail the functionality of a desktop system.

    • A.

      Buy a MP3 player.

    • B.

      Upgrade his laptop

    • C.

      Connect the laptop with the internet.

    • D.

      Buy a docking station.

    Correct Answer
    D. Buy a docking station.
    Explanation
    Buying a docking station would be a suitable alternative for MR Dawa as it would allow him to connect his laptop to a desktop setup. With a docking station, he can connect his laptop to a larger monitor, keyboard, and mouse, essentially turning it into a desktop system. This would enable his son, Wally, to play his favorite MP3 music on a larger screen and use a more comfortable setup. Additionally, it would save MR Dawa the cost of buying a separate desktop system.

    Rate this question:

  • 20. 

    Unwanted software loaded in ti system for the purpose of presenting commercial advertisement to the user is called___________________.

    • A.

      Spyware

    • B.

      Spam

    • C.

      Worms

    • D.

      Adware

    Correct Answer
    D. Adware
    Explanation
    Adware refers to unwanted software that is installed on a system with the intention of displaying commercial advertisements to the user. It is different from other types of unwanted software like spyware, spam, and worms, as its main purpose is to generate revenue through advertising. Adware often comes bundled with legitimate software downloads and can be difficult to remove. It can cause annoying pop-up ads, slow down the system, and compromise user privacy by collecting personal information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2009
    Quiz Created by
    Bijoy3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.