IT Essentials - Chapters 1-10 - Recap

75 Questions  I  By Mikaela647
this test will aid as a study guide recap in preparation for the IT essentials final exam chapters 1-10

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Which type of ROM can be erased by UV light?
A.
B.
C.
D.
2.  What socket does the CPU fit into? (1 or 3 words)
3.  What architecture uses a relatively small set of instructions which are designed to execute rapidly? (1 word)
4.  Which technique enhances the CPUs performance by executing multiple peices of code simultaneously on each pipeline?
A.
B.
C.
D.
5.  Which circuit board holds SDRAM, DDR SDRAM and DDR2 SDRAM chips?
A.
B.
C.
D.
6.  What IEE standard is Firewire and how many devices can it support?
A.
B.
C.
D.
7.  Computer components use ................. to request information from the CPU. The ............... travels along a wire on the motherboard to the CPU.  When the CPU receives a .............., it determines how to fulfill this request. (1 or 2 words)
8.  Which type of video connector has a 24 pin or 29 pin female connector and provides compressed digital output to a monitor?
A.
B.
C.
D.
E.
9.  How many conductors does a SATA cable have?
10.  What type of cache memory is external cache originally mounted on the motherboard near the CPU? (1 word)
11.  The operating system enables the user to interact with software and hardware.  There are two types of user interfaces; which interface interacts with menus and icons? (1 or 3 words)
12.  This partition normally uses the remaining free space on a hard drive or takes the place of primary partition. There can be only one ....................    ..........................  per hard drive, and it can be subdivided into smaller sections called logical drives. (2 words)
13.  What list provides a detailed inventory of hardware that has been tested and is known to work with the operating system?
A.
B.
C.
D.
14.  Which registry file contains information about the hardware and software in the computer system?
A.
B.
C.
D.
15.  NTFS can be converted back to FAT32 file system. (TRUE or FALSE)
16.  What is meant by a laptop device being hot-swappable?
A.
B.
C.
D.
17.  What does ACPI stand for?
18.  Which items are hot-swappable on a laptop? (pick 2)
A.
B.
C.
D.
E.
19.  The ............. .............. slot uses an open standard interface to connect to peripherals using the CardBus standard. (2 words)
20.  What are the pin configurations for the PC ExpressCard? (pick 2)
A.
B.
C.
D.
E.
21.  In Windows XP, the ACPI power management mode must be enabled in BIOS to allow the OS to configure all the power management states. (TRUE or FALSE)
22.  What type of memory is used in laptops?
A.
B.
C.
D.
E.
23.  Laptops processors use CPU .................................. to modify the clock speed to reduce power consumption and heat. (1 word)
24.  Which type of cell phone standard uses the standard name GPRS (General Packet Radio Service)?
A.
B.
C.
D.
E.
25.  What would you use to clean a laptop screen?
A.
B.
C.
D.
26.  Documents and applications are saved to a temporary file on the hard drive, and it takes longer to power on.  What type of power management is this? (1 word)
27.  What is the easiest way to extend the life of a laptop and keep it in optimal working order?
A.
B.
C.
D.
28.  ............ is the type of display technology used in laptops. (1or 3 words)
29.  A user obtains a new laptop and reports that it does not fit into the existing docking station.  What would be the most likely solution?
A.
B.
C.
D.
30.  How can you toggle between a connected desktop monitor and the laptop?
A.
B.
C.
D.
E.
31.  What print technology do laser printers use?
A.
B.
C.
D.
32.  The average length of time that a printer will work without failing is called the ................. (1 or 4 words)
33.  In the laser print process, what is the phase called when the photosensitive drum is scanned with the laser beam?
A.
B.
C.
D.
E.
34.  A user has contacted the helpdesk and stated that their scanner is not scanning.  They are using a SCSI connected scanner.  What would you advise the user to do?
A.
B.
C.
D.
35.  Some scanners can create text documents using .....................  software. (1 or 3 words)
36.  A user complains that their system receives hundreds or thousands of junk e-mails daily.  What could be the problem and how would you solve it?
A.
B.
C.
D.
37.  ..................  is a method of gaining access to resources on devices by pretending to be a trusted computer. (1 word)
38.  A .................  .................... , like a worm, does not need to be attached to other software to infect a host. (2 words)
39.  With ........... ...................... the user can control the type of data sent to a computer by selecting which ports will be open and which will be secure. (2 words)
40.  A technician is attempting to secure a wireless network.  Which 2 options should be performed to secure access to the network? (pick 2)
A.
B.
C.
D.
E.
41.  E-mail and text communications have a set of personal and business rules called ................. (1 word)
42.  Which type of customer is the only type you should politely interrupt?
A.
B.
C.
D.
E.
43.  Information or data that is subject to ethical customs includes the following items?
A.
B.
C.
D.
E.
44.  A .......................... is a contract that defines expectations between an organisation and the vendor to provide an agreed upon level of support. (1 or 3 words)
45.  You can make changes to the system software or hardware configuration without the customer's permission if they are unavailable and you are able to fix the problem.  (TRUE or FALSE)
46.  .........................  ........................... is a regular and systematic inspection, cleaning and replacement of worn parts, materials and systems by ensuring that they are in good working order. (2 words)
47.  Which common tasks are carried out during preventative maintenance? (pick 3)
A.
B.
C.
D.
E.
48.  What would you include on a software maintenance schedule? (pick 3)
A.
B.
C.
D.
E.
49.  When system, user, or software errors occurs on a computer, the ............... .................  is updated with the information about the errors. (2 words)
50.  Where would you check on your computer to see if all your devices are working correctly?     (2 words)
51.  You would wear an antistatic wrist strap when replacing power supplies or monitors. (TRUE or FALSE
52.  A sudden increase in voltage that lasts for a very short period and exceeds 100 percent of the normal voltage on a line is called?
A.
B.
C.
D.
E.
53.  A vacuum cleaner ia ideal for cleaning the inside of a computer case or a laptop keyboard. (TRUE or FALSE)
54.  If the humidity level is too low, the chance of .................. increases. (1 or 2 words)
55.  To optimise the space on a hard drive to allow faster access to programs and data you would use ..................
A.
B.
C.
D.
E.
56.  This type of cable has either 40 or 80 conductors. (1 or 4 words)
57.  When installing a used CPU, you must clean the CPU and the base of the heat sink with ........
A.
B.
C.
D.
58.  What happens if pin 1 on the floppy drive data cable is not aligned with pin 1 on the drive connector?
A.
B.
C.
D.
59.  Wireless NICs can be installed on a computer system by .............
A.
B.
C.
D.
60.  ................... ................... are installed to add functionality on a computer. (2 words)
61.  Which class of IP address is used for multicasting?
A.
B.
C.
D.
E.
62.  Which of the following protocols function is the downloading of e-mail messages from an e-mail server (there may be more than one answer)
A.
B.
C.
D.
E.
63.  Whereas a switch connect segments of a network, ................. are devices that connect entire networks to each other. (1 word)
64.  10BASE5 is a coaxial cable used in networks.  It has a maximum length of...........
A.
B.
C.
D.
65.  This operates between router devices to discover paths between networks and chooses routes based on the distance or hop count to the destination.
A.
B.
C.
D.
66.  What type of LAN physical topology creates the best redundancy?
A.
B.
C.
D.
E.
67.  This is a type of Token Ring network that combines high speed performance with the advantages of the token-passing ring topology. (1 or 4 words)
68.  This standard specifies that networks must implement the CSMA/CD access control method.  (note: it is not a wireless network)
A.
B.
C.
D.
69.  Which level of the OSI model establishes, manages and terminates the connection between the local and remote applications?
A.
B.
C.
D.
E.
70.  .................. is a method to carry telephone calls over the data networks and internet. (1 or 3 words)
71.  A user has contacted the helpdesk and stated that their computer cannot connect to a popular website.  What could be the possible solution?
A.
B.
C.
D.
72.  The most commonly used DSL technology is ..................... (1 or 4 words)
73.  Which wireless ethernet standards are compatible with each other?
A.
B.
C.
D.
74.  Which dotted decimal number is used to distinguish the network portion of the IP address from the host portion?
A.
B.
C.
D.
75.  10BASE-T is not susceptible to EMI.  (TRUE or FALSE)
Back to top
Quiz Comments (3)
to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz