1.
What does a computer use to connect more than 2 hard drives?
Explanation
A computer uses SATA (Serial ATA) to connect more than 2 hard drives. SATA is a computer bus interface that allows for the transfer of data between the computer's motherboard and storage devices, such as hard drives. It provides a high-speed and efficient connection for multiple hard drives, allowing the computer to access and store data simultaneously across multiple drives. SATA has become the standard interface for connecting internal storage devices in modern computers due to its reliability and performance.
2.
How many more pins are there in a PATA cable than a SATA cable?
Explanation
There are 33 more pins in a PATA cable than a SATA cable.
3.
What are LANs typically connected with?
Explanation
LANs (Local Area Networks) are typically connected with copper cabling. Copper cabling is widely used for LAN connections due to its reliability, affordability, and ability to transmit data at high speeds. It provides a stable and secure connection, making it suitable for connecting computers, printers, servers, and other devices within a local area network. Copper cabling also allows for easy installation and maintenance, making it a popular choice for LAN connectivity in homes, offices, and other small to medium-sized networks.
4.
Approx. how much lead is in CRT monitors?
Explanation
CRT monitors contain approximately 4 pounds of lead.
5.
What is phishing a form of?
Explanation
Phishing is a form of social engineering. Social engineering refers to the manipulation and deception techniques used by attackers to exploit human psychology and gain unauthorized access to sensitive information. In the case of phishing, attackers use deceptive tactics, such as impersonating trustworthy entities or creating fake websites, emails, or messages, to trick individuals into revealing their personal information, such as passwords, credit card details, or social security numbers. Therefore, phishing falls under the category of social engineering as it relies on manipulating human behavior to achieve its malicious goals.
6.
What do you use to clean the RAM?
Explanation
Isopropyl alcohol is commonly used to clean electronic components, including RAM. It is a solvent that helps remove dirt, dust, and other contaminants from the surface of the RAM module. Isopropyl alcohol evaporates quickly and leaves no residue, making it a safe and effective cleaning solution for delicate electronic components. Regular cleaning of the RAM can help improve its performance and prolong its lifespan.
7.
What are the two types of network topology?
Explanation
The two types of network topology are physical and logical. Physical topology refers to the actual physical layout of the network, including the arrangement of devices and cables. Logical topology, on the other hand, refers to how data flows within the network, regardless of the physical layout. Both physical and logical topology are important for understanding and designing networks effectively.
8.
What does APIPA stand for?
Explanation
APIPA stands for Automatic Private Internet Protocol Addressing. This refers to a feature in the Windows operating system that allows a device to automatically assign itself an IP address when it is unable to connect to a DHCP server. This feature is useful in situations where a device is unable to obtain an IP address from a network, ensuring that it can still communicate within a local network. APIPA addresses are in the range of 169.254.0.1 to 169.254.255.254.
9.
Which OS introduced PnP?
Correct Answer
A. Windows 95
Explanation
Windows 95 introduced PnP (Plug and Play) functionality to the operating system. PnP allows devices to be automatically detected and configured by the system without the need for manual intervention. This feature greatly simplified the process of installing and using hardware devices on a computer, as users no longer needed to manually configure device settings or install drivers. Windows 95 was a significant milestone in the evolution of operating systems, and the introduction of PnP played a major role in improving the user experience and making technology more accessible to a wider audience.
10.
What is an alternative name for sub-folder?
Correct Answer
Sub-directory
Subdirectory
Explanation
An alternative name for a sub-folder is a sub-directory or subdirectory. This term refers to a folder that is located within another folder, creating a hierarchical structure within a file system. Sub-directories are used to organize and categorize files and folders, making it easier to navigate and manage large amounts of data.
11.
What are two examples of API
Correct Answer(s)
B. OpenGL
C. DirectX
Explanation
OpenGL and DirectX are two examples of APIs (Application Programming Interfaces). An API is a set of rules and protocols that allows different software applications to communicate with each other. In the context of computer graphics, OpenGL and DirectX are widely used APIs that provide developers with a standardized way to interact with the graphics hardware and render graphics on the screen. They provide functions and libraries that simplify the process of creating and manipulating 2D and 3D graphics, making it easier for developers to create visually appealing and interactive applications.
12.
A printer produces colours using...
Correct Answer(s)
Subtractive mixing
Explanation
A printer produces colors using subtractive mixing. Subtractive mixing is a process in which colors are created by subtracting certain wavelengths of light from the white light source. In this method, the printer starts with white light and then uses ink or toner to absorb or subtract specific wavelengths, resulting in the desired color. The subtractive mixing model is commonly used in printing because it allows for a wide range of colors to be produced by combining different amounts of cyan, magenta, yellow, and black inks.
13.
Firewire is also known as? (not 1394)
Correct Answer(s)
i.LINK
Explanation
Firewire is also known as i.LINK. i.LINK is a high-speed serial bus interface that is commonly used for connecting digital devices such as camcorders, computers, and audio equipment. It provides a fast and reliable data transfer between devices, allowing for the seamless transfer of large files and real-time streaming of audio and video. i.LINK is a trademarked name used by Sony for their implementation of the IEEE 1394 standard, which is commonly referred to as Firewire.
14.
What kind of interface do network printers use to connect to a network?
Correct Answer(s)
RJ-45
Explanation
Network printers use an RJ-45 interface to connect to a network. RJ-45 is a type of connector commonly used for Ethernet connections. It allows the printer to communicate with other devices on the network, such as computers or servers. The RJ-45 interface provides a reliable and fast connection, making it suitable for network printing.
15.
802.11g transfers at a rate of (Mbps)
Correct Answer(s)
54
Explanation
802.11g is a wireless networking standard that operates in the 2.4 GHz frequency range. It has a maximum data transfer rate of 54 Mbps, which means it can transmit data at a speed of 54 megabits per second. This standard is capable of providing faster wireless connectivity compared to its predecessor, 802.11b, which has a maximum transfer rate of only 11 Mbps. Therefore, the correct answer is 54.
16.
The higher the DPI, the higher the...
Correct Answer(s)
Resolution
Explanation
The higher the DPI (dots per inch), the higher the resolution. DPI refers to the number of dots or pixels that can be displayed in one inch of an image or printed material. As the DPI increases, the image becomes more detailed and sharp, resulting in a higher resolution. This is because more dots or pixels are packed into each inch, providing more information and clarity in the image. Therefore, a higher DPI directly correlates with a higher resolution.
17.
What two types of security are technicians usually responsible for?
Correct Answer(s)
Network & data
Data & network
Explanation
Technicians are usually responsible for two types of security: network security and data security. Network security involves protecting the network infrastructure from unauthorized access, attacks, and vulnerabilities. This includes implementing firewalls, intrusion detection systems, and encryption protocols. On the other hand, data security focuses on safeguarding sensitive information from unauthorized access, loss, or theft. This involves measures such as data encryption, access controls, and regular backups. Both network and data security are crucial for maintaining the confidentiality, integrity, and availability of an organization's information assets.
18.
If a threat is structured, it is considered...
Correct Answer(s)
External
Explanation
If a threat is structured, it means that it has a clear and organized plan or method of attack. This suggests that the threat is coming from outside of the system or organization being targeted. Therefore, it is considered an external threat.
19.
A worm is...
Correct Answer(s)
Self-replicating
Self replicating
Explanation
A worm is a type of malware that is capable of replicating itself and spreading to other computers or networks without any human intervention. It can create copies of itself and use various methods to propagate, such as exploiting vulnerabilities or sending itself through email attachments. The terms "self-replicating" and "self replicating" both refer to the same characteristic of a worm, which is its ability to reproduce and spread autonomously.