1.
The size and layout of a computer case is known as?
Correct Answer
E. Form factor
Explanation
Form factor refers to the size and layout of a computer case. It determines the physical dimensions and shape of the case, as well as the placement and compatibility of internal components. Different form factors, such as ATX, microATX, and mini-ITX, have specific specifications and standards that dictate the size and layout of the case. This is important for ensuring that all the components fit properly and work together efficiently. Therefore, form factor is the correct answer for the size and layout of a computer case.
2.
A molex connector is a keyed connector which is used to connect what?
Correct Answer(s)
D. Hard drive
E. Optical Drive
Explanation
A molex connector is a keyed connector that is commonly used to connect hard drives and optical drives. These types of drives require a reliable and secure connection to the power supply, and the molex connector provides just that. It ensures that the drive receives the necessary power to function properly, making it an essential component for these types of devices.
3.
A Berg Connector is a keyed connector used to connect what ?
Correct Answer
E. Floppy Drive
Explanation
A Berg Connector is a keyed connector used to connect a Floppy Drive.
4.
A ......./....... connector is used to connect to the motherboard. It provides the motherboard with power and their are two different configurations, they are; ......... and ...........
Correct Answer(s)
C. 24 pin
E. 20 pin
Explanation
What you looking at?
5.
A four to eight pin power connector which provides power to the motherboard is known as?
Correct Answer
A. AUX
Explanation
The correct answer is AUX. A four to eight pin power connector that provides power to the motherboard is commonly known as an AUX connector. This connector is used to supply additional power to the motherboard, particularly for high-performance systems that require more power.
6.
If AT stands for Advanced Technology and LPX stands for low-profile extended, What does NLX stand for? (Motherboard Form Factors)
Correct Answer
D. New low-profile extended
Explanation
NLX stands for New low-profile extended. This can be inferred by matching the given abbreviations with their corresponding expansions. AT stands for Advanced Technology, LPX stands for low-profile extended, and NLX is the only option that fits the pattern.
7.
The central processing unit (CPU) is considered the computers brain.... The CPU's slot or socket is usually built around the PGA (Pin Grid Array) architecture. The Socket is usually ".........." .
Correct Answer
D. Zero Insertion force (ZIF)
Explanation
IT essentielllllls
8.
CISC stands for Complec Instruction Set Computer. This architecture uses ....?
Correct Answer
D. A broad set of instructions, resulting in fewer steps per operation.
Explanation
CISC stands for Complex Instruction Set Computer. This architecture uses a broad set of instructions, resulting in fewer steps per operation. Unlike RISC (Reduced Instruction Set Computer), CISC processors are designed to handle complex instructions that can perform multiple tasks in a single operation. This approach allows for more efficient execution of tasks, as fewer instructions are needed to accomplish a particular operation. However, CISC processors may sacrifice some speed for the flexibility and versatility provided by the larger instruction set.
9.
Some people sometimes try to enhance their CPU's performance with the use of ........? This particular task enables an Operating System to see a single CPU as two CPU's
Correct Answer
C. Hyperthreading
Explanation
Hyperthreading is a technique used to enhance CPU performance by allowing an operating system to see a single CPU as two CPUs. It enables simultaneous execution of multiple threads on each CPU core, improving overall system performance and efficiency. This technology is commonly used in modern processors to optimize multitasking and resource utilization.
10.
What has been your favourite lesson in this course?
Correct Answer(s)
A. El fun
B. Rad fun
C. ADTF
D. This
E. There all boll*x
11.
Information is written to this particular ROM chip after it is manufactured. It can be erased with UV light
Correct Answer
B. EPROM
Explanation
EPROM stands for Erasable Programmable Read-Only Memory. It is a type of ROM chip that can be programmed and erased multiple times using ultraviolet (UV) light. Unlike regular ROM, which is permanently programmed during manufacturing, EPROM can be reprogrammed by exposing the chip to UV light, which erases the existing data. This makes EPROM a flexible and reusable memory chip, suitable for applications where the stored information needs to be updated or changed.
12.
This particular RAM is much faster than DRAM and does not have to be refreshed so often.
Correct Answer
D. SRAM
Explanation
SRAM (Static Random Access Memory) is the correct answer because it is faster than DRAM (Dynamic Random Access Memory) and does not require frequent refreshing. Unlike DRAM, which needs to be refreshed constantly to retain data, SRAM retains data as long as power is supplied to it. SRAM is typically used in cache memory and other applications where speed and reliability are crucial.
13.
DIMM is a circuit board which hold SDRAM, DDR SDRAM and DDR2 SDRAM.. There are three different configurations what are they?
Correct Answer(s)
A. 168-pin
C. 184-pin
D. 240-pin
Explanation
The correct answer is 168-pin, 184-pin, and 240-pin. These are the three different configurations of DIMM circuit boards that can hold SDRAM, DDR SDRAM, and DDR2 SDRAM. The number of pins refers to the physical connectors on the circuit board that allow it to be inserted into the memory slot of a computer or other device. Different configurations are used for different types of memory modules, and the number of pins determines compatibility with the corresponding memory slot.
14.
In regards to Cache memory, which statment is correct?
Correct Answer
D. L1 is internal Cache and is integrated in the CPU
L2 is internal cache, integrated in to the CPU but was originally mounted on the motherboard near the CPU
L3 is used on some high end workstations and server CPU's
Explanation
The correct answer states that L1 cache is internal and integrated in the CPU, L2 cache is also internal and integrated in the CPU but was originally mounted on the motherboard near the CPU, and L3 cache is used on some high end workstations and server CPUs. This explanation accurately describes the hierarchy and placement of cache memory in a computer system.
15.
In regards to Error Checking which method is the most thorough.
Correct Answer
C. Error Correction Code (ECC)
Explanation
Error Correction Code (ECC) is the most thorough method for error checking because it not only detects errors but also corrects them. Unlike Nonparity and Parity methods that can only detect errors, ECC can identify and fix errors in data transmission. ECC achieves this by adding extra bits to the data, which allows it to reconstruct the original information even if errors occur during transmission. This makes ECC more reliable and effective in ensuring data integrity.
16.
Ach nein!
Correct Answer(s)
A. Oh no!
B. Shiver me timbers!
C. Part of the Crew, Part of the Ship!
D. What?!
E. Okay then.
Explanation
This answer consists of a series of expressions or exclamations that can be used to convey surprise, disbelief, or resignation in different situations. "Oh no!" expresses a sense of dismay or disappointment. "Shiver me timbers!" is a playful phrase often associated with pirates and is used to express astonishment or amazement. "Part of the Crew, Part of the Ship!" suggests a sense of belonging or camaraderie. "What?!" indicates confusion or disbelief. "Okay then." conveys acceptance or resignation.
17.
On average a CD can have a storage data capactity of?
Correct Answer
D. 700MB
Explanation
A CD typically has a storage data capacity of 700MB. This is the most commonly used size for CDs and is often referred to as a "standard" CD. CDs with a capacity of 1GB or more are less common and typically referred to as "oversized" or "extended" CDs. CDs with capacities of 600MB or 850MB are less common and not widely used.
18.
An FDD data cable has how many pins?
Correct Answer
B. 34
Explanation
An FDD data cable has 34 pins.
19.
Firewire is also known as what?
Correct Answer(s)
B. IEEE 1394
C. I.link
Explanation
Firewire is a high-speed data transfer technology commonly used for connecting devices such as computers, cameras, and external hard drives. It is also known by the names IEEE 1394 and i.link. IEEE 1394 is the technical name for Firewire, while i.link is the name used by Sony for the same technology. Both terms refer to the same standard for data transfer, making them correct alternatives for Firewire. The option "bakkalakkalakka" is not a valid name for Firewire and can be disregarded.
20.
The three different types of SCSI connectors are....?
Correct Answer(s)
A. DB-25 female connector
B. High-density 50 pin female connector
C. High-density 68-pin female connector
Explanation
The correct answer includes the three different types of SCSI connectors: DB-25 female connector, High-density 50 pin female connector, and High-density 68-pin female connector. These connectors are commonly used in SCSI (Small Computer System Interface) technology for connecting various devices such as hard drives, scanners, and printers to a computer system. The DB-25 female connector is a 25-pin connector commonly used in older SCSI devices. The High-density 50 pin female connector is a smaller connector used in SCSI-2 devices. The High-density 68-pin female connector is used in SCSI-3 devices and provides a higher data transfer rate.
21.
VGA (Video Fraphics Array) has how many pins?
Correct Answer
A. 15
Explanation
VGA (Video Graphics Array) has 15 pins. VGA is a standard display interface used for connecting monitors to computers. It uses a 15-pin connector to transmit video signals.
22.
A DVI (Digital Visual Interface (DVI) can have two different pin configurations, what are they?
Correct Answer(s)
B. 24
C. 29
Explanation
The correct answer is 24 and 29. A DVI (Digital Visual Interface) can have two different pin configurations, which are 24 and 29. These pin configurations refer to the number of pins present in the DVI connector. The 24-pin configuration is known as DVI-D, which supports digital signals only. The 29-pin configuration is known as DVI-I, which supports both digital and analog signals.
23.
A HDMI (High Definition Multimedia Interface has how any pin connectors
Correct Answer
E. 19
24.
S-Video has how many pins?
Correct Answer
B. 4
Explanation
S-Video has 4 pins. S-Video, also known as Separate Video or Super Video, is a video signal format that carries video information over separate channels. It uses a 4-pin mini-DIN connector to transmit the video signal. This connector has 4 pins, which are used to carry the luminance (Y) and chrominance (C) signals separately, resulting in a higher quality video signal compared to composite video.
25.
A what scrren is usually used on laptops?
Correct Answer
B. LCD
Explanation
LCD (Liquid Crystal Display) screens are usually used on laptops. LCD screens are thin, lightweight, and energy-efficient, making them ideal for portable devices like laptops. They provide high-quality visuals with vibrant colors and sharp images. LCD technology uses liquid crystals to manipulate light, resulting in a clear and bright display. This type of screen is commonly found in modern laptops due to its superior performance and sleek design.
26.
What is the maximum data speed of high speed USB 2.0?
Correct Answer
D. 480MPBS
Explanation
The correct answer is 480 Mbps. USB 2.0 has a maximum data transfer rate of 480 Mbps, which is significantly faster than the previous USB 1.1 standard. This high data speed allows for faster file transfers and better performance when using USB devices such as external hard drives or flash drives.
27.
Class B fire extinguishers are used for what?
Correct Answer
A. Flammable Liquids
Explanation
Class B fire extinguishers are used for flammable liquids. Flammable liquids include substances such as gasoline, oil, grease, and solvents that can easily catch fire and sustain combustion. Class B fire extinguishers are specifically designed to extinguish fires involving these types of flammable liquids by smothering the flames and cutting off the oxygen supply. They are not suitable for fires involving electrical equipment, ordinary combustibles, or combustible metals.
28.
This protects computer equipment from ESD damage.
Correct Answer
E. Antistatic wrist-strap
Explanation
An antistatic wrist-strap protects computer equipment from electrostatic discharge (ESD) damage. When working with sensitive electronic components, static electricity can build up on the body and transfer to the equipment, potentially causing damage. The antistatic wrist-strap is worn on the wrist and is connected to a grounding point, allowing any static electricity to be safely discharged. This prevents the buildup and transfer of static electricity, protecting the computer equipment from ESD damage.
29.
What is used to optimize disk space on a computer by enabling faster access to data.
Correct Answer
E. Defrag
Explanation
Defrag, short for defragmentation, is a process used to optimize disk space on a computer by rearranging fragmented data on the hard drive. Over time, as files are added, deleted, and modified, they can become fragmented, meaning they are stored in non-contiguous clusters on the disk. This can slow down data access times. Defragging reorganizes the fragmented files, placing them in contiguous clusters, which enables faster access to data and improves overall system performance. Therefore, defrag is the correct answer for optimizing disk space and enhancing data access speed.
30.
Which condition refers to a sudden dramatic increase in voltage, which is usually caused by lightning?
Correct Answer
C. Spike
Explanation
A spike refers to a sudden dramatic increase in voltage, often caused by lightning. This surge in voltage can be damaging to electronic devices and can lead to their malfunction or even destruction. It is important to have surge protection measures in place to prevent any damage from occurring during such voltage spikes.
31.
What is used to clean the CPU and the CPU's base?
Correct Answer
B. IPA
Explanation
IPA, or isopropyl alcohol, is commonly used to clean the CPU and its base. It is a highly effective solvent that evaporates quickly, leaving no residue behind. This makes it ideal for removing thermal compound or any other dirt and debris that may have accumulated on the CPU. Additionally, IPA is safe to use on electronic components as it does not conduct electricity and dries quickly, reducing the risk of damage to the CPU.
32.
SATA data cables have how many pins?
Correct Answer
A. 7
Explanation
SATA data cables have 7 pins.
33.
When the computer is turned on what is the first thing the computer carrys out?
Correct Answer
D. POST
Explanation
When the computer is turned on, the first thing it carries out is the Power-On Self Test (POST). This is a built-in diagnostic test that checks the hardware components of the computer to ensure they are functioning properly. The POST checks the processor, memory, hard drive, and other essential components. If any issues are detected during the POST, the computer may display error messages or fail to boot up. Therefore, the POST is a crucial step in the startup process of a computer.
34.
What does CMOS stand for?
Correct Answer
complementary metal-oxide semiconductor
complementary metal oxide semiconductor
Explanation
CMOS stands for complementary metal-oxide semiconductor. It refers to a technology used in the manufacturing of integrated circuits, particularly for microprocessors and memory chips. This technology combines both NMOS (n-type metal-oxide semiconductor) and PMOS (p-type metal-oxide semiconductor) transistors on a single chip. CMOS technology offers low power consumption, high noise immunity, and the ability to integrate both digital and analog circuitry on the same chip. The alternative answer, "complementary metal oxide semiconductor," is incorrect as it does not include the hyphen between "metal" and "oxide."
35.
Which two connector are used to connect external peripherals?
Correct Answer(s)
D. PS/2
E. USB
Explanation
PS/2 and USB are the two connectors used to connect external peripherals. PS/2 is a connector commonly used for connecting keyboards and mice to a computer. USB (Universal Serial Bus) is a widely used connector for connecting various peripherals such as printers, scanners, external hard drives, and more. Both PS/2 and USB connectors provide a means of communication between the computer and the external device, allowing data transfer and control.
36.
What are the six steps of the troubleshooting process? - In order
Correct Answer
A. Gather data from the customer
Verify the Obvious
Try Quick or less intensive solutions first
Gather Data from the customer
Evaluate the problem and implement the solution
Close with the customer
Explanation
The correct answer is the one that includes the steps in the correct order: Gather data from the customer, Verify the Obvious, Try Quick or less intensive solutions first, Evaluate the problem and implement the solution, and Close with the customer. This order follows a logical progression in troubleshooting, starting with gathering information from the customer, verifying any obvious issues, and then attempting quick and less intensive solutions before moving on to more in-depth evaluation and implementation of a solution. Finally, the process is closed by ensuring the customer is satisfied with the resolution.
37.
When Researching for possible solutions what are 3 main sources in which you should gather information from?
Correct Answer(s)
A. Online forums
C. Search engines
E. Computer manuals
Explanation
When researching for possible solutions, three main sources from which you should gather information are online forums, search engines, and computer manuals. Online forums provide a platform for individuals to discuss and share their experiences and knowledge on various topics, making it a valuable source of information. Search engines allow you to search for specific keywords or phrases, providing a wide range of resources and articles related to your topic. Computer manuals are specifically designed to provide detailed information and instructions on various computer-related topics, making them a reliable source for technical information.
38.
What site does jj not like?
Correct Answer(s)
A. Google
B. Wiki
C. Ask
D. 2donkeysspitroast
E. Pen island
39.
Which of the following are common tasks performed during preventitive maintenance
Correct Answer(s)
B. Update the RAM
C. Clean the mouse and keyboard
E. Update drivers
Explanation
During preventive maintenance, common tasks include updating the RAM, cleaning the mouse and keyboard, and updating drivers. Updating the RAM can improve the performance of the computer by increasing its memory capacity. Cleaning the mouse and keyboard ensures that they function properly and prevents dirt and debris from affecting their operation. Updating drivers is important as it ensures that the computer's hardware components are compatible with the latest software updates, enhancing system stability and performance. Reinstalling the OS is not typically considered a common task during preventive maintenance, as it is more often performed in response to system issues or upgrades. Checking and securing loose cables is also important for maintaining proper connections, but it is not explicitly mentioned in the answer options.
40.
What are the four main roles of an OS?
Correct Answer(s)
A. Manage applications
C. Provides user interface
D. Manage files and folders
E. Controls hardware access
Explanation
The four main roles of an OS are to manage applications, provide a user interface, manage files and folders, and control hardware access. Managing applications involves coordinating the execution of different programs and allocating system resources. Providing a user interface allows users to interact with the computer system and perform tasks easily. Managing files and folders includes organizing and storing data efficiently. Controlling hardware access involves managing the communication between software and hardware components, ensuring proper functioning and resource allocation.
41.
Two types of User interfaces are?
Correct Answer(s)
B. CLI
E. GUI
Explanation
CLI stands for Command Line Interface, which allows users to interact with a computer system by typing commands into a terminal or console. It is text-based and typically used by advanced users or developers. GUI stands for Graphical User Interface, which provides a visual way for users to interact with a computer system using icons, buttons, and menus. It is user-friendly and commonly used by casual computer users. Therefore, the correct answer is CLI and GUI, as these are two different types of user interfaces.
42.
Two or more users can work with programs and files and share perpheral devices at the same time. What is this a definition of?
Correct Answer
B. Multiuser
Explanation
Multiuser refers to the capability of multiple users to work with programs and files and share peripheral devices simultaneously. This allows multiple individuals to access and interact with a system or network at the same time, each with their own user account and privileges. This is commonly seen in operating systems and applications that support multiple user logins and sessions, enabling collaboration and efficient resource utilization.
43.
The four types of modes of operation are.....?
Correct Answer(s)
A. Real mode
B. Protected Mode
C. Virtual real Mode
D. Compatible Mode
Explanation
The correct answer includes the four types of modes of operation: Real mode, Protected Mode, Virtual real Mode, and Compatible Mode. These modes are used in computer systems to define the behavior of the processor and memory addressing. Real mode is the basic mode of operation where the processor can directly access the entire memory. Protected Mode provides memory protection and multitasking capabilities. Virtual real Mode allows running real mode applications within a protected mode environment. Compatible Mode enables backward compatibility with older software.
44.
Createsthe enviroment of an earlier OS for applications that are not compatible with the current OS. What is this a definition of?
Correct Answer
E. Compatibillity Mode
Explanation
Compatibility Mode is the correct answer because it refers to creating the environment of an earlier operating system for applications that are not compatible with the current operating system. This mode allows older applications to run on newer systems by emulating the behavior of the older operating system, ensuring compatibility and functionality.
45.
Name Two types of OS's
Correct Answer(s)
B. Desktop Operating Systems
E. Network Operating Systems
Explanation
The question asks for two types of operating systems, and the answer provides two options: desktop operating systems and network operating systems. This implies that these are the two types of operating systems being referred to. The other options mentioned in the question, such as Linux, Mac OS, and graphical user interface, are not types of operating systems but rather specific examples or features related to operating systems.
46.
A desktop OS has which three following characteristics?
Correct Answer(s)
A. Suppots a single user
C. Runs single User applications
D. Shares files and folders on a small network with limited security
Explanation
A desktop OS typically supports a single user, meaning that it is designed to be used by one person at a time. It also runs single user applications, which are programs that are meant to be used by one user at a time. Additionally, a desktop OS can share files and folders on a small network with limited security, meaning that it allows users on the network to access and share files, but with some restrictions on security measures.
47.
Which of the followingwould best describe the HCL (Hardware Compatibillity List)
Correct Answer
B. A website containing information of inventory known to work with an OS
Explanation
The HCL (Hardware Compatibility List) is a website that contains information about hardware that is known to work with a specific operating system (OS). It provides a list of compatible hardware components, such as processors, motherboards, graphics cards, and peripherals, that have been tested and verified to work seamlessly with the specified OS. This information is valuable for users who want to ensure that the hardware they purchase is compatible with their chosen OS, minimizing potential compatibility issues and ensuring a smooth user experience.
48.
Which is the most secure type of file system?
Correct Answer
A. NTFS
Explanation
NTFS (New Technology File System) is considered the most secure type of file system due to its advanced security features. It supports file and folder level permissions, encryption, and access control lists, providing better control over data access and protection against unauthorized access. NTFS also has built-in features for error detection and recovery, ensuring data integrity. In contrast, FAT32 (File Allocation Table) lacks these security features, making it less secure. Therefore, NTFS is the preferred choice when security is a top priority.
49.
Which file does the NTLDR lrun to get information about installed hardware?
Correct Answer
D. Nedetect.com
Explanation
The NTLDR (NT Loader) runs the nedetect.com file to obtain information about the installed hardware. This file is responsible for detecting and initializing hardware devices during the boot process. It helps the operating system identify and configure the hardware components in the computer system.
50.
Out of the five different HKEY's which are taught in IT essentials which one, is information about which file extensions map to a particular application?
Correct Answer
A. HKEY_CLASSES_ROOT
Explanation
HKEY_CLASSES_ROOT is the correct answer because it contains information about file associations and file extension mappings to specific applications. This registry key is used to determine which application should be used to open a particular file based on its extension. It also stores information about the default icon for each file type and other related settings.