IT Essentials Quiz Questions

35 Questions | Total Attempts: 109

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

Do you know all the facts about IT essentials? Take this quiz and prove yourself now!


Questions and Answers
  • 1. 
    How many firewire devices can a single firewire port support?
    • A. 

      12

    • B. 

      32

    • C. 

      63

    • D. 

      127

  • 2. 
    Which type of memory transfers data twice as fast as SDRAM and increases performance by transferring data twice as fast
  • 3. 
    Which type of video connector has a 24-pin or 29-pin female connector and provides compressed digital output to monitor.
  • 4. 
    How many universal serial bus (USB) devices can be connected to a USB port.
    • A. 

      256

    • B. 

      128

    • C. 

      127

    • D. 

      64

  • 5. 
    What is the maxumim data speed of high-speed USB 2.0
    • A. 

      1.5 Mbps

    • B. 

      480 Mbps

    • C. 

      840 Mbps

    • D. 

      380 Mbps

    • E. 

      12 Mbps

  • 6. 
    What type of power connector is connected to a CD-ROM
  • 7. 
    What type of power connector is connected to an ATX motherboard  ..........
  • 8. 
    What helps maintain even contact and heat distribution between CPU and heat sink?
    • A. 

      Silicon paste

    • B. 

      Thermal Compund

    • C. 

      Glue

    • D. 

      Graphite Paste

  • 9. 
    When installing a CPU in a ZIF socket, how should the pins be aligned up to avoid damage.?
    • A. 

      Pin 1 is always aligned with the corner opposite the base of the lever.

    • B. 

      Pin 1 on the CPU is aligned with pin 1 on the ZIF socket

    • C. 

      Pin 1 is aligned with the corner closest the memory

    • D. 

      The removed corner of the CPU is always aligned with the corner opposite pin 1

  • 10. 
    What prevents the motherboard from coming into contact with the bottom of the case? ........
  • 11. 
    Which open source operating system is available on multiple hardware platforms?    ........
  • 12. 
    What registry file contains information about hardware and software in the computer system?
    • A. 

      HKEY_CLASSES_ROOT

    • B. 

      HKEY_USERS

    • C. 

      HKEY_LOCAL_MACHINE

    • D. 

      HKEY_CURRENT_USER

  • 13. 
    How can the command line be accessed in windows xp?
    • A. 

      Start>run>prompt

    • B. 

      Start>run>terminal

    • C. 

      Start>run>cmd

    • D. 

      Start>all programs>accessories>terminal

    • E. 

      Start>control panel>prompt

  • 14. 
    Which key or key sequence will enable a user to start windows xp in safe mode    ........
  • 15. 
    What is the common cause of error message 'invalid system disk'
    • A. 

      The delete key was pressed during the system boot.

    • B. 

      The BIOS has been changed to boot from the hard drive first.

    • C. 

      There is a nonbootable floppy disk or CD in the drive.

    • D. 

      There is no floppy disk CD in the drive.

  • 16. 
    What should be done before upgrading from windows 2000 to windows XP
    • A. 

      Download a legitimate XP aunthentication key

    • B. 

      Back up all the data files

    • C. 

      Detach all peripheral devices

    • D. 

      Update all device drivers.

  • 17. 
    What technology do dot-matrix printers use    .......
  • 18. 
    What type of printer melts ink and sprays it through a nozzle onto a drum to transfer an image onto paper.
  • 19. 
    What peripheral is used to convert paper documents into electronic files
    • A. 

      Scanner

    • B. 

      Digital Printer

    • C. 

      Projector

    • D. 

      Printer

  • 20. 
    How is the speed of a laser printer measured.
    • A. 

      Pages per week

    • B. 

      Pixels per second

    • C. 

      Dots per minute

    • D. 

      Pages per millenium

    • E. 

      Pages per minute

  • 21. 
    What phase of the laser printing process includes applying toner to the latent image.
  • 22. 
    What software presentation displays advertising on your computer
  • 23. 
    What type security threat installs to computer without the user's knowledge and then monitors all computer activity.
  • 24. 
    What is a form of attack that prevents users from acccessing normal services, such as e-mail or web server.
    • A. 

      Trojan

    • B. 

      Ping of death

    • C. 

      Distributed denial of service

    • D. 

      Denial of service

  • 25. 
    Which two options should be performed to secure access to network.
    • A. 

      Change the default administrator password for all access point

    • B. 

      Use the default SSID values for the access points.

    • C. 

      Install a security appliance to stop all wireless traffic.

    • D. 

      Enable the broadcasting of the SSID for only one access point

    • E. 

      Use MAC filtering

Back to Top Back to top