IT Essentials - Chapters 1-10 - Recap

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mikaela647
M
Mikaela647
Community Contributor
Quizzes Created: 8 | Total Attempts: 21,263
Questions: 75 | Attempts: 1,858

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

This test will aid as a study guide recap in preparation for the IT Essentials final exam chapters 1-10


Questions and Answers
  • 1. 

    Which type of ROM can be erased by UV light?

    • A.

      PROM

    • B.

      EEPROM

    • C.

      EPROM

    • D.

      ROM

    Correct Answer
    C. EPROM
    Explanation
    EPROM stands for Erasable Programmable Read-Only Memory. It is a type of ROM that can be erased by exposing it to ultraviolet (UV) light. EPROM chips have a transparent window on the top that allows UV light to pass through. When the EPROM needs to be erased, the chip is taken out of the circuit and exposed to UV light for a specified amount of time. This erases the data stored in the EPROM, making it ready to be reprogrammed with new data.

    Rate this question:

  • 2. 

    What socket does the CPU fit into? (1 or 3 words)

    Correct Answer
    ZIF
    zero insertion force
    Explanation
    The CPU fits into a ZIF (Zero Insertion Force) socket. This type of socket allows for easy and secure installation of the CPU without applying excessive force. The CPU can be inserted or removed from the socket without any resistance or damage.

    Rate this question:

  • 3. 

    What architecture uses a relatively small set of instructions which are designed to execute rapidly? (1 word)

    Correct Answer
    RISC
    Explanation
    RISC stands for Reduced Instruction Set Computer. It is an architecture that uses a relatively small set of instructions that are designed to execute rapidly. RISC processors typically have a simplified instruction set, which allows for faster execution of instructions. This architecture focuses on simplicity and efficiency, aiming to minimize the number of instructions needed to perform a task. By reducing the complexity of instructions, RISC processors can achieve faster processing speeds and improved performance.

    Rate this question:

  • 4. 

    Which technique enhances the CPUs performance by executing multiple peices of code simultaneously on each pipeline?

    • A.

      CPU throttling

    • B.

      Flashing the BIOS

    • C.

      Hyperthreading

    • D.

      CISC

    Correct Answer
    C. Hyperthreading
    Explanation
    Hyperthreading is a technique that enhances the CPU's performance by executing multiple pieces of code simultaneously on each pipeline. It allows the CPU to handle multiple threads or tasks at the same time, by creating virtual cores that share the resources of a physical core. This improves overall efficiency and can result in better performance, especially in situations where there are multiple threads or tasks running concurrently. CPU throttling, flashing the BIOS, and CISC are not related to the execution of multiple pieces of code simultaneously on each pipeline.

    Rate this question:

  • 5. 

    Which circuit board holds SDRAM, DDR SDRAM and DDR2 SDRAM chips?

    • A.

      SIMM

    • B.

      DIP

    • C.

      RIMM

    • D.

      DIMM

    Correct Answer
    D. DIMM
    Explanation
    DIMM stands for Dual In-line Memory Module, and it is the circuit board that holds SDRAM, DDR SDRAM, and DDR2 SDRAM chips. DIMM is a type of memory module commonly used in computers to provide additional RAM. It has a 64-bit data path and is available in different capacities. DIMM modules are inserted into the memory slots on the motherboard and provide faster data transfer rates compared to older memory modules like SIMM and DIP.

    Rate this question:

  • 6. 

    What IEE standard is Firewire and how many devices can it support?

    • A.

      1284 and 127

    • B.

      1394 and 63

    • C.

      1394 and 127

    • D.

      1284 and 63

    Correct Answer
    B. 1394 and 63
    Explanation
    Firewire is a standard for high-speed data transfer and is also known as IEEE 1394. It can support up to 63 devices, allowing for multiple devices to be connected and communicate with each other simultaneously. The other option, IEEE 1284, is a standard for parallel ports used in printers and can support up to 127 devices. However, this is not the correct answer as the question specifically asks about Firewire.

    Rate this question:

  • 7. 

    Computer components use ................. to request information from the CPU. The ............... travels along a wire on the motherboard to the CPU.  When the CPU receives a .............., it determines how to fulfill this request. (1 or 2 words)

    Correct Answer
    IRQ
    interrupt requests
    interrupt request
    IRQs
    Explanation
    Computer components use IRQ (Interrupt Request) to request information from the CPU. The interrupt request travels along a wire on the motherboard to the CPU. When the CPU receives an interrupt request, it determines how to fulfill this request.

    Rate this question:

  • 8. 

    Which type of video connector has a 24 pin or 29 pin female connector and provides compressed digital output to a monitor?

    • A.

      HDMI

    • B.

      VGA

    • C.

      AAV

    • D.

      DVI

    • E.

      RCA

    Correct Answer
    D. DVI
    Explanation
    DVI stands for Digital Visual Interface. It is a video connector that has a 24 pin or 29 pin female connector. DVI provides compressed digital output to a monitor, making it the correct answer for this question. HDMI, VGA, AAV, and RCA are all different types of video connectors, but they do not match the given description.

    Rate this question:

  • 9. 

    How many conductors does a SATA cable have?

    Correct Answer
    7
    seven
    Explanation
    A SATA cable has 7 conductors. Each conductor is responsible for carrying different types of signals such as data, power, and ground. These conductors ensure the proper functioning of the SATA cable and allow for the transfer of data between devices. Therefore, the correct answer is 7 or seven.

    Rate this question:

  • 10. 

    What type of cache memory is external cache originally mounted on the motherboard near the CPU? (1 word)

    Correct Answer
    L2
    Explanation
    The correct answer for the question is L2. L2 cache, also known as secondary cache, is a type of cache memory that is originally mounted on the motherboard near the CPU. It is faster than the main memory (RAM) and is used to store frequently accessed data and instructions, reducing the time it takes for the CPU to access them. L2 cache is larger in size compared to L1 cache and provides a higher level of cache memory hierarchy.

    Rate this question:

  • 11. 

    The operating system enables the user to interact with software and hardware.  There are two types of user interfaces; which interface interacts with menus and icons? (1 or 3 words)

    Correct Answer
    GUI
    graphical user interface
    Explanation
    The correct answer for this question is GUI, which stands for graphical user interface. The GUI allows the user to interact with software and hardware through menus and icons, providing a visual representation of the system's functions and options. It simplifies the user's experience by providing a more intuitive and user-friendly interface compared to command-line interfaces.

    Rate this question:

  • 12. 

    This partition normally uses the remaining free space on a hard drive or takes the place of primary partition. There can be only one ....................    ..........................  per hard drive, and it can be subdivided into smaller sections called logical drives. (2 words)

    Correct Answer
    Extended partition
    Explanation
    An extended partition is a type of partition that is created when there is remaining free space on a hard drive or when it takes the place of a primary partition. Unlike primary partitions, there can only be one extended partition per hard drive. However, this extended partition can be subdivided into smaller sections called logical drives. Therefore, the correct answer to the question is "extended partition".

    Rate this question:

  • 13. 

    What list provides a detailed inventory of hardware that has been tested and is known to work with the operating system?

    • A.

      Microsoft Compatibility Assistant

    • B.

      Microsoft Knowledge Base

    • C.

      Hardware Compatibility List

    • D.

      Windows XP Manual

    Correct Answer
    C. Hardware Compatibility List
    Explanation
    The Hardware Compatibility List is a comprehensive inventory of hardware that has been tested and proven to work with the operating system. It provides detailed information about the compatibility of various hardware components with the operating system, ensuring that users can choose compatible hardware for their system. The list helps users avoid compatibility issues and ensures a smooth and efficient functioning of the operating system with the hardware components.

    Rate this question:

  • 14. 

    Which registry file contains information about the hardware and software in the computer system?

    • A.

      HKEY_CURRENT_USER

    • B.

      HKEY_LOCAL_MACHINE

    • C.

      HKEY_USERS

    • D.

      HKEY_CLASSES_ROOT

    Correct Answer
    B. HKEY_LOCAL_MACHINE
    Explanation
    HKEY_LOCAL_MACHINE is the correct answer because it is a registry file that contains information about the hardware and software in the computer system. This file stores configuration settings and preferences for all users on the computer, including system-wide settings, device drivers, and software installations. It is a crucial component of the Windows operating system and is used by various applications and services to access and modify system settings.

    Rate this question:

  • 15. 

    NTFS can be converted back to FAT32 file system. (TRUE or FALSE)

    Correct Answer
    False
    No
    Explanation
    NTFS and FAT32 are two different file systems used by Windows operating systems. While it is possible to convert a FAT32 file system to NTFS, it is not possible to convert NTFS back to FAT32 without reformatting the drive. Therefore, the statement that NTFS can be converted back to FAT32 is false. The answer "False" and "No" both indicate that the statement is incorrect.

    Rate this question:

  • 16. 

    What is meant by a laptop device being hot-swappable?

    • A.

      The device can interface with a laptop wirelessly

    • B.

      The device does not needs a driver to interface the computer OS

    • C.

      The device can be connected using more than one type of port

    • D.

      The laptop does not need to be powered off to install or remove the device

    Correct Answer
    D. The laptop does not need to be powered off to install or remove the device
    Explanation
    A laptop device being hot-swappable means that it can be installed or removed from the laptop without having to power off the laptop. This allows for convenient and seamless installation or removal of the device, without interrupting the laptop's operation.

    Rate this question:

  • 17. 

    What does ACPI stand for?

    Correct Answer
    Advanced configuration and power interface
    Advanced configuration power interface
    Explanation
    ACPI stands for Advanced Configuration and Power Interface. It is a standard that defines a set of interfaces and protocols for the operating system to manage power consumption and configuration of hardware devices. It provides features such as power management, device configuration, and system control. The correct answer is "Advanced configuration and power interface" as it accurately represents the acronym and its purpose.

    Rate this question:

  • 18. 

    Which items are hot-swappable on a laptop? (pick 2)

    • A.

      Hard drive

    • B.

      USB flash drive

    • C.

      LCD screen

    • D.

      Optical drive

    • E.

      RAM

    Correct Answer(s)
    B. USB flash drive
    D. Optical drive
    Explanation
    The two items that are hot-swappable on a laptop are the USB flash drive and the optical drive. Hot-swappable means that these devices can be connected or disconnected from the laptop while it is still running, without the need to restart the system. The hard drive, LCD screen, and RAM are not hot-swappable as they require the laptop to be powered off before they can be replaced or upgraded.

    Rate this question:

  • 19. 

    The ............. .............. slot uses an open standard interface to connect to peripherals using the CardBus standard. (2 words)

    Correct Answer(s)
    PC card
    Explanation
    The PC card slot uses an open standard interface to connect to peripherals using the CardBus standard. The PC card slot is a hardware feature found in laptops and allows for the insertion of PC cards, which are credit card-sized devices that can be used to add functionality to the computer. These PC cards can include peripherals such as network adapters, sound cards, or memory expansion cards. The PC card slot uses the CardBus standard, which is an open standard interface that allows for high-speed data transfer between the PC card and the computer.

    Rate this question:

  • 20. 

    What are the pin configurations for the PC ExpressCard? (pick 2)

    • A.

      34-pin

    • B.

      36-pin

    • C.

      48-pin

    • D.

      54-pin

    • E.

      57-pin

    Correct Answer(s)
    A. 34-pin
    D. 54-pin
    Explanation
    The PC ExpressCard has two pin configurations, which are 34-pin and 54-pin. These pin configurations refer to the number of pins or connectors on the ExpressCard. The 34-pin configuration is commonly used for ExpressCards that provide USB or FireWire functionality, while the 54-pin configuration is used for ExpressCards that offer additional features such as eSATA or PCI Express.

    Rate this question:

  • 21. 

    In Windows XP, the ACPI power management mode must be enabled in BIOS to allow the OS to configure all the power management states. (TRUE or FALSE)

    Correct Answer(s)
    True
    Yes
    Explanation
    In Windows XP, the ACPI power management mode needs to be enabled in BIOS for the operating system to configure all the power management states. This means that without enabling ACPI in BIOS, the OS will not be able to fully control and manage power settings and states on the computer. Therefore, the statement is true.

    Rate this question:

  • 22. 

    What type of memory is used in laptops?

    • A.

      SIMM

    • B.

      DIMM

    • C.

      SODIMM

    • D.

      PIMM

    • E.

      RIMM

    Correct Answer
    C. SODIMM
    Explanation
    SODIMM stands for Small Outline Dual In-Line Memory Module. It is a type of memory module that is specifically designed for use in laptops and other small form factor computers. SODIMMs are smaller in size compared to regular DIMMs, making them suitable for compact devices like laptops. They are used to provide additional RAM (Random Access Memory) to the laptop, allowing it to run multiple programs and perform tasks more efficiently. Therefore, SODIMM is the correct answer for the type of memory used in laptops.

    Rate this question:

  • 23. 

    Laptops processors use CPU .................................. to modify the clock speed to reduce power consumption and heat. (1 word)

    Correct Answer
    throttling
    Explanation
    Laptop processors use CPU throttling to modify the clock speed in order to reduce power consumption and heat. Throttling is a technique that allows the processor to dynamically adjust its clock speed based on the workload. By reducing the clock speed, the processor consumes less power and generates less heat, which helps in preventing overheating and extending battery life. Throttling is a common feature in modern laptops that helps in balancing performance and energy efficiency.

    Rate this question:

  • 24. 

    Which type of cell phone standard uses the standard name GPRS (General Packet Radio Service)?

    • A.

      2G

    • B.

      2.5G

    • C.

      3G

    • D.

      3.5G

    • E.

      4G

    Correct Answer
    B. 2.5G
    Explanation
    GPRS (General Packet Radio Service) is a mobile data standard that was introduced as an enhancement to the original 2G (second generation) cell phone standard. It provided faster data transfer rates compared to traditional 2G networks, allowing for basic internet browsing and email capabilities on mobile devices. Therefore, the correct answer is 2.5G.

    Rate this question:

  • 25. 

    What would you use to clean a laptop screen?

    • A.

      Trichloroethane solvent

    • B.

      Isopropyl alcohol and water

    • C.

      Window cleaner

    • D.

      Ammonia based solvent

    Correct Answer
    B. Isopropyl alcohol and water
    Explanation
    Isopropyl alcohol and water would be the best option to clean a laptop screen. This solution is effective in removing dirt, fingerprints, and smudges without causing damage to the screen. Trichloroethane solvent is not commonly used for cleaning laptop screens and can be harmful to the screen. Window cleaner and ammonia-based solvents may contain chemicals that can damage the screen.

    Rate this question:

  • 26. 

    Documents and applications are saved to a temporary file on the hard drive, and it takes longer to power on.  What type of power management is this? (1 word)

    Correct Answer
    hibernate
    hibernation
    hibernating
    Explanation
    The correct answer is hibernate, hibernation, hibernating. This type of power management is known as hibernation. When a computer is put into hibernation mode, all the documents and applications are saved to a temporary file on the hard drive. This allows the computer to power off completely, conserving energy. When the computer is powered on again, it takes longer to start up as it needs to restore the saved state from the temporary file.

    Rate this question:

  • 27. 

    What is the easiest way to extend the life of a laptop and keep it in optimal working order?

    • A.

      Clean the laptop regularly

    • B.

      Do a clean reinstall of the OS

    • C.

      Replace parts regularly

    • D.

      Back up important information monthly

    Correct Answer
    A. Clean the laptop regularly
    Explanation
    Regularly cleaning the laptop helps to remove dust, dirt, and debris from the device, preventing them from clogging the vents and causing overheating. This, in turn, helps to maintain the optimal working order of the laptop and extends its lifespan. By keeping the laptop clean, users can ensure that the internal components are not compromised by excessive heat, which can lead to hardware failure. Additionally, cleaning the laptop regularly can also improve its performance and prevent issues such as sluggishness or freezing.

    Rate this question:

  • 28. 

    ............ is the type of display technology used in laptops. (1or 3 words)

    Correct Answer
    LCD
    liquid crystal display
    Explanation
    LCD stands for liquid crystal display, which is a type of display technology commonly used in laptops. LCD screens are made up of a layer of liquid crystals that can be manipulated to allow or block light, creating the images and colors that we see on the screen. This technology is known for its thinness, energy efficiency, and ability to produce high-quality images. Therefore, both LCD and liquid crystal display are correct answers for the type of display technology used in laptops.

    Rate this question:

  • 29. 

    A user obtains a new laptop and reports that it does not fit into the existing docking station.  What would be the most likely solution?

    • A.

      Docking stations are universal. Talk the user through how to install the laptop in the docking station

    • B.

      Arrange for a level two technician to go out and install the laptop

    • C.

      Docking stations are proprietary. Verify that the user has a compatible model

    • D.

      The docking station must be broken, arrange for a replacement

    Correct Answer
    C. Docking stations are proprietary. Verify that the user has a compatible model
    Explanation
    The correct answer is "Docking stations are proprietary. Verify that the user has a compatible model." This means that docking stations are not universal and are designed to work with specific models or brands of laptops. To solve the issue, it is important to check if the user's laptop is compatible with the docking station they are trying to use. If it is not compatible, alternative solutions such as finding a compatible docking station or using a different method for connecting the laptop to peripherals may need to be explored.

    Rate this question:

  • 30. 

    How can you toggle between a connected desktop monitor and the laptop?

    • A.

      Use the shift key

    • B.

      Use the function key

    • C.

      Go onto the internet

    • D.

      Disable the laptop screen in the control panel

    • E.

      Change the screen resolution

    Correct Answer
    B. Use the function key
    Explanation
    To toggle between a connected desktop monitor and a laptop, you can use the function key. The function key, often labeled as "Fn" on the keyboard, is designed to perform special functions when pressed in combination with other keys. On many laptops, there is a specific function key combination, such as Fn + F4 or Fn + F8, that allows you to switch between different display modes, including toggling between the laptop screen and an external monitor. By pressing the appropriate function key combination, you can easily switch the display output between the two screens.

    Rate this question:

  • 31. 

    What print technology do laser printers use?

    • A.

      Piezoelectric

    • B.

      Electrophotographic

    • C.

      Electrostatic spray

    • D.

      Impact

    Correct Answer
    B. Electrophotographic
    Explanation
    Laser printers use electrophotographic print technology. This technology involves a laser beam that scans the surface of a drum or a photosensitive belt, creating an electrostatic image. The drum or belt is then coated with toner, which is attracted to the charged areas on the surface. Finally, the toner is transferred onto the paper and fused using heat to create the printed image. This process allows for high-quality and precise printing, making electrophotographic technology ideal for laser printers.

    Rate this question:

  • 32. 

    The average length of time that a printer will work without failing is called the ................. (1 or 4 words)

    Correct Answer
    MTBF
    mean time between failure
    mean time between failures
    Explanation
    The correct answer for the given question is "MTBF" which stands for "mean time between failure". This term refers to the average length of time that a printer or any other system operates without experiencing a failure. It is a measure used to estimate the reliability and durability of a device, indicating how long it is expected to function before encountering a failure.

    Rate this question:

  • 33. 

    In the laser print process, what is the phase called when the photosensitive drum is scanned with the laser beam?

    • A.

      Fusing

    • B.

      Cleaning

    • C.

      Developing

    • D.

      Writing

    • E.

      Conditioning

    Correct Answer
    D. Writing
    Explanation
    The phase called "Writing" refers to the process in laser printing where the photosensitive drum is scanned with the laser beam. During this phase, the laser beam selectively charges the drum's surface to create an electrostatic image of the content to be printed. This image will later be developed and transferred onto the paper during subsequent stages of the printing process.

    Rate this question:

  • 34. 

    A user has contacted the helpdesk and stated that their scanner is not scanning.  They are using a SCSI connected scanner.  What would you advise the user to do?

    • A.

      Uninstall and reinstall the driver

    • B.

      Make sure the scanner is started before the computer

    • C.

      Unlock the scanner head

    • D.

      Replace the connection cables

    Correct Answer
    B. Make sure the scanner is started before the computer
    Explanation
    The correct answer advises the user to make sure the scanner is started before the computer. This is because when using a SCSI connected scanner, it is important to ensure that the scanner is powered on and ready before the computer is turned on. This allows the computer to properly detect and communicate with the scanner. Starting the scanner before the computer can help resolve any issues related to the scanner not scanning.

    Rate this question:

  • 35. 

    Some scanners can create text documents using .....................  software. (1 or 3 words)

    Correct Answer
    OCR
    optical character recognition
    Explanation
    Some scanners have the capability to convert scanned documents into editable text documents using OCR (optical character recognition) software. OCR technology recognizes the text in the scanned image and converts it into machine-readable text, allowing users to edit, search, and manipulate the text as needed. This technology is particularly useful when dealing with printed documents that need to be digitized or converted into editable formats.

    Rate this question:

  • 36. 

    A user complains that their system receives hundreds or thousands of junk e-mails daily.  What could be the problem and how would you solve it?

    • A.

      A trojan horse is on the user's system; run a virus scan

    • B.

      This may be a denial of service attack. At the e-mail server, filter out e-mail from the sender

    • C.

      Clear the user's outbox as this could be full and overloading his outlook

    • D.

      Adware has caused the problem. Close down the internet and reboot the computer

    Correct Answer
    B. This may be a denial of service attack. At the e-mail server, filter out e-mail from the sender
    Explanation
    The correct answer suggests that the user's system is experiencing a denial of service attack, which is causing the influx of junk emails. To solve the problem, the recommendation is to filter out emails from the sender at the email server. By implementing this filtering mechanism, the user will be able to block the incoming junk emails and prevent them from overwhelming their system.

    Rate this question:

  • 37. 

    ..................  is a method of gaining access to resources on devices by pretending to be a trusted computer. (1 word)

    Correct Answer
    Spoofing
    Explanation
    Spoofing is a technique used to gain unauthorized access to resources on devices by impersonating a trusted computer. This involves creating a false identity or falsifying information to deceive the target system into granting access. Spoofing can occur in various forms, such as IP spoofing, email spoofing, or website spoofing. It is often employed by attackers to trick users or systems into disclosing sensitive information or performing unintended actions.

    Rate this question:

  • 38. 

    A .................  .................... , like a worm, does not need to be attached to other software to infect a host. (2 words)

    Correct Answer
    trojan horse
    Explanation
    A trojan horse, like a worm, does not need to be attached to other software to infect a host. A trojan horse is a type of malicious software that appears to be legitimate but actually contains harmful code. It can enter a system disguised as a harmless file or program and once executed, it can perform various malicious activities without needing to attach itself to other software. This makes it similar to a worm, which is also a standalone malicious program capable of self-replication and spreading without the need for a host file.

    Rate this question:

  • 39. 

    With ........... ...................... the user can control the type of data sent to a computer by selecting which ports will be open and which will be secure. (2 words)

    Correct Answer
    port protection
    Explanation
    Port protection refers to a security measure that allows the user to have control over the type of data being sent to a computer. By selecting which ports will be open and which will be secure, the user can effectively manage the flow of data and prevent unauthorized access or potential security threats. This feature ensures that only designated ports are accessible and helps safeguard the computer from potential vulnerabilities.

    Rate this question:

  • 40. 

    A technician is attempting to secure a wireless network.  Which 2 options should be performed to secure access to the network? (pick 2)

    • A.

      Change the default administrator passwork for all access points

    • B.

      Install a security appliance to stop all wireless traffic

    • C.

      Enable the broadcasting of the SSID for only one access point

    • D.

      Use MAC filtering

    • E.

      Use the default SSID values for the access points

    Correct Answer(s)
    A. Change the default administrator passwork for all access points
    D. Use MAC filtering
    Explanation
    To secure access to the wireless network, the technician should change the default administrator password for all access points. This ensures that unauthorized individuals cannot easily gain access to the network settings and make unauthorized changes. Additionally, using MAC filtering is recommended, as it allows the network to only accept connections from devices with specific MAC addresses. This adds an extra layer of security by restricting access to only trusted devices. By implementing these two measures, the technician can enhance the security of the wireless network.

    Rate this question:

  • 41. 

    E-mail and text communications have a set of personal and business rules called ................. (1 word)

    Correct Answer(s)
    netiquette
    Explanation
    Netiquette refers to the set of personal and business rules that govern e-mail and text communications. It outlines proper behavior and guidelines for online communication, such as using appropriate language, avoiding spamming or flaming, and respecting others' privacy. Netiquette is essential for maintaining respectful and effective communication in the digital world.

    Rate this question:

  • 42. 

    Which type of customer is the only type you should politely interrupt?

    • A.

      Rude

    • B.

      Knowledgeable

    • C.

      Talkative

    • D.

      Angry

    • E.

      Inexperienced

    Correct Answer
    C. Talkative
    Explanation
    The only type of customer that should be politely interrupted is a talkative customer. This is because talkative customers tend to dominate the conversation and may not allow the customer service representative to provide the necessary assistance or gather important information. By politely interrupting, the representative can steer the conversation back on track and ensure that all necessary information is obtained to address the customer's needs effectively.

    Rate this question:

  • 43. 

    Information or data that is subject to ethical customs includes the following items?

    • A.

      E-mails

    • B.

      Records or data on the computer

    • C.

      Telephone lists

    • D.

      Hard copies of files

    • E.

      All of the above

    Correct Answer
    E. All of the above
    Explanation
    The correct answer is "All of the above". This is because all the listed items, including emails, records or data on the computer, telephone lists, and hard copies of files, can contain sensitive or personal information that is subject to ethical customs. It is important to handle and protect these items in accordance with ethical guidelines to ensure privacy and confidentiality.

    Rate this question:

  • 44. 

    A .......................... is a contract that defines expectations between an organisation and the vendor to provide an agreed upon level of support. (1 or 3 words)

    Correct Answer
    SLA
    Service level agreement
    Service level agreements
    SLAs
    Explanation
    A Service Level Agreement (SLA) is a contract that defines expectations between an organization and a vendor to provide an agreed upon level of support. It outlines the specific services to be provided, the quality standards that must be met, and the metrics that will be used to measure performance. The SLA ensures that both parties have a clear understanding of their responsibilities and helps to establish accountability for meeting the agreed upon service levels.

    Rate this question:

  • 45. 

    You can make changes to the system software or hardware configuration without the customer's permission if they are unavailable and you are able to fix the problem.  (TRUE or FALSE)

    Correct Answer
    false
    no
    Explanation
    Making changes to system software or hardware configuration without the customer's permission is not ethical or recommended. It is important to respect the customer's ownership and privacy rights. Therefore, the statement is false.

    Rate this question:

  • 46. 

    .........................  ........................... is a regular and systematic inspection, cleaning and replacement of worn parts, materials and systems by ensuring that they are in good working order. (2 words)

    Correct Answer
    preventative maintenance
    Explanation
    Preventative maintenance refers to the regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems to ensure that they are in good working order. This practice aims to prevent any potential issues or breakdowns by addressing them before they become major problems. By conducting preventative maintenance, organizations can increase the lifespan of their equipment, reduce the risk of unexpected failures, and improve overall efficiency and productivity.

    Rate this question:

  • 47. 

    Which common tasks are carried out during preventative maintenance? (pick 3)

    • A.

      Check and secure loose cables

    • B.

      Update the RAM

    • C.

      Clean the mouse and keyboard

    • D.

      Update drivers

    • E.

      Reinstall the OS

    Correct Answer(s)
    A. Check and secure loose cables
    C. Clean the mouse and keyboard
    D. Update drivers
    Explanation
    During preventative maintenance, three common tasks that are carried out include checking and securing loose cables, cleaning the mouse and keyboard, and updating drivers. Checking and securing loose cables ensures proper connectivity and prevents any potential issues caused by loose connections. Cleaning the mouse and keyboard helps to remove dirt, dust, and debris, ensuring smooth and efficient operation. Updating drivers ensures that the hardware devices on the system are running with the latest software, improving performance and compatibility.

    Rate this question:

  • 48. 

    What would you include on a software maintenance schedule? (pick 3)

    • A.

      Change BIOS configuration

    • B.

      Review software updates

    • C.

      Review security patches

    • D.

      Replace RAM

    • E.

      Defragment the hard drive

    Correct Answer(s)
    B. Review software updates
    C. Review security patches
    E. Defragment the hard drive
    Explanation
    A software maintenance schedule should include reviewing software updates to ensure that the software is up to date with the latest features and bug fixes. Reviewing security patches is also important to address any vulnerabilities and protect the system from potential threats. Additionally, defragmenting the hard drive helps to optimize the system's performance by organizing fragmented data. Therefore, including these three tasks on a software maintenance schedule is essential for keeping the software running smoothly and securely.

    Rate this question:

  • 49. 

    When system, user, or software errors occurs on a computer, the ............... .................  is updated with the information about the errors. (2 words)

    Correct Answer(s)
    event viewer
    Explanation
    When errors occur on a computer, the event viewer is updated with information about these errors. The event viewer is a built-in Windows tool that logs and displays system, user, and software events, including errors. It provides a detailed record of events that occur on the computer, allowing users and administrators to analyze and troubleshoot issues effectively.

    Rate this question:

  • 50. 

    Where would you check on your computer to see if all your devices are working correctly?     (2 words)

    Correct Answer(s)
    device manager
    in device manager
    the device manager
    Explanation
    The correct answer is "device manager". The device manager is a tool in the computer's operating system that allows users to view and manage all the hardware devices connected to their computer. It provides information about the status and functionality of each device, including any errors or issues that may be present. By checking the device manager, users can determine if all their devices are working correctly and troubleshoot any problems that may arise.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2009
    Quiz Created by
    Mikaela647
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.