CompTIA A+ Essentials And IT Technician Exam! Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Hangten202004
H
Hangten202004
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,989
| Attempts: 4,989 | Questions: 57
Please wait...
Question 1 / 57
0 %
0/100
Score 0/100
1. True or False? Control Panel provides access to various configuration utilities for the Windows operating system.

Explanation

The Control Panel in Windows provides access to various configuration utilities for the operating system. It allows users to customize and manage settings related to the hardware, software, and system preferences. Users can modify display settings, manage devices, add or remove programs, configure network settings, and perform various other administrative tasks. Therefore, the statement "Control Panel provides access to various configuration utilities for the Windows operating system" is true.

Submit
Please wait...
About This Quiz
CompTIA A+ Essentials And IT Technician Exam! Quiz - Quiz

CompTIA tests are designed to test how knowledgeable one is when it comes to computer knowledge and applications. A+ supports the ability to connect users to the data... see morethey need to do their jobs regardless of the devices being used. The quiz below is designed specifically for a person who is studying for the IT technician exam. Give it a try and better be prepared for the certification exam. see less

2. True or False? While troubleshooting a system board problem, if the computer displays error messages, research the messages to determine a possible cause.

Explanation

When troubleshooting a system board problem, it is important to research any error messages displayed by the computer. Error messages can provide valuable information about the issue and help determine a possible cause. By researching these messages, one can gain insights into the specific problem and find potential solutions or fixes. Therefore, the statement is true.

Submit
3. True or False? You should avoid using jargon, abbreviations, and acronyms when speaking with users.

Explanation

When speaking with users, it is important to avoid using jargon, abbreviations, and acronyms. This is because users may not be familiar with these terms, leading to confusion and misunderstanding. Using plain and simple language helps in effective communication and ensures that the users understand the information being conveyed accurately.

Submit
4. True or False? Floppy disks can hold up to 1.44 MB of data.

Explanation

Floppy disks were a popular storage medium in the past, and the most common type, known as the 3.5-inch floppy disk, had a storage capacity of 1.44 MB. This was the standard capacity for floppy disks and allowed users to store a moderate amount of data, such as documents, images, or small software programs. However, with the advancement of technology, floppy disks have become outdated and are no longer commonly used due to their limited storage capacity and slower data transfer rates.

Submit
5. Peripheral devices use which standard for high-speed FireWire interfaces?

Explanation

Peripheral devices use the IEEE 1394 standard for high-speed FireWire interfaces. This standard allows for fast data transfer between devices such as computers, cameras, and external hard drives. It provides a reliable and efficient way to connect and transfer data between these devices, making it a commonly used standard in the industry.

Submit
6. True or False? Power supplies not only power the components directly connected to the system board through slots, but drives and other internal components as well.

Explanation

Power supplies are responsible for providing power to all components connected to the system board, including drives and other internal components. This means that they not only power the components directly connected through slots, but also those that are connected through other means such as cables or connectors. Therefore, the statement is true.

Submit
7. True or False? Privacy and security are two things that can be customized on the Internet Explorer web browser.

Explanation

Privacy and security are two things that can be customized on the Internet Explorer web browser. This means that users have the ability to adjust their privacy settings and enhance security features according to their preferences. They can control cookies, manage website permissions, enable or disable pop-up blockers, and set security levels to protect their browsing experience. By offering these customization options, Internet Explorer allows users to personalize their privacy and security settings to suit their individual needs.

Submit
8. True or False? Laser printers use a laser beam, toner, and an electrophotographic drum to create images.

Explanation

Laser printers use a laser beam, toner, and an electrophotographic drum to create images. The laser beam scans the drum, which is coated with a photosensitive material, causing it to form an electrostatic image. The toner, a fine powder, is then attracted to the charged areas on the drum, and is transferred onto the paper to create the final image. Therefore, the statement is true.

Submit
9. True or False? You should always check to see if the input device you are installing needs updated drivers.

Explanation

It is important to always check if the input device you are installing needs updated drivers because updated drivers can improve the device's performance, compatibility, and security. Outdated drivers may cause issues or prevent the device from functioning properly. Therefore, regularly checking for updated drivers ensures that the input device operates optimally.

Submit
10. True or False? The most common types of events to audit are access attempts on objects, such as files or folders and user logons and logoffs.

Explanation

The given statement is true. The most common types of events to audit are access attempts on objects, such as files or folders, and user logons and logoffs. Auditing these events helps in monitoring and tracking any unauthorized access or suspicious activities on the system. By auditing access attempts on objects, organizations can ensure the security and integrity of their data and prevent any potential breaches. Similarly, auditing user logons and logoffs helps in keeping track of user activities and identifying any unusual login patterns or unauthorized access attempts.

Submit
11. After determining that the computer hardware meets requirements for an upgrade, what should you do next?

Explanation

After determining that the computer hardware meets requirements for an upgrade, the next logical step would be to back up existing data files. This is important because during the upgrade process, there is a risk of data loss or corruption. By backing up the data files, you ensure that even if something goes wrong during the upgrade, you will still have a copy of your important files. This step helps to safeguard against any potential data loss and allows for a smooth transition to the upgraded system.

Submit
12. As an A+ technician, which of these would most likely cause damage to muscles, tendons, and nerves?

Explanation

Repetitive strain is the most likely cause of damage to muscles, tendons, and nerves for an A+ technician. This is because repetitive strain refers to the overuse of certain muscles and tendons due to repetitive motions or activities. This can lead to inflammation, pain, and damage to the muscles, tendons, and nerves involved. Electromagnetic radiation, noise, and office environments may have other health effects, but they are not directly associated with damage to muscles, tendons, and nerves.

Submit
13. True or False? A network address is typically composed of two parts: one identifies the portion of the network and the other identifies the specific computer.

Explanation

A network address is typically composed of two parts: one identifies the portion of the network and the other identifies the specific computer. This statement is true because a network address consists of a network ID and a host ID. The network ID helps identify the portion of the network, while the host ID helps identify the specific computer within that network.

Submit
14. Which firewall option allows you to record information concerning unsolicited traffic on your network?

Explanation

The security log option allows you to record information concerning unsolicited traffic on your network. This log keeps a record of all incoming and outgoing traffic, including any attempts to access your network without authorization. By reviewing the security log, you can identify potential security threats and take appropriate measures to protect your network. Port blocking, application access, and global security level do not specifically involve recording information about unsolicited traffic.

Submit
15. What is a Windows troubleshooting tool used to test communications between two TCP/IP-based hosts?

Explanation

Ping is a Windows troubleshooting tool used to test communications between two TCP/IP-based hosts. It sends a small packet of data to a specific IP address and waits for a response. If the host receives the packet and responds, it indicates that the communication between the two hosts is working properly. Ping is commonly used to check network connectivity, diagnose network issues, and measure the round-trip time for data packets.

Submit
16. True or False? When a computer hibernates, the computer shuts down after saving everything in memory on your hard disk.

Explanation

When a computer hibernates, it saves everything in memory onto the hard disk and then shuts down. This allows the computer to resume exactly where it left off when it is turned back on, as it can restore the saved state from the hard disk. Therefore, the statement "When a computer hibernates, the computer shuts down after saving everything in memory on your hard disk" is true.

Submit
17. True or False? When the adapter card tests fine and the slot tests fine, but services are unavailable, the possible cause is that the cables are not connected, are loose, or are damaged.

Explanation

When the adapter card tests fine and the slot tests fine, but services are unavailable, the possible cause is that the cables are not connected, are loose, or are damaged. This means that even though the hardware components are functioning correctly, the issue lies with the cables that connect them. If the cables are not properly connected, loose, or damaged, they can disrupt the flow of data and prevent services from being accessible. Therefore, the statement is true.

Submit
18. True or False? All UNIX systems share a kernel/shell architecture.

Explanation

All UNIX systems share a kernel/shell architecture. This means that the operating system's kernel, which is responsible for managing system resources and providing low-level services, is separate from the shell, which is the command-line interface that allows users to interact with the system. The kernel handles the communication between hardware and software, while the shell provides a way for users to execute commands and manage files and processes. This architecture is a fundamental characteristic of UNIX systems and is present in all of them.

Submit
19. Computer designers develop standard interfaces between their system boards and the specific adapter cards that you install later. What is this interface called?

Explanation

Computer designers develop standard interfaces between their system boards and the specific adapter cards that you install later. This interface is called a bus. A bus is a communication pathway that allows data to be transferred between different components of a computer system. It provides a standardized way for the system board and adapter cards to exchange information and work together seamlessly.

Submit
20. True or False? The power supply converts DC power from an electrical outlet to the AC power needed by system components.

Explanation

The power supply actually converts AC power from an electrical outlet to the DC power needed by system components.

Submit
21. True or False? Bluetooth is a wireless radio protocol that allows communication between devices usually more than 30 feet apart.

Explanation

Bluetooth is a wireless radio protocol that allows communication between devices usually within a range of 30 feet. Therefore, the given statement is false as it states that Bluetooth allows communication between devices more than 30 feet apart, which is not accurate.

Submit
22. True or False? Disk Defragmenter arranges stored data on a disk in discontiguous blocks.

Explanation

Disk Defragmenter is a tool that arranges stored data on a disk in contiguous blocks, not discontiguous blocks. By rearranging fragmented files, it improves the efficiency and speed of accessing data on the disk. Therefore, the correct answer is False.

Submit
23. As an A+ technician, what is the first step to installing and configuring a display device?

Explanation

The first step to installing and configuring a display device is to turn off the computer. This is important because it ensures that there is no power running through the computer while you connect the monitor. This helps to prevent any potential damage to the computer or the monitor during the installation process. Once the computer is turned off, you can then proceed with connecting the monitor using the appropriate cables and ports.

Submit
24. Windows can manage enough memory addresses to fill how much memory?

Explanation

Windows can manage enough memory addresses to fill 4 GB of memory. This means that the operating system is capable of addressing and utilizing up to 4 GB of RAM in a computer system.

Submit
25. True or False? If the monitor flickers, you should set the refresh rate as high as supported by the monitor and adapter card.

Explanation

Setting the refresh rate as high as supported by the monitor and adapter card is recommended when the monitor flickers. This is because a higher refresh rate can help reduce or eliminate the flickering effect, resulting in a smoother and more stable display. By increasing the refresh rate, the monitor and adapter card can refresh the image on the screen more frequently, reducing the perception of flickering.

Submit
26. Which of the following statements about antivirus software is false?

Explanation

This statement is false because antivirus software should be deployed on both individual computers and network servers to provide comprehensive protection against viruses. Network servers can also be vulnerable to virus attacks, so it is important to have antivirus software installed on them as well.

Submit
27. In which printing process does the printer use heat to release the ink from the nozzle?

Explanation

The correct answer is Thermal inkjet print process. In this printing process, the printer uses heat to release the ink from the nozzle. This is done by heating the ink inside the cartridge, causing it to expand and be forced out through the nozzle onto the paper.

Submit
28. Which of these PC cards has a thickness of 10.5 mm?

Explanation

The correct answer is Miniature hard drive. This is because a miniature hard drive is a type of PC card that has a thickness of 10.5 mm. Memory, modem, and wireless network adapter are not specified to have this thickness.

Submit
29. Which of the following are solutions for a problem with the microphone not working properly?

Explanation

The given answer suggests that the solutions for a problem with the microphone not working properly are to verify that the microphone is connected to the correct port on the sound card, test the microphone on a computer with a properly functioning sound card and microphone, and connect a known good microphone to the computer. These steps help to identify and troubleshoot any issues related to the microphone's connection, functionality, and compatibility.

Submit
30. Why do MIDI adapters have a DIN5 connector at one end and a 15-pin connector at the other end?

Explanation

MIDI adapters have a DIN5 connector at one end and a 15-pin connector at the other end in order to connect to the game port. The game port is a type of connector commonly found on older computer systems and is used for connecting various gaming peripherals, such as joysticks, gamepads, and MIDI devices. Therefore, the MIDI adapter is designed with these connectors to facilitate the connection between MIDI devices and the game port.

Submit
31. Which of these is the most basic preventative maintenance technique for most computer components?

Explanation

Keeping computer components clean is the most basic preventative maintenance technique for most computer components. Dust and debris can accumulate on the components over time, leading to overheating and potential damage. Regular cleaning helps to ensure proper airflow and prevents the buildup of dust that can hinder the performance and longevity of the components.

Submit
32. Social engineering attacks can occur through which of these methods?

Explanation

Social engineering attacks can occur through various methods, including over the phone, in person, and through email. These methods involve manipulating individuals to gain unauthorized access to sensitive information or perform malicious actions. Over the phone, attackers may use techniques such as impersonation or deception to trick individuals into revealing confidential information. In-person attacks involve physically interacting with the victim to exploit vulnerabilities or gain trust. Through email, attackers can use phishing or other techniques to deceive individuals into clicking on malicious links or providing sensitive information.

Submit
33. True or False? To remove loose debris from a keyboard, you should shake it upside down.

Explanation

To remove loose debris from a keyboard, shaking it upside down is an effective method. This is because shaking the keyboard upside down allows the debris to fall out from between the keys. It is important to do this gently to avoid causing any damage to the keyboard.

Submit
34. Wires are color-coded as to their voltages. What color wire is a +5 voltage?

Explanation

In electrical wiring, color coding is used to identify the different voltages of wires. The color red is typically used to indicate a positive voltage, such as +5 volts. Therefore, the correct color wire for a +5 voltage would be the red wire.

Submit
35. What may be the problem if your computer boots, but the screen remains blank?

Explanation

If the computer boots but the screen remains blank, the problem is likely that the memory is not correct for the system. This means that the memory modules installed in the computer may not be compatible with the motherboard or they may not be properly seated in their slots. As a result, the computer is unable to properly initialize the display and show any content on the screen.

Submit
36. Which of these are ways an individual computer might connect to the Internet?

Explanation

An individual computer can connect to the Internet through a local network connection, which allows it to access the Internet through a router or modem within the local network. Additionally, the computer can connect to the Internet through an Internet Service Provider (ISP), which provides the necessary infrastructure and connectivity to access the Internet.

Submit
37. WPA is an acronym for which of these?

Explanation

WPA stands for Wi-Fi Protected Access. It is a security protocol used to protect wireless networks. It provides encryption and authentication mechanisms to ensure the confidentiality and integrity of data transmitted over a Wi-Fi network. WPA replaced the earlier security protocol, WEP, which had several vulnerabilities. Wi-Fi Protected Access is widely used to secure wireless networks and prevent unauthorized access.

Submit
38. True or False? The registry is divided into five sections called subsections.

Explanation

The registry is not divided into five sections called subsections.

Submit
39. What is Novell's object-oriented database organized as a hierarchical tree called?

Explanation

Novell's object-oriented database organized as a hierarchical tree is called eDirectory or NDS. This database structure allows for the organization and management of data in a hierarchical manner, similar to a tree structure. It is commonly used for directory services and user management in Novell's network operating systems.

Submit
40. Which of these are considered reliable troubleshooting resources when researching printer and scanner issues?

Explanation

Device documentation, manufacturer's websites, and error logs are considered reliable troubleshooting resources when researching printer and scanner issues. Device documentation provides detailed information about the device's features, functions, and troubleshooting steps. Manufacturer's websites often have FAQs, troubleshooting guides, and support forums where users can find solutions to common issues. Error logs can provide valuable information about the specific errors or problems that the device is experiencing, helping users diagnose and resolve the issues effectively. User blogs, on the other hand, may not always provide accurate or reliable information, making them less reliable as troubleshooting resources.

Submit
41. What are the four primary categories of components in a typical personal computer?

Explanation

The four primary categories of components in a typical personal computer are the system unit, display device, input devices, and external devices. The system unit refers to the main enclosure that houses the motherboard, processor, memory, and storage devices. The display device is responsible for outputting visual information, such as a monitor or screen. Input devices allow users to interact with the computer, such as a keyboard or mouse. External devices include peripherals that are connected to the computer, such as printers or scanners. Software, although mentioned in the options, is not considered a component but rather a program that runs on the computer.

Submit
42. What are some common types of solid state storage?

Explanation

USB devices, SD memory cards, and flash memory cards are all common types of solid-state storage. These devices use flash memory technology to store and retrieve data. USB devices are portable storage devices that can be connected to a computer's USB port. SD memory cards are small cards used in cameras, smartphones, and other devices to store data. Flash memory cards are also small cards used in various devices to provide additional storage capacity. All of these types of solid-state storage offer fast access times, high reliability, and compact form factors.

Submit
43. Which of these are components of the print spooler?

Explanation

The components of the print spooler are the Graphics Device Interface (GDI) and the Print Processor. The GDI is responsible for translating the print job into a language that the printer can understand, while the Print Processor is responsible for managing the print queue and sending the print job to the printer. The other options listed, such as Internet uniform resource locator and Universal Naming Convention path, are not components of the print spooler.

Submit
44. Newer Intel systems employ the Intel Hub Architecture (IHA) chipset. What are the two main chips found on that chipset?

Explanation

The two main chips found on the Intel Hub Architecture (IHA) chipset are the Graphics and AGP Memory Controller Hub (GMCH) and the I/O Controller Hub (ICH). The GMCH is responsible for managing the graphics and AGP memory functions, while the ICH handles input/output and peripheral connectivity. These two chips work together to provide efficient and effective performance in newer Intel systems.

Submit
45. Once you have discovered and implemented a solution, what should you do next?

Explanation

After implementing a solution, it is important to test the computer logged in as a user. This step ensures that the solution has been successfully implemented and that the computer is functioning properly for the end user. Testing as a user allows for a more realistic assessment of the computer's performance and functionality. It also helps to identify any potential issues or errors that may have been missed during the implementation process.

Submit
46. Which of these generally leaves messages on a mail server?

Explanation

IMAP4 generally leaves messages on a mail server. IMAP4 (Internet Message Access Protocol version 4) is a protocol used by email clients to retrieve emails from a mail server. Unlike POP3 (Post Office Protocol version 3) which typically downloads emails to the client device and removes them from the server, IMAP4 allows users to access and manage their emails directly on the server. This means that messages are stored on the server and can be accessed from multiple devices, providing a more synchronized and flexible email experience. SMTP (Simple Mail Transfer Protocol) is used for sending emails, while HTTP (Hypertext Transfer Protocol) is used for web browsing.

Submit
47. What specification determines how many backup tapes or other media sets are needed, and the sequence in which they are used and reused?

Explanation

The rotation method determines how many backup tapes or other media sets are needed and the sequence in which they are used and reused. This method ensures that backups are performed regularly and that older backups are overwritten or reused in a systematic manner. It helps in managing the storage space efficiently and ensures that multiple copies of backups are available for disaster recovery purposes.

Submit
48. Which network model is described as having a host computer that controls all network communication and performs data processing and storage on behalf of clients?

Explanation

A centralized network is described as having a host computer that controls all network communication and performs data processing and storage on behalf of clients. In this network model, all requests and data are sent to the central host computer, which then processes and stores the information before sending it back to the clients. This model allows for centralized control and management of the network, making it easier to maintain and secure.

Submit
49. Which of these are considered common mobile computing device issues?

Explanation

Common mobile computing device issues include external monitor not displaying, short battery life, and the device getting very warm. These issues can affect the functionality and usability of the device, causing inconvenience and potential performance issues.

Submit
50. True or False? If the optical drive door won't open, the first thing you should do is open My Computer and right-click the drive icon, then choose Eject.

Explanation

The correct answer is False. If the optical drive door won't open, the first thing you should do is check if there is a small pinhole on the front of the drive. If there is, you can use a straightened paperclip or a similar object to insert into the pinhole and manually eject the drive. Right-clicking the drive icon in My Computer and choosing Eject is not the first step to take in this situation.

Submit
51. Which of the following is true of the system BIOS?

Explanation

The system BIOS is stored in the ROM and is responsible for starting the most basic services of a computer system. It is also true that every computer has a system BIOS that sets the computer's configuration and environment when the system is powered on. Additionally, it is possible for computers to have more than one BIOS to control other system functions.

Submit
52. Printers and scanners require that appropriate software drivers are enabled. Which of these functions are controlled by the drivers?

Explanation

Printers and scanners require software drivers to control various functions. The drivers enable the functionality of stapling, collation, and color rendition. Stapling refers to the ability of a printer to automatically staple printed pages together. Collation is the process of arranging multiple copies of a document in the correct order. Color rendition refers to the accurate reproduction of colors by the printer or scanner. These functions are controlled by the software drivers, which communicate with the hardware and enable these features to be utilized.

Submit
53. Which of these are you able to do in the Recovery Console?

Explanation

In the Recovery Console, you are able to correct boot problems, manage files and disks, and enable and disable services. This means that if your computer is experiencing issues with booting, you can use the Recovery Console to fix the problem. Additionally, you can use it to manage files and disks, such as copying or deleting files, and you can enable or disable services as needed.

Submit
54. Fingerprint scanners scan the fingerprints on a user’s hand. Which of the following are advantages of fingerprint scanners?

Explanation

Fingerprint scanners have several advantages. Firstly, fingerprint collection is simple and inexpensive, making it a convenient method for identification. Additionally, fingerprint scanners are common, meaning they are widely available and can be easily implemented in various settings. Moreover, fingerprint scanners are known for their accuracy and stability, ensuring reliable authentication. However, the given answer does not include the advantage of fingerprint scanners working regardless of the cleanliness of the user's hands, which is another important benefit as it allows for consistent scanning even in less-than-ideal conditions.

Submit
55. Which of the following are true statements about data removal from a storage medium?

Explanation

Formatting a storage device once may not completely erase the information stored on it, as there are recovery tools that can reconstruct data from the remnants of deleted files or formatted disks. However, formatting the device several times or bulk erasing it first can permanently erase the information. Additionally, destroying the media is a more secure method of data removal, as it ensures that the information cannot be recovered.

Submit
56. Which of the following are the main categories of instruction sets?

Explanation

The main categories of instruction sets are Complex instruction set computer (CISC), Reduced instruction set computer (RISC), and Explicitly parallel instruction computing (EPIC). These categories represent different approaches to designing the instruction set architecture for a computer processor. CISC focuses on providing a wide variety of complex instructions that can perform multiple operations in a single instruction. RISC, on the other hand, emphasizes a simplified instruction set with a smaller number of basic instructions that can be executed more quickly. EPIC is a newer approach that aims to exploit parallelism in instruction execution by allowing multiple instructions to be executed simultaneously. EISC is not a main category of instruction sets and is therefore not included in the correct answer.

Submit
57. Which of these are entries in the Event Log?

Explanation

The entries in the Event Log include Category, User, Computer, and Type. These are the different fields or categories that are recorded in the Event Log when an event occurs. The Category field represents the category or classification of the event, the User field represents the user account associated with the event, the Computer field represents the name of the computer where the event occurred, and the Type field represents the type or nature of the event. These entries help in analyzing and troubleshooting events that occur on a system.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 23, 2008
    Quiz Created by
    Hangten202004
Cancel
  • All
    All (57)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
True or False? Control Panel provides access to various configuration...
True or False? While troubleshooting a system board problem, if the...
True or False? You should avoid using jargon, abbreviations, and...
True or False? Floppy disks can hold up to 1.44 MB of data.
Peripheral devices use which standard for high-speed FireWire...
True or False? Power supplies not only power the components directly...
True or False? Privacy and security are two things that can be...
True or False? Laser printers use a laser beam, toner, and an...
True or False? You should always check to see if the input device you...
True or False? The most common types of events to audit are access...
After determining that the computer hardware meets requirements for an...
As an A+ technician, which of these would most likely cause damage to...
True or False? A network address is typically composed of two parts:...
Which firewall option allows you to record information concerning...
What is a Windows troubleshooting tool used to test communications...
True or False? When a computer hibernates, the computer shuts down...
True or False? When the adapter card tests fine and the slot tests...
True or False? All UNIX systems share a kernel/shell architecture.
Computer designers develop standard interfaces between their system...
True or False? The power supply converts DC power from an electrical...
True or False? Bluetooth is a wireless radio protocol that allows...
True or False? Disk Defragmenter arranges stored data on a disk in...
As an A+ technician, what is the first step to installing and...
Windows can manage enough memory addresses to fill how much memory?
True or False? If the monitor flickers, you should set the refresh...
Which of the following statements about antivirus software is false?
In which printing process does the printer use heat to release the ink...
Which of these PC cards has a thickness of 10.5 mm?
Which of the following are solutions for a problem with the microphone...
Why do MIDI adapters have a DIN5 connector at one end and a 15-pin...
Which of these is the most basic preventative maintenance technique...
Social engineering attacks can occur through which of these methods?
True or False? To remove loose debris from a keyboard, you should...
Wires are color-coded as to their voltages. What color wire is a +5...
What may be the problem if your computer boots, but the screen remains...
Which of these are ways an individual computer might connect to the...
WPA is an acronym for which of these?
True or False? The registry is divided into five sections called...
What is Novell's object-oriented database organized as a hierarchical...
Which of these are considered reliable troubleshooting resources when...
What are the four primary categories of components in a typical...
What are some common types of solid state storage?
Which of these are components of the print spooler?
Newer Intel systems employ the Intel Hub Architecture (IHA) chipset....
Once you have discovered and implemented a solution, what should you...
Which of these generally leaves messages on a mail server?
What specification determines how many backup tapes or other media...
Which network model is described as having a host computer that...
Which of these are considered common mobile computing device issues?
True or False? If the optical drive door won't open, the first thing...
Which of the following is true of the system BIOS?
Printers and scanners require that appropriate software drivers are...
Which of these are you able to do in the Recovery Console?
Fingerprint scanners scan the fingerprints on a user’s hand. Which...
Which of the following are true statements about data removal from a...
Which of the following are the main categories of instruction sets?
Which of these are entries in the Event Log?
Alert!

Advertisement