IT Essentials - Chapters 1-10 - Recap

75 Questions  I  By Mikaela647
Please take the quiz to rate it.

IT Essentials Quizzes & Trivia
This test will aid as a study guide recap in preparation for the IT Essentials final exam chapters 1-10

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    Which type of ROM can be erased by UV light?
    • A. 

      PROM

    • B. 

      EEPROM

    • C. 

      EPROM

    • D. 

      ROM


  • 2. 
    What socket does the CPU fit into? (1 or 3 words)

  • 3. 
    What architecture uses a relatively small set of instructions which are designed to execute rapidly? (1 word)

  • 4. 
    Which technique enhances the CPUs performance by executing multiple peices of code simultaneously on each pipeline?
    • A. 

      CPU throttling

    • B. 

      Flashing the BIOS

    • C. 

      Hyperthreading

    • D. 

      CISC


  • 5. 
    Which circuit board holds SDRAM, DDR SDRAM and DDR2 SDRAM chips?
    • A. 

      SIMM

    • B. 

      DIP

    • C. 

      RIMM

    • D. 

      DIMM


  • 6. 
    What IEE standard is Firewire and how many devices can it support?
    • A. 

      1284 and 127

    • B. 

      1394 and 63

    • C. 

      1394 and 127

    • D. 

      1284 and 63


  • 7. 
    Computer components use ................. to request information from the CPU. The ............... travels along a wire on the motherboard to the CPU.  When the CPU receives a .............., it determines how to fulfill this request. (1 or 2 words)

  • 8. 
    Which type of video connector has a 24 pin or 29 pin female connector and provides compressed digital output to a monitor?
    • A. 

      HDMI

    • B. 

      VGA

    • C. 

      AAV

    • D. 

      DVI

    • E. 

      RCA


  • 9. 
    How many conductors does a SATA cable have?

  • 10. 
    What type of cache memory is external cache originally mounted on the motherboard near the CPU? (1 word)

  • 11. 
    The operating system enables the user to interact with software and hardware.  There are two types of user interfaces; which interface interacts with menus and icons? (1 or 3 words)

  • 12. 
    This partition normally uses the remaining free space on a hard drive or takes the place of primary partition. There can be only one ....................    ..........................  per hard drive, and it can be subdivided into smaller sections called logical drives. (2 words)

  • 13. 
    What list provides a detailed inventory of hardware that has been tested and is known to work with the operating system?
    • A. 

      Microsoft Compatibility Assistant

    • B. 

      Microsoft Knowledge Base

    • C. 

      Hardware Compatibility List

    • D. 

      Windows XP Manual


  • 14. 
    Which registry file contains information about the hardware and software in the computer system?
    • A. 

      HKEY_CURRENT_USER

    • B. 

      HKEY_LOCAL_MACHINE

    • C. 

      HKEY_USERS

    • D. 

      HKEY_CLASSES_ROOT


  • 15. 
    NTFS can be converted back to FAT32 file system. (TRUE or FALSE)

  • 16. 
    What is meant by a laptop device being hot-swappable?
    • A. 

      The device can interface with a laptop wirelessly

    • B. 

      The device does not needs a driver to interface the computer OS

    • C. 

      The device can be connected using more than one type of port

    • D. 

      The laptop does not need to be powered off to install or remove the device


  • 17. 
    What does ACPI stand for?

  • 18. 
    Which items are hot-swappable on a laptop? (pick 2)
    • A. 

      Hard drive

    • B. 

      USB flash drive

    • C. 

      LCD screen

    • D. 

      Optical drive

    • E. 

      RAM


  • 19. 
    The ............. .............. slot uses an open standard interface to connect to peripherals using the CardBus standard. (2 words)

  • 20. 
    What are the pin configurations for the PC ExpressCard? (pick 2)
    • A. 

      34-pin

    • B. 

      36-pin

    • C. 

      48-pin

    • D. 

      54-pin

    • E. 

      57-pin


  • 21. 
    In Windows XP, the ACPI power management mode must be enabled in BIOS to allow the OS to configure all the power management states. (TRUE or FALSE)

  • 22. 
    What type of memory is used in laptops?
    • A. 

      SIMM

    • B. 

      DIMM

    • C. 

      SODIMM

    • D. 

      PIMM

    • E. 

      RIMM


  • 23. 
    Laptops processors use CPU .................................. to modify the clock speed to reduce power consumption and heat. (1 word)

  • 24. 
    Which type of cell phone standard uses the standard name GPRS (General Packet Radio Service)?
    • A. 

      2G

    • B. 

      2.5G

    • C. 

      3G

    • D. 

      3.5G

    • E. 

      4G


  • 25. 
    What would you use to clean a laptop screen?
    • A. 

      Trichloroethane solvent

    • B. 

      Isopropyl alcohol and water

    • C. 

      Window cleaner

    • D. 

      Ammonia based solvent


  • 26. 
    Documents and applications are saved to a temporary file on the hard drive, and it takes longer to power on.  What type of power management is this? (1 word)

  • 27. 
    What is the easiest way to extend the life of a laptop and keep it in optimal working order?
    • A. 

      Clean the laptop regularly

    • B. 

      Do a clean reinstall of the OS

    • C. 

      Replace parts regularly

    • D. 

      Back up important information monthly


  • 28. 
    ............ is the type of display technology used in laptops. (1or 3 words)

  • 29. 
    A user obtains a new laptop and reports that it does not fit into the existing docking station.  What would be the most likely solution?
    • A. 

      Docking stations are universal. Talk the user through how to install the laptop in the docking station

    • B. 

      Arrange for a level two technician to go out and install the laptop

    • C. 

      Docking stations are proprietary. Verify that the user has a compatible model

    • D. 

      The docking station must be broken, arrange for a replacement


  • 30. 
    How can you toggle between a connected desktop monitor and the laptop?
    • A. 

      Use the shift key

    • B. 

      Use the function key

    • C. 

      Go onto the internet

    • D. 

      Disable the laptop screen in the control panel

    • E. 

      Change the screen resolution


  • 31. 
    What print technology do laser printers use?
    • A. 

      Piezoelectric

    • B. 

      Electrophotographic

    • C. 

      Electrostatic spray

    • D. 

      Impact


  • 32. 
    The average length of time that a printer will work without failing is called the ................. (1 or 4 words)

  • 33. 
    In the laser print process, what is the phase called when the photosensitive drum is scanned with the laser beam?
    • A. 

      Fusing

    • B. 

      Cleaning

    • C. 

      Developing

    • D. 

      Writing

    • E. 

      Conditioning


  • 34. 
    A user has contacted the helpdesk and stated that their scanner is not scanning.  They are using a SCSI connected scanner.  What would you advise the user to do?
    • A. 

      Uninstall and reinstall the driver

    • B. 

      Make sure the scanner is started before the computer

    • C. 

      Unlock the scanner head

    • D. 

      Replace the connection cables


  • 35. 
    Some scanners can create text documents using .....................  software. (1 or 3 words)

  • 36. 
    A user complains that their system receives hundreds or thousands of junk e-mails daily.  What could be the problem and how would you solve it?
    • A. 

      A trojan horse is on the user's system; run a virus scan

    • B. 

      This may be a denial of service attack. At the e-mail server, filter out e-mail from the sender

    • C. 

      Clear the user's outbox as this could be full and overloading his outlook

    • D. 

      Adware has caused the problem. Close down the internet and reboot the computer


  • 37. 
    ..................  is a method of gaining access to resources on devices by pretending to be a trusted computer. (1 word)

  • 38. 
    A .................  .................... , like a worm, does not need to be attached to other software to infect a host. (2 words)

  • 39. 
    With ........... ...................... the user can control the type of data sent to a computer by selecting which ports will be open and which will be secure. (2 words)

  • 40. 
    A technician is attempting to secure a wireless network.  Which 2 options should be performed to secure access to the network? (pick 2)
    • A. 

      Change the default administrator passwork for all access points

    • B. 

      Install a security appliance to stop all wireless traffic

    • C. 

      Enable the broadcasting of the SSID for only one access point

    • D. 

      Use MAC filtering

    • E. 

      Use the default SSID values for the access points


  • 41. 
    E-mail and text communications have a set of personal and business rules called ................. (1 word)

  • 42. 
    Which type of customer is the only type you should politely interrupt?
    • A. 

      Rude

    • B. 

      Knowledgeable

    • C. 

      Talkative

    • D. 

      Angry

    • E. 

      Inexperienced


  • 43. 
    Information or data that is subject to ethical customs includes the following items?
    • A. 

      E-mails

    • B. 

      Records or data on the computer

    • C. 

      Telephone lists

    • D. 

      Hard copies of files

    • E. 

      All of the above


  • 44. 
    A .......................... is a contract that defines expectations between an organisation and the vendor to provide an agreed upon level of support. (1 or 3 words)

  • 45. 
    You can make changes to the system software or hardware configuration without the customer's permission if they are unavailable and you are able to fix the problem.  (TRUE or FALSE)

  • 46. 
    .........................  ........................... is a regular and systematic inspection, cleaning and replacement of worn parts, materials and systems by ensuring that they are in good working order. (2 words)

  • 47. 
    Which common tasks are carried out during preventative maintenance? (pick 3)
    • A. 

      Check and secure loose cables

    • B. 

      Update the RAM

    • C. 

      Clean the mouse and keyboard

    • D. 

      Update drivers

    • E. 

      Reinstall the OS


  • 48. 
    What would you include on a software maintenance schedule? (pick 3)
    • A. 

      Change BIOS configuration

    • B. 

      Review software updates

    • C. 

      Review security patches

    • D. 

      Replace RAM

    • E. 

      Defragment the hard drive


  • 49. 
    When system, user, or software errors occurs on a computer, the ............... .................  is updated with the information about the errors. (2 words)

  • 50. 
    Where would you check on your computer to see if all your devices are working correctly?     (2 words)

  • 51. 
    You would wear an antistatic wrist strap when replacing power supplies or monitors. (TRUE or FALSE

  • 52. 
    A sudden increase in voltage that lasts for a very short period and exceeds 100 percent of the normal voltage on a line is called?
    • A. 

      Blackout

    • B. 

      Brownout

    • C. 

      Noise

    • D. 

      Spike

    • E. 

      Power surge


  • 53. 
    A vacuum cleaner ia ideal for cleaning the inside of a computer case or a laptop keyboard. (TRUE or FALSE)

  • 54. 
    If the humidity level is too low, the chance of .................. increases. (1 or 2 words)

  • 55. 
    To optimise the space on a hard drive to allow faster access to programs and data you would use ..................
    • A. 

      Fdisk

    • B. 

      Scandisk

    • C. 

      Disk Management

    • D. 

      Defrag

    • E. 

      Disk cleanup


  • 56. 
    This type of cable has either 40 or 80 conductors. (1 or 4 words)

  • 57. 
    When installing a used CPU, you must clean the CPU and the base of the heat sink with ........
    • A. 

      Compressed air

    • B. 

      Isopropyl alcohol

    • C. 

      Ammonia based solution

    • D. 

      Water and a soft cloth


  • 58. 
    What happens if pin 1 on the floppy drive data cable is not aligned with pin 1 on the drive connector?
    • A. 

      The computer will not boot up

    • B. 

      The drive activity light will remain on

    • C. 

      The drive works as normal

    • D. 

      The drive continually makes a whirring noise


  • 59. 
    Wireless NICs can be installed on a computer system by .............
    • A. 

      PCI expansion slots on the motherboard

    • B. 

      PCIe expansion slots on the motherboard

    • C. 

      Externally with a USB connector

    • D. 

      All of the above


  • 60. 
    ................... ................... are installed to add functionality on a computer. (2 words)

  • 61. 
    Which class of IP address is used for multicasting?
    • A. 

      Class A

    • B. 

      Class B

    • C. 

      Class C

    • D. 

      Class D

    • E. 

      Class E


  • 62. 
    Which of the following protocols function is the downloading of e-mail messages from an e-mail server (there may be more than one answer)
    • A. 

      POP3

    • B. 

      SMTP

    • C. 

      SSH

    • D. 

      IMAP

    • E. 

      Telnet


  • 63. 
    Whereas a switch connect segments of a network, ................. are devices that connect entire networks to each other. (1 word)

  • 64. 
    10BASE5 is a coaxial cable used in networks.  It has a maximum length of...........
    • A. 

      50m

    • B. 

      100m

    • C. 

      150m

    • D. 

      500m


  • 65. 
    This operates between router devices to discover paths between networks and chooses routes based on the distance or hop count to the destination.
    • A. 

      ICMP

    • B. 

      APIPA

    • C. 

      RIP

    • D. 

      ARP


  • 66. 
    What type of LAN physical topology creates the best redundancy?
    • A. 

      Bus

    • B. 

      Ring

    • C. 

      Star

    • D. 

      Hierarchical/extended star

    • E. 

      Mesh


  • 67. 
    This is a type of Token Ring network that combines high speed performance with the advantages of the token-passing ring topology. (1 or 4 words)

  • 68. 
    This standard specifies that networks must implement the CSMA/CD access control method.  (note: it is not a wireless network)
    • A. 

      801.3

    • B. 

      801.11

    • C. 

      802.3

    • D. 

      802.11


  • 69. 
    Which level of the OSI model establishes, manages and terminates the connection between the local and remote applications?
    • A. 

      Physical

    • B. 

      Session

    • C. 

      Network

    • D. 

      Applications

    • E. 

      Data link


  • 70. 
    .................. is a method to carry telephone calls over the data networks and internet. (1 or 3 words)

  • 71. 
    A user has contacted the helpdesk and stated that their computer cannot connect to a popular website.  What could be the possible solution?
    • A. 

      Check to make sure that the DHCP server is operational and can be pinged

    • B. 

      Check DNS settings, hardware and software firewall settings

    • C. 

      Check for loose network cables

    • D. 

      Check the NIC card configuration


  • 72. 
    The most commonly used DSL technology is ..................... (1 or 4 words)

  • 73. 
    Which wireless ethernet standards are compatible with each other?
    • A. 

      802.11a and 802.11n

    • B. 

      802.11b and 802.11n

    • C. 

      802.11b, 802.11g and 802.11n

    • D. 

      802.11a, 802.11g and 802.11n


  • 74. 
    Which dotted decimal number is used to distinguish the network portion of the IP address from the host portion?
    • A. 

      Default gateway

    • B. 

      MAC address

    • C. 

      Physical address

    • D. 

      Subnet mask


  • 75. 
    10BASE-T is not susceptible to EMI.  (TRUE or FALSE)

Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.