IT Essentials - Chapters 1-10 - Recap

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mikaela647
M
Mikaela647
Community Contributor
Quizzes Created: 8 | Total Attempts: 21,406
| Attempts: 1,858
SettingsSettings
Please wait...
  • 1/75 Questions

    If the humidity level is too low, the chance of .................. increases. (1 or 2 words)

Please wait...
IT Essentials Quizzes & Trivia
About This Quiz

This test will aid as a study guide recap in preparation for the IT Essentials final exam chapters 1-10


Quiz Preview

  • 2. 

    What socket does the CPU fit into? (1 or 3 words)

    Explanation
    The CPU fits into a ZIF (Zero Insertion Force) socket. This type of socket allows for easy and secure installation of the CPU without applying excessive force. The CPU can be inserted or removed from the socket without any resistance or damage.

    Rate this question:

  • 3. 

    What architecture uses a relatively small set of instructions which are designed to execute rapidly? (1 word)

    Explanation
    RISC stands for Reduced Instruction Set Computer. It is an architecture that uses a relatively small set of instructions that are designed to execute rapidly. RISC processors typically have a simplified instruction set, which allows for faster execution of instructions. This architecture focuses on simplicity and efficiency, aiming to minimize the number of instructions needed to perform a task. By reducing the complexity of instructions, RISC processors can achieve faster processing speeds and improved performance.

    Rate this question:

  • 4. 

    Computer components use ................. to request information from the CPU. The ............... travels along a wire on the motherboard to the CPU.  When the CPU receives a .............., it determines how to fulfill this request. (1 or 2 words)

    Explanation
    Computer components use IRQ (Interrupt Request) to request information from the CPU. The interrupt request travels along a wire on the motherboard to the CPU. When the CPU receives an interrupt request, it determines how to fulfill this request.

    Rate this question:

  • 5. 

    How many conductors does a SATA cable have?

    Explanation
    A SATA cable has 7 conductors. Each conductor is responsible for carrying different types of signals such as data, power, and ground. These conductors ensure the proper functioning of the SATA cable and allow for the transfer of data between devices. Therefore, the correct answer is 7 or seven.

    Rate this question:

  • 6. 

    What type of cache memory is external cache originally mounted on the motherboard near the CPU? (1 word)

    Explanation
    The correct answer for the question is L2. L2 cache, also known as secondary cache, is a type of cache memory that is originally mounted on the motherboard near the CPU. It is faster than the main memory (RAM) and is used to store frequently accessed data and instructions, reducing the time it takes for the CPU to access them. L2 cache is larger in size compared to L1 cache and provides a higher level of cache memory hierarchy.

    Rate this question:

  • 7. 

    The operating system enables the user to interact with software and hardware.  There are two types of user interfaces; which interface interacts with menus and icons? (1 or 3 words)

    Explanation
    The correct answer for this question is GUI, which stands for graphical user interface. The GUI allows the user to interact with software and hardware through menus and icons, providing a visual representation of the system's functions and options. It simplifies the user's experience by providing a more intuitive and user-friendly interface compared to command-line interfaces.

    Rate this question:

  • 8. 

    This partition normally uses the remaining free space on a hard drive or takes the place of primary partition. There can be only one ....................    ..........................  per hard drive, and it can be subdivided into smaller sections called logical drives. (2 words)

    Explanation
    An extended partition is a type of partition that is created when there is remaining free space on a hard drive or when it takes the place of a primary partition. Unlike primary partitions, there can only be one extended partition per hard drive. However, this extended partition can be subdivided into smaller sections called logical drives. Therefore, the correct answer to the question is "extended partition".

    Rate this question:

  • 9. 

    NTFS can be converted back to FAT32 file system. (TRUE or FALSE)

    Explanation
    NTFS and FAT32 are two different file systems used by Windows operating systems. While it is possible to convert a FAT32 file system to NTFS, it is not possible to convert NTFS back to FAT32 without reformatting the drive. Therefore, the statement that NTFS can be converted back to FAT32 is false. The answer "False" and "No" both indicate that the statement is incorrect.

    Rate this question:

  • 10. 

    What does ACPI stand for?

    Explanation
    ACPI stands for Advanced Configuration and Power Interface. It is a standard that defines a set of interfaces and protocols for the operating system to manage power consumption and configuration of hardware devices. It provides features such as power management, device configuration, and system control. The correct answer is "Advanced configuration and power interface" as it accurately represents the acronym and its purpose.

    Rate this question:

  • 11. 

    The ............. .............. slot uses an open standard interface to connect to peripherals using the CardBus standard. (2 words)

    Explanation
    The PC card slot uses an open standard interface to connect to peripherals using the CardBus standard. The PC card slot is a hardware feature found in laptops and allows for the insertion of PC cards, which are credit card-sized devices that can be used to add functionality to the computer. These PC cards can include peripherals such as network adapters, sound cards, or memory expansion cards. The PC card slot uses the CardBus standard, which is an open standard interface that allows for high-speed data transfer between the PC card and the computer.

    Rate this question:

  • 12. 

    In Windows XP, the ACPI power management mode must be enabled in BIOS to allow the OS to configure all the power management states. (TRUE or FALSE)

    Explanation
    In Windows XP, the ACPI power management mode needs to be enabled in BIOS for the operating system to configure all the power management states. This means that without enabling ACPI in BIOS, the OS will not be able to fully control and manage power settings and states on the computer. Therefore, the statement is true.

    Rate this question:

  • 13. 

    Laptops processors use CPU .................................. to modify the clock speed to reduce power consumption and heat. (1 word)

    Explanation
    Laptop processors use CPU throttling to modify the clock speed in order to reduce power consumption and heat. Throttling is a technique that allows the processor to dynamically adjust its clock speed based on the workload. By reducing the clock speed, the processor consumes less power and generates less heat, which helps in preventing overheating and extending battery life. Throttling is a common feature in modern laptops that helps in balancing performance and energy efficiency.

    Rate this question:

  • 14. 

    Documents and applications are saved to a temporary file on the hard drive, and it takes longer to power on.  What type of power management is this? (1 word)

    Explanation
    The correct answer is hibernate, hibernation, hibernating. This type of power management is known as hibernation. When a computer is put into hibernation mode, all the documents and applications are saved to a temporary file on the hard drive. This allows the computer to power off completely, conserving energy. When the computer is powered on again, it takes longer to start up as it needs to restore the saved state from the temporary file.

    Rate this question:

  • 15. 

    ............ is the type of display technology used in laptops. (1or 3 words)

    Explanation
    LCD stands for liquid crystal display, which is a type of display technology commonly used in laptops. LCD screens are made up of a layer of liquid crystals that can be manipulated to allow or block light, creating the images and colors that we see on the screen. This technology is known for its thinness, energy efficiency, and ability to produce high-quality images. Therefore, both LCD and liquid crystal display are correct answers for the type of display technology used in laptops.

    Rate this question:

  • 16. 

    The average length of time that a printer will work without failing is called the ................. (1 or 4 words)

    Explanation
    The correct answer for the given question is "MTBF" which stands for "mean time between failure". This term refers to the average length of time that a printer or any other system operates without experiencing a failure. It is a measure used to estimate the reliability and durability of a device, indicating how long it is expected to function before encountering a failure.

    Rate this question:

  • 17. 

    Some scanners can create text documents using .....................  software. (1 or 3 words)

    Explanation
    Some scanners have the capability to convert scanned documents into editable text documents using OCR (optical character recognition) software. OCR technology recognizes the text in the scanned image and converts it into machine-readable text, allowing users to edit, search, and manipulate the text as needed. This technology is particularly useful when dealing with printed documents that need to be digitized or converted into editable formats.

    Rate this question:

  • 18. 

    ..................  is a method of gaining access to resources on devices by pretending to be a trusted computer. (1 word)

    Explanation
    Spoofing is a technique used to gain unauthorized access to resources on devices by impersonating a trusted computer. This involves creating a false identity or falsifying information to deceive the target system into granting access. Spoofing can occur in various forms, such as IP spoofing, email spoofing, or website spoofing. It is often employed by attackers to trick users or systems into disclosing sensitive information or performing unintended actions.

    Rate this question:

  • 19. 

    A .................  .................... , like a worm, does not need to be attached to other software to infect a host. (2 words)

    Explanation
    A trojan horse, like a worm, does not need to be attached to other software to infect a host. A trojan horse is a type of malicious software that appears to be legitimate but actually contains harmful code. It can enter a system disguised as a harmless file or program and once executed, it can perform various malicious activities without needing to attach itself to other software. This makes it similar to a worm, which is also a standalone malicious program capable of self-replication and spreading without the need for a host file.

    Rate this question:

  • 20. 

    With ........... ...................... the user can control the type of data sent to a computer by selecting which ports will be open and which will be secure. (2 words)

    Explanation
    Port protection refers to a security measure that allows the user to have control over the type of data being sent to a computer. By selecting which ports will be open and which will be secure, the user can effectively manage the flow of data and prevent unauthorized access or potential security threats. This feature ensures that only designated ports are accessible and helps safeguard the computer from potential vulnerabilities.

    Rate this question:

  • 21. 

    E-mail and text communications have a set of personal and business rules called ................. (1 word)

    Explanation
    Netiquette refers to the set of personal and business rules that govern e-mail and text communications. It outlines proper behavior and guidelines for online communication, such as using appropriate language, avoiding spamming or flaming, and respecting others' privacy. Netiquette is essential for maintaining respectful and effective communication in the digital world.

    Rate this question:

  • 22. 

    A .......................... is a contract that defines expectations between an organisation and the vendor to provide an agreed upon level of support. (1 or 3 words)

    Explanation
    A Service Level Agreement (SLA) is a contract that defines expectations between an organization and a vendor to provide an agreed upon level of support. It outlines the specific services to be provided, the quality standards that must be met, and the metrics that will be used to measure performance. The SLA ensures that both parties have a clear understanding of their responsibilities and helps to establish accountability for meeting the agreed upon service levels.

    Rate this question:

  • 23. 

    You can make changes to the system software or hardware configuration without the customer's permission if they are unavailable and you are able to fix the problem.  (TRUE or FALSE)

    Explanation
    Making changes to system software or hardware configuration without the customer's permission is not ethical or recommended. It is important to respect the customer's ownership and privacy rights. Therefore, the statement is false.

    Rate this question:

  • 24. 

    .........................  ........................... is a regular and systematic inspection, cleaning and replacement of worn parts, materials and systems by ensuring that they are in good working order. (2 words)

    Explanation
    Preventative maintenance refers to the regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems to ensure that they are in good working order. This practice aims to prevent any potential issues or breakdowns by addressing them before they become major problems. By conducting preventative maintenance, organizations can increase the lifespan of their equipment, reduce the risk of unexpected failures, and improve overall efficiency and productivity.

    Rate this question:

  • 25. 

    When system, user, or software errors occurs on a computer, the ............... .................  is updated with the information about the errors. (2 words)

    Explanation
    When errors occur on a computer, the event viewer is updated with information about these errors. The event viewer is a built-in Windows tool that logs and displays system, user, and software events, including errors. It provides a detailed record of events that occur on the computer, allowing users and administrators to analyze and troubleshoot issues effectively.

    Rate this question:

  • 26. 

    Where would you check on your computer to see if all your devices are working correctly?     (2 words)

    Explanation
    The correct answer is "device manager". The device manager is a tool in the computer's operating system that allows users to view and manage all the hardware devices connected to their computer. It provides information about the status and functionality of each device, including any errors or issues that may be present. By checking the device manager, users can determine if all their devices are working correctly and troubleshoot any problems that may arise.

    Rate this question:

  • 27. 

    You would wear an antistatic wrist strap when replacing power supplies or monitors. (TRUE or FALSE

    Explanation
    Wearing an antistatic wrist strap is not necessary when replacing power supplies or monitors. Antistatic wrist straps are typically used when working with sensitive electronic components to prevent the buildup and discharge of static electricity, which can potentially damage the components. However, when replacing power supplies or monitors, there is usually no need to handle sensitive electronic components directly, making the use of an antistatic wrist strap unnecessary.

    Rate this question:

  • 28. 

    A vacuum cleaner ia ideal for cleaning the inside of a computer case or a laptop keyboard. (TRUE or FALSE)

    Explanation
    A vacuum cleaner is not ideal for cleaning the inside of a computer case or a laptop keyboard. The strong suction of a vacuum cleaner can cause static electricity, which can damage the delicate electronic components of a computer. It is recommended to use compressed air or specialized computer cleaning tools to clean the inside of a computer case or a laptop keyboard.

    Rate this question:

  • 29. 

    This type of cable has either 40 or 80 conductors. (1 or 4 words)

    Explanation
    PATA, which stands for parallel advanced technologies attachment, is a type of cable that has either 40 or 80 conductors.

    Rate this question:

  • 30. 

    ................... ................... are installed to add functionality on a computer. (2 words)

    Explanation
    Adapter cards are installed to add functionality on a computer. These cards are hardware components that can be inserted into slots on the motherboard of a computer. They are designed to provide additional features or capabilities that are not built-in to the computer's original configuration. By adding adapter cards, users can expand the capabilities of their computer system, such as adding a graphics card for enhanced visual performance, a network card for connecting to a local area network, or a sound card for improved audio output.

    Rate this question:

  • 31. 

    Whereas a switch connect segments of a network, ................. are devices that connect entire networks to each other. (1 word)

    Explanation
    Routers are devices that connect entire networks to each other. They are used to direct network traffic between different networks and determine the most efficient path for data to travel. Routers use routing tables to make decisions about where to send data packets, ensuring that they reach their intended destination. By connecting multiple networks together, routers enable communication and data transfer between these networks, allowing for the seamless exchange of information across different parts of a network.

    Rate this question:

  • 32. 

    .................. is a method to carry telephone calls over the data networks and internet. (1 or 3 words)

    Explanation
    VoIP, or voice over IP, is a method that enables telephone calls to be transmitted over data networks and the internet. This technology converts analog voice signals into digital data packets, which are then transmitted over IP networks. By using VoIP, traditional telephone calls can be made using the internet, allowing for cost savings and increased flexibility in communication.

    Rate this question:

  • 33. 

    The most commonly used DSL technology is ..................... (1 or 4 words)

    Explanation
    ADSL, which stands for Asymmetric Digital Subscriber Line, is the most commonly used DSL technology. It allows for high-speed internet access over traditional copper telephone lines. The term "asymmetric" refers to the fact that the download speed is typically faster than the upload speed in ADSL. This technology is widely used in residential and small business settings due to its cost-effectiveness and availability.

    Rate this question:

  • 34. 

    10BASE-T is not susceptible to EMI.  (TRUE or FALSE)

    Explanation
    The statement "10BASE-T is not susceptible to EMI" is false. 10BASE-T is a type of Ethernet networking technology that uses twisted pair cables, which are susceptible to electromagnetic interference (EMI). EMI can cause signal degradation and disrupt the communication on the network. Therefore, 10BASE-T is indeed susceptible to EMI.

    Rate this question:

  • 35. 

    This is a type of Token Ring network that combines high speed performance with the advantages of the token-passing ring topology. (1 or 4 words)

    Explanation
    FDDI (Fiber Distributed Data Interface)

    Rate this question:

  • 36. 

    What is meant by a laptop device being hot-swappable?

    • The device can interface with a laptop wirelessly

    • The device does not needs a driver to interface the computer OS

    • The device can be connected using more than one type of port

    • The laptop does not need to be powered off to install or remove the device

    Correct Answer
    A. The laptop does not need to be powered off to install or remove the device
    Explanation
    A laptop device being hot-swappable means that it can be installed or removed from the laptop without having to power off the laptop. This allows for convenient and seamless installation or removal of the device, without interrupting the laptop's operation.

    Rate this question:

  • 37. 

    What is the easiest way to extend the life of a laptop and keep it in optimal working order?

    • Clean the laptop regularly

    • Do a clean reinstall of the OS

    • Replace parts regularly

    • Back up important information monthly

    Correct Answer
    A. Clean the laptop regularly
    Explanation
    Regularly cleaning the laptop helps to remove dust, dirt, and debris from the device, preventing them from clogging the vents and causing overheating. This, in turn, helps to maintain the optimal working order of the laptop and extends its lifespan. By keeping the laptop clean, users can ensure that the internal components are not compromised by excessive heat, which can lead to hardware failure. Additionally, cleaning the laptop regularly can also improve its performance and prevent issues such as sluggishness or freezing.

    Rate this question:

  • 38. 

    What list provides a detailed inventory of hardware that has been tested and is known to work with the operating system?

    • Microsoft Compatibility Assistant

    • Microsoft Knowledge Base

    • Hardware Compatibility List

    • Windows XP Manual

    Correct Answer
    A. Hardware Compatibility List
    Explanation
    The Hardware Compatibility List is a comprehensive inventory of hardware that has been tested and proven to work with the operating system. It provides detailed information about the compatibility of various hardware components with the operating system, ensuring that users can choose compatible hardware for their system. The list helps users avoid compatibility issues and ensures a smooth and efficient functioning of the operating system with the hardware components.

    Rate this question:

  • 39. 

    How can you toggle between a connected desktop monitor and the laptop?

    • Use the shift key

    • Use the function key

    • Go onto the internet

    • Disable the laptop screen in the control panel

    • Change the screen resolution

    Correct Answer
    A. Use the function key
    Explanation
    To toggle between a connected desktop monitor and a laptop, you can use the function key. The function key, often labeled as "Fn" on the keyboard, is designed to perform special functions when pressed in combination with other keys. On many laptops, there is a specific function key combination, such as Fn + F4 or Fn + F8, that allows you to switch between different display modes, including toggling between the laptop screen and an external monitor. By pressing the appropriate function key combination, you can easily switch the display output between the two screens.

    Rate this question:

  • 40. 

    Which registry file contains information about the hardware and software in the computer system?

    • HKEY_CURRENT_USER

    • HKEY_LOCAL_MACHINE

    • HKEY_USERS

    • HKEY_CLASSES_ROOT

    Correct Answer
    A. HKEY_LOCAL_MACHINE
    Explanation
    HKEY_LOCAL_MACHINE is the correct answer because it is a registry file that contains information about the hardware and software in the computer system. This file stores configuration settings and preferences for all users on the computer, including system-wide settings, device drivers, and software installations. It is a crucial component of the Windows operating system and is used by various applications and services to access and modify system settings.

    Rate this question:

  • 41. 

    What type of memory is used in laptops?

    • SIMM

    • DIMM

    • SODIMM

    • PIMM

    • RIMM

    Correct Answer
    A. SODIMM
    Explanation
    SODIMM stands for Small Outline Dual In-Line Memory Module. It is a type of memory module that is specifically designed for use in laptops and other small form factor computers. SODIMMs are smaller in size compared to regular DIMMs, making them suitable for compact devices like laptops. They are used to provide additional RAM (Random Access Memory) to the laptop, allowing it to run multiple programs and perform tasks more efficiently. Therefore, SODIMM is the correct answer for the type of memory used in laptops.

    Rate this question:

  • 42. 

    What would you use to clean a laptop screen?

    • Trichloroethane solvent

    • Isopropyl alcohol and water

    • Window cleaner

    • Ammonia based solvent

    Correct Answer
    A. Isopropyl alcohol and water
    Explanation
    Isopropyl alcohol and water would be the best option to clean a laptop screen. This solution is effective in removing dirt, fingerprints, and smudges without causing damage to the screen. Trichloroethane solvent is not commonly used for cleaning laptop screens and can be harmful to the screen. Window cleaner and ammonia-based solvents may contain chemicals that can damage the screen.

    Rate this question:

  • 43. 

    A user obtains a new laptop and reports that it does not fit into the existing docking station.  What would be the most likely solution?

    • Docking stations are universal. Talk the user through how to install the laptop in the docking station

    • Arrange for a level two technician to go out and install the laptop

    • Docking stations are proprietary. Verify that the user has a compatible model

    • The docking station must be broken, arrange for a replacement

    Correct Answer
    A. Docking stations are proprietary. Verify that the user has a compatible model
    Explanation
    The correct answer is "Docking stations are proprietary. Verify that the user has a compatible model." This means that docking stations are not universal and are designed to work with specific models or brands of laptops. To solve the issue, it is important to check if the user's laptop is compatible with the docking station they are trying to use. If it is not compatible, alternative solutions such as finding a compatible docking station or using a different method for connecting the laptop to peripherals may need to be explored.

    Rate this question:

  • 44. 

    Information or data that is subject to ethical customs includes the following items?

    • E-mails

    • Records or data on the computer

    • Telephone lists

    • Hard copies of files

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    The correct answer is "All of the above". This is because all the listed items, including emails, records or data on the computer, telephone lists, and hard copies of files, can contain sensitive or personal information that is subject to ethical customs. It is important to handle and protect these items in accordance with ethical guidelines to ensure privacy and confidentiality.

    Rate this question:

  • 45. 

    What would you include on a software maintenance schedule? (pick 3)

    • Change BIOS configuration

    • Review software updates

    • Review security patches

    • Replace RAM

    • Defragment the hard drive

    Correct Answer(s)
    A. Review software updates
    A. Review security patches
    A. Defragment the hard drive
    Explanation
    A software maintenance schedule should include reviewing software updates to ensure that the software is up to date with the latest features and bug fixes. Reviewing security patches is also important to address any vulnerabilities and protect the system from potential threats. Additionally, defragmenting the hard drive helps to optimize the system's performance by organizing fragmented data. Therefore, including these three tasks on a software maintenance schedule is essential for keeping the software running smoothly and securely.

    Rate this question:

  • 46. 

    Which type of customer is the only type you should politely interrupt?

    • Rude

    • Knowledgeable

    • Talkative

    • Angry

    • Inexperienced

    Correct Answer
    A. Talkative
    Explanation
    The only type of customer that should be politely interrupted is a talkative customer. This is because talkative customers tend to dominate the conversation and may not allow the customer service representative to provide the necessary assistance or gather important information. By politely interrupting, the representative can steer the conversation back on track and ensure that all necessary information is obtained to address the customer's needs effectively.

    Rate this question:

  • 47. 

    To optimise the space on a hard drive to allow faster access to programs and data you would use ..................

    • Fdisk

    • Scandisk

    • Disk Management

    • Defrag

    • Disk cleanup

    Correct Answer
    A. Defrag
    Explanation
    To optimize the space on a hard drive and allow faster access to programs and data, the correct option is "Defrag." Defragmentation is a process that rearranges fragmented data on the hard drive, making it contiguous and reducing the time it takes for the computer to access files. This helps improve overall system performance and speeds up program execution by minimizing the time it takes for the hard drive to locate and retrieve data.

    Rate this question:

  • 48. 

    Wireless NICs can be installed on a computer system by .............

    • PCI expansion slots on the motherboard

    • PCIe expansion slots on the motherboard

    • Externally with a USB connector

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    Wireless NICs can be installed on a computer system using different methods. They can be installed through PCI expansion slots on the motherboard, which provide a direct connection to the system. They can also be installed through PCIe expansion slots on the motherboard, which offer faster data transfer rates. Additionally, wireless NICs can be installed externally using a USB connector, allowing for easy installation and removal. Therefore, the correct answer is "All of the above" as all three methods can be used to install wireless NICs on a computer system.

    Rate this question:

  • 49. 

    Which technique enhances the CPUs performance by executing multiple peices of code simultaneously on each pipeline?

    • CPU throttling

    • Flashing the BIOS

    • Hyperthreading

    • CISC

    Correct Answer
    A. Hyperthreading
    Explanation
    Hyperthreading is a technique that enhances the CPU's performance by executing multiple pieces of code simultaneously on each pipeline. It allows the CPU to handle multiple threads or tasks at the same time, by creating virtual cores that share the resources of a physical core. This improves overall efficiency and can result in better performance, especially in situations where there are multiple threads or tasks running concurrently. CPU throttling, flashing the BIOS, and CISC are not related to the execution of multiple pieces of code simultaneously on each pipeline.

    Rate this question:

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2009
    Quiz Created by
    Mikaela647
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.