A+ Certification 220-702 Part 1 Of 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Spawn_2_extreme
S
Spawn_2_extreme
Community Contributor
Quizzes Created: 5 | Total Attempts: 3,386
| Attempts: 609 | Questions: 53
Please wait...
Question 1 / 53
0 %
0/100
Score 0/100
1. Which one of the following keys is found only on a laptop?

Explanation

The Fn key is found only on a laptop. This key is used to access special functions and shortcuts on laptops, such as adjusting brightness, volume, or screen resolution. It is not commonly found on desktop keyboards. The Ctrl, Shift, and Numlock keys, on the other hand, are found on both laptops and desktop keyboards.

Submit
Please wait...
About This Quiz
A Plus Certification Quizzes & Trivia

The quiz below is set on the 202 to the 702 series for the A+ certification course. If one is capable of tackling the questions they are sure... see moreto pass the coming exams with minimal difficulties. Think you have what it takes? Give this first set of questions a try and find out. see less

2. Which of the following would indicate a secured HTTP server?

Explanation

The correct answer is "HTTPS://www.davidlprowse.com". The "HTTPS" protocol indicates that the HTTP server is secured. The "S" in HTTPS stands for Secure Socket Layer (SSL) or Transport Layer Security (TLS), which encrypts the data transmitted between the server and the client, ensuring a secure connection. The other options, HTTPSSL://www.davidlprowse.com, HTTP://www.davidlprowse.com, and HTTP://www.davidlprowse.com/secure, do not include the "S" in HTTPS, indicating that they are not secured HTTP servers.

Submit
3. What type of adapter card is normally plugged into an AGP adapter card slot?

Explanation

An AGP adapter card slot is specifically designed to accommodate a video adapter card. This type of adapter card is responsible for generating and displaying visual content on the computer's monitor. Therefore, the correct answer in this case is "Video".

Submit
4. Which syntax will enable you to see your computer’s MAC address?

Explanation

The correct answer is IPCONFIG /all. By using this syntax, you will be able to see your computer's MAC address along with other information such as IP address, subnet mask, and default gateway.

Submit
5. What is a common risk when installing Windows drivers that are unsigned?

Explanation

When installing Windows drivers that are unsigned, there is a common risk of compromising system stability. Unsigned drivers are not verified by Microsoft, which means they may not meet the necessary standards and could potentially contain bugs or malware. This can lead to system instability, causing crashes, freezes, or other performance issues. It is important to only install drivers from trusted sources to ensure the stability and security of the system.

Submit
6. What would you need to access to boot the computer into Safe Mode?

Explanation

To boot a computer into Safe Mode, you would need to access the Advanced Boot Options. This menu allows you to choose different startup options for your computer, including Safe Mode. Safe Mode is a troubleshooting mode that starts the computer with only essential drivers and services, which can help diagnose and fix issues with the operating system. Accessing the Advanced Boot Options menu can be done by pressing a specific key (such as F8) during the computer's startup process.

Submit
7. What is the delay in the RAM’s response to a request from the memory controller called?

Explanation

Latency refers to the delay in the RAM's response to a request from the memory controller. It represents the time it takes for the RAM to retrieve and provide the requested data. Latency is an important factor in determining the overall performance and speed of a computer system. It can be influenced by various factors such as the type of RAM, the speed of the memory controller, and the distance between the RAM and the memory controller.

Submit
8. You are at a customer’s office you have visited before. You can guess what the problem is, and when the customer mentions getting an IP address of 169.254..., you immediately know how to fix the problem. However, as you ponder the solution, you notice that the customer is now talking about his server. What should you do?

Explanation

It is important to let the customer finish what he is saying because he might provide additional information or mention other issues that need to be addressed. Interrupting him could lead to misunderstandings or missing important details. It is best to actively listen to the customer and then address the IP problem once he has finished speaking.

Submit
9. Buzz gets an error that says “Error log full.” Where should you go to clear his Error log?

Explanation

To clear Buzz's Error log, you should go to the Event Viewer. The Event Viewer is a tool in Windows that allows users to view and manage event logs on their computer. Event logs store information about events that occur on the system, including errors and warnings. By accessing the Event Viewer, Buzz can locate and clear the error log, which will help in troubleshooting any issues he may be experiencing.

Submit
10. Which of these is an example of social engineering?

Explanation

Asking for a username and password over the phone is an example of social engineering because it involves manipulating or deceiving individuals to gain unauthorized access to sensitive information. In this scenario, the attacker may pretend to be a trusted authority or a technical support representative to trick the victim into revealing their login credentials. This tactic exploits human trust and relies on social interaction rather than technical means to breach security measures.

Submit
11. While you are working on a customer’s computer at her home, she informs you that she needs to leave for about 10 minutes and that her 8-year-old son can help you with anything if you need it. What should you do?

Explanation

It is important to prioritize the safety and well-being of both the child and the technician. Leaving an 8-year-old child unsupervised can pose risks and potential hazards. Therefore, it is appropriate to inform the customer that an adult must be present while the technician is working to ensure a safe environment for everyone involved.

Submit
12. After installing a new hard drive on a Windows XP computer, Len tries to format the drive. Windows XP does not show the format option in Disk Management. What did Len forget to do first?

Explanation

Len forgot to partition the drive before trying to format it. Partitioning a hard drive involves dividing it into separate sections or partitions, which allows the operating system to recognize and use the drive. Without partitioning, Windows XP will not show the format option in Disk Management.

Submit
13. A computer you are working on has a lot of dust inside. How should you clean this

Explanation

Using compressed air to remove the dust is the most effective and safe method for cleaning a computer with a lot of dust inside. Disassembling the power supply is not recommended unless you have proper knowledge and experience. Using a vacuum can create static electricity and damage the sensitive components of the computer. Using a surface dust cleaning solution can leave residue and potentially damage the electronics. Compressed air, on the other hand, can effectively remove dust without causing any harm to the computer components.

Submit
14. What function is performed by the external power supply of a laptop?

Explanation

The external power supply of a laptop converts AC power from a wall outlet to DC power that the laptop can use. This is necessary because laptops operate on DC power, while the power supplied by the wall outlet is in the form of AC power. Therefore, the external power supply performs the function of converting the AC power to DC power, allowing the laptop to operate and charge its battery.

Submit
15. What is the easiest way to monitor the battery health of a UPS?

Explanation

The easiest way to monitor the battery health of a UPS is by using the UPS monitoring software. This software is specifically designed to provide real-time information and alerts about the battery status, allowing users to track the health and performance of the UPS battery. It provides detailed information such as battery voltage, remaining capacity, and estimated runtime, making it convenient and efficient for monitoring the battery health. Using a voltmeter may require manual measurements and may not provide comprehensive information. Replacing the battery every year is not a practical solution as it may lead to unnecessary expenses. Event Viewer is not directly related to monitoring battery health.

Submit
16. A user’s time and date keeps resetting to January 1st, 2000. What is the most likely cause?

Explanation

The most likely cause for the user's time and date resetting to January 1st, 2000 is that the lithium battery on the computer's motherboard needs to be replaced. The lithium battery is responsible for providing power to the motherboard's real-time clock (RTC), which keeps track of the date and time even when the computer is turned off. If the battery is no longer functioning properly, it can cause the RTC to reset to a default date, such as January 1st, 2000. Updating the BIOS or Windows, or modifying the Windows Date and Time Properties window, would not typically resolve this issue.

Submit
17. Which of the following commands ping the loopback address?

Explanation

The loopback address is a special IP address that allows a device to send network packets to itself. In this case, the command "PING 127.0.0.1" specifically pings the loopback address, as it is the correct IP address for the loopback interface. The other commands do not target the loopback address, so they will not ping the loopback interface.

Submit
18. In a standard ATX-based computer, how many IDE devices can be installed?

Explanation

In a standard ATX-based computer, up to four IDE devices can be installed. IDE (Integrated Drive Electronics) is an older technology used to connect storage devices such as hard drives and optical drives to a computer's motherboard. The computer typically has two IDE channels, each capable of supporting two devices. Therefore, a total of four IDE devices can be connected, with two devices per channel.

Submit
19. How do you change the virtual memory in Windows XP?

Explanation

To change the virtual memory in Windows XP, you need to go to the System Properties window by clicking on Start > Settings > Control Panel > System. Then, click on the Advanced tab and select Performance Options. From there, click on the Change button and enter the new virtual memory size.

Submit
20. The IP address 192.168.1.1 should have what default subnet mask?

Explanation

The default subnet mask for the IP address 192.168.1.1 is 255.255.255.0 because it is a Class C IP address. Class C addresses have a default subnet mask of 255.255.255.0, which means that the first 3 octets (192.168.1) represent the network portion of the address, and the last octet (1) represents the host portion. This allows for a maximum of 254 hosts on the network.

Submit
21. To learn more about the PING command, what would you enter at the command line?

Explanation

Entering "PING /?" at the command line will provide more information about the PING command. The "/?" is a common syntax used in command line interfaces to display help and usage information for a specific command. By entering this command, the user can access the help documentation for the PING command, which will provide details on its usage, options, and parameters.

Submit
22. How many pins would you see in a high-quality printhead on a dot matrix printer?

Explanation

A high-quality printhead on a dot matrix printer typically contains 24 pins. These pins are responsible for striking the ink ribbon against the paper to create the desired image or text. The more pins a printhead has, the higher the print quality and resolution it can achieve. Therefore, a high-quality printhead would have a greater number of pins, such as 24 in this case.

Submit
23. Which of the following commands creates a new directory in the Windows Command Prompt?

Explanation

The correct answer is MD. MD stands for "make directory" and is a command used in the Windows Command Prompt to create a new directory. The CD command is used to change the current directory, RD is used to remove a directory, and XD is not a valid command.

Submit
24. How can you configure Windows XP’s virtual memory to optimal settings?

Explanation

Setting Windows to automatically manage the size of the virtual memory is the optimal setting because it allows the operating system to dynamically adjust the size of the virtual memory based on the system's needs. This ensures that the system has enough virtual memory to run efficiently without wasting resources. Manually setting the virtual memory to a specific size may result in inadequate memory allocation or excessive memory usage, depending on the system's requirements.

Submit
25. Jake’s Windows Vista computer has several programs running in the system tray that take up a lot of memory and processing power. He would like you to turn them off permanently. What tool should you use to do this?

Explanation

MSCONFIG.EXE is the correct answer because it is a tool that allows users to manage the startup programs and services on a Windows computer. By using MSCONFIG.EXE, Jake can disable the programs running in the system tray, preventing them from starting up automatically and consuming memory and processing power.

Submit
26. What is the minimum number of hard drives necessary to implement RAID 5?

Explanation

RAID 5 is a data storage technique that distributes data across multiple hard drives, providing redundancy and increased performance. In RAID 5, data is striped across multiple drives with parity information distributed among them. This allows for data recovery in case of a single drive failure. To implement RAID 5, a minimum of three hard drives is required. One drive is used for parity information, while the other two drives store the data. This setup ensures that data can still be accessed even if one of the drives fails.

Submit
27. Which of the following components could cause the POST to beep several times and fail during boot?

Explanation

RAM stands for Random Access Memory, which is a crucial component in a computer system. During the Power-On Self Test (POST), the computer checks the functionality of different hardware components. If the RAM is faulty or not properly installed, it can cause the POST to beep several times and fail during boot. This is because the computer is unable to access or use the RAM properly, leading to errors in the boot process.

Submit
28. Joey’s computer was working fine for weeks, and suddenly it cannot connect to the Internet. Joey runs the command ipconfig and sees that the IP address his computer is using is 169.254.50.68. What can he conclude from this?

Explanation

The IP address 169.254.50.68 is an Automatic Private IP Addressing (APIPA) address. This address is automatically assigned by the computer when it cannot obtain an IP address from a DHCP server. Therefore, Joey can conclude that his computer is unable to access the DHCP server, which is responsible for assigning IP addresses to devices on a network.

Submit
29. A computer has 512MB of RAM. It also has 64MB of shared video memory. How much RAM is available to the operating system?

Explanation

The computer has 512MB of RAM, but 64MB of it is allocated for shared video memory. Shared video memory is memory that is used by the graphics card for displaying images on the screen. Therefore, the operating system only has access to the remaining amount of RAM, which is 448MB.

Submit
30. Which of the following has the fastest data throughput?

Explanation

RAM (Random Access Memory) has the fastest data throughput among the given options. This is because RAM is a type of computer memory that allows data to be read from or written to quickly. It is much faster than other storage devices like CD-ROM, hard drive, and USB, which have slower data transfer rates. RAM is designed to provide quick access to data, making it ideal for storing and retrieving information that needs to be accessed frequently and rapidly by the computer's processor.

Submit
31. Louis attempts to boot his computer. A message on the screen says “Hard disk not found.” The computer has a single PATA IDE hard disk. What is the most likely cause of the problem?

Explanation

The most likely cause of the problem is that the IDE cable is not connected. If the IDE cable is not properly connected to the hard disk and the motherboard, the computer will not be able to detect the hard disk and display the error message "Hard disk not found." This is a common issue and can be easily resolved by ensuring that the IDE cable is securely connected at both ends.

Submit
32. To prevent damage to a computer and its peripherals, the computer should be connected to what?

Explanation

A UPS (Uninterruptible Power Supply) is essential to prevent damage to a computer and its peripherals. A UPS provides backup power in case of a power outage or fluctuation, ensuring that the computer remains powered on and protected. It also acts as a surge protector, safeguarding against power spikes or surges that could potentially damage the computer components. Therefore, connecting a computer to a UPS is crucial for maintaining its functionality and protecting it from potential harm.

Submit
33. What type of power connector is used for a x16 video card?

Explanation

A PCIe 6-pin power connector is used for a x16 video card. This type of power connector provides the necessary power to the video card for it to function properly. The PCIe 6-pin connector is specifically designed for high-performance graphics cards and is capable of delivering sufficient power to meet the demands of these cards. It is a standard power connector used in modern computer systems for connecting graphics cards.

Submit
34. What are the six steps of the laser-printing process in order?

Explanation

The correct answer is Cleaning, charging, writing, developing, transferring, fusing. This sequence of steps is the correct order in which the laser-printing process occurs. First, the printer cleans the drum or other printing surface to remove any residual toner or debris. Then, the drum is charged with an electrical charge to prepare it for writing. Next, the laser writes the image or text onto the drum by selectively discharging the charged areas. After that, the developing unit applies toner to the discharged areas, creating a visible image. The image is then transferred from the drum to the paper or other media. Finally, the fusing unit applies heat and pressure to fuse the toner onto the paper, completing the printing process.

Submit
35. Which of these tools can protect you in the case of a surge?

Explanation

An antistatic strap can protect you in the case of a surge by grounding any static electricity that may build up on your body. This prevents the static electricity from damaging sensitive electronic components or causing a surge that could damage the equipment you are working with. By wearing an antistatic strap, you can safely discharge any static electricity and reduce the risk of electrical damage.

Submit
36. What is the thickness of a Type II PC Card?

Explanation

The correct answer is 0.2 inches (5.0mm). This is the thickness of a Type II PC Card.

Submit
37. A customer wants you to replace the fan in her power supply. What should you do?

Explanation

not-available-via-ai

Submit
38. Which of the following precautions should be taken so that ESD does not cause damage to a computer that is being repaired? Select all that apply.

Explanation

Using an antistatic strap and putting the computer on an antistatic mat are both precautions that should be taken to prevent ESD (electrostatic discharge) from causing damage to a computer being repaired. An antistatic strap is worn on the wrist and helps to ground the person working on the computer, preventing any static electricity from building up and potentially damaging the components. Placing the computer on an antistatic mat provides a grounded surface that helps to dissipate any static electricity that may be present. Wearing shoes with rubber soles and spraying antistatic spray on the components are not effective precautions for preventing ESD damage.

Submit
39. If you get a Code 1 message about a particular device in the Device Manager, what should you do?

Explanation

If you receive a Code 1 message about a specific device in the Device Manager, the correct action to take is to update the driver. This is because a Code 1 message indicates that the device is not configured correctly and updating the driver can resolve the issue. Closing applications and installing RAM, disabling the device, or reinstalling the driver may not address the underlying problem and are not the recommended solutions in this case.

Submit
40. Which tool checks protected system files?

Explanation

SFC (System File Checker) is the tool that checks protected system files. It is a Windows utility that scans and verifies the integrity of all system files, replacing any corrupted or modified files with the original versions from the Windows cache. This helps in maintaining the stability and functionality of the operating system by ensuring that essential system files are not compromised or damaged. Chkdsk, Xcopy, and Scandisk are not specifically designed for checking protected system files.

Submit
41. Roger informs you that none of the three SCSI drives can be seen on his SCSI chain. What should you check?

Explanation

The correct answer suggests that the first thing to check is whether the SCSI adapter has an ID of 7. This is important because the SCSI adapter needs to have a specific ID in order to function properly. Additionally, it is important to ensure that both ends of the chain are terminated, as this helps to prevent signal reflections and ensure proper communication between devices. Lastly, each disk should have a unique ID, as having duplicate IDs can cause conflicts and prevent the drives from being recognized.

Submit
42. You start a new computer and nothing seems to happen. Upon closer inspection, you can hear the hard drive spinning; however, nothing is coming up on the monitor. Which of the following would not be a reason for this?

Explanation

The reason for nothing appearing on the monitor is not because the PC is not connected to the AC outlet. The AC outlet is responsible for providing power to the PC, and if it is not connected, the computer would not start at all. In this case, since the hard drive is spinning, it indicates that the PC is receiving power and the issue lies elsewhere, such as the monitor not being on or not being connected to the PC, or the video card not being properly seated.

Submit
43. Which of the following answers can be used to keep disk drives free of errors and Windows XP running efficiently? Select all that apply.

Explanation

Disk Defragmenter and Check Disk are two tools that can be used to keep disk drives free of errors and Windows XP running efficiently. Disk Defragmenter helps in optimizing the placement of files on the hard drive, which can improve system performance. Check Disk, on the other hand, scans the hard drive for errors and fixes them, ensuring the integrity of the file system and preventing potential issues. Both tools are important for maintaining the health and performance of the disk drives in Windows XP.

Submit
44. What command repairs the bootmgr.exe file in Windows Vista?

Explanation

The command "bootrec /fixboot" repairs the bootmgr.exe file in Windows Vista. This command is used to fix issues related to the boot configuration data (BCD) store. It specifically repairs the boot sector of the system partition, which is essential for the operating system to start up properly. By using this command, the bootmgr.exe file can be restored or repaired, resolving any boot-related problems in Windows Vista.

Submit
45. A co-worker is traveling to Europe and is bringing her computer. She asks you what safety concerns there might be. What should you tell her?

Explanation

When traveling to Europe with a computer, it is important to check the voltage selector on the power supply. Different countries have different electrical systems and voltages. By checking the voltage selector, the co-worker can ensure that the computer is set to the correct voltage for the country she is visiting. This will prevent any potential damage to the computer and ensure its safe usage.

Submit
46. Which of the following recovery options uses a floppy disk?

Explanation

ASR (Automated System Recovery) is the recovery option that uses a floppy disk. ASR is a feature in Windows operating systems that allows users to create a backup of their system's critical files and settings. In the event of a system failure, the ASR floppy disk can be used to restore the system to its previous state. This option is particularly useful for restoring a system when the operating system cannot be accessed or when other recovery options are not available.

Submit
47. A customer’s computer is using FAT16. What file system can you upgrade it to when using the convert command?

Explanation

The correct answer is NTFS. The convert command can be used to upgrade a computer's file system from FAT16 to NTFS. NTFS is a more advanced and secure file system compared to FAT16, offering features such as file and folder permissions, encryption, and support for larger file sizes and partitions.

Submit
48. Tom has a 30GB hard disk partition (known as C:). He has 1.5GB free space on the partition. How can he defrag the partition?

Explanation

Tom can defrag the partition by running DEFRAG.EXE -f in the command line. The -f option stands for "force defragmentation" which will defragment the partition even if there is low free space available. This is suitable for Tom's situation where he only has 1.5GB free space on the partition.

Submit
49. How can a paper jam be resolved? (Select all that apply.)

Explanation

To resolve a paper jam, there are several steps that can be taken. First, clearing the paper path is essential to remove any stuck or jammed paper. Secondly, using the right type of paper is important to prevent jams caused by incompatible paper sizes or thickness. Lastly, checking for damaged rollers is necessary as they can cause paper jams if they are not functioning properly. Checking for a damaged primary corona wire is not relevant to resolving a paper jam.

Submit
50. Jennifer just installed a DVD-ROM drive and a CD-RW drive in a PC. When she boots the system, she sees only the DVD-ROM drive. What is the most likely cause of this problem?

Explanation

The most likely cause of Jennifer only seeing the DVD-ROM drive when she boots the system is that the Molex connector is not connected to the CD-RW drive.

Submit
51. Which of the following is the proper boot sequence of a PC?

Explanation

The proper boot sequence of a PC starts with the CPU, which initiates the boot process. After the CPU, the Power-On Self Test (POST) is performed to check the hardware components of the computer. Once the POST is completed, the boot loader is loaded, which is responsible for loading the operating system. Finally, the operating system is loaded and the PC is ready for use.

Submit
52. Which of the following settings must be established if you want to make a secure wireless connection? Select all that apply.

Explanation

To establish a secure wireless connection, two settings must be established. The first is the encryption standard used, which ensures that the data transmitted over the wireless connection is encrypted and cannot be easily intercepted by unauthorized users. The second setting is the SSID (Service Set Identifier) of the access point, which is the unique name that identifies the wireless network. By setting a specific SSID, you can ensure that only authorized devices can connect to the network, adding an extra layer of security. The brand of access point and the wireless standard used are not directly related to establishing a secure wireless connection.

Submit
53. What is Windows Vista’s recovery environment known as? (Select all that apply.)

Explanation

The correct answer is WinRE and System Recovery Options. Windows Vista's recovery environment is known as WinRE, which stands for Windows Recovery Environment. It provides various tools and options for troubleshooting and repairing the operating system. System Recovery Options is also a correct answer as it refers to the set of tools and features available within WinRE for recovering and repairing the system.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 12, 2010
    Quiz Created by
    Spawn_2_extreme
Cancel
  • All
    All (53)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which one of the following keys is found only on a laptop?
Which of the following would indicate a secured HTTP server?
What ...
Which syntax will enable you to see your computer’s MAC address?
What ...
What would you need to access to boot the computer into Safe Mode?
What ...
You ...
Buzz ...
Which of these is an example of social engineering?
While ...
After ...
A ...
What function is performed by the external power supply of a laptop?
What is the easiest way to monitor the battery health of a UPS?
A ...
Which of the following commands ping the loopback address?
In ...
How do you change the virtual memory in Windows XP?
The IP address 192.168.1.1 should have what default subnet mask?
To ...
How ...
Which ...
How ...
Jake’s ...
What ...
Which ...
Joey’s ...
A ...
Which of the following has the fastest data throughput?
Louis ...
To ...
What type of power connector is used for a x16 video card?
What are the six steps of the laser-printing process in order?
Which of these tools can protect you in the case of a surge?
What is the thickness of a Type II PC Card?
A ...
Which ...
If ...
Which tool checks protected system files?
Roger ...
You ...
Which ...
What command repairs the bootmgr.exe file in Windows Vista?
A ...
Which of the following recovery options uses a floppy disk?
A ...
Tom ...
How can a paper jam be resolved? (Select all that apply.)
Jennifer ...
Which of the following is the proper boot sequence of a PC?
Which ...
What ...
Alert!

Advertisement