1.
What should be done if CMOS contains a password you don’t know?
Correct Answer
B. Install the COMS shorting jumper to erase the CMOS data
Explanation
If the CMOS contains a password that you don't know, the best course of action would be to install the COMS shorting jumper to erase the CMOS data. This is a common method used to reset the CMOS settings and remove any passwords that may be set. By installing the jumper, it completes a circuit that clears the CMOS memory, effectively erasing any password that was previously set.
2.
Which of the following technique is used to troubleshoot if the adapter card and its slots are working fine, but services are unavailable?
Correct Answer
B. Visually inspect cards and cables and reconnect if necessary
Explanation
Visually inspecting cards and cables and reconnecting if necessary is the appropriate technique to troubleshoot if the adapter card and its slots are working fine but services are unavailable. This is because there may be loose connections or faulty cables causing the services to be unavailable, and by visually inspecting and reconnecting them, any issues can be identified and resolved.
3.
- How will you grather information about the modems installed in the computer and the network configuration without checking in the control panel utility?
Correct Answer
B. By using the registry sub tree HKEY_LOCAL_MACHINE
Explanation
The correct answer is by using the registry sub tree HKEY_LOCAL_MACHINE. The HKEY_LOCAL_MACHINE registry sub tree contains information about the hardware and software configuration of the computer, including information about installed modems and network configuration. Therefore, by accessing this registry sub tree, one can gather information about the modems installed in the computer and the network configuration without checking in the control panel utility.
4.
Which of the following is not a function of fully uninterruptible Power Supply system?
Correct Answer
A. Long term data backup
Explanation
A fully uninterruptible Power Supply (UPS) system is designed to provide continuous power to critical devices in the event of a power outage. It ensures that the devices connected to it remain operational without any interruption. The functions of a UPS system include keeping the batteries online, monitoring the power input line, and switching to the output of battery power when a loss in power is detected. However, long term data backup is not a function of a UPS system. Backup of data is typically handled by separate data storage systems or backup solutions.
5.
Salman need to attache an external CD-Rom drive. Which option needs to be verified when installing an external drive that in not checked normally on installing a internal drive on a notebook?
Correct Answer
B. Verify that the power switch, or power supply, is turned off.
Explanation
When installing an external CD-Rom drive on a notebook, it is important to verify that the power switch or power supply is turned off. This is not normally checked when installing an internal drive on a notebook because the internal drive is already connected to the power supply. However, when attaching an external drive, it is necessary to ensure that the power switch or power supply is turned off to avoid any potential damage or electrical shock.
6.
.---------------------------lasera are capable of creating eye damage through chronic, continous exposure; this classs include barcode readers.
Correct Answer
D. Class 2
Explanation
Class 2 lasers are considered safe for eye exposure because they emit low power levels that are not likely to cause damage, even with chronic and continuous exposure. Class 1 lasers are also safe, but they are limited to very low power levels. Class 3 lasers can cause eye damage with direct exposure, while Class 4 lasers can cause eye damage and also pose a fire hazard. The statement in the question suggests that barcode readers, which are commonly used in various industries, fall under the Class 2 category.
7.
Port COM1 is type of---------------------------------------.
Correct Answer
D. Serial Port
Explanation
The correct answer is Serial Port. A serial port is a type of port that enables serial communication, which means data is transferred one bit at a time. It is commonly used to connect devices such as modems, mice, and printers to a computer. Unlike parallel ports, which transfer multiple bits simultaneously, a serial port transfers data sequentially. PS/2 ports are used for connecting keyboards and mice, USB ports are used for connecting various devices, and parallel ports are used for connecting printers and other parallel devices.
8.
Sushil is planning to create a data processing-intensive crossword generator software. He had recently purched a good quality processor with L1 and L2 caches but want to increase its speed to allow his software to be tested well. Which of the following methods can he use to increase the speed of his processor at minimal cost?
Correct Answer
D. Use overclocking
Explanation
Overclocking is a method that Sushil can use to increase the speed of his processor at minimal cost. Overclocking involves increasing the clock speed of the processor beyond its default specifications, which can result in improved performance. This can be done by adjusting the settings in the computer's BIOS or using specialized software. By overclocking his processor, Sushil can achieve a higher processing speed without having to purchase additional hardware or software.
9.
Identify which of thew following is not a condition when adapter’s icon shows an exclamation mark on a yellow background?
Correct Answer
A. The PC Card slot has been disabled in the CMOS
Explanation
When the adapter's icon shows an exclamation mark on a yellow background, it indicates that there is an issue with the adapter or the device it is connected to. The other options listed are all possible conditions that can cause this problem, except for "The PC Card slot has been disabled in the CMOS." If the PC Card slot is disabled in the CMOS (Complementary Metal-Oxide-Semiconductor), it means that the system's BIOS settings have been configured to disable the slot, which is not related to the adapter showing an exclamation mark on a yellow background.
10.
36.Missing NTLDR is a type of _____________________________________________.
Correct Answer
B. Boot Error
Explanation
Missing NTLDR is a type of boot error. NTLDR (NT Loader) is a crucial component of the Windows operating system that is responsible for loading the operating system. When the NTLDR file is missing or corrupted, the computer cannot boot properly, resulting in a boot error. This error typically occurs when the computer's boot sector is damaged or when there is an issue with the hard drive or the operating system's files.
11.
Which statement is NOT TRUE about Disk Management Tool?
Correct Answer
D. Disk Management Tool is used to view file and folder properties stored on the disk
Explanation
The Disk Management Tool is not used to view file and folder properties stored on the disk. It is primarily used to display, create, and remove partitions on the drives, convert partitions from FAT or FAT32 to NTFS, and determine the amount of free space on a partition.
12.
Untill yesterday, ypur windows based computer was working fine. But today you receive “Boot record Not found” error massage. What is the first thing that you should do?
Correct Answer
D. Run the FDISK program and reformat the hard drive
13.
Kamal has built a custom computer using individual hardware components. When he start up the computer, one long beep and one short beep is produced. How should he troubleshoot this problem?
Correct Answer
B. He should check for moniter power, video cable nad display adapter
14.
For a node on a network following information are given:
IP Address is equal to 139.87.140.76
Subnet mask is equal to 255.255.255.0
Which is the correct network ID for this system?
Correct Answer
C. 139.87.140.0
Explanation
The correct network ID for this system is 139.87.140.0 because the subnet mask is 255.255.255.0, which means that the first three octets of the IP address are the network address and the last octet can be any value within the network. Therefore, the network ID is obtained by setting the last octet to 0.
15.
Which of the following statement is NOT TRUE about software based firewall security issues?
Correct Answer
A. Browser used for the communication is firewall security issue in software based firewall as some browser bypass software base firewall
Explanation
The statement "Browser used for the communication is firewall security issue in software based firewall as some browser bypass software base firewall" is not true because software-based firewalls are designed to control and monitor the traffic that passes through the browser as well. They are capable of filtering and blocking unwanted or malicious traffic, including traffic from browsers. Therefore, the statement is incorrect as it suggests that browsers can bypass the firewall, which is not the case.
16.
Program Name Installation is a type of restore point that is created:
Correct Answer
D. When programs are installed with installer tools such as installshield and Windows XP installer
Explanation
Program Name Installation is a type of restore point that is created when programs are installed with installer tools such as installshield and Windows XP installer. This means that whenever a program is installed using these installer tools, a restore point is automatically created. This restore point can be used to roll the system back to its state just after the installation of the program.
17.
A user is trying to start the system. During the boot process he receives a message of type “Non bootable/Non accessible disk”. As a PC technician what could not be the possible cause of the error?
Correct Answer
A. NTLRD file might be missing or corrupt. Application Error
Explanation
The possible cause of the error mentioned in the question is "NTLRD file might be missing or corrupt." This means that the NTLRD file, which is a crucial system file responsible for the boot process, is either not present or damaged. This can result in the system being unable to boot properly. The other options mentioned, such as CMOS boot sequence, hardware problems with the hard disk or controller, and a disk in the floppy disk drive, are all potential causes of boot issues, but they are not mentioned as the possible cause in this question.
18.
In a laser printer, a thermal fuse is used to prevent--------------------------------------------------------.
Correct Answer
B. A fuser from overheating
Explanation
A thermal fuse is used in a laser printer to prevent the fuser from overheating. The fuser is a component in the printer that heats up to melt the toner onto the paper. If the fuser were to overheat, it could cause damage to the printer or even start a fire. The thermal fuse is designed to break the electrical circuit if the temperature exceeds a certain threshold, thus preventing the fuser from overheating and ensuring the safe operation of the printer.
19.
MR Dawa owned a laptop computer, which he used extensively in his office. Now his son, Wally, is insisting him to buy a desktop for he wants to play his favorite MP3 music on the system. Suggest him analternative such that he can avail the functionality of a desktop system.
Correct Answer
D. Buy a docking station.
Explanation
Buying a docking station would be a suitable alternative for MR Dawa as it would allow him to connect his laptop to a desktop setup. With a docking station, he can connect his laptop to a larger monitor, keyboard, and mouse, essentially turning it into a desktop system. This would enable his son, Wally, to play his favorite MP3 music on a larger screen and use a more comfortable setup. Additionally, it would save MR Dawa the cost of buying a separate desktop system.
20.
Unwanted software loaded in ti system for the purpose of presenting commercial advertisement to the user is called___________________.
Correct Answer
D. Adware
Explanation
Adware refers to unwanted software that is installed on a system with the intention of displaying commercial advertisements to the user. It is different from other types of unwanted software like spyware, spam, and worms, as its main purpose is to generate revenue through advertising. Adware often comes bundled with legitimate software downloads and can be difficult to remove. It can cause annoying pop-up ads, slow down the system, and compromise user privacy by collecting personal information.