CompTIA A+ 220-702 Essentials Practice Test....(Part 2)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Freddyoca
F
Freddyoca
Community Contributor
Quizzes Created: 5 | Total Attempts: 4,827
| Attempts: 562
SettingsSettings
Please wait...
  • 1/113 Questions

    A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

    • OS update
    • Adjust jumper settings
    • BIOS update
    • New CMOS battery
Please wait...
A Plus Certification Quizzes & Trivia
About This Quiz

This CompTIA A+ 220-702 Essentials Practice Test assesses key IT support skills and knowledge, focusing on troubleshooting USB speed, DB-9 ports, networked printers, continuous ping operations, and setting up user accounts on Windows XP.


Quiz Preview

  • 2. 

    A user signs up for every online promotion and mailing list they are prompted with and their mailbox is flooded with email. Which of the following is an example of this?

    • Virus

    • Infection

    • Spam

    • Malware

    Correct Answer
    A. Spam
    Explanation
    The given scenario describes a situation where a user signs up for multiple online promotions and mailing lists, resulting in their mailbox being flooded with emails. This is a clear example of spam. Spam refers to unsolicited or unwanted emails that are sent in bulk to a large number of recipients, often for advertising or promotional purposes. In this case, the user's decision to sign up for every online promotion and mailing list has led to an overwhelming amount of unwanted emails in their mailbox.

    Rate this question:

  • 3. 

    A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

    • OS update

    • Adjust jumper settings

    • BIOS update

    • New CMOS battery

    Correct Answer
    A. BIOS update
    Explanation
    The most likely solution to the issue of the computer not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing and configuring hardware components, including memory. Updating the BIOS can ensure that the system recognizes and properly utilizes the new memory.

    Rate this question:

  • 4. 

    Which of the following can cause a blue screen error?

    • Bad drivers

    • A DVD that contains an incorrect format

    • An incorrect router configuration

    • A rogue DHCP server

    Correct Answer
    A. Bad drivers
    Explanation
    Bad drivers can cause a blue screen error. When a computer's hardware is not properly supported by the installed drivers, it can lead to conflicts and system crashes. These crashes often result in a blue screen error, also known as the "Blue Screen of Death" (BSOD). Updating drivers regularly and ensuring compatibility with the operating system can help prevent such errors.

    Rate this question:

  • 5. 

    A technician is experiencing an issue with the computer randomly rebooting throughout the day. The technician suspects the cause is from over heating. Which of the following should the technician check for the cause?

    • The heat sink is firmly attached to the processor.

    • The RAM chips are firmly in place.

    • The hard drive is attached to the power supply.

    • The graphics card is firmly in place.

    Correct Answer
    A. The heat sink is firmly attached to the processor.
    Explanation
    The technician should check if the heat sink is firmly attached to the processor. Overheating can cause a computer to randomly reboot, and the heat sink is responsible for dissipating heat from the processor. If the heat sink is not properly attached, it may not be able to effectively cool the processor, leading to overheating and subsequent reboots. Checking the attachment of the heat sink is crucial in troubleshooting the issue.

    Rate this question:

  • 6. 

    A user is cleaning up their temporary Internet files and is concerned about the number of cookies discovered. Which of the following is a correct statement about cookies?

    • Cookies are spyware.

    • Cookies are not always malicious.

    • Cookies cannot be removed.

    • Cookies should be disabled at all times.

    Correct Answer
    A. Cookies are not always malicious.
    Explanation
    The correct statement about cookies is that they are not always malicious. Cookies are small text files that websites store on a user's computer to remember information about them. While some cookies can be used for tracking and targeted advertising, not all cookies are harmful. Many cookies are necessary for websites to function properly and provide a personalized user experience. It is important for users to regularly clean up their cookies and be cautious about the types of cookies they allow, but disabling cookies completely is not always necessary.

    Rate this question:

  • 7. 

    Which of the following tools would be BEST to use to pry open the case of a laptop?

    • Metal screwdriver

    • Plastic wedge

    • Needle-nose pliers

    • Extension magnet

    Correct Answer
    A. Plastic wedge
    Explanation
    A plastic wedge would be the best tool to use to pry open the case of a laptop. Unlike a metal screwdriver or needle-nose pliers, a plastic wedge is less likely to cause damage to the laptop's case or internal components. It is also less conductive, reducing the risk of electrical damage. An extension magnet is not suitable for prying open a laptop case as it is designed for retrieving metal objects and would not provide the necessary leverage.

    Rate this question:

  • 8. 

    Which of the following tools can be used prior to installing Windows Vista to find hardware compatibility issues?

    • Upgrade Advisor

    • Window Aero

    • Task Manager

    • Device Manager

    Correct Answer
    A. Upgrade Advisor
    Explanation
    Upgrade Advisor is the correct answer because it is a tool specifically designed to scan a computer system and check for hardware and software compatibility issues before installing Windows Vista. It helps users determine if their current hardware and software configurations are compatible with Windows Vista, and provides recommendations on necessary upgrades or updates to ensure a smooth installation process.

    Rate this question:

  • 9. 

    A technician needs to modify the BIOS settings of a PC; however, the BIOS setup password is unknown to all current employees. How can the technician accomplish this task?

    • Set the motherboard configuration jumper to clear the password.

    • Use a third party utility to reset the password.

    • Disconnect the power supply to the motherboard.

    • Contact the OEM and ask them to clear the password.

    Correct Answer
    A. Set the motherboard configuration jumper to clear the password.
    Explanation
    The technician can accomplish the task by setting the motherboard configuration jumper to clear the password. This jumper is a small plastic connector that is placed over two pins on the motherboard. By moving the jumper to the "clear" position and then back to its original position, the BIOS password will be reset. This method is commonly used to clear BIOS passwords when the password is unknown.

    Rate this question:

  • 10. 

    A user states that the inkjet printer is printing streaks on documents. Which of the following would resolve the issue?

    • Use the printers clean option.

    • Replace the printer data cable.

    • Print the demo page from the printer.

    • Print the demo page from the printer.

    Correct Answer
    A. Use the printers clean option.
    Explanation
    Using the printer's clean option can resolve the issue of streaks on documents. This option is designed to clean the printhead and remove any clogs or debris that may be causing the streaks. By running the clean option, the printer can ensure that the ink is flowing properly and that the prints come out without any streaks or smudges.

    Rate this question:

  • 11. 

    A technician needs to implement a RAID 1 set on a computer. Which of the following is the MINIMUM number of hard drives that would be required?

    • 1

    • 2

    • 3

    • 5

    Correct Answer
    A. 2
    Explanation
    To implement a RAID 1 set, also known as disk mirroring, the technician needs to have at least two hard drives. In RAID 1, data is written simultaneously to two drives, creating an exact copy or mirror of the data. This redundancy provides data protection in case one of the drives fails. Therefore, the minimum number of hard drives required for RAID 1 is 2.

    Rate this question:

  • 12. 

    After replacing the motherboard in a laptop, the system overheats and fails to boot. Which of the following is the MOST likely cause of this error?

    • Thermal paste was not applied between the heat sink and CPU.

    • The fan is not compatible with the new motherboard.

    • The GPU is not compatible with the CPU.

    • The replacement motherboard firmware is out of date.

    Correct Answer
    A. Thermal paste was not applied between the heat sink and CPU.
    Explanation
    The most likely cause of the system overheating and failing to boot after replacing the motherboard in a laptop is that the thermal paste was not applied between the heat sink and CPU. Thermal paste is a crucial component that helps to transfer heat from the CPU to the heat sink, ensuring proper cooling. Without thermal paste, the heat cannot be effectively dissipated, leading to overheating and potential damage to the system.

    Rate this question:

  • 13. 

    From a command prompt, a technician is removing some old user profiles from a desktop. Which of the following commands would be used to delete folders after they have been emptied?

    • SFC

    • MSCONFIG

    • RD

    • EDIT

    Correct Answer
    A. RD
    Explanation
    The command "RD" stands for "Remove Directory" and is used to delete folders from a command prompt. After the technician has emptied the folders, they can use the RD command followed by the folder name to permanently delete the folder and its contents. This command is commonly used to remove old user profiles or any other unnecessary folders from a desktop.

    Rate this question:

  • 14. 

    After performing a preventative maintenance on a laser printer, which of the following is the NEXT step a technician should take?

    • Refill the paper trays

    • Restart the printer

    • Print a test page

    • Restore to factory settings

    Correct Answer
    A. Print a test page
    Explanation
    After performing a preventative maintenance on a laser printer, the next step a technician should take is to print a test page. This is important to ensure that the printer is functioning properly after the maintenance. By printing a test page, the technician can check if all the components of the printer are working correctly, including the print quality, alignment, and any potential issues that may have arisen during the maintenance. This step helps in verifying that the printer is ready for regular use and ensures that any problems can be identified and resolved promptly.

    Rate this question:

  • 15. 

    Which of the following is the MAXIMUM allowable cable length of CAT5?

    • 100 meters (328 feet)

    • 250 meters (820 feet)

    • 500 meters (1640 feet)

    • 1000 meters (3280 feet)

    Correct Answer
    A. 100 meters (328 feet)
    Explanation
    The maximum allowable cable length of CAT5 is 100 meters (328 feet). This is because CAT5 cables are designed to transmit data over short distances and exceeding this length can result in signal degradation and loss.

    Rate this question:

  • 16. 

    A technician has deleted all the files in the directory C:\tempfiles. Which of the following commands should the technician use to delete this directory?

    • CD

    • SFC

    • MD

    • RD

    Correct Answer
    A. RD
    Explanation
    The technician should use the "RD" command to delete the directory C:\tempfiles. RD stands for "Remove Directory" and is used to delete directories in the Windows command prompt.

    Rate this question:

  • 17. 

    A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?

    • The processor is faulty.

    • The file system is fragmented.

    • The modem drivers are corrupt.

    • The power supply is faulty.

    Correct Answer
    A. The file system is fragmented.
    Explanation
    The most likely issue in this scenario is that the file system is fragmented. Fragmentation occurs when files are stored in non-contiguous blocks on the hard drive, leading to slower performance as the system needs to search for and retrieve scattered pieces of data. The constant activity of the hard drive LED suggests that the system is struggling to load all applications due to the fragmented file system. This issue can be resolved by defragmenting the hard drive, which rearranges the fragmented files and improves overall system performance.

    Rate this question:

  • 18. 

    If a computer has an IP address of 169.254.6.15, which of the following has failed?

    • WINS

    • DHCP

    • DNS

    • NAT

    Correct Answer
    A. DHCP
    Explanation
    If a computer has an IP address of 169.254.6.15, it means that the computer was unable to obtain an IP address from a DHCP server. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. When a device fails to obtain an IP address through DHCP, it falls back to using Automatic Private IP Addressing (APIPA) in the range of 169.254.x.x. Therefore, the failure of DHCP is the reason for the computer having an IP address of 169.254.6.15.

    Rate this question:

  • 19. 

    A technician plugs a USB device into the front panel of a desktop computer and nothing happens. The technician knows that plug-n-play is enabled. Which of the following BEST describes a possible cause to this issue?

    • The technician plugged a USB 2.0 device into a USB 1.1 port.

    • The technician needs to reboot the computer for the device to work.

    • The technician plugged a USB 1.1 device into a USB 2.0 port.

    • The front panel connectors are not plugged into the motherboard.

    Correct Answer
    A. The front panel connectors are not plugged into the motherboard.
    Explanation
    The front panel connectors not being plugged into the motherboard is the best explanation for the issue because if they are not connected properly, the USB device will not be recognized by the computer. Plugging a USB 2.0 device into a USB 1.1 port or vice versa would still allow the device to be recognized, although it may not function at its optimal speed. Rebooting the computer is not necessary for a USB device to work, as plug-n-play should automatically detect and install the necessary drivers.

    Rate this question:

  • 20. 

    A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the users resulting access level for the remotely shared directory?

    • Modify

    • Full control

    • Write

    • Read

    Correct Answer
    A. Read
    Explanation
    The user's resulting access level for the remotely shared directory is "Read" because even though the file share permissions allow the user to have full control, the NTFS permissions override it and only grant read access to the user.

    Rate this question:

  • 21. 

    A technician troubleshooting an issue over the phone determines that a home user has a faulty hard drive. The only information the home user can give is that the PC is ten years old, and the drive capacity is 40GB. Which of the following drive types should the technician bring to the service call?

    • Solid state

    • USB

    • SATA

    • PATA

    Correct Answer
    A. PATA
    Explanation
    Based on the given information that the PC is ten years old, it is likely that the PC is using an older technology for its hard drive. PATA (Parallel ATA) is an older interface commonly found in older PCs, while SATA (Serial ATA) is a newer interface. Therefore, the technician should bring a PATA drive to the service call.

    Rate this question:

  • 22. 

    A computer is not able to access Internet websites, internal company servers, or other networked resources. Which of the following is the FIRST step to help identify the cause of the problem?

    • Check the Ethernet link light.

    • Reboot the computer.

    • Check the length of the twisted-pair cable.

    • Ensure that a static IP address is assigned.

    Correct Answer
    A. Check the Ethernet link light.
    Explanation
    To identify the cause of the problem, the first step is to check the Ethernet link light. This light indicates whether there is a physical connection between the computer and the network. If the light is not lit, it suggests that there may be an issue with the network cable or the network port on the computer. By checking the link light, it helps in determining if the problem lies in the physical connection, which can then be further troubleshooted.

    Rate this question:

  • 23. 

    A user is not able to receive files off the FTP server. Which of the following default ports needs to be opened for FTP to work properly?

    • 21

    • 80

    • 110

    • 44 443

    Correct Answer
    A. 21
    Explanation
    Port 21 is the default port for FTP (File Transfer Protocol). When a user wants to receive files from an FTP server, they need to have port 21 opened on their network or firewall. This is because FTP uses port 21 for its control connection, which is responsible for sending commands and responses between the client and server. By opening port 21, the user will be able to establish a connection with the FTP server and receive files successfully.

    Rate this question:

  • 24. 

    A user has just moved to a new office and is unable to access the network. The technician suspects the users network settings need to be changed. Which of the following tools would the technician use on the Windows XP computer to view the network settings?

    • NETDIAG

    • TRACERT

    • IPCONFIG

    • PATHPING

    Correct Answer
    A. IPCONFIG
    Explanation
    The technician would use IPCONFIG on the Windows XP computer to view the network settings. IPCONFIG is a command-line tool that displays the current configuration of all network interfaces on the computer, including IP addresses, subnet masks, and default gateways. By using IPCONFIG, the technician can check if the user's network settings are correctly configured and make any necessary changes to allow access to the network.

    Rate this question:

  • 25. 

    A second optical drive has been added to the computer and needs to be referenced as the R: drive by the Microsoft Windows operating system. Which of the following places in Microsoft Windows will BEST accomplish this task?

    • Administrative Tools

    • Disk Management

    • Device Manager

    • Event Viewer

    Correct Answer
    A. Disk Management
    Explanation
    Disk Management is the best place in Microsoft Windows to accomplish the task of referencing a second optical drive as the R: drive. Disk Management allows users to manage and configure disk drives, including assigning drive letters to new drives. By accessing Disk Management, the user can assign the letter R: to the newly added optical drive, ensuring that it is recognized and accessible by the operating system.

    Rate this question:

  • 26. 

    Under which of the following circumstances would a technician use IPCONFIG /RENEW?

    • After an unsuccessful reboot

    • If a users IP address has been spoofed

    • After using IPCONFIG /RELEASE

    • If the computer has an ARP address conflict

    Correct Answer
    A. After using IPCONFIG /RELEASE
    Explanation
    A technician would use IPCONFIG /RENEW after using IPCONFIG /RELEASE. When a user runs IPCONFIG /RELEASE, it releases the current IP address assigned to the computer. After releasing the IP address, the computer needs to obtain a new IP address to establish a network connection again. Therefore, the technician would use IPCONFIG /RENEW to request a new IP address from the DHCP server.

    Rate this question:

  • 27. 

    A user is playing a new first person game on the computer and the screen is pausing during game play. The user has a high-end graphics card and is maxed out in memory. Which of the following should the technician perform?

    • Reinstall the game.

    • Upgrade the drivers

    • Replace the hard drive.

    • Reinstall the OS.

    Correct Answer
    A. Upgrade the drivers
    Explanation
    The screen pausing during gameplay can be caused by outdated or incompatible graphics drivers. Upgrading the drivers can resolve this issue by providing better compatibility and performance for the high-end graphics card. Reinstalling the game, replacing the hard drive, or reinstalling the OS would not directly address the problem with the screen pausing.

    Rate this question:

  • 28. 

    A user is connected to a stand alone printer. The user is receiving an out of memory error when printing large graphic files. Which of the following should the technician perform?

    • Upgrade RAM on the printer

    • Upgrade HDD on the computer

    • Upgrade RAM on the computer

    • Reinstall printer drivers

    Correct Answer
    A. Upgrade RAM on the printer
    Explanation
    The user is receiving an out of memory error when printing large graphic files. This suggests that the printer's current RAM is insufficient to handle the large files. Therefore, upgrading the RAM on the printer will increase its memory capacity and allow it to process the large graphic files without encountering memory errors.

    Rate this question:

  • 29. 

    A technician is dispatched to a system that will not go beyond the Windows XP splash screen. Which of the following, after restart, would allow the technician to load Windows XP?

    • Press F6, select Last Known Good Configuration, login

    • Press F8, select Debug mode, login

    • Press F8, select Last Known Good Configuration, login

    • Press F6, select Debug mode, login

    Correct Answer
    A. Press F8, select Last Known Good Configuration, login
    Explanation
    Pressing F8 and selecting Last Known Good Configuration allows the technician to load Windows XP because this option loads a previous configuration that was known to work properly. This can help to resolve any issues that may have caused the system to not go beyond the splash screen. Logging in after selecting this option will allow the technician to access the system and continue troubleshooting if necessary.

    Rate this question:

  • 30. 

    A technician is tasked with setting up a Windows XP computer with a user account that will only be used to access the Internet. Which account type should the user have access to?

    • Guest

    • Administrator

    • Domain User

    • Power User

    Correct Answer
    A. Guest
    Explanation
    The user should have access to the Guest account. The Guest account is designed for temporary or occasional use and has limited privileges, making it suitable for a user who only needs to access the internet. The Administrator account has full control over the computer and should not be used for regular internet access. Domain User accounts are typically used in a networked environment, and Power User accounts have elevated privileges that may not be necessary for internet access.

    Rate this question:

  • 31. 

    An internal IEEE 1394 expansion card should be installed on which port type?

    • AMR

    • AGP

    • ISA

    • PCI

    Correct Answer
    A. PCI
    Explanation
    An internal IEEE 1394 expansion card should be installed on the PCI port type. PCI stands for Peripheral Component Interconnect, which is a standard expansion bus that allows devices to be connected to the computer's motherboard. This type of port is commonly used for various expansion cards, including IEEE 1394 (also known as FireWire) cards, which are used for high-speed data transfer and connecting devices such as cameras and external hard drives.

    Rate this question:

  • 32. 

    A user reports that after installing a PCIe video card into a system, the onboard video no longer displays. Which of the following is MOST likely the cause?

    • The drivers for the onboard video card have been overwritten by the PCIe video card drivers.

    • The PCIe video card is defective and is conflicting with the onboard video.

    • The BIOS detected the PCIe video card and disabled the onboard video.

    • The processor has overheated and is causing the video to not display.

    Correct Answer
    A. The BIOS detected the PCIe video card and disabled the onboard video.
    Explanation
    The most likely cause for the onboard video no longer displaying after installing a PCIe video card is that the BIOS detected the PCIe video card and disabled the onboard video. When a PCIe video card is installed, the BIOS typically recognizes it as the primary display device and automatically disables the onboard video to avoid conflicts. This allows the system to prioritize the use of the PCIe video card for graphics processing.

    Rate this question:

  • 33. 

    A technician is upgrading memory in a desktop PC. The user purchased two 2GB DIMMS from the PC manufacturer. The PC powers on and POST shows 2GB of RAM. Which of the following is the FIRST action to perform?

    • Update the manufacturers chipset drivers.

    • Replace the two 2GB DIMMs with four 1GB DIMMs.

    • Update the PC BIOS and verify all memory is seen in POST.

    • Replace both of the 2GB DIMMs memory with new memory.

    Correct Answer
    A. Update the PC BIOS and verify all memory is seen in POST.
    Explanation
    The first action to perform in this scenario is to update the PC BIOS and verify all memory is seen in POST. This is because the technician has upgraded the memory in the desktop PC, but the POST is only showing 2GB of RAM instead of the expected 4GB. Updating the PC BIOS can help ensure that the system recognizes and utilizes the full amount of installed memory. Verifying this in the POST will confirm that the memory upgrade was successful.

    Rate this question:

  • 34. 

    A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?

    • Operating system type of the connected PCs

    • Location of the wireless router

    • Number of PCs that will access the network

    • Number of available Ethernet ports on the router

    Correct Answer
    A. Location of the wireless router
    Explanation
    The most important consideration when setting up a wireless network is the location of the wireless router. This is because the location of the router affects the signal strength and coverage of the network. Placing the router in a central location, away from obstacles and interference, ensures that all devices connected to the network can receive a strong and reliable signal.

    Rate this question:

  • 35. 

    A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?

    • FTP

    • SMTP

    • POP

    • SNMP

    Correct Answer
    A. SMTP
    Explanation
    SMTP stands for Simple Mail Transfer Protocol, which is responsible for sending email messages from a client to a server. In this scenario, if a user can receive emails but cannot send them, it indicates that the SMTP protocol is incorrectly configured. This means that there may be an issue with the SMTP settings or the server may not be properly configured to allow outgoing email messages.

    Rate this question:

  • 36. 

    After installing a replacement floppy disk drive, the LED on the drive stays constantly lit and the drive does not work. Which of the following is the MOST likely cause of the problem?

    • Floppy ribbon is reversed

    • Floppy disk is in the drive

    • Floppy ribbon is not connected

    • This is normal after replacement

    Correct Answer
    A. Floppy ribbon is reversed
    Explanation
    The most likely cause of the problem is that the floppy ribbon is reversed. This means that the ribbon cable connecting the floppy disk drive to the motherboard has been inserted incorrectly. Reversing the ribbon cable can result in improper communication between the drive and the motherboard, causing the LED to stay constantly lit and the drive to not work.

    Rate this question:

  • 37. 

    Which of the following is a difference between a worm and spyware?

    • A worm replicates itself before infecting other systems.

    • Spyware replicates multiple times on one system before infecting another system.

    • A worm attacks one platform, where spyware attacks across platforms.

    • Spyware resides primarily in the boot sector, where a worm resides primarily in the registry.

    Correct Answer
    A. A worm replicates itself before infecting other systems.
    Explanation
    A worm is a type of malware that is capable of replicating itself and spreading to other systems without any user intervention. It can exploit vulnerabilities in a network to propagate and infect multiple systems. On the other hand, spyware is a type of malware that is designed to collect information about a user's activities without their knowledge or consent. It may replicate multiple times on a single system, but it does not typically infect other systems. Therefore, the difference between a worm and spyware is that a worm replicates itself before infecting other systems.

    Rate this question:

  • 38. 

    Which of the following will occur if an AGP 4x video card is used in an AGP 2x slot?

    • The video card will run at the slower AGP 2x speed.

    • The video card will run at the higher AGP 4x speed.

    • The video card will run in-between the two speeds at the AGP 3x speed.

    • The video card will not operate.

    Correct Answer
    A. The video card will run at the slower AGP 2x speed.
    Explanation
    If an AGP 4x video card is used in an AGP 2x slot, the video card will run at the slower AGP 2x speed. This is because the video card is designed to be backward compatible with lower speed slots. The AGP 2x slot cannot support the higher speed of AGP 4x, so the video card will automatically adjust to the maximum speed supported by the slot, which is AGP 2x.

    Rate this question:

  • 39. 

    A user reports that a laser printer is printing out pages with blurry text that smudges when touched. Which of the following is the MOST likely reason for this?

    • The toner cartridge is running low.

    • The toner cartridge is leaking.

    • The fuser is not getting hot enough.

    • The transfer bar needs to be replaced.

    Correct Answer
    A. The fuser is not getting hot enough.
    Explanation
    The fuser is responsible for melting the toner onto the paper during the printing process. If the fuser is not getting hot enough, the toner will not properly adhere to the paper, resulting in blurry text that smudges when touched. This is the most likely reason for the issue described by the user.

    Rate this question:

  • 40. 

    A technician needs a list of all the routers along a given path over multiple networks. Which of the following commands will accomplish this task?

    • IPCONFIG

    • TRACERT

    • PING

    • NSLOOKUP

    Correct Answer
    A. TRACERT
    Explanation
    The TRACERT command is used to trace the route that packets take from the source to the destination. It displays a list of all the routers along the path that the packets traverse. This command is commonly used to troubleshoot network connectivity issues and identify the network hops between two endpoints. Therefore, TRACERT is the correct command to accomplish the task of obtaining a list of all the routers along a given path over multiple networks.

    Rate this question:

  • 41. 

    A user reports that when typing on the laptop keyboard, the mouse pointer scrolls across the screen. Which of the following would MOST likely resolve this issue?

    • Reboot the laptop

    • Use an external monitor

    • Disable the touch pad

    • Plug in an external mouse

    Correct Answer
    A. Disable the touch pad
    Explanation
    Disabling the touchpad would most likely resolve the issue because it seems that the touchpad is sensitive and causing the mouse pointer to scroll across the screen when typing. By disabling the touchpad, the user can prevent any accidental movements of the mouse pointer while typing on the laptop keyboard.

    Rate this question:

  • 42. 

    A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?

    • Change the default administrator password

    • Change the IP range of the wireless network

    • Hide the SSID

    • Disable WEP

    Correct Answer
    A. Change the default administrator password
    Explanation
    Changing the default administrator password is the correct answer because it helps prevent unauthorized access to the router's settings. By changing the default password, the technician can ensure that only authorized users can access and modify the router's configuration. This helps in preventing any malicious activity or unauthorized changes that could cause the router to reboot.

    Rate this question:

  • 43. 

    Which of the following is the BEST source for information about malware detected on a computer?

    • README.TXT file included with the anti-spyware software installation

    • User of a previously infected computer

    • Operating system documentation

    • Anti-spyware software website

    Correct Answer
    A. Anti-spyware software website
    Explanation
    The best source for information about malware detected on a computer is the anti-spyware software website. This is because the website is specifically dedicated to providing information and updates about the software, including any malware that has been detected. The README.TXT file included with the anti-spyware software installation may provide some information, but it is likely to be limited compared to the comprehensive information available on the software website. The user of a previously infected computer may have some insights, but their knowledge may not be as reliable or up-to-date as the information provided by the software website. The operating system documentation is unlikely to provide specific information about malware detection.

    Rate this question:

  • 44. 

    A user reports that after working for a while with their PC, the computer reboots without warning. The technician has ruled out a virus infection, and when examining the motherboard discovers that some of the capacitors look distended and out of shape. Which of the following should the technician do to fix the users PC?

    • Reconfigure the BIOS settings

    • Replace the motherboard

    • Replace the hard drive

    • Replace the hard drive

    • Remove and replace the affected capacitors

    Correct Answer
    A. Replace the motherboard
    Explanation
    The technician should replace the motherboard because the distended and out of shape capacitors indicate a hardware issue. This hardware issue is likely causing the computer to reboot without warning. Reconfiguring the BIOS settings or replacing the hard drive would not address the problem with the capacitors.

    Rate this question:

  • 45. 

    After rebooting a workstation a message pops up saying one or more services failed to start. Which of the following will provide information about this issue?

    • Look at the Security event logs.

    • Look at the Task Manager.

    • Look at the system event logs.

    • Look at the application event logs.

    Correct Answer
    A. Look at the system event logs.
    Explanation
    The system event logs would provide information about the issue of one or more services failing to start after rebooting a workstation. These logs record events related to the operating system and its components, including service start and stop events. By examining the system event logs, one can identify any errors or warnings related to the failed services and troubleshoot the issue accordingly.

    Rate this question:

  • 46. 

    Which of the following is contained in the first sector of the hard disk?

    • Operating system

    • Master file table

    • Boot sector

    • Master boot record

    Correct Answer
    A. Master boot record
    Explanation
    The first sector of a hard disk contains the Master Boot Record (MBR). The MBR is a small program that is executed when the computer is powered on and it contains information about the disk's partitions and the location of the operating system. It also contains the partition table, which helps the computer locate and access the different partitions on the disk. The MBR is crucial for the computer to boot up properly and initiate the operating system.

    Rate this question:

  • 47. 

    The technician is moving a users files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?

    • C:\users\user1\documents to c:\users\user1\documents

    • C:\documents and settings\user1\my documents to c:\users\user1\documents

    • C:\documents and settings\user1\my documents to c:\documents and settings\user1\my documents

    • C:\users\user1\my documents to c:\users\user1\documents

    Correct Answer
    A. C:\documents and settings\user1\my documents to c:\users\user1\documents
    Explanation
    The correct answer is c:\documents and settings\user1\my documents to c:\users\user1\documents. In Windows XP, the default directory for user documents is "c:\documents and settings\user1\my documents", while in Windows Vista, it is "c:\users\user1\documents". Therefore, when moving the user's files from Windows XP to Windows Vista, the files in the "c:\documents and settings\user1\my documents" directory should be moved to the "c:\users\user1\documents" directory.

    Rate this question:

  • 48. 

    An inkjet printer prints faded and smeared pages. Which of the following would be the MOST appropriate solution for this issue?

    • Blow compressed air on the print cartridges.

    • Run the printers cleaning routine.

    • Reseat the print cartridges.

    • Use a lint-free cloth to clean the print heads.

    Correct Answer
    A. Run the printers cleaning routine.
    Explanation
    Running the printer's cleaning routine would be the most appropriate solution for the issue of faded and smeared pages. This routine is specifically designed to clean the print heads and remove any clogs or debris that may be causing the poor print quality. By running this routine, the printer will be able to clear any blockages and ensure that the ink is properly distributed, resulting in clearer and sharper prints.

    Rate this question:

  • 49. 

    Which of the following commands would be used to go from c:\windows to c:\windows\system32?

    • RD

    • MD

    • DIR

    • CD

    Correct Answer
    A. CD
    Explanation
    To go from the "c:\windows" directory to the "c:\windows\system32" directory, the correct command to use is "CD". The CD command stands for "change directory" and is used to navigate through different directories within the file system. By typing "CD c:\windows\system32", the user will be able to change their current directory to the "system32" directory, which is located within the "windows" directory.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 17, 2011
    Quiz Created by
    Freddyoca
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.