Strata Practice Exam 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By 11bRanger
1
11bRanger
Community Contributor
Quizzes Created: 1 | Total Attempts: 706
Questions: 90 | Attempts: 710

SettingsSettingsSettings
Strata Practice Exam 1 - Quiz

Strata practice exam, questions 10/12/11


Questions and Answers
  • 1. 

    Step 1 - Talk to the customer Step 2 - Document your work Step 3 - Continue to gather information Step 4 - Eliminate possibilities to find the problem Step 5 - Test your results

  • 2. 

    You are installing two hard disk drives which of the following possible combinations can be used? Each correct answer represnts a complete solution. Choose all that apply.

    • A.

      Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.

    • B.

      Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drice is on primary IDE contoller. Designate but drives as Master.

    • C.

      Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drive is on the primary contoller. Designate the second hard disk drive as Slave.

    • D.

      Install both the hard disk drives on the primary IDE controller. Deignate both drives as Secondary

    Correct Answer(s)
    A. Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
    B. Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drice is on primary IDE contoller. Designate but drives as Master.
    Explanation
    The correct answers are:
    1) Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
    2) Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on the primary IDE controller. Designate both drives as Master.


    In both of these configurations, each hard drive is connected to a separate IDE controller, ensuring that they don't interfere with each other. In the first configuration, the second hard drive is connected to the primary IDE controller, and the drives are designated as Master and Slave to differentiate between them. In the second configuration, the second hard drive is connected to the secondary IDE controller, and both drives are designated as Master.

    Rate this question:

  • 3. 

    Which of the following maximum resolutions does the UXGA video technology supports?

    • A.

      2560 x 1600

    • B.

      1600 x 1200

    • C.

      2048 x 1536

    • D.

      1280 x 1024

    Correct Answer
    B. 1600 x 1200
    Explanation
    The UXGA video technology supports a maximum resolution of 1600 x 1200.

    Rate this question:

  • 4. 

    Which of the following sleep modes is the most power hungry mode?

    • A.

      S1

    • B.

      S2

    • C.

      S0

    • D.

      S3

    Correct Answer
    A. S1
    Explanation
    S1 sleep mode is the most power hungry mode among the given options. In S1 sleep mode, also known as "Standby" or "Suspend to RAM," the computer enters a low-power state where the CPU and other components are powered down, but the RAM remains active. This allows for a quick wake-up time as the system can resume from where it left off. However, since the RAM still requires power to maintain its data, S1 mode consumes more power compared to other sleep modes like S2, S0, or S3.

    Rate this question:

  • 5. 

    Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?

    • A.

      /p

    • B.

      /s

    • C.

      /r

    • D.

      /o

    Correct Answer
    D. /o
    Explanation
    The correct answer is /o. The /o switch is used with the XCOPY command to copy the ownership and NTFS permissions of the files while copying them. This switch ensures that the copied files retain the same permissions and ownership as the original files.

    Rate this question:

  • 6. 

    Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.

    • A.

      It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption.

    • B.

      It is a device that works as an interface between a computer and a network.

    • C.

      It is a device that routes data packets between computers in different networks

    • D.

      It is a device that contains a microprocessor and permanent memory.

    Correct Answer(s)
    A. It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption.
    D. It is a device that contains a microprocessor and permanent memory.
    Explanation
    A smart card is a device that contains a microprocessor and permanent memory, allowing it to store and process data. It is used to securely store public and private keys for various purposes such as log on, e-mail signing and encryption, and file encryption. This ensures that sensitive information is protected and can only be accessed by authorized individuals. Therefore, the given answer correctly states that a smart card is used for secure storage of keys and contains a microprocessor and permanent memory.

    Rate this question:

  • 7. 

    Which of the following ports is also known as PS/2

    • A.

      6 - pin Mini-Din connector

    • B.

      5- pin DIN connector

    • C.

      4 - pin Mini-Din connector

    • D.

      USB connector

    Correct Answer
    A. 6 - pin Mini-Din connector
    Explanation
    The correct answer is 6-pin Mini-Din connector. This connector is commonly used for connecting keyboards and mice to computers. It is also known as the PS/2 port because it was originally introduced by IBM for their Personal System/2 computers. The 6-pin Mini-Din connector has a round shape and is typically color-coded, with purple for keyboards and green for mice. It has been largely replaced by USB connectors in modern computers, but some older systems may still have PS/2 ports for compatibility with legacy devices.

    Rate this question:

  • 8. 

    Which of the following statements are true about USB? Choose two

    • A.

      USB supports hot plugging

    • B.

      You can connect up to 127 peripheral devices to a single USB port

    • C.

      You can connect up to 16 peripheral devices to a single USB port

    • D.

      USB does not support plug n play installation

    Correct Answer(s)
    A. USB supports hot plugging
    B. You can connect up to 127 peripheral devices to a single USB port
    Explanation
    USB supports hot plugging, which means that you can connect and disconnect USB devices without having to restart the computer. This feature allows for easy and convenient use of USB devices. Additionally, you can connect up to 127 peripheral devices to a single USB port, making it a versatile and efficient way to connect multiple devices to a computer.

    Rate this question:

  • 9. 

    Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?

    • A.

      Min in the middle attack

    • B.

      Denial of service (DoS) attack

    • C.

      Buffer overflow attack

    • D.

      Shoulder surfing attack

    Correct Answer
    D. Shoulder surfing attack
    Explanation
    A shoulder surfing attack is a type of attack where an individual looks surreptitiously at the keyboard or monitor of an employee's computer. This allows the attacker to gather sensitive information such as passwords, login credentials, or confidential data. It is a form of social engineering that relies on the attacker's ability to physically observe the victim's actions. This type of attack can be easily executed in public places like coffee shops or airports, where individuals may be less cautious about protecting their screens or keyboards.

    Rate this question:

  • 10. 

    You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?

    • A.

      His operating system is incompatible.

    • B.

      A firewall is blocking him

    • C.

      His laptop is incompatable

    • D.

      MAC filtering is blocking him

    Correct Answer
    D. MAC filtering is blocking him
    Explanation
    The problem is that MAC filtering is blocking him. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's new laptop is not on the approved list of MAC addresses, it is being blocked from connecting to the company wireless network.

    Rate this question:

  • 11. 

    Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?

    • A.

      Session initiation Protocol

    • B.

      Streaming Media

    • C.

      HTTP streaming

    • D.

      Slipstreaming

    Correct Answer
    B. Streaming Media
    Explanation
    Streaming media is the correct answer because it is a technology that enables users to hear and watch video clips while they are still being downloaded from a website. This eliminates the need to wait for the entire download to complete before accessing the content. Streaming media works by sending small portions of the video or audio file in a continuous stream, allowing users to start experiencing the content in real-time.

    Rate this question:

  • 12. 

    Which of the following refers to the data rate supported by a network conncection or interface?

    • A.

      Bandwidth

    • B.

      Preboot Execution Environment (PXE)

    • C.

      Branding

    • D.

      Spam

    Correct Answer
    A. Bandwidth
    Explanation
    Bandwidth refers to the data rate supported by a network connection or interface. It represents the maximum amount of data that can be transmitted over a network in a given amount of time. A higher bandwidth allows for faster data transfer and better performance.

    Rate this question:

  • 13. 

    Which of the following are serial interfaces? Choos all that apply

    • A.

      EPP

    • B.

      USB

    • C.

      Firewire

    • D.

      IEEE 1284

    Correct Answer(s)
    B. USB
    C. Firewire
    Explanation
    USB and Firewire are both examples of serial interfaces. Serial interfaces are communication interfaces that transmit data one bit at a time over a single wire or channel. USB (Universal Serial Bus) is a widely used interface for connecting devices such as keyboards, mice, and external storage devices to computers. Firewire (IEEE 1394) is another high-speed interface commonly used for connecting devices like digital cameras and external hard drives to computers. EPP and IEEE 1284, on the other hand, are parallel interfaces, which transmit multiple bits simultaneously over multiple wires or channels.

    Rate this question:

  • 14. 

    Which of the following devics has its own BIOS?

    • A.

      Hard disk drive

    • B.

      South card

    • C.

      Network interface card

    • D.

      Video adapter

    Correct Answer
    D. Video adapter
    Explanation
    A video adapter is a hardware device that is responsible for generating and outputting video signals to a display device. It has its own BIOS (Basic Input/Output System) which contains the necessary firmware to initialize and control the video adapter. The BIOS of a video adapter allows it to communicate with the computer's operating system and ensures proper functioning of the display. This BIOS is separate from the computer's main BIOS, which is responsible for initializing other hardware components.

    Rate this question:

  • 15. 

    Which of the following are dual core processors? Choose two.

    • A.

      AMD Athlon(tm) 64 X2

    • B.

      Intel Pentium 4

    • C.

      Intel(r) Pentium(r) processor Extreme Ediditon

    • D.

      AMD Athlon(tm)

    Correct Answer(s)
    A. AMD Athlon(tm) 64 X2
    C. Intel(r) Pentium(r) processor Extreme Ediditon
    Explanation
    The correct answer is AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition. Both of these processors are dual core processors, meaning they have two separate processing units within a single chip. This allows for improved multitasking and performance compared to single core processors. The other options, Intel Pentium 4 and AMD Athlon(tm), are not dual core processors.

    Rate this question:

  • 16. 

    Which of the following switches is used with XCOPY command to copy directories and subdirectoris, including empty directions?

    • A.

      /q

    • B.

      /o

    • C.

      /s

    • D.

      /e

    Correct Answer
    D. /e
    Explanation
    The correct answer is /e. This switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. The /e switch ensures that all directories and subdirectories are copied during the process, even if they are empty. This is useful when you want to create an exact copy of a directory structure, including all empty directories within it.

    Rate this question:

  • 17. 

    WHich of the following provides authentication, enryption and data integrity for wireless devices?

    • A.

      PAP

    • B.

      WAN

    • C.

      WAP

    • D.

      WTLS

    Correct Answer
    D. WTLS
    Explanation
    WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. It is a security protocol specifically designed for wireless communication, ensuring secure transmission of data over wireless networks. WTLS is similar to SSL (Secure Sockets Layer) and provides similar security features, such as encryption to protect data from unauthorized access, authentication to verify the identity of the communicating parties, and data integrity to ensure that the data remains unchanged during transmission. Therefore, WTLS is the correct answer for this question.

    Rate this question:

  • 18. 

    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

    • A.

      Bluetooth

    • B.

      802. 11

    • C.

      802. 11b

    • D.

      Infrared

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported wireless technology that allows for easy and seamless connections between devices. It has a decent range and is capable of transmitting data at a high speed, making it suitable for connecting peripherals like printers and mice to a laptop. Additionally, Bluetooth is energy-efficient, which helps to conserve battery life on both the laptop and the connected devices.

    Rate this question:

  • 19. 

    What is the mazimum resolution that the WUXGA video technology supports?

    • A.

      2048 x 1536

    • B.

      1920 x 1200

    • C.

      3840 x 2400

    • D.

      1600 x 1200

    Correct Answer
    B. 1920 x 1200
    Explanation
    WUXGA video technology supports a maximum resolution of 1920 x 1200. This means that the technology can display images or videos with a width of 1920 pixels and a height of 1200 pixels.

    Rate this question:

  • 20. 

    What does Wireless transport layer security (WTLS) provide for wireless devices? Choose all that apply

    • A.

      Data integnity

    • B.

      Encryption

    • C.

      Bandwidth

    • D.

      Authentication

    Correct Answer(s)
    A. Data integnity
    B. Encryption
    D. Authentication
    Explanation
    WTLS provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data transmitted over the wireless network remains intact and has not been tampered with. Encryption ensures that the data is secured and cannot be accessed by unauthorized individuals. Authentication verifies the identity of the wireless devices and ensures that only authorized devices can access the network. Bandwidth, on the other hand, is not provided by WTLS.

    Rate this question:

  • 21. 

    Which of the following software displays advertisements, whether or not the user has consented?

    • A.

      Trojan horse

    • B.

      Honeypot

    • C.

      Spyware

    • D.

      Adware

    Correct Answer
    D. Adware
    Explanation
    Adware is a type of software that displays advertisements on a user's device, regardless of whether or not the user has given consent. Unlike other software options listed, such as Trojan horse, Honeypot, and Spyware, Adware specifically focuses on generating revenue through advertising. It is designed to track user behavior and display targeted ads, often disrupting the user's browsing experience. Therefore, Adware is the correct answer to the question.

    Rate this question:

  • 22. 

    Which of the following protocols transmits error messages and network statistics?

    • A.

      ICMP

    • B.

      DHCP

    • C.

      TCP

    • D.

      NNTP

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. ICMP is used by network devices to send error messages indicating issues such as unreachable hosts or network congestion. It is also used for network diagnostics and troubleshooting by providing information about network statistics like round-trip time and packet loss. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses, TCP (Transmission Control Protocol) is responsible for reliable data transmission, and NNTP (Network News Transfer Protocol) is used for distributing news articles.

    Rate this question:

  • 23. 

    Which of the following power sources are used to power a laptop?

    • A.

      Solar panel

    • B.

      AC power

    • C.

      Battery

    • D.

      Docking station

    Correct Answer(s)
    B. AC power
    C. Battery
    Explanation
    Laptops can be powered using AC power and batteries. AC power refers to the electricity supplied through a power outlet, which is commonly used when the laptop is connected to a charger. On the other hand, laptops also have built-in batteries that can store electrical energy and provide power when the laptop is not connected to an outlet. These batteries can be recharged using AC power. Therefore, both AC power and batteries are used to power a laptop.

    Rate this question:

  • 24. 

    Matk works as a Network admin. for NetTech inc. The network has 150 Windows 2000 professional client computers and four Windows 2000 servers. All the client computers are able to connect to the internet. Mark is concerned about malware infecting the client computers through the internet. What will Mark do to protect the client computers from malware? Choose two.

    • A.

      Educate users of the client computers about the problems arising due to malware

    • B.

      Educate users of the client computers to avoid malware

    • C.

      Prevent users of the client computers from executing any programs.

    • D.

      Assign read only permission to the users for accessing the hard disk drives of the client computers.

    Correct Answer(s)
    A. Educate users of the client computers about the problems arising due to malware
    B. Educate users of the client computers to avoid malware
    Explanation
    Mark will educate the users about the problems arising due to malware and how to avoid it. This will help the users to be aware of the risks and take necessary precautions while browsing the internet, downloading files, or opening suspicious emails. By educating the users, Mark can reduce the chances of malware infecting the client computers and ensure that the users are actively involved in maintaining a secure network environment.

    Rate this question:

  • 25. 

    You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?

    • A.

      128 Megabytes

    • B.

      64 Megabytes

    • C.

      2 Gigabytes

    • D.

      1 Gigabyte

    Correct Answer
    B. 64 Megabytes
    Explanation
    Windows XP Professional requires a minimum of 64 Megabytes of RAM to function properly. This amount of memory is sufficient for the operating system to run basic tasks and applications. However, it is important to note that this is the minimum requirement, and for optimal performance, it is recommended to have more RAM installed.

    Rate this question:

  • 26. 

    You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

    • A.

      Rambus

    • B.

      Non Parity RAM

    • C.

      ECC RAM

    • D.

      Logic Parity RAM

    Correct Answer
    C. ECC RAM
    Explanation
    ECC RAM, or Error Correcting Code RAM, should be selected for the new PC to ensure that errors are handled properly. ECC RAM is designed to detect and correct errors that occur during data storage and retrieval. It uses additional bits to store error correction codes, allowing it to identify and fix single-bit errors and detect multi-bit errors. This makes ECC RAM more reliable and suitable for systems that require high data integrity, such as servers or workstations used for critical tasks.

    Rate this question:

  • 27. 

    What is the maximum data transmission speed of IEE 802. 11b Wireless networks?

    • A.

      54 Mbps

    • B.

      600 Mbps

    • C.

      600 Gbps

    • D.

      11 Mbps

    Correct Answer
    D. 11 Mbps
    Explanation
    The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard, also known as Wi-Fi 1, was introduced in 1999 and operates in the 2.4 GHz frequency range. It provides a lower data rate compared to newer Wi-Fi standards such as 802.11g and 802.11n, but it still offers sufficient speed for basic internet browsing and email usage.

    Rate this question:

  • 28. 

    Which of the following types of parental controls is used to limit access to the internet contents?

    • A.

      Content filter control

    • B.

      Bandwidth control

    • C.

      Usage management tool

    • D.

      Monitoring control

    Correct Answer
    A. Content filter control
    Explanation
    Content filter control is used to limit access to internet contents by blocking or filtering certain websites or types of content. It allows parents to restrict their children's access to inappropriate or harmful content, ensuring a safer internet experience. This type of parental control can be set up on devices or through internet service providers, and it helps parents to control and monitor the online activities of their children.

    Rate this question:

  • 29. 

    Andrew has a personal computer. One morning, he starts his computer and hinds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose two

    • A.

      BIOS has become outdated.

    • B.

      The CMOS battery has failed.

    • C.

      The CMOS chip has failed

    • D.

      Software stored in the CMOS battery is infected by a virus.

    Correct Answer(s)
    B. The CMOS battery has failed.
    C. The CMOS chip has failed
    Explanation
    The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings in Andrew's computer. The CMOS battery is responsible for maintaining these settings, so if it has failed, it can cause this error. Additionally, if the CMOS chip itself has failed, it can also result in a checksum failure. Therefore, the most likely causes of this error are a failed CMOS battery and a failed CMOS chip.

    Rate this question:

  • 30. 

    What are the benefits of using Universal Serial bus 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply

    • A.

      Easy configuration of hardware devices

    • B.

      Expansion

    • C.

      Security

    • D.

      Speed

    Correct Answer(s)
    A. Easy configuration of hardware devices
    B. Expansion
    D. Speed
    Explanation
    USB 2.0 offers several benefits over legacy communication ports. Firstly, it allows for easy configuration of hardware devices, making it convenient to connect and use different peripherals. Secondly, it provides expansion capabilities, allowing users to connect multiple devices through hubs and extend the functionality of their system. Lastly, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, ensuring efficient and quick communication between devices.

    Rate this question:

  • 31. 

    Which of the following sleep modes is also known as Hibernation in Windows operating systems?

    • A.

      S3

    • B.

      S2

    • C.

      S4

    • D.

      S1

    Correct Answer
    C. S4
    Explanation
    S4 is the correct answer because it is the sleep mode that is also known as Hibernation in Windows operating systems. In this mode, the computer saves the current state of the system to the hard drive and then shuts down completely. When the computer is turned on again, it restores the previous state from the hard drive, allowing the user to resume their work from where they left off.

    Rate this question:

  • 32. 

    Which of the following can occur if the power cable runs along with the computer network cable?

    • A.

      EMI

    • B.

      ESD

    • C.

      Broadcast Storm

    • D.

      Surge

    Correct Answer
    A. EMI
    Explanation
    If the power cable runs along with the computer network cable, it can lead to Electromagnetic Interference (EMI). EMI occurs when the electrical signals from the power cable interfere with the signals from the network cable, causing distortion or disruption in the network communication. This can result in poor network performance, data errors, or even complete network failure. It is important to keep power cables and network cables separated to minimize the risk of EMI.

    Rate this question:

  • 33. 

    Which of the following are types social engineering attacks? Choose two

    • A.

      An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee

    • B.

      An unauthorized person inserts and intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts

    • C.

      An unauthorized person calls a user to be a system adminstrator in order to get the users password

    • D.

      An unauthorized person modifies packet headers by using someone elses IP address to his identity

    Correct Answer(s)
    A. An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee
    C. An unauthorized person calls a user to be a system adminstrator in order to get the users password
    Explanation
    The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks where the attacker manipulates human behavior and exploits trust to gain unauthorized access to systems or sensitive information. In the first scenario, the attacker uses impersonation to deceive the company's employees and gain physical access to the server. In the second scenario, the attacker uses social manipulation by pretending to be a system administrator to trick the user into revealing their password.

    Rate this question:

  • 34. 

    Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?

    • A.

      Simply put the Windows Recovery CD in and the recovery process will start

    • B.

      Reinstall Windows

    • C.

      Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state

    • D.

      Simply uninstall any new software.

    Correct Answer
    C. Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state
    Explanation
    The best way to put the customer's Windows XP machine into a working state again is to use the Windows recovery console with the Windows recovery CD. This will allow the user to access advanced troubleshooting options and repair any system files or settings that may be causing the issue. Reinstalling Windows or uninstalling new software may not address the underlying problem, while using the recovery console provides a more targeted and effective solution.

    Rate this question:

  • 35. 

    Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?

    • A.

      Spyware

    • B.

      Shareware

    • C.

      Freeware

    • D.

      Adware

    Correct Answer
    B. Shareware
    Explanation
    Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.

    Rate this question:

  • 36. 

    Which of the following buses has a maximum data transfer rate of 2400 Mbps?

    • A.

      FireWire 800

    • B.

      ESATA

    • C.

      USB 1.1

    • D.

      USB 2.0

    Correct Answer
    B. ESATA
    Explanation
    eSATA (External Serial Advanced Technology Attachment) has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps. USB 1.1 has a maximum data transfer rate of 12 Mbps. USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the correct answer as it has the highest data transfer rate among the given options.

    Rate this question:

  • 37. 

    Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

    • A.

      Unicast

    • B.

      Multicast

    • C.

      Loopback

    • D.

      Anycast

    Correct Answer
    D. Anycast
    Explanation
    Anycast is a type of IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that has been assigned that address. This allows for efficient routing and load balancing, as the packet is automatically directed to the closest available interface. Anycast addresses are commonly used for services that need to be highly available and distributed across multiple locations.

    Rate this question:

  • 38. 

    Which of the following can be installed in an AGP slot?

    • A.

      Video card

    • B.

      RAM

    • C.

      Micoprocessor

    • D.

      Modem card

    Correct Answer
    A. Video card
    Explanation
    An AGP slot is specifically designed to accommodate a video card. It provides a high-speed connection between the video card and the computer's motherboard, allowing for efficient data transfer and enhanced graphics performance. Therefore, a video card is the only option that can be installed in an AGP slot, making it the correct answer.

    Rate this question:

  • 39. 

    At what voltage does a USB host supply power to the USB bus?

    • A.

      15 volts

    • B.

      5 vots

    • C.

      50 volts

    • D.

      3 volts

    Correct Answer
    B. 5 vots
    Explanation
    A USB host supplies power to the USB bus at a voltage of 5 volts. This is the standard voltage for USB power supply. It is important to maintain this voltage as it ensures compatibility and safe operation of USB devices. Higher voltages can cause damage to the devices, while lower voltages may not provide sufficient power for proper functioning. Therefore, 5 volts is the correct answer for the given question.

    Rate this question:

  • 40. 

    Which of the following enables third pary developers to create capabilites to extend an application?

    • A.

      Plug in

    • B.

      Virtual machine

    • C.

      Hotfix

    • D.

      JavaScript

    Correct Answer
    A. Plug in
    Explanation
    A plug-in is a software component that allows third-party developers to extend the functionality of an application. It provides an interface for developers to add new features or modify existing ones without altering the core code of the application. By creating plug-ins, developers can enhance the application's capabilities and tailor it to meet specific user needs. This enables a more customizable and flexible experience for users, as they can choose the plug-ins that best suit their requirements.

    Rate this question:

  • 41. 

    Which of the following statements about multi or authentication is true?

    • A.

      It uses a key distribution center (KDC)

    • B.

      It protects a computer from a malicious software such as worms

    • C.

      It involves two or more methods as part of the authentication process

    • D.

      It is a process in which a client process and a server are required to prove their identities to each other before performing any application function

    Correct Answer
    C. It involves two or more methods as part of the authentication process
    Explanation
    Multi-factor authentication (MFA) is a security measure that involves using two or more methods for verifying a user's identity during the authentication process. This adds an extra layer of security as it requires the user to provide multiple pieces of evidence to prove their identity. By combining different authentication methods such as passwords, biometrics, tokens, or smart cards, MFA helps protect against unauthorized access and enhances the overall security of a system or application.

    Rate this question:

  • 42. 

    What is the difference between the USB 2.0 and IEEE 1394 bus standards?

    • A.

      IEEE 1394 is faster than USB 2.0

    • B.

      IEEE 1393 supports hot swapping

    • C.

      IEEE 1394 is slower than USB 2.0

    • D.

      USB 2.0 supports Plug and Play feature

    Correct Answer
    C. IEEE 1394 is slower than USB 2.0
    Explanation
    The given correct answer states that IEEE 1394 is slower than USB 2.0. This means that in terms of data transfer speed, USB 2.0 is faster compared to IEEE 1394.

    Rate this question:

  • 43. 

    Which of the following devices provides input by analyzing printed text, handwriting, or an abject?

    • A.

      Webcam

    • B.

      Image Scanner

    • C.

      Packet analyzer

    • D.

      BD-ROM drive

    Correct Answer
    B. Image Scanner
    Explanation
    An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents or images into digital format. This allows the user to edit, store, or share the scanned information electronically. Unlike a webcam, which captures live video or images, an image scanner specifically focuses on converting physical documents into digital files. A packet analyzer is used for network analysis, and a BD-ROM drive is used for reading Blu-ray discs.

    Rate this question:

  • 44. 

    Which fo the following substances are restricted under restriction of hazardous Substances (RoHS)?

    • A.

      Mercury(Hg)

    • B.

      Lead(Pb)

    • C.

      Iron(Fe)

    • D.

      Cadmium(Cd)

    Correct Answer(s)
    A. Mercury(Hg)
    B. Lead(Pb)
    D. Cadmium(Cd)
    Explanation
    Mercury (Hg), lead (Pb), and cadmium (Cd) are restricted under the Restriction of Hazardous Substances (RoHS). These substances are known to be harmful and toxic to human health and the environment. RoHS is a directive that restricts the use of certain hazardous substances in electrical and electronic equipment to minimize their negative impact. By restricting the use of these substances, RoHS aims to promote the production of safer and more environmentally friendly products.

    Rate this question:

  • 45. 

    Which of the following statements about a riser card is true?

    • A.

      It is used to connect a computer in a network

    • B.

      It is used to connect extra microprocessors

    • C.

      It provides extra memory for expansion cards

    • D.

      It is used to extend slots for expansion cards.

    Correct Answer
    D. It is used to extend slots for expansion cards.
    Explanation
    A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected vertically, providing more flexibility for adding peripherals or upgrading the system. This is different from the other options provided, as a riser card does not connect the computer to a network, add extra microprocessors, or provide extra memory for expansion cards.

    Rate this question:

  • 46. 

    Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?

    • A.

      E book reader

    • B.

      Memory card reader

    • C.

      Smart card reader

    • D.

      Barcode reader

    Correct Answer
    B. Memory card reader
    Explanation
    A memory card reader is used for accessing the data on Secure Digital SD card, MMC, and CompactFlash (CF). This device allows users to transfer data from these types of memory cards to a computer or other devices, making it easier to access and manage the stored information.

    Rate this question:

  • 47. 

    Which of the following can be used to accomplish authentication? Choose all that apply

    • A.

      Biometrics

    • B.

      Enryption

    • C.

      Passwaord

    • D.

      Token

    Correct Answer(s)
    A. Biometrics
    C. Passwaord
    D. Token
    Explanation
    Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to the use of unique physical or behavioral characteristics, such as fingerprints or facial recognition, to verify a person's identity. Passwords are commonly used to authenticate users by requiring them to enter a secret code or phrase. Tokens, such as smart cards or USB devices, can also be used to authenticate users by generating a unique code or providing a physical object that verifies their identity.

    Rate this question:

  • 48. 

    Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two

    • A.

      SMPS

    • B.

      Floppy drive

    • C.

      Monitor

    • D.

      Keyboard

    Correct Answer(s)
    A. SMPS
    C. Monitor
    Explanation
    SMPS (Switched Mode Power Supply) and Monitor can cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting and regulating the electrical power supply, and if not handled properly, it can deliver high voltage electric shocks. Similarly, a faulty or damaged monitor can also pose a risk of electric shock due to exposed wires or faulty insulation. Floppy drives and keyboards are not typically associated with delivering lethal electric shocks.

    Rate this question:

  • 49. 

    Which of the following ports on a computer are used to connect a keyboard? Choose two

    • A.

      USB

    • B.

      DB-25

    • C.

      PS/2

    • D.

      DB-9

    Correct Answer(s)
    A. USB
    C. PS/2
    Explanation
    USB and PS/2 are the correct answers because these ports are commonly used to connect keyboards to a computer. USB (Universal Serial Bus) ports are the most common and widely used ports for connecting peripherals, including keyboards. PS/2 ports, on the other hand, are older and less common but still found on some computers. PS/2 ports are specifically designed for connecting keyboards and mice. DB-25 and DB-9 are not used for connecting keyboards, but rather for other purposes such as serial communication or printer connections.

    Rate this question:

  • 50. 

    Which of the following features are related to power management? Choose two

    • A.

      Hot plugging

    • B.

      Hibernate mode

    • C.

      Standy mode

    • D.

      Safe mode

    Correct Answer(s)
    B. Hibernate mode
    C. Standy mode
    Explanation
    Hibernate mode and Standby mode are both related to power management. Hibernate mode allows the computer to save the current state and power off completely, while Standby mode allows the computer to enter a low-power state where it can quickly resume operations. Both features help conserve power and extend battery life in laptops and other devices.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2011
    Quiz Created by
    11bRanger
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.