1.
How many firewire devices can a single firewire port support?
A. 
B. 
C. 
D. 
2.
Which type of memory transfers data twice as fast as SDRAM and increases performance by transferring data twice as fast
3.
Which type of video connector has a 24-pin or 29-pin female connector and provides compressed digital output to monitor.
4.
How many universal serial bus (USB) devices can be connected to a USB port.
A. 
B. 
C. 
D. 
5.
What is the maxumim data speed of high-speed USB 2.0
A. 
B. 
C. 
D. 
E. 
6.
What type of power connector is connected to a CD-ROM
7.
What type of power connector is connected to an ATX motherboard ..........
8.
What helps maintain even contact and heat distribution between CPU and heat sink?
A. 
B. 
C. 
D. 
9.
When installing a CPU in a ZIF socket, how should the pins be aligned up to avoid damage.?
A. 
Pin 1 is always aligned with the corner opposite the base of the lever.
B. 
Pin 1 on the CPU is aligned with pin 1 on the ZIF socket
C. 
Pin 1 is aligned with the corner closest the memory
D. 
The removed corner of the CPU is always aligned with the corner opposite pin 1
10.
What prevents the motherboard from coming into contact with the bottom of the case? ........
11.
Which open source operating system is available on multiple hardware platforms? ........
12.
What registry file contains information about hardware and software in the computer system?
A. 
B. 
C. 
D. 
13.
How can the command line be accessed in windows xp?
A. 
B. 
C. 
D. 
Start>all programs>accessories>terminal
E. 
Start>control panel>prompt
14.
Which key or key sequence will enable a user to start windows xp in safe mode ........
15.
What is the common cause of error message 'invalid system disk'
A. 
The delete key was pressed during the system boot.
B. 
The BIOS has been changed to boot from the hard drive first.
C. 
There is a nonbootable floppy disk or CD in the drive.
D. 
There is no floppy disk CD in the drive.
16.
What should be done before upgrading from windows 2000 to windows XP
A. 
Download a legitimate XP aunthentication key
B. 
Back up all the data files
C. 
Detach all peripheral devices
D. 
Update all device drivers.
17.
What technology do dot-matrix printers use .......
18.
What type of printer melts ink and sprays it through a nozzle onto a drum to transfer an image onto paper.
19.
What peripheral is used to convert paper documents into electronic files
A. 
B. 
C. 
D. 
20.
How is the speed of a laser printer measured.
A. 
B. 
C. 
D. 
E. 
21.
What phase of the laser printing process includes applying toner to the latent image.
22.
What software presentation displays advertising on your computer
23.
What type security threat installs to computer without the user's knowledge and then monitors all computer activity.
24.
What is a form of attack that prevents users from acccessing normal services, such as e-mail or web server.
A. 
B. 
C. 
Distributed denial of service
D. 
25.
Which two options should be performed to secure access to network.
A. 
Change the default administrator password for all access point
B. 
Use the default SSID values for the access points.
C. 
Install a security appliance to stop all wireless traffic.
D. 
Enable the broadcasting of the SSID for only one access point
E.