Intro To PC Final Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jevavee
J
Jevavee
Community Contributor
Quizzes Created: 4 | Total Attempts: 6,225
| Attempts: 62 | Questions: 68
Please wait...
Question 1 / 68
0 %
0/100
Score 0/100
1. ________________ are rated by the maximum power (in watts) that they can provide.  It is important to keep in mind that the ________________ must produce at least enough energy to operate all the components of the system at the same time.  During the initial startup of the computer,  many components require additional power to get going.

Explanation

Power supplies are rated by the maximum power (in watts) that they can provide. It is important to keep in mind that the power supply must produce at least enough energy to operate all the components of the system at the same time. During the initial startup of the computer, many components require additional power to get going.

Submit
Please wait...
About This Quiz
Intro To PC Final Exam - Quiz

The 'Intro to PC Final Exam' assesses knowledge on PC hardware components, focusing on Intel chipsets, power supplies, static electricity effects, and memory types. It evaluates understanding of... see moredual-core technology, major heat sources in PCs, and the functionality of DDR SDRAM. see less

2. The _____________________ is the first Intel desktop CPU to put two CPU's in the same package, called dual-core.

Explanation

The Pentium D is the correct answer because it was the first Intel desktop CPU to feature two CPU's in the same package, which is known as dual-core. This means that the Pentium D processor had two separate processing units within a single chip, allowing for improved multitasking and overall performance compared to single-core processors.

Submit
3. The _______________ is the prime heat source within a PC.

Explanation

The CPU, or Central Processing Unit, is the main component responsible for executing instructions and performing calculations in a computer. It is often referred to as the "brain" of the computer and generates a significant amount of heat during operation. The CPU is equipped with multiple cores and a high clock speed, allowing it to handle complex tasks efficiently. Due to its high power consumption and heat generation, proper cooling mechanisms such as fans or liquid cooling systems are necessary to prevent overheating and ensure the CPU operates optimally.

Submit
4. _____________________________ or ____________________, is a newer type od SDRAM.  As its name implies, it transfers data at double the speed of regular SDRAM.

Explanation

Double Data Rate SDRAM, also known as DDR SDRAM, is a newer type of SDRAM that transfers data at double the speed of regular SDRAM. This means that it can provide faster and more efficient data transfer, resulting in improved performance for computer systems. DDR SDRAM has become widely used in modern computing devices due to its enhanced speed and reliability compared to traditional SDRAM.

Submit
5. _____________________ are designed to be used in notebook or laptop computers.  They are physically smaller than standard DIMMS, but electrically similar, and are available in EDO and SDRAM types.

Explanation

SO-DIMMs, or Small Outline Dual In-Line Memory Modules, are specifically designed for use in notebook or laptop computers. They are physically smaller than standard DIMMs but have similar electrical characteristics. SO-DIMMs are available in both EDO (Extended Data Output) and SDRAM (Synchronous Dynamic Random Access Memory) types, making them compatible with a wide range of computer systems.

Submit
6. The biggest technical difference between Windows and MS-DOS is the _______________.  The _______________ is a database that keeps track of hardware and software configuration and setup information.

Explanation

The biggest technical difference between Windows and MS-DOS is the Registry. The Registry is a database that keeps track of hardware and software configuration and setup information.

Submit
7. The objects in the COntents window are viewed in one of several formats.  You can use the View menu bar or the View icon on the tool bar to change the view (Icon, Tile, List, Details, and the Thumbnail).  The _________view is the default but is difficult to use if you are concerned with file sizes, the dates they were modified, or if you have a list of files that could be sorted for easier viewing.  We recommend switching to the _____________view.

Explanation

The Tile view is the default but is difficult to use if you are concerned with file sizes, the dates they were modified, or if you have a list of files that could be sorted for easier viewing. We recommend switching to the Detailed view.

Submit
8. ______________________ is generally used to describe any memory that does not lose data when the power is removed.  Its opposite is _______________, which lose data when power is removed.  ____________ is the physical memory package, usually a large IC on the motherboard.

Explanation

ROM is generally used to describe any memory that does not lose data when the power is removed. Its opposite, RAM, loses data when power is removed. ROM is the physical memory package, usually a large IC on the motherboard.

Submit
9. The _______________________ contains information that points to the location of the operating system. In DOS and WIndows 95/98 that file was __________________.  In Windows NT/2000/XP that file is _______________.  In earlier operating systems the key files were ____________ and __________________. In Windows NT, 2000, and XP, _________________ is the key file.

Explanation

The system partition contains information that points to the location of the operating system. In DOS and Windows 95/98, that file was IO.SYS. In Windows NT/2000/XP, that file is NTLDR. In earlier operating systems, the key files were IO.SYS and COMMAND.COM. In Windows NT, 2000, and XP, NTLDR is the key file.

Submit
10. Microsoft recommends that you only used _______________ drivers, which also come with a special Windows logo stating they are designed for Windows. 

Explanation

Microsoft recommends that users only use signed drivers. Signed drivers have undergone a verification process by Microsoft and come with a special Windows logo indicating that they are designed specifically for Windows. These drivers are considered to be more reliable and secure compared to unsigned drivers, as they have been tested and approved by Microsoft.

Submit
11. The ___________________ and _________________ are an attempt to verify that you are the authentic intended user, and not an imposter.  The process of verifying that the person typing is the actual authorized user is called ____________________.

Explanation

The login and password are used as a means to verify the identity of the user and ensure that they are the intended user and not an imposter. This process of verifying the user's identity is called authentication.

Submit
12. One final approach takes a bit of work upfront but it works very quickly.  You can make a copy of your entire system partition and put it on CD or another hard drive.  This copy is called _______________, and is an exact duplicate of your drive.

Explanation

A disk image is a copy of the entire system partition that is stored on a CD or another hard drive. It is an exact duplicate of the original drive, including all files, folders, and settings. This approach requires some initial effort to create the disk image, but it allows for quick restoration of the system in case of any issues or failures.

Submit
13. With ___________________ drives, You connect a single drive to a port on the motherboard, and that's it.

Explanation

With SATA drives, you connect a single drive to a port on the motherboard, and that's it. SATA (Serial Advanced Technology Attachment) is a type of interface used to connect storage devices, such as hard drives and solid-state drives, to the motherboard of a computer. It is a simple and straightforward method of connecting a drive, as it only requires plugging in a single cable to the SATA port on the motherboard. SATA drives have become the standard for most modern computers due to their ease of use and faster data transfer speeds compared to older interfaces like IDE.

Submit
14. DVD capacity table: DVD Type = Max Capacity; Single-layer, single-sided = _______________GB; Single-layer, double sided = _____________GB; Dual-layer, single sided = ______________________ GB; Double layer, double sided = ___________GB.

Explanation

The answer 4.7, 9.4, 8.5, 17 represents the maximum capacity in gigabytes (GB) for each type of DVD mentioned in the table. The single-layer, single-sided DVD has a capacity of 4.7 GB, the single-layer, double-sided DVD has a capacity of 9.4 GB, the dual-layer, single-sided DVD has a capacity of 8.5 GB, and the double-layer, double-sided DVD has a capacity of 17 GB.

Submit
15. The problem is how does the CPU know when a device needs attention?  It works the same way a student gets the attention of the instructor.  Each device will "raise its hand" and wait for the CPU to respond.  Each device will use the raising its hand  version known as, a _____________________.

Explanation

Each device in a computer system uses a hardware interrupt to get the attention of the CPU. Similar to a student raising their hand to get the attention of an instructor, the device "raises its hand" by sending a signal to the CPU. This signal is known as a hardware interrupt, which prompts the CPU to stop its current task and handle the request from the device. By using hardware interrupts, the CPU can efficiently manage multiple devices and respond to their needs in a timely manner.

Submit
16. A ___________________ works having an electron gun at the long narrow end which is heated and emits a stream of high-speed electrons in the direction of the large end of the tube.

Explanation

A CRT (Cathode Ray Tube) works by using an electron gun at one end of the tube that is heated and emits a stream of high-speed electrons. These electrons are then directed towards the larger end of the tube, where they hit a phosphor-coated screen, creating the images that we see on a CRT display.

Submit
17. ______________ displays are known for their sharp image quality, low power usage, light weight, and thin profile.  

Explanation

LCD displays, or Liquid Crystal Displays, are known for their sharp image quality due to their ability to produce high-resolution images. They also have low power usage compared to other display technologies, making them energy-efficient. LCD displays are lightweight and have a thin profile, making them suitable for portable devices such as laptops, tablets, and smartphones.

Submit
18. Because of the level of complexity and the millions of microscopic transistors that need to be printed onto the LCD substrate,  LCDs are fairly expensive and difficult to manufacture.  In a standard 1,024 x 768 color laptop screen, there are more than __________________ transistors.  If a single transistor doesn't operate properly,  the associated pixel loses its sub-pixel color.

Explanation

LCD screens are expensive and difficult to manufacture due to their complexity and the large number of microscopic transistors that need to be printed onto the LCD substrate. In a standard 1,024 x 768 color laptop screen, there are more than 2 million transistors. If even a single transistor fails to operate properly, the corresponding pixel loses its sub-pixel color.

Submit
19. Microsoft and Intel jointly developed the ______________________ (APM) specification.  These specifications define the _____________________ between the hardware and the operating system.  In order for a computer to provide power management it must comply with both of these standards, DPMS for monitors, APM on the computer side.

Explanation

Microsoft and Intel collaborated to create the Advanced Power Management (APM) specification. This specification outlines the standards for power management between the hardware and the operating system. To enable power management on a computer, it must adhere to both the DPMS standard for monitors and the APM standard on the computer side. The APM specification provides a bios-level interface for managing power settings and optimizing energy usage.

Submit
20. In some peer-to-peer networks,  a single machine is assigned to be the ________________________.

Explanation

In some peer-to-peer networks, a single machine is designated as the main storage depot. This means that this particular machine is responsible for storing and managing the majority of the network's data. Other machines in the network can access and retrieve data from this main storage depot when needed. Having a centralized storage location helps to streamline data management and ensure that important files are easily accessible to all network participants.

Submit
21. The next step-up is the ________________________.  This network requires that one computer,  the server, is dedicated to acting as a central repository of account and login information, and usually files and applications.

Explanation

A client-server network is the next step-up in networking. In this type of network, one computer, known as the server, is dedicated to storing and managing account and login information, as well as files and applications. Other computers, called clients, connect to the server to access these resources. This setup allows for centralized control and management of data and resources, making it efficient and secure.

Submit
22. ___________________________ establish the rules on how computers talk to and understand each other.

Explanation

Protocols are a set of rules that define how computers communicate and understand each other. They establish the standards and procedures for data transmission, ensuring that information is exchanged accurately and efficiently between devices. By following these protocols, computers can effectively communicate over networks, enabling seamless data transfer and interoperability.

Submit
23. In a ________________________, all devices are connected to a single linear cable.

Explanation

A bus network is a type of network where all devices are connected to a single linear cable. This cable, known as the bus, serves as a communication pathway for all devices on the network. Each device on the bus network can transmit data onto the bus, and all other devices can receive and interpret that data. This type of network is commonly used in small to medium-sized networks where simplicity and cost-effectiveness are important factors.

Submit
24. In a _______________________,  all workstations and servers are connected in a closed loop.

Explanation

A ring network is a type of computer network where all workstations and servers are connected in a closed loop. In this network topology, each device is connected to two other devices, forming a ring-like structure. Data travels in one direction around the ring, passing through each device until it reaches its destination. This type of network is known for its simplicity and efficiency in transmitting data, as it eliminates the need for a central hub or switch.

Submit
25. _______________________ (NICs) link the computer to the network cable systems.

Explanation

Network Interface Cards (NICs) are hardware devices that connect a computer to a network cable system. They provide the necessary interface for the computer to send and receive data over the network. NICs are essential for establishing a connection between the computer and the network, allowing the computer to communicate with other devices and access resources on the network. Without NICs, the computer would not be able to connect to the network cable systems and participate in network communication.

Submit
26. _________________________ consists of two insulated strands of wire twisted around each other to form a pair.

Explanation

Twisted-pair cable is a type of cable that is made up of two insulated strands of wire that are twisted around each other to form a pair. This twisting helps to reduce electromagnetic interference and crosstalk between the wires, making it suitable for transmitting data signals. Twisted-pair cables are commonly used in Ethernet networks and telephone systems.

Submit
27. Twisted-pair cable is limited to a maximum lenght of _________________, and it requires a hub or a switch to connect more than two computers.  __________________ is by far the most popular type of cabling, even with its length limitation.

Explanation

Twisted-pair cable is limited to a maximum length of 100 meters. It requires a hub or a switch to connect more than two computers. UTP (Unshielded Twisted Pair) is the most popular type of cabling, despite its length limitation.

Submit
28. As with any technology,  the ____________________ has its downside.  For one thing it has limited throughput.  The theoretical maximum speed of today's fastest wireless technology is __________________Mbps.

Explanation

Wireless LAN technology, also known as Wi-Fi, has its limitations. One of these limitations is its limited throughput, meaning it can only handle a certain amount of data at a time. The theoretical maximum speed of the fastest wireless LAN technology currently available is 54 Mbps (megabits per second). This means that in ideal conditions, the wireless LAN can transmit data at a maximum speed of 54 Mbps.

Submit
29. The ______________________________________________ has specified several categories of twisted-pair cable.  Not all of these are approved for data communications.

Explanation

The Electronics Industries Association/Telecommunications Industry Association (EIA/TIA) has specified several categories of twisted-pair cable. These categories are used for different purposes and not all of them are approved for data communications.

Submit
30. Operating in the same 2.4Ghz range as the 802.11B,  the newer __________________ standard offers the same speed as 802.11A at 54Mbps, but is backward-compatible with 802.11B.  As of today this is the most widely used system.

Explanation

The correct answer is 802.11G. This standard operates in the same 2.4Ghz range as 802.11B and offers the same speed as 802.11A at 54Mbps. It is also backward-compatible with 802.11B, making it a popular choice among users. As of today, 802.11G is the most widely used system.

Submit
31. ______________________ is a fast, full time connection to the internet, and does not tie up a telephone line as it can operate at the same time as a telephone call.  Speed is between ___________________Kbps; depending on the type and how far you are from the nearest substation.

Explanation

DSL (Digital Subscriber Line) is a fast, full-time connection to the internet that does not require tying up a telephone line. It can operate simultaneously with a telephone call. The speed of DSL can vary between 354 Kbps to 3000 Kbps, depending on the type of DSL and the distance from the nearest substation.

Submit
32. The Intel chipset system uses the ___________ device to control the transfer data into and out of the SATA ports.

Explanation

The correct answer is ICH. ICH stands for Input/Output Controller Hub and it is a part of the Intel chipset system. The ICH device is responsible for controlling the transfer of data into and out of the SATA ports. It acts as a bridge between the CPU and the SATA ports, facilitating the communication between the two and ensuring smooth data transfer.

Submit
33. It is important to know that ___________________________ itself does not cause electrical damage.  The damage occurs when these extremely high voltages are discharged in an uncontrolled manner, typically through a semiconductor such as an integrated circuit.

Explanation

Static electricity itself does not cause electrical damage. The damage occurs when these extremely high voltages are discharged in an uncontrolled manner, typically through a semiconductor such as an integrated circuit. Static electricity refers to the buildup of electric charges on the surface of objects. It can be generated by friction, contact, or separation of materials. While static electricity can cause discomfort or minor shocks, it is the uncontrolled discharge of this built-up charge that can potentially damage electronic components.

Submit
34. A time - tested way to increase system performance is to __________________________.  However,  when upgrading memory there are several precautions that must be observed to insure a smooth upgrade.

Explanation

Increasing the memory capacity of a system is a proven method to enhance its performance. By adding more memory, the system can handle larger amounts of data and run multiple applications simultaneously without slowing down. However, when upgrading memory, it is crucial to follow certain precautions to ensure a seamless upgrade process. This may include checking compatibility with the existing hardware, ensuring proper installation techniques, and verifying the system's ability to support the increased memory capacity.

Submit
35. Most experienced system administrators will ____________________________, which effectively closes a potential security hole.  An amazing number of people use the default administrator account with their first name as password...and the hackers know this.

Explanation

The correct answer is to change the Administrator account name or change the name of the Administrator account. This is because using the default administrator account with a common password (such as the user's first name) is a common practice among many users. Hackers are aware of this and can exploit it to gain unauthorized access to the system. By changing the name of the Administrator account, it becomes harder for hackers to guess the username and therefore adds an additional layer of security to the system.

Submit
36. ______________________ is most often defined as the act of playing a ruse to entice you to give up personal information.

Explanation

Phishing is most often defined as the act of playing a ruse to entice you to give up personal information. Phishing scams typically involve sending fraudulent emails or messages that appear to be from reputable sources, such as banks or online services, in order to trick individuals into revealing sensitive information like passwords or credit card details. These scams often employ tactics like creating a sense of urgency or using convincing fake websites to deceive victims. It is important to be cautious and verify the authenticity of any requests for personal information to protect oneself from falling victim to phishing attacks.

Submit
37. Installing an optical drive is similar to installing a ___________________.

Explanation

Installing an optical drive is similar to installing a hard drive because both require physically connecting the drive to the computer's motherboard using cables, securing it in the appropriate drive bay, and configuring the computer's BIOS to recognize the new drive. Additionally, both types of drives store and retrieve data, although they use different methods - optical drives use lasers to read and write data on optical discs, while hard drives use magnetic storage to store data on spinning platters.

Submit
38. ______________________ are used to connect devices to the motherboard and therefore allow the flow of data between that device and other devices in the computer.

Explanation

Expansion buses are used to connect devices to the motherboard and allow the flow of data between that device and other devices in the computer. These buses provide a pathway for communication and data transfer, enabling devices such as graphics cards, sound cards, and network adapters to be connected and interact with the rest of the computer system. Without expansion buses, devices would not be able to communicate with each other or with the motherboard, limiting the functionality and expandability of the computer.

Submit
39. _____________________ uses a serial data transfer method rather than parallel.

Explanation

PCIe (Peripheral Component Interconnect Express) uses a serial data transfer method rather than parallel. This means that data is transmitted one bit at a time, sequentially, instead of multiple bits simultaneously. This allows for faster and more efficient data transfer, as it eliminates the need for synchronization between multiple parallel data channels. PCIe also provides higher bandwidth and scalability compared to parallel interfaces, making it the preferred choice for connecting devices such as graphics cards, network cards, and storage devices to a computer's motherboard.

Submit
40. The best source of information to check before obtaining memory is the _____________________ that comes with the computer or motherboard.  This source will generally list the type of memory required,  how many modules are possible,  and how to install them on the motherboard. 

Explanation

The best source of information to check before obtaining memory is the documentation that comes with the computer or motherboard. This documentation typically includes all the necessary information about the type of memory required, the number of modules that can be installed, and instructions on how to install them on the motherboard. Therefore, referring to the documentation is crucial to ensure compatibility and proper installation of memory.

Submit
41. Beyond the remote workstation sits the __________________ network.  As its name implies,  this network is a collection of similar computers with a common connection.  This is the type of network created when several computers in an office are interconnected.

Explanation

The correct answer is peer-to-peer. In a peer-to-peer network, computers are interconnected and share resources without the need for a central server. This type of network is commonly found in small offices or homes where computers are connected directly to each other. Each computer in the network can act as both a client and a server, allowing users to share files, printers, and other resources easily.

Submit
42. The key aspects of a peer-to-peer network are that no single computer is in charge of the others, and each computer is independent of the others.

Explanation

A peer-to-peer network is a type of network where all the computers are equal and there is no central authority or hierarchy. Each computer in the network can act as both a client and a server, allowing them to share resources and communicate directly with each other. This means that no single computer has control over the others, and they can operate independently. Therefore, the statement that the key aspects of a peer-to-peer network are that no single computer is in charge of the others, and each computer is independent of the others, is true.

Submit
43. The server runs a special operating system, the __________________.  Typically this is Windows NT server, Windows 200x Server, Netware, or a server version of Linux.

Explanation

The correct answer is NOS, which stands for Network Operating System. This is a specialized operating system designed to manage and coordinate network resources and provide services to client devices. Common examples of NOS include Windows NT server, Windows 200x Server, Netware, and server versions of Linux.

Submit
44. ______________________ are widely used in large organizations where security must be managed and many users will be connected to a network.

Explanation

Client-server networks are widely used in large organizations where security must be managed and many users will be connected to a network. In a client-server network, multiple clients (computers or devices) connect to a central server, which manages and controls access to resources, data, and services. This architecture allows for centralized security measures to be implemented, such as user authentication and authorization, data encryption, and firewall protection. It also enables efficient management and distribution of resources, as the server can handle multiple requests from clients simultaneously.

Submit
45. On older Windows 9x systems, you might see login screens where you can optionally enter a _______________ and ____________ - the key being optional.  WIth Windows NT, 2000, XP, and Vista, the ________________ and _____________ are required.

Explanation

On older Windows 9x systems, the login screens may have an option to enter a username and password, but it is not mandatory. However, with Windows NT, 2000, XP, and Vista, both the username and password are required to be entered in order to log in.

Submit
46. The __________________________ process eliminates most of the device drivers on the Internet that load malware along with running a device.

Explanation

The digital signature process is a method used to verify the authenticity and integrity of digital data. In the context of the given question, the digital signature process can be used to eliminate device drivers on the Internet that may contain malware. By using digital signatures, users can ensure that the device drivers they download and install are from trusted sources and have not been tampered with. This helps to protect their devices from malware that may be loaded along with the device drivers.

Submit
47. Most commonly, you use the tools on the _____________________ to partition the drive when you first install Windows.

Explanation

When installing Windows, the tools on the Windows installation CDs are commonly used to partition the drive. These tools allow users to divide the hard drive into separate sections, known as partitions, which can be used to organize and manage data more efficiently. By using the Windows installation CDs, users can easily access these partitioning tools and set up the desired partitions during the installation process.

Submit
48. The latest technology for storing data belongs to the ______________________________.  Most of us are familiar with the CD-ROMs and DVD ROMs that we use for playing audio, video, or installing software.  The advantages of these drives are that they can store large amounts of data, are inexpensive to produce, and are unaffected by environmental influences.

Explanation

The correct answer is the "family of optical drives". Optical drives, such as CD-ROMs and DVD-ROMs, are a type of storage technology that uses lasers to read and write data on optical discs. They have the advantage of being able to store large amounts of data, being cost-effective to produce, and being resistant to environmental factors.

Submit
49. In optical diskes (CD, DVDs) the disk is made up of 3 different parts.  The _________________, the __________________, is molded from a master disk.  

Explanation

The correct answer is the bottom part, polycarbonate layer. In optical disks such as CDs and DVDs, the disk is composed of three different parts. The bottom part refers to the lower section of the disk, while the polycarbonate layer is a material that is molded from a master disk. This layer is responsible for protecting the data stored on the disk and is transparent to allow the laser beam to read the data.

Submit
50. Certain types of optical disk damage can be reversed through a process called ________________________.

Explanation

Resurfacing is a process that can reverse certain types of optical disk damage. It involves removing a thin layer from the surface of the disk, which can eliminate scratches, smudges, or other imperfections that may be causing the disk to malfunction. This process restores the disk's readability and functionality, making it usable again.

Submit
51. Unlike CRTs, LCDs have comparatively narrow viewing angles - often in the range of ________________ degrees horizontal, and ________________ degrees vertical.

Explanation

LCDs have narrower viewing angles compared to CRTs. This means that the optimal viewing experience for LCD screens is limited to a specific range of angles. The given answer suggests that LCDs typically have a horizontal viewing angle between 125-160 degrees and a vertical viewing angle between 55-70 degrees. This indicates that the screen can be viewed clearly within these specific angles, but the quality may degrade or become distorted if viewed from outside this range.

Submit
52. __________________________ is a major task and requires complete disassembly, reassembly and setup of the entire computer and all of its devices.  That's just the hardware.  You'll also need to reinstall the operating system and all your applications too. 

Explanation

Installing a new motherboard is a major task because it involves disassembling the entire computer and its devices, then reassembling and setting them up again. This includes not only the hardware components but also reinstalling the operating system and all applications. It is a complex process that requires careful handling and knowledge of computer hardware and software.

Submit
53. _______________________ is already installed in many buildings and homes, it is a required way to wire telephones in new homes.

Explanation

Unshielded twisted-pair cabling is already installed in many buildings and homes because it is a required way to wire telephones in new homes. This type of cabling consists of pairs of insulated copper wires twisted together, which helps to reduce electromagnetic interference. It is commonly used for telephone and Ethernet network connections due to its affordability and reliability.

Submit
54. ____________________________ is a huge set of standard protocols and services.  It is the result of the Department of Defense funding for networks that began in the early 1970's, in an attempt to tie together government computers.

Explanation

TCP/IP is a set of standard protocols and services that emerged from the Department of Defense's funding for networks in the 1970s. It was developed to connect government computers together, and has since become the foundation of the modern internet. TCP/IP consists of two main protocols, Transmission Control Protocol (TCP) and Internet Protocol (IP), which work together to ensure reliable and efficient communication between devices on a network.

Submit
55. A __________________________ was one reason the "ILOVEYOU" VIRUS (WORM) WAS SO DAMAGING TO MILLIONS OF wINDOWS USERS.  

Explanation

The hidden file extension was one reason the "ILOVEYOU" virus (worm) was so damaging to millions of Windows users. By disguising itself as a harmless text file, the virus tricked users into thinking it was safe to open. However, the file extension was actually .vbs (Visual Basic Script), which allowed the virus to execute its malicious code and spread rapidly throughout the system, causing significant damage to files and networks.

Submit
56. To retrieve the date stored on a CD-ROM disk, the CD-ROM player ___________________________________ - the clear (polycarbonate) side of the disk.

Explanation

To retrieve the date stored on a CD-ROM disk, the CD-ROM player shines a laser beam on the track surface from beneath the disk. This is because the data on a CD-ROM is stored in tiny pits and lands on the track surface of the disk. The laser beam reflects off these pits and lands differently, allowing the player to read the digital information encoded on the disk. Shining the laser beam from beneath the disk ensures that it interacts with the track surface and accurately reads the data stored on it.

Submit
57. What does the server typically maintain?

Explanation

The server typically maintains an e-mail system, a data backup system, special applications, and connections to a limitless number of additional resources. This means that the server is responsible for managing and storing emails, ensuring that data is regularly backed up to prevent loss, running specific applications required for the system, and providing access to various additional resources as needed.

Submit
58. _______________________ is one of the most important responsibilities of the system administrator.  ______________ and _________________ bacups are the most effective way of preventing data loss.

Explanation

Backing up vital data is one of the most important responsibilities of the system administrator. It ensures that important data is protected and can be restored in case of any unexpected events such as hardware failures, software errors, or data corruption. Performing frequent and regular backups is the most effective way of preventing data loss as it ensures that the latest version of the data is always available for restoration. This helps in minimizing the impact of any potential data loss incidents and ensures business continuity.

Submit
59. What are the 6 diagnostic questions to ask when something goes wrong with your pc?

Explanation

The 6 diagnostic questions to ask when something goes wrong with your PC are: What is the symptom exactly?, Has it ever worked before?, When did the trouble start?, What has changed?, When does the problem happen?, What have you done to correct it? These questions help to identify the specific issue, understand the history of the problem, determine possible causes or changes that may have led to the issue, and assess any attempts made to resolve it. By asking these questions, one can gather relevant information and troubleshoot effectively.

Submit
60. The goal of the hard drive is to ____________, ________________________________________________. This is accomplished by utilizing motion in two directions.

Explanation

The goal of a hard drive is to achieve fast, random access to data stored on a flat surface. This is accomplished by utilizing motion in two directions. By quickly moving the read/write head across the surface of the disk, the hard drive can access data in different locations without having to physically move the disk itself. The motion in two directions allows for efficient and quick retrieval of data, making it possible to access and retrieve information from different parts of the disk in a random order.

Submit
61. As we learned, __________________________ are composed of one or more disks or platters on which data is stored.  The physical geometry on these platters if often referred to as the _________________________ of a hard drive.  It is the _______________________ of data that determines the maximum storage capacity of the drive.

Explanation

A hard disk is composed of one or more disks or platters on which data is stored. The physical geometry on these platters is often referred to as the logical geometry of a hard drive. It is the logical arrangement of data that determines the maximum storage capacity of the drive.

Submit
62. It (_________________________________) generally uses a 40 pin, 80 conductor cable.

Explanation

The correct answer is IDE drive interface. IDE stands for Integrated Drive Electronics, which is a standard interface used for connecting storage devices such as hard drives and CD/DVD drives to a computer. It typically uses a 40 pin, 80 conductor cable for data transfer. The term "IDE Drive Interface" is essentially repeating the same information, so it is not a separate explanation.

Submit
63. When installing an IDE hard drive,   the __________________ configure the drive.  Unlike a floppy, the cable plays no role in the drive's configuration.

Explanation

When installing an IDE hard drive, the master/slave jumpers configure the drive. These jumpers determine whether the drive will be recognized as the master or slave drive in the IDE chain. The master drive is typically connected to the end of the IDE cable and is responsible for controlling the data transfer, while the slave drive is connected to the middle of the cable and follows the commands of the master drive. The cable itself does not have any role in the drive's configuration, as it simply serves as a medium for data transmission.

Submit
64. When purchasing or specifying an optical drive, 2 values need to be considered.  The first is the ______________.  The standard for the _____________________ is  _________________kBps.

Explanation

When purchasing or specifying an optical drive, the first value that needs to be considered is the transfer rate. The transfer rate refers to the speed at which data can be read from or written to the optical drive. The standard for the transfer rate is 150 kilobytes per second (kBps). This means that the optical drive can transfer data at a rate of 150 kilobytes per second.

Submit
65. _________________________ expansion cards only need to be physically installed and the computer turned on.  Windows will find the card and guide you through the set-up including driver installation.   ______________________ also does a good job of identifying and allowing changes to these settings, and helping you verify that the device is installed properly.  To see what Windows has found, go to _______________ and ____________________.  From the menu select __________________ and then _____________________, and click the ___________________ button.

Explanation

When installing expansion cards, the process is simplified by using the Plug-and-Play feature. Once the card is physically installed and the computer is turned on, Windows will automatically detect and configure the card. Windows Device Manager is a tool that helps manage and troubleshoot hardware devices on a Windows computer. To access it, you can right-click on the "My Computer" icon on the desktop, go to Properties, then navigate to the Hardware tab and click on Device Manager. This allows you to see the devices that Windows has detected and make any necessary changes or verify proper installation.

Submit
66. _____________________ consume more than half of all power used by a computer system (typically ___________ watts).  To deal with this, VESA has created specifications for ___________________ (DPMS).  These standards define the signals that a computer can send to a monitor during idle times.

Explanation

Monitors consume more than half of all power used by a computer system, typically ranging from 80 to 100 watts. To address this issue, VESA has established specifications for DisplayPower-Management Signaling (DPMS). These standards define the signals that a computer can send to a monitor during idle times, allowing for power-saving measures to be implemented and reducing energy consumption.

Submit
67. __________________________ (SVGA) is today's video standard. The standard covers every resolution and color depth up to _____________ x _____________ with ______________________ colors.  When a specification requires "standard VGA" it means _____________ x ______________ with ___________ colors.

Explanation

SVGA (Super Video Graphics Array) is today's video standard. The standard covers every resolution and color depth up to 1280 x 1024 with 16,777,216 colors. When a specification requires "standard VGA" it means 800 x 600 with 256 colors.

Submit
68. There is one problem you are likely to encounter some day, but it has nothing to do with a hardware problem.  Often an application, or even Windows itself, will have trouble with the software driver that controls the video card.  The driver could have been _________________, or a ____________________ as expected.  This can show up as _______________, _______________________, _________________________, or ___________________.  In most cases these problems can be fixed by ___________________________.  Driver updates are often available from the Manufacturer's website, as well as video BIOS updates and the instructions to install them.

Explanation

Sometimes, an application or Windows itself may have trouble with the software driver that controls the video card. This can happen if the driver becomes corrupted or if a new application doesn't work properly with the driver. The issues caused by this can include bad colors, completely unreadable displays, scrambled graphics on buttons, or any number of odd problems. In most cases, these problems can be fixed by updating the video driver to a newer version. Driver updates, as well as video BIOS updates and installation instructions, are often available from the manufacturer's website.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 26, 2011
    Quiz Created by
    Jevavee
Cancel
  • All
    All (68)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
________________ are rated by the maximum power (in watts) that they...
The _____________________ is the first Intel desktop CPU to put two...
The _______________ is the prime heat source within a PC.
_____________________________ or ____________________, is a newer type...
_____________________ are designed to be used in notebook or laptop...
The biggest technical difference between Windows and MS-DOS is the...
The objects in the COntents window are viewed in one of several...
______________________ is generally used to describe any memory that...
The _______________________ contains information that points to the...
Microsoft recommends that you only used _______________ drivers, which...
The ___________________ and _________________ are an attempt to verify...
One final approach takes a bit of work upfront but it works very...
With ___________________ drives, You connect a single drive to a port...
DVD capacity table: DVD Type = Max Capacity; Single-layer,...
The problem is how does the CPU know when a device needs attention?...
A ___________________ works having an electron gun at the long narrow...
______________ displays are known for their sharp image quality, low...
Because of the level of complexity and the millions of microscopic...
Microsoft and Intel jointly developed the ______________________ (APM)...
In some peer-to-peer networks,  a single machine is assigned to...
The next step-up is the ________________________.  This network...
___________________________ establish the rules on how computers talk...
In a ________________________, all devices are connected to a single...
In a _______________________,  all workstations and servers are...
_______________________ (NICs) link the computer to the network cable...
_________________________ consists of two insulated strands of wire...
Twisted-pair cable is limited to a maximum lenght of...
As with any technology,  the ____________________ has its...
The ______________________________________________ has specified...
Operating in the same 2.4Ghz range as the 802.11B,  the newer...
______________________ is a fast, full time connection to the...
The Intel chipset system uses the ___________ device to control the...
It is important to know that ___________________________ itself does...
A time - tested way to increase system performance is to...
Most experienced system administrators will...
______________________ is most often defined as the act of playing a...
Installing an optical drive is similar to installing a...
______________________ are used to connect devices to the motherboard...
_____________________ uses a serial data transfer method rather than...
The best source of information to check before obtaining memory is the...
Beyond the remote workstation sits the __________________ network....
The key aspects of a peer-to-peer network are that no single computer...
The server runs a special operating system, the __________________....
______________________ are widely used in large organizations where...
On older Windows 9x systems, you might see login screens where you can...
The __________________________ process eliminates most of the device...
Most commonly, you use the tools on the _____________________ to...
The latest technology for storing data belongs to the...
In optical diskes (CD, DVDs) the disk is made up of 3 different parts....
Certain types of optical disk damage can be reversed through a process...
Unlike CRTs, LCDs have comparatively narrow viewing angles - often in...
__________________________ is a major task and requires complete...
_______________________ is already installed in many buildings and...
____________________________ is a huge set of standard protocols and...
A __________________________ was one reason the "ILOVEYOU"...
To retrieve the date stored on a CD-ROM disk, the CD-ROM player...
What does the server typically maintain?
_______________________ is one of the most important responsibilities...
What are the 6 diagnostic questions to ask when something goes wrong...
The goal of the hard drive is to ____________,...
As we learned, __________________________ are composed of one or more...
It (_________________________________) generally uses a 40 pin, 80...
When installing an IDE hard drive,   the __________________...
When purchasing or specifying an optical drive, 2 values need to be...
_________________________ expansion cards only need to be physically...
_____________________ consume more than half of all power used by a...
__________________________ (SVGA) is today's video standard. The...
There is one problem you are likely to encounter some day, but it has...
Alert!

Advertisement