CompTIA A+ Practical Application #1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Gerardo_ceboller
G
Gerardo_ceboller
Community Contributor
Quizzes Created: 4 | Total Attempts: 317
Questions: 50 | Attempts: 79

SettingsSettingsSettings
CompTIA A+ Practical Application #1 - Quiz



Questions and Answers
  • 1. 

    Which of the following would be used to correct a ghost image on a laser printer?

    • A.

      Replace the drum

    • B.

      Replace the fuser

    • C.

      Clean the printhead

    • D.

      Replace the cartridges

    Correct Answer
    A. Replace the drum
    Explanation
    To correct a ghost image on a laser printer, the drum needs to be replaced. The drum is responsible for transferring the toner onto the paper, and if it becomes worn or damaged, it can result in ghosting, where faint or duplicate images appear on the printed page. By replacing the drum, the printer will have a new and properly functioning component to ensure that the toner is transferred accurately, eliminating the ghosting issue.

    Rate this question:

  • 2. 

    A technician installed a new application on a Windows XP desktop. After the application was installed, the technician rebooted the desktop and received a bluescreen error. Which of the following steps should the technician perform? (Select TWO).

    • A.

      Boot into Safe Mode

    • B.

      Replace the motherboard

    • C.

      Uninstall the application

    • D.

      Replace the hard drive

    • E.

      Install more RAM

    Correct Answer(s)
    A. Boot into Safe Mode
    C. Uninstall the application
    Explanation
    After installing the new application on the Windows XP desktop, the technician encountered a bluescreen error upon reboot. To troubleshoot this issue, the technician should first boot into Safe Mode. Safe Mode starts Windows with only the essential drivers and services, which can help identify and resolve any conflicts or issues caused by the new application. Once in Safe Mode, the technician should then proceed to uninstall the application that was recently installed. This will eliminate any potential conflicts and allow the desktop to boot up properly.

    Rate this question:

  • 3. 

    A user no longer has access to a site that the user frequently visits. The technician pings another system and the gateway within the network. The pings made successful connections. Which of the following should the technician do NEXT?

    • A.

      Update the operating system

    • B.

      Check the DHCP settings

    • C.

      PING the Internet site

    • D.

      Update the anti-virus software

    Correct Answer
    C. PING the Internet site
    Explanation
    The technician should PING the Internet site next to determine if the issue lies with the user's access to that specific site or if it is a broader network connectivity issue. By successfully pinging another system and the gateway within the network, the technician has confirmed that the local network is functioning properly. Pinging the Internet site will help identify if the problem is isolated to that site or if there is a larger issue with the user's access to the Internet.

    Rate this question:

  • 4. 

    A user has a 1TB external hard drive connected to a desktop system. When the user searches the drive for a file, the response to the search is very slow. How can the user improve the performance of the file searches on the external drive?

    • A.

      Change the sort order of the files.

    • B.

      Make sure that all of the files are in folders that are in alphabetical order.

    • C.

      Search multiple drive letters at the same time.

    • D.

      Turn on indexing for the assigned drive letter.

    Correct Answer
    D. Turn on indexing for the assigned drive letter.
    Explanation
    Turning on indexing for the assigned drive letter can improve the performance of file searches on the external drive. Indexing creates a catalog of the files on the drive, allowing for faster and more efficient searches. By enabling indexing, the system can quickly locate the desired files, resulting in a faster response time for the user's searches.

    Rate this question:

  • 5. 

    A user is attempting to connect a laptop to a TV using an HDMI connector. The user reports the video works properly but there is no sound. Which of the following could be the MOST likely cause?

    • A.

      The speakers are not compatible with the digital connection.

    • B.

      The HDMI audio service has not been selected.

    • C.

      The laptop needs an HDMI application installed.

    • D.

      The HDMI cable is too long.

    Correct Answer
    B. The HDMI audio service has not been selected.
    Explanation
    The most likely cause for the user's issue is that the HDMI audio service has not been selected. This means that the laptop is not sending the audio signal through the HDMI connection to the TV. To fix this, the user should go into the audio settings on their laptop and select the HDMI audio output as the default option.

    Rate this question:

  • 6. 

    Which of the following will occur if %temp% is executed from the run command?

    • A.

      The operating system's temporary folder will be opened.

    • B.

      Applications located in the %temp% folder will be executed.

    • C.

      Applications will be deleted in the %temp% folder.

    • D.

      The current user's temporary folder will be opened.

    Correct Answer
    D. The current user's temporary folder will be opened.
    Explanation
    Executing "%temp%" from the run command will open the current user's temporary folder. The "%temp%" is an environment variable that represents the path to the temporary folder for the current user. By executing it, the operating system will open the folder, allowing the user to view and manage the temporary files stored there. It does not execute any applications located in the folder or delete any files.

    Rate this question:

  • 7. 

    Which of the following does PING -t do?

    • A.

      Continuous ping of an IP address until cancelled

    • B.

      Continuous ping of an IP address until the count reaches 1000

    • C.

      Continuous ping of an IP address until the target responds

    • D.

      Continuous ping of an IP address until the target returns

    Correct Answer
    A. Continuous ping of an IP address until cancelled
    Explanation
    The correct answer is "Continuous ping of an IP address until cancelled." The command "PING -t" is used to continuously ping an IP address until the user manually cancels the process. This is useful for monitoring the network connectivity and response time of a specific IP address over a prolonged period of time.

    Rate this question:

  • 8. 

    Where would a technician go to turn off UAC in Windows Vista?

    • A.

      Control Panel

    • B.

      Active Directory Users and Computers

    • C.

      Computer Management

    • D.

      Run> Command prompt > NET STOP UAC

    Correct Answer
    A. Control Panel
    Explanation
    In Windows Vista, the correct place to go to turn off User Account Control (UAC) is the Control Panel. UAC is a security feature that helps prevent unauthorized changes to the computer, and it can be disabled or adjusted in the Control Panel settings. Active Directory Users and Computers is a tool used for managing user accounts in a network environment, while Computer Management is a tool for managing various aspects of the computer system. The Run> Command prompt > NET STOP UAC option is not a valid method for turning off UAC in Windows Vista.

    Rate this question:

  • 9. 

    On a laptop, which of the following is the name of the socket that a wireless card would typically be inserted into?

    • A.

      PCIe

    • B.

      AGP

    • C.

      Mini PCI

    • D.

      PCI

    Correct Answer
    C. Mini PCI
    Explanation
    A wireless card on a laptop is typically inserted into a socket called Mini PCI. This socket is specifically designed to accommodate wireless cards and provides a secure and reliable connection for wireless communication. PCIe and AGP are other types of sockets commonly used for different purposes, such as graphics cards or expansion cards, but they are not typically used for wireless cards on laptops. PCI is an older type of socket that is also not commonly used for wireless cards on modern laptops.

    Rate this question:

  • 10. 

    Jill, a user, states that there are two lines running down the middle of all printed pages on the laser printer. Which of the following could be the cause of the lines?

    • A.

      The drum is dirty

    • B.

      The driver is corrupt

    • C.

      The printer is out of memory

    • D.

      The toner is out

    Correct Answer
    A. The drum is dirty
    Explanation
    The drum is a crucial component in a laser printer that transfers toner onto the paper. If the drum is dirty, it can result in lines appearing on the printed pages. The dirt or debris on the drum can interfere with the smooth transfer of toner, causing the lines to appear.

    Rate this question:

  • 11. 

    A technician suspects that a power supply may be failing in a computer. Which of the following are the standard voltages for a SATA connection on an ATX power supply?

    • A.

      -3.3v, 5v, 12v

    • B.

      3.3v, -5v, -12v

    • C.

      3.3v, 5v, 12v

    • D.

      -5v, 5v, 12v

    Correct Answer
    C. 3.3v, 5v, 12v
    Explanation
    The standard voltages for a SATA connection on an ATX power supply are 3.3v, 5v, and 12v. These voltages are commonly used to power various components in a computer, including SATA drives. The -3.3v, -5v, and -12v options are not standard voltages for a SATA connection. Therefore, the correct answer is 3.3v, 5v, 12v.

    Rate this question:

  • 12. 

    A user reports that printed pages are smearing after the pages come out of a laser printer. Which of the following is the MOST likely problem?

    • A.

      The corona wire is not supplying the correct voltage.

    • B.

      The fuser is not reaching the correct temperature.

    • C.

      The paper is card stock and is too thick.

    • D.

      The paper has a humidity content that is too low.

    Correct Answer
    B. The fuser is not reaching the correct temperature.
    Explanation
    The fuser is responsible for melting the toner onto the paper, and if it is not reaching the correct temperature, the toner will not properly adhere to the paper. This can result in smearing of the printed pages.

    Rate this question:

  • 13. 

    Company policy does not allow users to use dial-up connections. A new shipment of laptops contains builtin modems. Which of the following is the BEST way for the technician to setup the laptop to prevent the use of the modem?

    • A.

      Use Device Manager to disable the modem.

    • B.

      Delete the modem under Phone and Modems in the Control Panel.

    • C.

      Remove the dial-up networking option in Network Connections.

    • D.

      Change the local area code to 555 in Modem properties.

    Correct Answer
    A. Use Device Manager to disable the modem.
    Explanation
    The best way for the technician to prevent the use of the modem is to use Device Manager to disable it. This will effectively deactivate the modem and prevent users from utilizing dial-up connections.

    Rate this question:

  • 14. 

    After Microsoft Windows boots, a message appears stating that a service failed to start. Which of the following can be used to find more information about this error?

    • A.

      Disk Manager

    • B.

      Control Panel

    • C.

      Start Menu

    • D.

      Event Viewer

    Correct Answer
    D. Event Viewer
    Explanation
    Event Viewer can be used to find more information about the error message that appears after Microsoft Windows boots. Event Viewer is a built-in Windows tool that allows users to view and analyze detailed information about various system events, including error messages. It provides logs and records of system events, allowing users to troubleshoot and diagnose issues by examining the specific error details and related information.

    Rate this question:

  • 15. 

    Which of the following will occur if an NTFS-formatted USB drive is inserted into a USB port on a second computer?

    • A.

      The USB drive will not be accessible.

    • B.

      The files and folders will inherit permissions from the second computer.

    • C.

      Files and folders may or may not be accessible depending on set permissions.

    • D.

      The user will be prompted to enter credentials to access the files and folders on the drive.

    Correct Answer
    C. Files and folders may or may not be accessible depending on set permissions.
    Explanation
    When an NTFS-formatted USB drive is inserted into a USB port on a second computer, the accessibility of the files and folders on the drive will depend on the set permissions. This means that the user may or may not be able to access the files and folders, depending on the permissions that have been configured on the second computer.

    Rate this question:

  • 16. 

    Which of the following is the difference between a stop error (e.g. stop C0021xxx) and a Dr. Watson error?

    • A.

      A Dr. Watson error is usually related to a damaged graphics adaptor or memory chip.

    • B.

      A Dr. Watson error occurs before the Windows GUI appears.

    • C.

      A stop error is known as a bluescreen and causes complete system failure.

    • D.

      A stop error writes the error to a memory dump file before restoring the system to a working state.

    Correct Answer
    C. A stop error is known as a bluescreen and causes complete system failure.
    Explanation
    A stop error, also known as a bluescreen, refers to a system error that causes the entire system to fail. This error typically results in a blue screen appearing on the computer screen, hence the name bluescreen. On the other hand, a Dr. Watson error is usually related to a damaged graphics adaptor or memory chip and occurs before the Windows graphical user interface (GUI) appears. The Dr. Watson error does not necessarily cause a complete system failure like a stop error does.

    Rate this question:

  • 17. 

    A laptop display is not working. The technician connects the laptop to an external monitor and it displays fine. The technician opens the laptop and checks the physical connector from the display to the motherboard and it appears connected and undamaged. Which of the following is the MOST likely problem?

    • A.

      The LCD inverter is faulty.

    • B.

      The video adapter is faulty.

    • C.

      The LCD converter is faulty.

    • D.

      The LCD lamp needs to be replaced.

    Correct Answer
    A. The LCD inverter is faulty.
    Explanation
    The most likely problem in this scenario is that the LCD inverter is faulty. The LCD inverter is responsible for providing power to the backlight of the laptop display. If the inverter is faulty, it can cause the display to not work properly. In this case, when the technician connects the laptop to an external monitor and it displays fine, it suggests that the issue lies specifically with the laptop's display components, rather than the video adapter or the LCD lamp. Since the physical connector appears connected and undamaged, the fault is likely with the inverter.

    Rate this question:

  • 18. 

    A technician needs to delete an infected file. The system says the file is in use every time the technician attempts to delete the file. Which of the following will be the BEST way to delete the file?

    • A.

      The technician should boot into Safe Mode with Command Prompt and delete the file.

    • B.

      The technician should reboot the machine, log in as administrator, and delete the file.

    • C.

      The technician should bring up Task Manager and delete the file from there.

    • D.

      The technician should boot the system normally and delete the file from the command prompt.

    Correct Answer
    A. The technician should boot into Safe Mode with Command Prompt and delete the file.
    Explanation
    Booting into Safe Mode with Command Prompt allows the technician to start the computer with only essential system files and drivers, eliminating any potential conflicts that may be preventing the file from being deleted. By accessing the command prompt in Safe Mode, the technician can delete the infected file without any interference from other processes or applications running in the background. This method provides the best chance of successfully deleting the file and eliminating the infection.

    Rate this question:

  • 19. 

    Which of the following protocols should a technician consider troubleshooting if a user is not receiving incoming emails on their desktop?

    • A.

      SMTP

    • B.

      POP

    • C.

      FTP

    • D.

      SIP

    Correct Answer
    B. POP
    Explanation
    If a user is not receiving incoming emails on their desktop, a technician should consider troubleshooting the POP (Post Office Protocol) protocol. POP is responsible for retrieving emails from a mail server and delivering them to the user's device. By troubleshooting the POP protocol, the technician can identify and resolve any issues that may be preventing the user from receiving emails.

    Rate this question:

  • 20. 

    A user installs a laser jet printer on a Windows XP desktop. The user states that Windows XP generic printer drivers were used. When the user prints a document, the pages are printing out with random symbols, letters, and numbers. Which of the following should the technician do?

    • A.

      Download manufacturer printer drivers

    • B.

      Restart the printer spooler

    • C.

      Check for Microsoft Windows updates

    • D.

      Check Device Manager

    Correct Answer
    A. Download manufacturer printer drivers
    Explanation
    The user is experiencing printing issues with random symbols, letters, and numbers instead of the desired document. This suggests that the generic printer drivers used by Windows XP are not compatible with the laser jet printer. To resolve the issue, the technician should download and install the manufacturer printer drivers specific to the laser jet printer. These drivers are designed to work optimally with the printer and will likely resolve the problem.

    Rate this question:

  • 21. 

    Which of the following can be used to kill a running process?

    • A.

      Control Panel

    • B.

      Computer Management

    • C.

      Task Manager

    • D.

      Add/Remove Programs

    Correct Answer
    C. Task Manager
    Explanation
    Task Manager can be used to kill a running process. It is a system utility in Windows operating systems that provides information about the processes and programs running on a computer. It allows users to view and manage the processes, including terminating or ending them if necessary. By accessing the Task Manager, users can identify and stop any unwanted or problematic processes that may be causing issues on their computer.

    Rate this question:

  • 22. 

    Which of the following utilities will a technician use to determine how many partitions a hard drive has?

    • A.

      Administrator Tools

    • B.

      Disk Management

    • C.

      Device Manager

    • D.

      Computer Management

    Correct Answer
    B. Disk Management
    Explanation
    A technician would use Disk Management to determine how many partitions a hard drive has. Disk Management is a utility that allows users to view and manage the disks and partitions on a computer. By accessing Disk Management, the technician can see a list of all the hard drives connected to the computer and the partitions that are present on each drive. This information can be useful for troubleshooting, organizing data, or making changes to the partitions if necessary.

    Rate this question:

  • 23. 

    If a technician needs to convert a hard drive from Basic to Dynamic, which of the following utilities would the technician use?

    • A.

      Add Hardware Wizard

    • B.

      Device Manager

    • C.

      Computer Management

    • D.

      Disk Management

    Correct Answer
    D. Disk Management
    Explanation
    The technician would use the Disk Management utility to convert a hard drive from Basic to Dynamic. Disk Management is a Windows utility that allows users to manage and configure disk partitions and volumes. It provides options for creating, deleting, formatting, and resizing partitions, as well as converting a basic disk to a dynamic disk. This utility can be accessed through the Computer Management tool in Windows.

    Rate this question:

  • 24. 

    A customer requires a shock resistant mass storage device in their PC. Which of the following drives should the technician install?

    • A.

      Hard disk

    • B.

      Solid state

    • C.

      Floppy

    • D.

      Tape

    Correct Answer
    B. Solid state
    Explanation
    A solid state drive (SSD) would be the best choice for a shock resistant mass storage device in a PC. Unlike traditional hard disk drives (HDDs) that have moving parts, SSDs use flash memory to store data, making them more durable and resistant to shocks and vibrations. This makes SSDs less prone to failure and data loss in case of accidental drops or impacts. Therefore, installing a solid state drive would provide the customer with a reliable and shock resistant storage solution for their PC.

    Rate this question:

  • 25. 

    A technician needs to change the process priority of a background program. Which of the following tools is BEST for performing this function?

    • A.

      MSCONFIG

    • B.

      Computer Management

    • C.

      Task Scheduler

    • D.

      Task Manager

    Correct Answer
    D. Task Manager
    Explanation
    The Task Manager is the best tool for changing the process priority of a background program. The Task Manager allows the technician to view and manage running processes on the computer, including the ability to change the priority of a process. This can be useful for adjusting the priority of a background program to allocate more system resources to it or to prioritize other tasks. MSCONFIG is used for managing startup programs, Computer Management is used for managing system resources, and Task Scheduler is used for scheduling tasks to run at specific times.

    Rate this question:

  • 26. 

    Which of the following locations would a technician use to add a Windows 7 computer to a domain?

    • A.

      System Properties

    • B.

      Windows Defender

    • C.

      Network and Sharing Center

    • D.

      Device Manager

    Correct Answer
    A. System Properties
    Explanation
    A technician would use the System Properties location to add a Windows 7 computer to a domain. System Properties allows users to view and modify system settings, including joining a domain. By accessing the System Properties, the technician can navigate to the Computer Name tab and click on the "Change" button to join the computer to a domain.

    Rate this question:

  • 27. 

    After powering on a workstation, an intrusion alert is displayed indicating that the case has been opened. How would a technician reset the alert?

    • A.

      Change the setting in the registry

    • B.

      Change the setting in the BIOS

    • C.

      Change the setting in the DOS startup files

    • D.

      Change the setting in the Control Panel

    Correct Answer
    B. Change the setting in the BIOS
    Explanation
    The intrusion alert is displayed because the case of the workstation has been opened. To reset the alert, the technician would need to change the setting in the BIOS. The BIOS (Basic Input/Output System) is responsible for controlling the hardware settings of the computer, including the detection of intrusions. By accessing the BIOS settings, the technician can reset the alert and ensure that it does not appear again.

    Rate this question:

  • 28. 

    A technician plugs a USB device into the computer. The system tray displays a message that reports the device is installed, but may not work properly. Which of the following is the MOST likely cause of the message?

    • A.

      The device needs a firmware update.

    • B.

      The device needs an updated driver installed.

    • C.

      The plugged in device is too slow for the USB port speed.

    • D.

      The device is incompatible with the installed version of Windows.

    Correct Answer
    B. The device needs an updated driver installed.
    Explanation
    The most likely cause of the message is that the device needs an updated driver installed. This is because the system tray message indicates that the device is installed but may not work properly, which suggests that there may be an issue with the driver. Updating the driver can help ensure that the device functions correctly with the computer.

    Rate this question:

  • 29. 

    A technician is replacing the motherboard on a laptop. Which of the following is the MOST important step during the disassembly process?

    • A.

      Place all of the screws in a container with other parts.

    • B.

      Keep the power supply plugged in to ground the system.

    • C.

      Organize the screws and document the locations.

    • D.

      Use a magnetic tipped screwdriver to remove the screws.

    Correct Answer
    C. Organize the screws and document the locations.
    Explanation
    When replacing the motherboard on a laptop, organizing the screws and documenting their locations is the most important step during the disassembly process. This is crucial because laptops often have numerous screws of different sizes and lengths, and if they are not properly organized and documented, it can lead to confusion and difficulty during reassembly. By keeping track of the screw locations, the technician can ensure that each screw is placed back in its correct position, preventing any damage or misalignment when reassembling the laptop.

    Rate this question:

  • 30. 

    A customer has a wireless router installed in their home office. The customer is having issues with signal strength at the opposite end of the house. Which of the following is the BEST option to increase the signal strength?

    • A.

      Install a high gain antenna focused towards the office wall

    • B.

      Run CAT5e cable to all of the rooms that have poor signal strength

    • C.

      Install a wireless repeater at the far end of the house

    • D.

      Install a second wired router in the far end of the house

    Correct Answer
    C. Install a wireless repeater at the far end of the house
    Explanation
    Installing a wireless repeater at the far end of the house is the best option to increase the signal strength. A wireless repeater receives the existing Wi-Fi signal and amplifies it, extending the range of the wireless network. By placing the repeater at the far end of the house, it can receive the weak signal and rebroadcast it, effectively increasing the signal strength in that area. This is a cost-effective solution that does not require running cables or installing additional routers.

    Rate this question:

  • 31. 

    A technician wants to setup hardware RAID 5 for a Windows 7 computer to prevent data loss. In which of the following locations would the technician MOST likely change the setting?

    • A.

      Disk Manager

    • B.

      Device Manager

    • C.

      Windows Boot DVD

    • D.

      The BIOS

    Correct Answer
    D. The BIOS
    Explanation
    The technician would most likely change the setting in the BIOS. The BIOS (Basic Input/Output System) is responsible for initializing hardware components during the boot process. In order to set up hardware RAID 5, the technician would need to configure the RAID settings in the BIOS. This involves enabling RAID support, selecting the appropriate RAID level (in this case, RAID 5), and configuring the specific drives to be included in the RAID array.

    Rate this question:

  • 32. 

    Which of the following will fix a laptop with dark irregular lines that run the width of the display in all video modes?

    • A.

      Perform a System Restore

    • B.

      Replace the video capture card

    • C.

      Change the resolution to 800 x 600

    • D.

      Replace the LCD

    Correct Answer
    D. Replace the LCD
    Explanation
    Replacing the LCD will fix a laptop with dark irregular lines that run the width of the display in all video modes. This is because the LCD screen is responsible for displaying images on the laptop, and if it is damaged or faulty, it can cause issues such as dark irregular lines. By replacing the LCD, the laptop will have a new screen that should resolve the problem.

    Rate this question:

  • 33. 

    Offline files and folders are available on which versions of Windows? (Select TWO).

    • A.

      Windows 7 Ultimate

    • B.

      Windows 7 Home Premium

    • C.

      Windows XP Home

    • D.

      Windows Vista Home Premium 64-bit

    • E.

      Windows XP Professional

    Correct Answer(s)
    A. Windows 7 Ultimate
    E. Windows XP Professional
    Explanation
    Offline files and folders are available on Windows 7 Ultimate and Windows XP Professional. This feature allows users to access files and folders even when they are not connected to the network. It enables offline access and synchronization of files between the local computer and a network location. Windows 7 Home Premium, Windows XP Home, and Windows Vista Home Premium 64-bit do not have this feature.

    Rate this question:

  • 34. 

    Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?

    • A.

      The document is set to hidden.

    • B.

      The document is locked.

    • C.

      The document was saved as a system document.

    • D.

      The document is owned by the first user.

    Correct Answer
    D. The document is owned by the first user.
    Explanation
    The problem is that the document is owned by the first user. This means that only the first user has permission to access and view the document. Since the second user is logged in and trying to access the document, they do not have the necessary permissions and therefore cannot find the document.

    Rate this question:

  • 35. 

    Which of the following characteristics of Windows Gadgets is accurate?

    • A.

      Windows Gadgets are available in all versions of Windows since XP.

    • B.

      Windows Gadgets are part of the Sidebar in Windows Vista and Windows 7.

    • C.

      Windows Gadgets were introduced in Windows 7.

    • D.

      Windows Gadgets are part of the Sidebar in Windows Vista.

    Correct Answer
    B. Windows Gadgets are part of the Sidebar in Windows Vista and Windows 7.
    Explanation
    Windows Gadgets are part of the Sidebar in Windows Vista and Windows 7. This means that in these two versions of Windows, users can access and use Windows Gadgets through the Sidebar feature. The Sidebar is a vertical bar on the desktop that can display various gadgets such as clocks, calendars, weather updates, and more. This characteristic is accurate because it specifies the specific versions of Windows where the Sidebar and Windows Gadgets are available together.

    Rate this question:

  • 36. 

    A user powers up their desktop PC, and instead of booting up normally, the user is taken into the BIOS setup. Which of the following is the MOST likely problem?

    • A.

      The MBR is corrupt

    • B.

      NTLDR cannot be found by the system

    • C.

      A faulty CMOS battery

    • D.

      The BIOS requires a firmware update

    Correct Answer
    C. A faulty CMOS battery
    Explanation
    A faulty CMOS battery is the most likely problem in this scenario. The CMOS battery is responsible for providing power to the BIOS settings when the computer is turned off. If the CMOS battery is faulty or has run out of power, it can cause the computer to boot into the BIOS setup instead of starting up normally. This is because the BIOS settings are not being saved properly, leading to the computer defaulting to the BIOS setup each time it is powered on.

    Rate this question:

  • 37. 

    A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?

    • A.

      Operating system type of the connected PCs

    • B.

      Location of the wireless router

    • C.

      Number of PCs that will access the network

    • D.

      Number of available Ethernet ports on the router

    Correct Answer
    B. Location of the wireless router
    Explanation
    The most important consideration for setting up a wireless network is the location of the wireless router. This is because the location of the router affects the strength and coverage of the wireless signal. Placing the router in a central location within the home will ensure better signal strength and coverage throughout the house.

    Rate this question:

  • 38. 

    A computer running Windows 7 will not boot up. A user is receiving an `Invalid boot disk' error. Which of the following is the cause of this error?

    • A.

      The BOOT.INI file is not found.

    • B.

      The Windows registry is corrupt.

    • C.

      There is a CD-ROM in the drive.

    • D.

      The floppy drive is disconnected.

    Correct Answer
    C. There is a CD-ROM in the drive.
    Explanation
    The cause of the "Invalid boot disk" error in this scenario is that there is a CD-ROM in the drive. This error occurs when the computer tries to boot from a non-bootable CD-ROM instead of the hard drive. To resolve this issue, the user should remove the CD-ROM from the drive and try to boot up the computer again.

    Rate this question:

  • 39. 

    A user is working in a small office home office (SOHO), running Windows XP, and cannot connect to the Internet. The office uses a router that is setup as a DHCP server. The technician types IPCONFIG in the command prompt, the following appears: IP address 0.0.0.0 Gateway 0.0.0.0 Subnet Mask 0.0.0.0 DNS 0.0.0.0 Which of the following should the technician check FIRST?

    • A.

      Network adapter drivers

    • B.

      Router settings

    • C.

      Network cable

    • D.

      Firewall

    Correct Answer
    C. Network cable
    Explanation
    The technician should check the network cable first. The IP configuration showing all zeros indicates that the computer is not receiving any network connection. By checking the network cable, the technician can ensure that it is properly connected and functioning, allowing the computer to establish a connection with the router and receive the necessary IP configuration information.

    Rate this question:

  • 40. 

    Which of the following are encrypted protocols? (Select TWO).

    • A.

      TELNET

    • B.

      SSH

    • C.

      POP3

    • D.

      FTP

    • E.

      HTTPS

    Correct Answer(s)
    B. SSH
    E. HTTPS
    Explanation
    TELNET, POP3, and FTP are all unencrypted protocols, while SSH and HTTPS are encrypted protocols. SSH (Secure Shell) is a cryptographic network protocol used for secure remote login, command execution, and other secure network services. HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP, providing encrypted communication between a web server and a web browser.

    Rate this question:

  • 41. 

    A user is connecting to the Internet using a DSL modem. The user installs a new wireless router and is unable to connect remotely to their computer, using Remote Desktop. The user had no issues connecting remotely before the wireless router was installed. Which of the following is the problem?

    • A.

      Wireless router drivers are needed.

    • B.

      Port forwarding is not setup.

    • C.

      The wireless router is defective.

    • D.

      VPN is not setup correctly.

    Correct Answer
    B. Port forwarding is not setup.
    Explanation
    The problem is that port forwarding is not set up on the new wireless router. Port forwarding allows incoming connections to reach a specific device or service on the local network. Without port forwarding, the router does not know which device to send the incoming Remote Desktop connection to, resulting in the inability to connect remotely. The other options (wireless router drivers needed, defective wireless router, VPN not set up correctly) do not address the specific issue of connecting remotely using Remote Desktop.

    Rate this question:

  • 42. 

    Which of the following network modifications should be implemented to extend the wireless network range and allow out-of-range users to share the Internet connection?

    • A.

      Create a new VLAN for the out-of-range users.

    • B.

      Add a wireless access point for the out-of-range users.

    • C.

      Upgrade the out-of-range users' SSID searching software.

    • D.

      Enable network sharing on the users' computers that are within range.

    Correct Answer
    B. Add a wireless access point for the out-of-range users.
    Explanation
    To extend the wireless network range and allow out-of-range users to share the Internet connection, adding a wireless access point for the out-of-range users is the correct solution. A wireless access point acts as a bridge between the wired and wireless networks, allowing devices to connect to the network wirelessly. By adding a wireless access point in the out-of-range area, users will be able to connect to the network and share the Internet connection. This solution does not require any modifications to the VLAN, upgrading software, or enabling network sharing on computers within range.

    Rate this question:

  • 43. 

    The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user's connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?

    • A.

      Net /?

    • B.

      Ipconfig /flushdns

    • C.

      Netstat -r

    • D.

      Nbtstat -R

    Correct Answer
    B. Ipconfig /flushdns
    Explanation
    The technician can run the "ipconfig /flushdns" command next to troubleshoot the issue. This command clears the DNS cache on the user's computer, which can help resolve issues with accessing certain websites. By flushing the DNS cache, any outdated or incorrect DNS information will be removed, allowing the computer to obtain fresh DNS records when trying to access websites. This can potentially resolve any DNS-related issues that may be preventing the user from accessing certain Internet websites.

    Rate this question:

  • 44. 

    A customer wants to have a technician increase the amount of RAM in the laptop. Which of the following should the technician do FIRST before adding more memory?

    • A.

      Check for available hard drive space

    • B.

      Check the laptop documentation

    • C.

      Open the case to check for an available slot

    • D.

      Check the operating system on the computer

    Correct Answer
    B. Check the laptop documentation
    Explanation
    Before adding more memory to a laptop, the technician should first check the laptop documentation. This is important because the documentation will provide information on the maximum amount of RAM that the laptop can support, the type of RAM modules that are compatible with the laptop, and any specific installation instructions or precautions that need to be followed. By checking the laptop documentation, the technician can ensure that they are adding the correct type and amount of RAM in a way that is supported by the laptop manufacturer.

    Rate this question:

  • 45. 

    A user is cleaning up their temporary Internet files and is concerned about the number of cookies discovered. Which of the following is a correct statement about cookies?

    • A.

      Cookies are spyware.

    • B.

      Cookies are not always malicious.

    • C.

      Cookies cannot be removed.

    • D.

      Cookies should be disabled at all times.

    Correct Answer
    B. Cookies are not always malicious.
    Explanation
    Cookies are small text files that websites store on a user's computer to remember certain information about the user. While some cookies can be used for tracking and targeted advertising, not all cookies are malicious. Many cookies are harmless and serve useful purposes, such as remembering login information or personal preferences. It is important for users to be aware of the potential privacy implications of cookies and to regularly clean up their temporary Internet files, but it is not necessary to disable cookies altogether as they can be beneficial in enhancing the browsing experience.

    Rate this question:

  • 46. 

    A user is trying to connect a workstation to an application that communicates only on port 1025 in a remote branch office and the connection request times out every time. Which of the following options is MOST likely the cause?

    • A.

      All traffic on the network must travel over port 80.

    • B.

      The application is configured to talk on an incorrect port.

    • C.

      The firewall has the ports above 1024 blocked.

    • D.

      All traffic on the network must travel over port 443.

    Correct Answer
    C. The firewall has the ports above 1024 blocked.
    Explanation
    The most likely cause for the connection request timing out every time is that the firewall has the ports above 1024 blocked. This means that any communication on port 1025, which is the port the application communicates on, is being blocked by the firewall. As a result, the workstation is unable to establish a connection with the application.

    Rate this question:

  • 47. 

    A customer wants to purchase a new motherboard that supports SLI. Which of the following will the new motherboard need to be able to do?

    • A.

      Support several hard drives in a RAID.

    • B.

      Support multiple PCIe display adapters.

    • C.

      Support more than 4GB of memory.

    • D.

      Support more than one power supply.

    Correct Answer
    B. Support multiple PCIe display adapters.
    Explanation
    The customer wants to purchase a new motherboard that supports SLI, which stands for Scalable Link Interface. SLI is a technology developed by NVIDIA that allows multiple graphics cards to be used together to improve graphics performance. To support SLI, the motherboard needs to be able to support multiple PCIe display adapters, as SLI requires multiple graphics cards to be connected via the PCIe slots on the motherboard. Therefore, the correct answer is "Support multiple PCIe display adapters."

    Rate this question:

  • 48. 

    Which of the following tools would be used to format a partition but not the hard drive? (Select TWO).

    • A.

      Disk Defragmenter MMC Snap-In

    • B.

      Format from the command line

    • C.

      Disk Management MMC Snap-In

    • D.

      Fdisk from the command line

    • E.

      Chkdsk from the command line

    Correct Answer(s)
    B. Format from the command line
    C. Disk Management MMC Snap-In
    Explanation
    The correct answer is "Format from the command line" and "Disk Management MMC Snap-In". These tools can be used to format a specific partition on a hard drive without affecting the entire hard drive. Format from the command line allows users to format a partition by using specific commands, while Disk Management MMC Snap-In is a graphical tool that provides a user-friendly interface to manage disk partitions, including formatting. Disk Defragmenter MMC Snap-In, Fdisk from the command line, and Chkdsk from the command line are not used specifically for formatting partitions.

    Rate this question:

  • 49. 

    A user cannot access the Internet via a proxy server. Which of the following ports needs to be set on the web browser proxy to allow HTTP traffic?

    • A.

      21

    • B.

      25

    • C.

      80

    • D.

      120

    Correct Answer
    C. 80
    Explanation
    To access the Internet via a proxy server, the web browser needs to be configured to use the correct proxy port. In this case, the correct answer is 80. Port 80 is the default port for HTTP traffic, which is the protocol used for web browsing. By setting the proxy port to 80, the web browser will be able to communicate with the proxy server and access the Internet.

    Rate this question:

  • 50. 

    A customer is installing a new 2.5 USB external HDD on a desktop PC and is using the front USB port. A light on the drive turns on but the system does not recognize the device. Which of the following is the MOST likely problem?

    • A.

      The system is not providing enough power to the USB port.

    • B.

      A 2.5 drive is designed for use with a laptop not with a desktop PC.

    • C.

      Thumb drives and cameras are plugged into the front USB ports the customer needs to use the USB ports in the back.

    • D.

      The external drive is incompatible with the system.

    Correct Answer
    A. The system is not providing enough power to the USB port.
    Explanation
    The most likely problem is that the system is not providing enough power to the USB port. This is indicated by the fact that the light on the drive turns on, suggesting that it is receiving some power, but the system does not recognize the device. This could be due to insufficient power being supplied to the USB port, which is preventing the system from properly detecting and recognizing the external HDD.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 20, 2013
    Quiz Created by
    Gerardo_ceboller
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.