IT Essentials 1-10 Consolidation Quiz!

18 Questions | Total Attempts: 230

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

IT Essentials 1-10 Consolidation Quiz!


Questions and Answers
  • 1. 
    Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
  • 2. 
    Which type of computer resources are direct lines to the processor used by computer components to request information from the CPU?
  • 3. 
    Which type of memory is unable to have the contents modified?
  • 4. 
    Which tool should be used if a user needs to optimize space on a hard drive?
  • 5. 
    What is recommended to remove dust from inside a computer case?
  • 6. 
    Which solution should be used to clean a CPU and a heat sink?
  • 7. 
    Which type of drive is installed in a 5.25-inch bay?
  • 8. 
    A technician needs to upgrade the operating system on a computer from Windows 2000 Professional to Windows XP Professional. When the technician inserts the XP disc in the computer, the setup wizard fails to start. Which command can be used to start the upgrade?
  • 9. 
    Which set of related files store all the settings of a Windows XP installation?
  • 10. 
    Which display technology is most commonly found in modern laptop computers?
  • 11. 
    Which name is given to the collection of settings that control the power settings of a laptop?
  • 12. 
    Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
  • 13. 
    Which step of the laser printing process involves scanning the photosensitive drum with a laser?
  • 14. 
    A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
  • 15. 
    How many devices can you put in to a firewire port?
  • 16. 
    Which unit is commonly used to measure the print quality of an inkjet printer?
  • 17. 
    Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activities?
  • 18. 
    Which type of security threat uses e-mail that appears to be from a legitimate sender and asks the e-mail recipient to visit a web site to enter confidential information?
Back to Top Back to top