CompTIA 220-802 Practice Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Shellbreiner
S
Shellbreiner
Community Contributor
Quizzes Created: 2 | Total Attempts: 346
Questions: 100 | Attempts: 145

SettingsSettingsSettings
CompTIA Quizzes & Trivia

Questions and Answers
  • 1. 

    You are helping a customer with an Internet connectivity problem. The customer tells you that the computer cannot connect to a favorite website. After quickly analyzing the computer, you note that it cannot connect to any websites. What should you do next?

    • A.

      Identify the problem

    • B.

      Establish a theory of probable cause

    • C.

      Test you theory to determine cause

    • D.

      Establish a plan of action

    Correct Answer
    B. Establish a theory of probable cause
    Explanation
    Establishing a theory of probable cause is the next step because it allows you to make an educated guess about what might be causing the computer's inability to connect to any websites. By formulating a theory, you can then proceed to test it to determine the actual cause of the problem. This step is crucial in troubleshooting as it helps narrow down the potential causes and guides the subsequent actions to be taken.

    Rate this question:

  • 2. 

    You need to automatically check for performance issues in Windows 7. Which tool is the best option?

    • A.

      Device Manager in the Control Panel

    • B.

      Troubleshooting item in the Control Panel

    • C.

      Task Manager

    • D.

      Upgrade Advisor

    Correct Answer
    B. Troubleshooting item in the Control Panel
    Explanation
    The Troubleshooting item in the Control Panel is the best option for automatically checking for performance issues in Windows 7. This tool is specifically designed to identify and resolve common problems that can affect system performance. It provides a comprehensive set of diagnostic and repair tools that can help identify the root cause of performance issues and suggest appropriate solutions. By using the Troubleshooting item in the Control Panel, users can efficiently troubleshoot and improve the overall performance of their Windows 7 system.

    Rate this question:

  • 3. 

    Which of the following is used by BitLocker to provide an encryption key and to protect data?

    • A.

      TPM

    • B.

      CMOS

    • C.

      IRQ

    • D.

      AGP

    Correct Answer
    A. TPM
    Explanation
    The correct answer is TPM. TPM stands for Trusted Platform Module, which is a hardware component used by BitLocker to provide an encryption key and protect data. It is a specialized chip that stores cryptographic keys and helps in securing the system's integrity. BitLocker uses the TPM to ensure that the encryption keys are securely stored and that the system has not been tampered with. This helps in preventing unauthorized access to the encrypted data.

    Rate this question:

  • 4. 

    You want to verify that the local computer's network card is functioning properly. Which IP address should you use?

    • A.

      10.0.0.1

    • B.

      255.255.255.0

    • C.

      127.0.0.1

    • D.

      192.168.0.1

    Correct Answer
    C. 127.0.0.1
    Explanation
    The IP address 127.0.0.1 is known as the loopback address, which is used to test network connectivity on the local machine. It allows a computer to send network packets to itself, without actually sending them over the network. Therefore, using this IP address will help verify if the local computer's network card is functioning properly.

    Rate this question:

  • 5. 

    How would you secure a smartphone and its data? (Select the best two answers)

    • A.

      Passcode lock

    • B.

      Bluetooth

    • C.

      SSID

    • D.

      GPS tracking

    • E.

      Remote wipe

    Correct Answer(s)
    A. Passcode lock
    E. Remote wipe
    Explanation
    To secure a smartphone and its data, two effective measures are passcode lock and remote wipe. A passcode lock provides a basic level of security by requiring a password or PIN to access the device, preventing unauthorized access. Remote wipe allows the user to erase all data on the smartphone remotely in case it is lost or stolen, ensuring that sensitive information does not fall into the wrong hands. These two measures combined provide a strong defense against unauthorized access and data theft.

    Rate this question:

  • 6. 

    Your customer has a computer (called comp112) that has been infected by a worm. The worm has propagated to at least 30 other computers on the network. What should you do first before attempting to remove the worm from the computer name comp112?

    • A.

      Log the user off the system

    • B.

      Boot the system in Safe Mode

    • C.

      Run a full virus scan

    • D.

      Disconnect the network cable from the computer

    Correct Answer
    D. Disconnect the network cable from the computer
    Explanation
    Before attempting to remove the worm from the computer named comp112, the first step should be to disconnect the network cable from the computer. This is important because the worm has already propagated to at least 30 other computers on the network. By disconnecting the network cable, it prevents the worm from spreading further and potentially infecting more computers. Once the network connection is severed, further steps can be taken to remove the worm effectively.

    Rate this question:

  • 7. 

    Which command should you use to find out the integrity of a hard drive?

    • A.

      CHKDSK

    • B.

      FDISK

    • C.

      FORMAT

    • D.

      IPCONFIG

    Correct Answer
    A. CHKDSK
    Explanation
    CHKDSK is the correct answer because it is a command used to check the integrity of a hard drive in Windows operating systems. CHKDSK stands for "Check Disk" and it scans the file system on the hard drive for errors and fixes them if possible. It also identifies and marks bad sectors on the hard drive. FDISK is a command used for disk partitioning, FORMAT is used to format a disk, and IPCONFIG is used to display the IP configuration of a network interface.

    Rate this question:

  • 8. 

    Your boss asks you to find a list of routers along a given path through multiple networks. What command can help you?

    • A.

      PING

    • B.

      IPCONFIG

    • C.

      TRACERT

    • D.

      NSLOOKUP

    Correct Answer
    C. TRACERT
    Explanation
    The TRACERT command is used to trace the route taken by packets across an IP network. It provides a list of routers along a given path through multiple networks. This command can help in identifying the network hops and the routers involved in the path taken by the packets, allowing for troubleshooting and network analysis.

    Rate this question:

  • 9. 

    Your customer's laptop's LCD is being scratched by the keyboard when the lid is closed. What would prevent this from happening?

    • A.

      Replace the rubber bumpers

    • B.

      Replace the LCD hinges

    • C.

      Replace the LCD panel

    • D.

      Replace the keyboard

    Correct Answer
    A. Replace the rubber bumpers
    Explanation
    Replacing the rubber bumpers would prevent the laptop's LCD from being scratched by the keyboard when the lid is closed. The rubber bumpers act as a cushion between the keyboard and the LCD, preventing direct contact and minimizing the risk of scratches. By replacing the rubber bumpers, the laptop's LCD would be protected from any potential damage caused by the keyboard.

    Rate this question:

  • 10. 

    You have determined that the USB controller is malfunctioning. What should you do first to troubleshoot this problem?

    • A.

      Replace the USB controller

    • B.

      Test the voltage of the USB controller using a multimeter

    • C.

      Use the System Information utility

    • D.

      Use the Windows Device Manager

    Correct Answer
    D. Use the Windows Device Manager
    Explanation
    To troubleshoot a malfunctioning USB controller, the best first step is to use the Windows Device Manager. This utility allows you to view and manage the hardware devices connected to your computer. By accessing the Device Manager, you can check if the USB controller is recognized by the system, if it has any driver issues, or if there are any conflicts with other devices. This will help you identify and potentially resolve the problem without the need to replace the USB controller or perform any hardware testing.

    Rate this question:

  • 11. 

    You have been asked by a customer to add a second optical drive, to be referenced as M: on a computer running Windows 7. What is the best place to accomplish this?

    • A.

      Disk Management

    • B.

      Administrative Tools

    • C.

      Device Manager

    • D.

      Event Viewer

    Correct Answer
    A. Disk Management
    Explanation
    The best place to add a second optical drive, to be referenced as M:, on a computer running Windows 7 is Disk Management. Disk Management is a built-in tool in Windows that allows users to manage their disks and partitions. By accessing Disk Management, the user can initialize, format, and assign drive letters to new disks or partitions, including the second optical drive. This ensures that the drive is recognized by the system and can be accessed properly with the desired drive letter.

    Rate this question:

  • 12. 

    A user attempts to print a large image but only half the graphic prints out. What is the most likely reason for this?

    • A.

      The printer doesn't support the job's language

    • B.

      The printer needs more memory

    • C.

      The printer driver needs to be updated

    • D.

      The network connection is faulty

    Correct Answer
    B. The printer needs more memory
    Explanation
    The most likely reason for only half of the graphic printing out is that the printer needs more memory. When printing a large image, the printer may not have enough memory to process and print the entire image at once. As a result, it may only be able to print a portion of the image before running out of memory. Increasing the printer's memory capacity should resolve this issue and allow the full image to be printed.

    Rate this question:

  • 13. 

    Which of the following printer failures is described as a condition in which the internal feed mechanism stopped working temporarily?

    • A.

      No connectivity

    • B.

      Corrupt driver

    • C.

      Paper jam

    • D.

      Power cycle

    Correct Answer
    C. Paper jam
    Explanation
    A paper jam is a printer failure in which the internal feed mechanism temporarily stops working due to a piece of paper becoming stuck or jammed in the printer. This can prevent the printer from properly feeding paper through and can cause printing errors or complete failure until the jam is cleared.

    Rate this question:

  • 14. 

    Which command would you use to delete an empty directory?

    • A.

      EDIT

    • B.

      RD

    • C.

      FORMAT

    • D.

      DIR

    Correct Answer
    B. RD
    Explanation
    The command "RD" is used to delete an empty directory.

    Rate this question:

  • 15. 

    One of tour co-workers is attempting to access a file on a share located on a remote computer. The file's share permissions are set to allow the user full control; however, the NTFS permissions allow the user to have read access. What will be the user's resulting access level for the file?

    • A.

      Read

    • B.

      Write

    • C.

      Modify

    • D.

      Full Control

    Correct Answer
    A. Read
    Explanation
    The user's resulting access level for the file will be Read. This is because NTFS permissions take precedence over share permissions. Even though the share permissions allow the user full control, the more restrictive NTFS permissions only allow read access. Therefore, the user will only have read access to the file.

    Rate this question:

  • 16. 

    You are upgrading a computer from Windows Vista to Windows 7. What is the best tool to use to move a user's documents and file settings?

    • A.

      System Restore

    • B.

      Easy Transfer

    • C.

      XCOPY

    • D.

      Backup and Restore

    Correct Answer
    B. Easy Transfer
    Explanation
    Easy Transfer is the best tool to use when upgrading a computer from Windows Vista to Windows 7 to move a user's documents and file settings. Easy Transfer is a built-in utility in Windows that allows users to transfer files, folders, and settings from one computer to another. It simplifies the process of transferring important data and settings, ensuring a smooth transition to the new operating system without losing any important files or configurations.

    Rate this question:

  • 17. 

    You work at a PC bench and receive a laptop that has a dim display. You confirm that it is a hardware issue. Which part should be replaced first?

    • A.

      LCD panel

    • B.

      Video adapter

    • C.

      Display harness

    • D.

      LCD inverter

    Correct Answer
    D. LCD inverter
    Explanation
    The LCD inverter should be replaced first because it is responsible for providing power to the backlight of the LCD panel. If the display is dim, it could indicate a problem with the inverter not supplying enough power to the backlight, resulting in a dim display. By replacing the LCD inverter, it can help resolve the hardware issue and potentially fix the dim display problem.

    Rate this question:

  • 18. 

    A customer reports to you that he can no longer open any .tiff files. What is the most likely cause?

    • A.

      The .tiff files are corrupted

    • B.

      File associations have been removed

    • C.

      There is no photo-editing program available

    • D.

      File extension is not commonly used type

    Correct Answer
    B. File associations have been removed
    Explanation
    The most likely cause for the customer not being able to open any .tiff files is that the file associations have been removed. File associations determine which program should be used to open a specific file type. If the file associations for .tiff files have been removed, the operating system does not know which program to use to open them, resulting in the inability to open the files.

    Rate this question:

  • 19. 

    Which of the following answers can be the cause of a blue screen error?

    • A.

      Rogue DHCP server

    • B.

      Incorrect router configuration

    • C.

      Bad driver

    • D.

      Incompatible USB device

    Correct Answer
    C. Bad driver
    Explanation
    A bad driver can be a cause of a blue screen error. When a driver is corrupted, outdated, or incompatible with the operating system or other hardware components, it can result in system instability and crashes, leading to a blue screen error. Drivers act as a bridge between the hardware and the operating system, and any issues with them can disrupt the communication and functionality of the system, causing the blue screen error to occur.

    Rate this question:

  • 20. 

    A customer cannot access some Internet websites but can connect to resources inside the LAN. You can use the PING command to test the user's connectivity. What command should you run next to troubleshoot this issue?

    • A.

      NET USE

    • B.

      NETSTAT -r

    • C.

      NBSTAT -R

    • D.

      IPCONFIG/FLUSHDNS

    Correct Answer
    D. IPCONFIG/FLUSHDNS
    Explanation
    To troubleshoot the issue of a customer being unable to access some Internet websites but can connect to resources inside the LAN, the next command to run would be "IPCONFIG/FLUSHDNS". This command will flush the DNS cache on the customer's computer, which can help resolve any DNS-related issues that may be causing the problem. By flushing the DNS cache, the computer will clear any stored DNS information and retrieve fresh DNS records when trying to access websites, potentially resolving any connectivity issues.

    Rate this question:

  • 21. 

    You just finished upgrading a video card in a PC. When you reboot the system, nothing displays on the screen. What is the most likely cause?

    • A.

      The onboard video of the motherboard is still enabled in the BIOS

    • B.

      New video cards require new monitors because their resolutions do not match

    • C.

      The new video card must be enabled by dipswitch on the motherboard

    • D.

      The new video card must be installed within the OS first

    Correct Answer
    A. The onboard video of the motherboard is still enabled in the BIOS
    Explanation
    The most likely cause for the screen not displaying anything after upgrading the video card is that the onboard video of the motherboard is still enabled in the BIOS. This means that the system is still trying to use the onboard video instead of the new video card. To resolve this issue, the user would need to enter the BIOS settings and disable the onboard video, allowing the system to recognize and use the new video card.

    Rate this question:

  • 22. 

    A program is no longer responding. Where would a technician go to end the program?

    • A.

      Computer Management

    • B.

      Task Manager

    • C.

      Registry

    • D.

      Services console

    Correct Answer
    B. Task Manager
    Explanation
    When a program becomes unresponsive, a technician would typically use the Task Manager to end the program. Task Manager is a system utility in Windows that provides information about the processes and applications running on a computer. It allows users to view and manage running programs, monitor system performance, and end unresponsive tasks or processes. Therefore, Task Manager is the appropriate tool for a technician to terminate a program that is no longer responding.

    Rate this question:

  • 23. 

    You are setting up a SOHO wireless network. Which of the following provides that best security?

    • A.

      Diable SSID broadcasting and configure WEP

    • B.

      MAC address filtering

    • C.

      IP address filtering

    • D.

      Enable SSID and configure WPA2

    Correct Answer
    D. Enable SSID and configure WPA2
    Explanation
    Enabling SSID broadcasting and configuring WPA2 provides the best security for a SOHO wireless network. SSID broadcasting allows the network to be visible to devices, making it easier to connect. However, disabling SSID broadcasting adds an extra layer of security by hiding the network from unauthorized users. WPA2 is a strong encryption protocol that ensures the confidentiality and integrity of data transmitted over the network. By configuring WPA2, the network is protected against unauthorized access and potential security breaches.

    Rate this question:

  • 24. 

    After replacing a motherboard in a PC, the system overheats and fails to boot. What is the most likely cause?

    • A.

      The GPU is not compatible with the CPU

    • B.

      The new motherboard's firmware is out of date

    • C.

      Thermal paste was not applied between the heat sink and the CPU

    • D.

      The case fan failed

    Correct Answer
    C. Thermal paste was not applied between the heat sink and the CPU
    Explanation
    The most likely cause for the system overheating and failing to boot after replacing the motherboard is that thermal paste was not applied between the heat sink and the CPU. Thermal paste is used to improve the transfer of heat between the CPU and the heat sink, ensuring efficient cooling. Without thermal paste, the heat generated by the CPU cannot be effectively dissipated, leading to overheating and system failure.

    Rate this question:

  • 25. 

    Which of the following is common e-mail service that people use on their smartphone?

    • A.

      POP3

    • B.

      Outlook

    • C.

      HTTP

    • D.

      GMAIL

    Correct Answer
    D. GMAIL
    Explanation
    GMAIL is the correct answer because it is a commonly used email service that people use on their smartphones. It is a free email service provided by Google and is available as an app on both Android and iOS devices. GMAIL offers features such as a user-friendly interface, large storage capacity, efficient spam filtering, and seamless integration with other Google services. Many smartphone users prefer GMAIL for its convenience and reliability in managing their emails on the go.

    Rate this question:

  • 26. 

    A technician is attemping to backup 5 GB of data to an external hard drive that has been formatted as FAT32; however the backup keeps failing. What is the bset way to solve the problem?

    • A.

      Reformat the drive NTFS

    • B.

      Replace the drive

    • C.

      Back up the data to a USB drive

    • D.

      Back up to CD-ROM

    Correct Answer
    A. Reformat the drive NTFS
    Explanation
    Reformatting the drive to NTFS is the best way to solve the problem. FAT32 has a file size limitation of 4GB, so attempting to backup 5GB of data will fail. By reformatting the drive to NTFS, which does not have this limitation, the technician will be able to successfully backup the data.

    Rate this question:

  • 27. 

    A laptop you are troubleshooting will not display any video through the laptop's screen or through external monitors. What should you place?

    • A.

      Inverter

    • B.

      Video card

    • C.

      LCD

    • D.

      Drivers

    Correct Answer
    B. Video card
    Explanation
    In this scenario, if the laptop is not displaying any video through the laptop's screen or external monitors, the most likely cause is a faulty video card. The video card is responsible for generating and sending the video signal to the display. If it is not functioning properly, it can result in a lack of video output. The other options, such as the inverter (which controls the backlight of the screen), LCD (the screen itself), and drivers (software that allows the operating system to communicate with the video card) may also cause display issues, but they are less likely to be the root cause in this case.

    Rate this question:

  • 28. 

    Which of the following utilities enables a Windows 7 user to edit a file offline, and then automatically update the changes when the user returns back to the office?

    • A.

      Sync Center

    • B.

      Windows Aero

    • C.

      Windows Defender

    • D.

      HomeGroup

    Correct Answer
    A. Sync Center
    Explanation
    Sync Center is a utility in Windows 7 that allows users to edit files offline and automatically sync the changes when they return to the office. This feature is particularly useful for users who frequently work on files while traveling or in areas with limited or no internet connectivity. By using Sync Center, users can ensure that their files are always up to date and synced with the latest changes, regardless of their location or internet availability.

    Rate this question:

  • 29. 

    A customer's laser printer is printing a blank streak along one edge of each page, but is otherwise printing normally. What is the most likely reason?

    • A.

      The paper is too thick

    • B.

      The toner cartridge is low

    • C.

      The fuser is damaged

    • D.

      The printer needs to be rebooted

    Correct Answer
    C. The fuser is damaged
    Explanation
    The most likely reason for the blank streak along one edge of each page is that the fuser is damaged. The fuser is responsible for melting the toner onto the paper, and if it is damaged, it may not be able to properly fuse the toner onto the page, resulting in a blank streak. This is supported by the fact that the printer is otherwise printing normally, indicating that the issue is not with the paper or toner cartridge. Rebooting the printer would not fix a physical damage like a damaged fuser.

    Rate this question:

  • 30. 

    Which of the following tools can illuminate a network card's LED light when connected?

    • A.

      POST card

    • B.

      Loopback plug

    • C.

      PSU tester

    • D.

      Multimeter

    Correct Answer
    B. Loopback plug
    Explanation
    A loopback plug is a device that can be inserted into a network card's port to test its functionality. When connected, the loopback plug simulates a complete network connection and allows for the testing of the network card's LED light. This is because the loopback plug completes the circuit and triggers the LED to illuminate, indicating that the network card is working properly. The other tools listed, such as a POST card, PSU tester, and multimeter, are not specifically designed for testing network card LED lights.

    Rate this question:

  • 31. 

    One of your organization's technicians reconfigures the BIOS boot order on a PC and sees that the system time is incorrect. The technician resets the clock to the correct time but sees that a couple days later, the system time is wrong again. What is the most likely cause?

    • A.

      The motherboard is not seated properly

    • B.

      The time zone settings are incorrect in the OS

    • C.

      The CMOS battery has failed

    • D.

      The power supply is not providing the correct voltage

    Correct Answer
    C. The CMOS battery has failed
    Explanation
    The most likely cause for the system time being incorrect again after resetting it is that the CMOS battery has failed. The CMOS battery is responsible for powering the Real Time Clock (RTC) on the motherboard, which keeps track of the system time even when the computer is turned off. If the CMOS battery fails, the RTC will not be able to keep accurate time, leading to the system time being wrong.

    Rate this question:

  • 32. 

    Which Windows 7/Vista files replaced NTLDR?

    • A.

      Bootmgr.exe, bootsect.dos, io.sys

    • B.

      Io.sys, win.exe, bootmgr.exe

    • C.

      Ntdetect.exe, ntoskrnl.exe, io.sys

    • D.

      Boot,gr.exe, winload.exe, and winresume.exe

    Correct Answer
    D. Boot,gr.exe, winload.exe, and winresume.exe
  • 33. 

    You reboot a customer's computer and see a pop-up message that says one or more services failed to start. Whcih of the following can give you more information?

    • A.

      System event logs

    • B.

      Task Manager

    • C.

      Application event logs

    • D.

      Security log

    Correct Answer
    A. System event logs
    Explanation
    The system event logs can provide more information about the services that failed to start. These logs record various events and errors that occur on the computer, including information about service failures. By reviewing the system event logs, you can identify the specific services that failed to start and investigate the cause of the issue further. This can help in troubleshooting and resolving the problem effectively.

    Rate this question:

  • 34. 

    Which of the following would extend the wireless network range and allow out-of-the range users to share an Internet connection?

    • A.

      Implement a wireless access point for the out of range users

    • B.

      Enable network sharing on the users' computers that are within range

    • C.

      Upgrade the out-of-range users' SSID searching software

    • D.

      Create a new VLAN for the out of range users

    Correct Answer
    A. Implement a wireless access point for the out of range users
    Explanation
    Implementing a wireless access point for the out-of-range users would extend the wireless network range and allow them to share an Internet connection. A wireless access point acts as a bridge between the wired network and wireless devices, enabling connectivity for devices that are out of the range of the existing network. By adding a wireless access point, the network coverage is expanded, allowing users outside of the range to connect and share the Internet connection.

    Rate this question:

  • 35. 

    What can the command ping -t do?

    • A.

      Continuous ping of an IP address until the responds

    • B.

      Continuous ping of an IP address until it's canceled

    • C.

      Continuous ping of an IP address until the count reaches 20

    • D.

      Continuous ping of an IP address where each packet is equal to 1000 bytes

    Correct Answer
    B. Continuous ping of an IP address until it's canceled
    Explanation
    The command "ping -t" allows for continuous pinging of an IP address until it is manually canceled. This means that the command will keep sending ping requests to the specified IP address without stopping, providing a continuous stream of data. The user can choose to cancel the command at any time to stop the continuous pinging process.

    Rate this question:

  • 36. 

    You are installing a 32-bit program in a 64-bit version of Windows 7?

    • A.

      C:\

    • B.

      C:\Program Files

    • C.

      C:\Windows

    • D.

      C:\Program Files (x86)

    Correct Answer
    D. C:\Program Files (x86)
    Explanation
    The correct answer is "C:\Program Files (x86)". In a 64-bit version of Windows 7, the "Program Files (x86)" directory is used to install 32-bit programs. This directory is specifically designed to separate 32-bit applications from 64-bit applications, allowing them to coexist on the same system. By installing the 32-bit program in the "Program Files (x86)" directory, it ensures compatibility and proper functioning of the program within the 64-bit operating system.

    Rate this question:

  • 37. 

    Which of the following paths is the default directory for the user profiles in Windows 7?

    • A.

      C:\Program Files

    • B.

      C:\Users

    • C.

      C:\Users and Settings\

    • D.

      C:\Document and Settings\

    Correct Answer
    B. C:\Users
    Explanation
    The default directory for user profiles in Windows 7 is C:\Users. This is where all user profiles and their associated files and settings are stored. The other options, C:\Program Files, C:\Users and Settings\, and C:\Document and Settings\, are not the default directories for user profiles in Windows 7.

    Rate this question:

  • 38. 

    You are working on a computer that is giving a non-system disk error. Which of the following is most likely the cause?

    • A.

      There is a disk in the floppy drive

    • B.

      The registry has become corrupted

    • C.

      The incorrect driver was loaded

    • D.

      The RAM is not seated properly

    Correct Answer
    A. There is a disk in the floppy drive
    Explanation
    The most likely cause for the non-system disk error is that there is a disk in the floppy drive. This error message typically occurs when the computer is trying to boot from a disk that is not recognized as a valid system disk. If there is a disk in the floppy drive, the computer may be attempting to boot from it instead of the hard drive where the operating system is located. Removing the disk from the floppy drive should resolve the issue.

    Rate this question:

  • 39. 

    One of the tape drives in the server room is reporting errors. What should you do first to mainenance the tape drive?

    • A.

      Use the included cleaning tape for the drive

    • B.

      Uninstall the backup software and reinstall it

    • C.

      Install a new IDE cable

    • D.

      REplace the tape with a new one

    Correct Answer
    A. Use the included cleaning tape for the drive
    Explanation
    The first step to maintenance a tape drive that is reporting errors is to use the included cleaning tape for the drive. Over time, tape drives can accumulate dust and debris, which can cause errors and affect performance. Using a cleaning tape helps remove this buildup and ensures that the tape drive functions properly. It is a simple and effective solution that should be tried before considering other troubleshooting steps.

    Rate this question:

  • 40. 

    You co-worker is having trouble tapping icons on his smartphone. What should you check first?

    • A.

      Screen orientation

    • B.

      Geotracking

    • C.

      Global positioning

    • D.

      Screen calibration

    Correct Answer
    D. Screen calibration
    Explanation
    If your co-worker is having trouble tapping icons on his smartphone, the first thing you should check is the screen calibration. Screen calibration ensures that the touch input is accurately registered by the device. If the calibration is off, the touch inputs may not be accurately recognized, causing difficulty in tapping icons or using the touchscreen effectively. Checking the screen calibration settings and recalibrating if necessary can help resolve the issue.

    Rate this question:

  • 41. 

    At one of your customer's locations, two users share the same Windows 7 computer. The first user creates a document intended to be used by both users and then logs off the computer. The second user logs on and types the name of the document in the Start menu but the document cannot be found. What is the problem?

    • A.

      The document is locked

    • B.

      The document is set to hidden

    • C.

      The document is owned by the first user

    • D.

      The document is encrypted

    Correct Answer
    C. The document is owned by the first user
    Explanation
    The problem is that the document is owned by the first user. This means that only the first user has access to the document, and it cannot be accessed or viewed by the second user.

    Rate this question:

  • 42. 

    You receive a message in Windows XP that warns you of a memory-read error. What should you do to fix this?

    • A.

      Reseat or replace RAM modules

    • B.

      Change the memory settings in the BIOS

    • C.

      Replace the hard drive

    • D.

      Remove any USB flash drives

    Correct Answer
    A. Reseat or replace RAM modules
    Explanation
    If you receive a message in Windows XP warning you of a memory-read error, the correct action to fix this issue is to reseat or replace the RAM modules. This error indicates a problem with the computer's memory, and reseating the RAM modules can help ensure they are properly connected. If the issue persists, replacing the RAM modules may be necessary to resolve the error. Changing the memory settings in the BIOS, replacing the hard drive, or removing USB flash drives would not directly address a memory-read error.

    Rate this question:

  • 43. 

    Which component is usually removed to access a laptop's motherboard and other internal components?

    • A.

      Display

    • B.

      Bezel

    • C.

      Keyboard

    • D.

      Battery

    Correct Answer
    C. Keyboard
    Explanation
    The keyboard is usually removed to access a laptop's motherboard and other internal components. This is because the keyboard is attached to the top case of the laptop, and removing it allows access to the screws and connectors that hold the top case in place. Once the keyboard is removed, the top case can be lifted off, providing access to the motherboard and other internal components for repairs or upgrades.

    Rate this question:

  • 44. 

    A user tells you that her Windows 7 laptop does not display a picture when it is connected to a projector. However, there is a picture on the laptop's screen. What is the most likely cause?

    • A.

      Windows 7 does not support multiple displays on laptops

    • B.

      The Windows 7 video driver is missing

    • C.

      The presentation resolution is too big

    • D.

      The laptop external display setting has been turned off

    Correct Answer
    D. The laptop external display setting has been turned off
    Explanation
    The most likely cause for the user's issue is that the laptop's external display setting has been turned off. This means that the laptop is not sending the display signal to the projector, resulting in no picture being displayed. To resolve this, the user should check the display settings on their laptop and ensure that the external display option is enabled.

    Rate this question:

  • 45. 

    A co-worker attempts to run an old program on his Windows 7 computer. The program briefly opens, but then it closes immediately. What can you do to enable the program to run correctly?

    • A.

      Run the program in Windows Compatibility mode

    • B.

      Run the program from the Command Prompt

    • C.

      Run the program inside a virtual machine

    • D.

      Run the program from another computer

    Correct Answer
    A. Run the program in Windows Compatibility mode
    Explanation
    Running the program in Windows Compatibility mode allows it to run correctly on a newer version of Windows. This mode enables the program to emulate an older version of Windows, resolving any compatibility issues that may be causing it to close immediately. By selecting the appropriate compatibility settings, the program can be executed as if it were running on the desired Windows version, ensuring its proper functionality.

    Rate this question:

  • 46. 

    What color do EFS files display in by default?

    • A.

      Blue

    • B.

      Black

    • C.

      Green

    • D.

      Red

    Correct Answer
    C. Green
    Explanation
    EFS files display in green color by default. This color is used to indicate that the file is encrypted using the Encrypting File System (EFS) feature in Windows. Green color helps users easily identify which files are encrypted and provides a visual cue for their security status.

    Rate this question:

  • 47. 

    You want to create a spanned volume over two hard drives that are separate from the system volume of a Windows 7 workstation. What tool can help you determine if the har drives can support spanned volumes?

    • A.

      Disk Management

    • B.

      Task Mananger

    • C.

      Device Manager

    • D.

      System Information

    Correct Answer
    A. Disk Management
    Explanation
    Disk Management is the correct answer because it is a Windows utility that allows users to manage and configure disk drives and volumes. It provides information about the available hard drives and their capabilities, including the ability to support spanned volumes. By accessing Disk Management, you can determine if the hard drives in question can be used to create a spanned volume.

    Rate this question:

  • 48. 

    What is another name for a mirrored set?

    • A.

      RAID 0

    • B.

      RAID 1

    • C.

      RAID 5

    • D.

      RAID 6

    Correct Answer
    B. RAID 1
    Explanation
    RAID 1 is another name for a mirrored set. In RAID 1, data is duplicated across multiple drives, creating an exact copy or mirror of the data. This provides redundancy and fault tolerance, as if one drive fails, the data can still be accessed from the other drive. RAID 1 is commonly used in situations where data integrity and reliability are crucial, such as in critical database systems or important backup storage.

    Rate this question:

  • 49. 

    What would you replace in a laser printer if you see ghosted images?

    • A.

      Fuser

    • B.

      Cartridge

    • C.

      Drum

    • D.

      Printhead

    Correct Answer
    C. Drum
    Explanation
    If you see ghosted images in a laser printer, the most likely component that needs to be replaced is the drum. The drum is responsible for transferring toner onto the paper during the printing process. If the drum becomes worn or damaged, it can result in ghosted images, where faint copies of previous images appear on subsequent prints. Replacing the drum should resolve this issue and ensure that the printer produces clean and clear prints.

    Rate this question:

  • 50. 

    Of the following ways to manipulate a file, which can retain the file's NTFS permissions?

    • A.

      Moving the file to another NTFS volume

    • B.

      Copying the file to another FAT32 volume

    • C.

      Moving the file to a new location on the same volume

    • D.

      Copying the file to a new location on the same volume

    Correct Answer
    C. Moving the file to a new location on the same volume
    Explanation
    Moving the file to a new location on the same volume can retain the file's NTFS permissions. When a file is moved within the same volume, the file's permissions remain intact because the file system keeps track of the file's security descriptors. The NTFS file system stores permissions and other security information in the file's metadata, which is not changed when the file is moved to a new location on the same volume. Therefore, the file will retain its original NTFS permissions after being moved within the same volume.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 05, 2013
    Quiz Created by
    Shellbreiner
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.