IT Essentials - Chapters 1-10 - Recap

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mikaela647
M
Mikaela647
Community Contributor
Quizzes Created: 8 | Total Attempts: 21,411
| Attempts: 1,858 | Questions: 75
Please wait...
Question 1 / 75
0 %
0/100
Score 0/100
1. NTFS can be converted back to FAT32 file system. (TRUE or FALSE)

Explanation

NTFS and FAT32 are two different file systems used by Windows operating systems. While it is possible to convert a FAT32 file system to NTFS, it is not possible to convert NTFS back to FAT32 without reformatting the drive. Therefore, the statement that NTFS can be converted back to FAT32 is false. The answer "False" and "No" both indicate that the statement is incorrect.

Submit
Please wait...
About This Quiz
IT Essentials Quizzes & Trivia

This test will aid as a study guide recap in preparation for the IT Essentials final exam chapters 1-10

2. What does ACPI stand for?

Explanation

ACPI stands for Advanced Configuration and Power Interface. It is a standard that defines a set of interfaces and protocols for the operating system to manage power consumption and configuration of hardware devices. It provides features such as power management, device configuration, and system control. The correct answer is "Advanced configuration and power interface" as it accurately represents the acronym and its purpose.

Submit
3. The ............. .............. slot uses an open standard interface to connect to peripherals using the CardBus standard. (2 words)

Explanation

The PC card slot uses an open standard interface to connect to peripherals using the CardBus standard. The PC card slot is a hardware feature found in laptops and allows for the insertion of PC cards, which are credit card-sized devices that can be used to add functionality to the computer. These PC cards can include peripherals such as network adapters, sound cards, or memory expansion cards. The PC card slot uses the CardBus standard, which is an open standard interface that allows for high-speed data transfer between the PC card and the computer.

Submit
4. In Windows XP, the ACPI power management mode must be enabled in BIOS to allow the OS to configure all the power management states. (TRUE or FALSE)

Explanation

In Windows XP, the ACPI power management mode needs to be enabled in BIOS for the operating system to configure all the power management states. This means that without enabling ACPI in BIOS, the OS will not be able to fully control and manage power settings and states on the computer. Therefore, the statement is true.

Submit
5. Laptops processors use CPU .................................. to modify the clock speed to reduce power consumption and heat. (1 word)

Explanation

Laptop processors use CPU throttling to modify the clock speed in order to reduce power consumption and heat. Throttling is a technique that allows the processor to dynamically adjust its clock speed based on the workload. By reducing the clock speed, the processor consumes less power and generates less heat, which helps in preventing overheating and extending battery life. Throttling is a common feature in modern laptops that helps in balancing performance and energy efficiency.

Submit
6. Documents and applications are saved to a temporary file on the hard drive, and it takes longer to power on.  What type of power management is this? (1 word)

Explanation

The correct answer is hibernate, hibernation, hibernating. This type of power management is known as hibernation. When a computer is put into hibernation mode, all the documents and applications are saved to a temporary file on the hard drive. This allows the computer to power off completely, conserving energy. When the computer is powered on again, it takes longer to start up as it needs to restore the saved state from the temporary file.

Submit
7. ............ is the type of display technology used in laptops. (1or 3 words)

Explanation

LCD stands for liquid crystal display, which is a type of display technology commonly used in laptops. LCD screens are made up of a layer of liquid crystals that can be manipulated to allow or block light, creating the images and colors that we see on the screen. This technology is known for its thinness, energy efficiency, and ability to produce high-quality images. Therefore, both LCD and liquid crystal display are correct answers for the type of display technology used in laptops.

Submit
8. The average length of time that a printer will work without failing is called the ................. (1 or 4 words)

Explanation

The correct answer for the given question is "MTBF" which stands for "mean time between failure". This term refers to the average length of time that a printer or any other system operates without experiencing a failure. It is a measure used to estimate the reliability and durability of a device, indicating how long it is expected to function before encountering a failure.

Submit
9. Some scanners can create text documents using .....................  software. (1 or 3 words)

Explanation

Some scanners have the capability to convert scanned documents into editable text documents using OCR (optical character recognition) software. OCR technology recognizes the text in the scanned image and converts it into machine-readable text, allowing users to edit, search, and manipulate the text as needed. This technology is particularly useful when dealing with printed documents that need to be digitized or converted into editable formats.

Submit
10. ..................  is a method of gaining access to resources on devices by pretending to be a trusted computer. (1 word)

Explanation

Spoofing is a technique used to gain unauthorized access to resources on devices by impersonating a trusted computer. This involves creating a false identity or falsifying information to deceive the target system into granting access. Spoofing can occur in various forms, such as IP spoofing, email spoofing, or website spoofing. It is often employed by attackers to trick users or systems into disclosing sensitive information or performing unintended actions.

Submit
11. A .................  .................... , like a worm, does not need to be attached to other software to infect a host. (2 words)

Explanation

A trojan horse, like a worm, does not need to be attached to other software to infect a host. A trojan horse is a type of malicious software that appears to be legitimate but actually contains harmful code. It can enter a system disguised as a harmless file or program and once executed, it can perform various malicious activities without needing to attach itself to other software. This makes it similar to a worm, which is also a standalone malicious program capable of self-replication and spreading without the need for a host file.

Submit
12. With ........... ...................... the user can control the type of data sent to a computer by selecting which ports will be open and which will be secure. (2 words)

Explanation

Port protection refers to a security measure that allows the user to have control over the type of data being sent to a computer. By selecting which ports will be open and which will be secure, the user can effectively manage the flow of data and prevent unauthorized access or potential security threats. This feature ensures that only designated ports are accessible and helps safeguard the computer from potential vulnerabilities.

Submit
13. E-mail and text communications have a set of personal and business rules called ................. (1 word)

Explanation

Netiquette refers to the set of personal and business rules that govern e-mail and text communications. It outlines proper behavior and guidelines for online communication, such as using appropriate language, avoiding spamming or flaming, and respecting others' privacy. Netiquette is essential for maintaining respectful and effective communication in the digital world.

Submit
14. A .......................... is a contract that defines expectations between an organisation and the vendor to provide an agreed upon level of support. (1 or 3 words)

Explanation

A Service Level Agreement (SLA) is a contract that defines expectations between an organization and a vendor to provide an agreed upon level of support. It outlines the specific services to be provided, the quality standards that must be met, and the metrics that will be used to measure performance. The SLA ensures that both parties have a clear understanding of their responsibilities and helps to establish accountability for meeting the agreed upon service levels.

Submit
15. You can make changes to the system software or hardware configuration without the customer's permission if they are unavailable and you are able to fix the problem.  (TRUE or FALSE)

Explanation

Making changes to system software or hardware configuration without the customer's permission is not ethical or recommended. It is important to respect the customer's ownership and privacy rights. Therefore, the statement is false.

Submit
16. .........................  ........................... is a regular and systematic inspection, cleaning and replacement of worn parts, materials and systems by ensuring that they are in good working order. (2 words)

Explanation

Preventative maintenance refers to the regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems to ensure that they are in good working order. This practice aims to prevent any potential issues or breakdowns by addressing them before they become major problems. By conducting preventative maintenance, organizations can increase the lifespan of their equipment, reduce the risk of unexpected failures, and improve overall efficiency and productivity.

Submit
17. When system, user, or software errors occurs on a computer, the ............... .................  is updated with the information about the errors. (2 words)

Explanation

When errors occur on a computer, the event viewer is updated with information about these errors. The event viewer is a built-in Windows tool that logs and displays system, user, and software events, including errors. It provides a detailed record of events that occur on the computer, allowing users and administrators to analyze and troubleshoot issues effectively.

Submit
18. Where would you check on your computer to see if all your devices are working correctly?     (2 words)

Explanation

The correct answer is "device manager". The device manager is a tool in the computer's operating system that allows users to view and manage all the hardware devices connected to their computer. It provides information about the status and functionality of each device, including any errors or issues that may be present. By checking the device manager, users can determine if all their devices are working correctly and troubleshoot any problems that may arise.

Submit
19. You would wear an antistatic wrist strap when replacing power supplies or monitors. (TRUE or FALSE

Explanation

Wearing an antistatic wrist strap is not necessary when replacing power supplies or monitors. Antistatic wrist straps are typically used when working with sensitive electronic components to prevent the buildup and discharge of static electricity, which can potentially damage the components. However, when replacing power supplies or monitors, there is usually no need to handle sensitive electronic components directly, making the use of an antistatic wrist strap unnecessary.

Submit
20. A vacuum cleaner ia ideal for cleaning the inside of a computer case or a laptop keyboard. (TRUE or FALSE)

Explanation

A vacuum cleaner is not ideal for cleaning the inside of a computer case or a laptop keyboard. The strong suction of a vacuum cleaner can cause static electricity, which can damage the delicate electronic components of a computer. It is recommended to use compressed air or specialized computer cleaning tools to clean the inside of a computer case or a laptop keyboard.

Submit
21. If the humidity level is too low, the chance of .................. increases. (1 or 2 words)

Explanation

If the humidity level is too low, the chance of dehydration increases.

Submit
22. This type of cable has either 40 or 80 conductors. (1 or 4 words)

Explanation

PATA, which stands for parallel advanced technologies attachment, is a type of cable that has either 40 or 80 conductors.

Submit
23. ................... ................... are installed to add functionality on a computer. (2 words)

Explanation

Adapter cards are installed to add functionality on a computer. These cards are hardware components that can be inserted into slots on the motherboard of a computer. They are designed to provide additional features or capabilities that are not built-in to the computer's original configuration. By adding adapter cards, users can expand the capabilities of their computer system, such as adding a graphics card for enhanced visual performance, a network card for connecting to a local area network, or a sound card for improved audio output.

Submit
24. Whereas a switch connect segments of a network, ................. are devices that connect entire networks to each other. (1 word)

Explanation

Routers are devices that connect entire networks to each other. They are used to direct network traffic between different networks and determine the most efficient path for data to travel. Routers use routing tables to make decisions about where to send data packets, ensuring that they reach their intended destination. By connecting multiple networks together, routers enable communication and data transfer between these networks, allowing for the seamless exchange of information across different parts of a network.

Submit
25. .................. is a method to carry telephone calls over the data networks and internet. (1 or 3 words)

Explanation

VoIP, or voice over IP, is a method that enables telephone calls to be transmitted over data networks and the internet. This technology converts analog voice signals into digital data packets, which are then transmitted over IP networks. By using VoIP, traditional telephone calls can be made using the internet, allowing for cost savings and increased flexibility in communication.

Submit
26. The most commonly used DSL technology is ..................... (1 or 4 words)

Explanation

ADSL, which stands for Asymmetric Digital Subscriber Line, is the most commonly used DSL technology. It allows for high-speed internet access over traditional copper telephone lines. The term "asymmetric" refers to the fact that the download speed is typically faster than the upload speed in ADSL. This technology is widely used in residential and small business settings due to its cost-effectiveness and availability.

Submit
27. 10BASE-T is not susceptible to EMI.  (TRUE or FALSE)

Explanation

The statement "10BASE-T is not susceptible to EMI" is false. 10BASE-T is a type of Ethernet networking technology that uses twisted pair cables, which are susceptible to electromagnetic interference (EMI). EMI can cause signal degradation and disrupt the communication on the network. Therefore, 10BASE-T is indeed susceptible to EMI.

Submit
28. What socket does the CPU fit into? (1 or 3 words)

Explanation

The CPU fits into a ZIF (Zero Insertion Force) socket. This type of socket allows for easy and secure installation of the CPU without applying excessive force. The CPU can be inserted or removed from the socket without any resistance or damage.

Submit
29. What architecture uses a relatively small set of instructions which are designed to execute rapidly? (1 word)

Explanation

RISC stands for Reduced Instruction Set Computer. It is an architecture that uses a relatively small set of instructions that are designed to execute rapidly. RISC processors typically have a simplified instruction set, which allows for faster execution of instructions. This architecture focuses on simplicity and efficiency, aiming to minimize the number of instructions needed to perform a task. By reducing the complexity of instructions, RISC processors can achieve faster processing speeds and improved performance.

Submit
30. Computer components use ................. to request information from the CPU. The ............... travels along a wire on the motherboard to the CPU.  When the CPU receives a .............., it determines how to fulfill this request. (1 or 2 words)

Explanation

Computer components use IRQ (Interrupt Request) to request information from the CPU. The interrupt request travels along a wire on the motherboard to the CPU. When the CPU receives an interrupt request, it determines how to fulfill this request.

Submit
31. How many conductors does a SATA cable have?

Explanation

A SATA cable has 7 conductors. Each conductor is responsible for carrying different types of signals such as data, power, and ground. These conductors ensure the proper functioning of the SATA cable and allow for the transfer of data between devices. Therefore, the correct answer is 7 or seven.

Submit
32. What type of cache memory is external cache originally mounted on the motherboard near the CPU? (1 word)

Explanation

The correct answer for the question is L2. L2 cache, also known as secondary cache, is a type of cache memory that is originally mounted on the motherboard near the CPU. It is faster than the main memory (RAM) and is used to store frequently accessed data and instructions, reducing the time it takes for the CPU to access them. L2 cache is larger in size compared to L1 cache and provides a higher level of cache memory hierarchy.

Submit
33. The operating system enables the user to interact with software and hardware.  There are two types of user interfaces; which interface interacts with menus and icons? (1 or 3 words)

Explanation

The correct answer for this question is GUI, which stands for graphical user interface. The GUI allows the user to interact with software and hardware through menus and icons, providing a visual representation of the system's functions and options. It simplifies the user's experience by providing a more intuitive and user-friendly interface compared to command-line interfaces.

Submit
34. This partition normally uses the remaining free space on a hard drive or takes the place of primary partition. There can be only one ....................    ..........................  per hard drive, and it can be subdivided into smaller sections called logical drives. (2 words)

Explanation

An extended partition is a type of partition that is created when there is remaining free space on a hard drive or when it takes the place of a primary partition. Unlike primary partitions, there can only be one extended partition per hard drive. However, this extended partition can be subdivided into smaller sections called logical drives. Therefore, the correct answer to the question is "extended partition".

Submit
35. This is a type of Token Ring network that combines high speed performance with the advantages of the token-passing ring topology. (1 or 4 words)

Explanation

FDDI (Fiber Distributed Data Interface)

Submit
36. What is meant by a laptop device being hot-swappable?

Explanation

A laptop device being hot-swappable means that it can be installed or removed from the laptop without having to power off the laptop. This allows for convenient and seamless installation or removal of the device, without interrupting the laptop's operation.

Submit
37. What is the easiest way to extend the life of a laptop and keep it in optimal working order?

Explanation

Regularly cleaning the laptop helps to remove dust, dirt, and debris from the device, preventing them from clogging the vents and causing overheating. This, in turn, helps to maintain the optimal working order of the laptop and extends its lifespan. By keeping the laptop clean, users can ensure that the internal components are not compromised by excessive heat, which can lead to hardware failure. Additionally, cleaning the laptop regularly can also improve its performance and prevent issues such as sluggishness or freezing.

Submit
38. What list provides a detailed inventory of hardware that has been tested and is known to work with the operating system?

Explanation

The Hardware Compatibility List is a comprehensive inventory of hardware that has been tested and proven to work with the operating system. It provides detailed information about the compatibility of various hardware components with the operating system, ensuring that users can choose compatible hardware for their system. The list helps users avoid compatibility issues and ensures a smooth and efficient functioning of the operating system with the hardware components.

Submit
39. How can you toggle between a connected desktop monitor and the laptop?

Explanation

To toggle between a connected desktop monitor and a laptop, you can use the function key. The function key, often labeled as "Fn" on the keyboard, is designed to perform special functions when pressed in combination with other keys. On many laptops, there is a specific function key combination, such as Fn + F4 or Fn + F8, that allows you to switch between different display modes, including toggling between the laptop screen and an external monitor. By pressing the appropriate function key combination, you can easily switch the display output between the two screens.

Submit
40. Which registry file contains information about the hardware and software in the computer system?

Explanation

HKEY_LOCAL_MACHINE is the correct answer because it is a registry file that contains information about the hardware and software in the computer system. This file stores configuration settings and preferences for all users on the computer, including system-wide settings, device drivers, and software installations. It is a crucial component of the Windows operating system and is used by various applications and services to access and modify system settings.

Submit
41. What type of memory is used in laptops?

Explanation

SODIMM stands for Small Outline Dual In-Line Memory Module. It is a type of memory module that is specifically designed for use in laptops and other small form factor computers. SODIMMs are smaller in size compared to regular DIMMs, making them suitable for compact devices like laptops. They are used to provide additional RAM (Random Access Memory) to the laptop, allowing it to run multiple programs and perform tasks more efficiently. Therefore, SODIMM is the correct answer for the type of memory used in laptops.

Submit
42. What would you use to clean a laptop screen?

Explanation

Isopropyl alcohol and water would be the best option to clean a laptop screen. This solution is effective in removing dirt, fingerprints, and smudges without causing damage to the screen. Trichloroethane solvent is not commonly used for cleaning laptop screens and can be harmful to the screen. Window cleaner and ammonia-based solvents may contain chemicals that can damage the screen.

Submit
43. A user obtains a new laptop and reports that it does not fit into the existing docking station.  What would be the most likely solution?

Explanation

The correct answer is "Docking stations are proprietary. Verify that the user has a compatible model." This means that docking stations are not universal and are designed to work with specific models or brands of laptops. To solve the issue, it is important to check if the user's laptop is compatible with the docking station they are trying to use. If it is not compatible, alternative solutions such as finding a compatible docking station or using a different method for connecting the laptop to peripherals may need to be explored.

Submit
44. Information or data that is subject to ethical customs includes the following items?

Explanation

The correct answer is "All of the above". This is because all the listed items, including emails, records or data on the computer, telephone lists, and hard copies of files, can contain sensitive or personal information that is subject to ethical customs. It is important to handle and protect these items in accordance with ethical guidelines to ensure privacy and confidentiality.

Submit
45. What would you include on a software maintenance schedule? (pick 3)

Explanation

A software maintenance schedule should include reviewing software updates to ensure that the software is up to date with the latest features and bug fixes. Reviewing security patches is also important to address any vulnerabilities and protect the system from potential threats. Additionally, defragmenting the hard drive helps to optimize the system's performance by organizing fragmented data. Therefore, including these three tasks on a software maintenance schedule is essential for keeping the software running smoothly and securely.

Submit
46. Which type of customer is the only type you should politely interrupt?

Explanation

The only type of customer that should be politely interrupted is a talkative customer. This is because talkative customers tend to dominate the conversation and may not allow the customer service representative to provide the necessary assistance or gather important information. By politely interrupting, the representative can steer the conversation back on track and ensure that all necessary information is obtained to address the customer's needs effectively.

Submit
47. To optimise the space on a hard drive to allow faster access to programs and data you would use ..................

Explanation

To optimize the space on a hard drive and allow faster access to programs and data, the correct option is "Defrag." Defragmentation is a process that rearranges fragmented data on the hard drive, making it contiguous and reducing the time it takes for the computer to access files. This helps improve overall system performance and speeds up program execution by minimizing the time it takes for the hard drive to locate and retrieve data.

Submit
48. Wireless NICs can be installed on a computer system by .............

Explanation

Wireless NICs can be installed on a computer system using different methods. They can be installed through PCI expansion slots on the motherboard, which provide a direct connection to the system. They can also be installed through PCIe expansion slots on the motherboard, which offer faster data transfer rates. Additionally, wireless NICs can be installed externally using a USB connector, allowing for easy installation and removal. Therefore, the correct answer is "All of the above" as all three methods can be used to install wireless NICs on a computer system.

Submit
49. What print technology do laser printers use?

Explanation

Laser printers use electrophotographic print technology. This technology involves a laser beam that scans the surface of a drum or a photosensitive belt, creating an electrostatic image. The drum or belt is then coated with toner, which is attracted to the charged areas on the surface. Finally, the toner is transferred onto the paper and fused using heat to create the printed image. This process allows for high-quality and precise printing, making electrophotographic technology ideal for laser printers.

Submit
50. Which dotted decimal number is used to distinguish the network portion of the IP address from the host portion?

Explanation

The subnet mask is used to distinguish the network portion of the IP address from the host portion. It is a 32-bit number that works in conjunction with the IP address to determine which part of the address represents the network and which part represents the host. The subnet mask is applied bitwise to the IP address, with the network portion being indicated by the 1s in the mask and the host portion being indicated by the 0s.

Submit
51. Which technique enhances the CPUs performance by executing multiple peices of code simultaneously on each pipeline?

Explanation

Hyperthreading is a technique that enhances the CPU's performance by executing multiple pieces of code simultaneously on each pipeline. It allows the CPU to handle multiple threads or tasks at the same time, by creating virtual cores that share the resources of a physical core. This improves overall efficiency and can result in better performance, especially in situations where there are multiple threads or tasks running concurrently. CPU throttling, flashing the BIOS, and CISC are not related to the execution of multiple pieces of code simultaneously on each pipeline.

Submit
52. What IEE standard is Firewire and how many devices can it support?

Explanation

Firewire is a standard for high-speed data transfer and is also known as IEEE 1394. It can support up to 63 devices, allowing for multiple devices to be connected and communicate with each other simultaneously. The other option, IEEE 1284, is a standard for parallel ports used in printers and can support up to 127 devices. However, this is not the correct answer as the question specifically asks about Firewire.

Submit
53. Which common tasks are carried out during preventative maintenance? (pick 3)

Explanation

During preventative maintenance, three common tasks that are carried out include checking and securing loose cables, cleaning the mouse and keyboard, and updating drivers. Checking and securing loose cables ensures proper connectivity and prevents any potential issues caused by loose connections. Cleaning the mouse and keyboard helps to remove dirt, dust, and debris, ensuring smooth and efficient operation. Updating drivers ensures that the hardware devices on the system are running with the latest software, improving performance and compatibility.

Submit
54. What happens if pin 1 on the floppy drive data cable is not aligned with pin 1 on the drive connector?

Explanation

If pin 1 on the floppy drive data cable is not aligned with pin 1 on the drive connector, the drive activity light will remain on. This is because pin 1 is responsible for indicating the activity status of the drive. When it is not aligned correctly, the drive will constantly send a signal to the activity light, causing it to stay on even when there is no actual activity happening.

Submit
55. Which circuit board holds SDRAM, DDR SDRAM and DDR2 SDRAM chips?

Explanation

DIMM stands for Dual In-line Memory Module, and it is the circuit board that holds SDRAM, DDR SDRAM, and DDR2 SDRAM chips. DIMM is a type of memory module commonly used in computers to provide additional RAM. It has a 64-bit data path and is available in different capacities. DIMM modules are inserted into the memory slots on the motherboard and provide faster data transfer rates compared to older memory modules like SIMM and DIP.

Submit
56. A user complains that their system receives hundreds or thousands of junk e-mails daily.  What could be the problem and how would you solve it?

Explanation

The correct answer suggests that the user's system is experiencing a denial of service attack, which is causing the influx of junk emails. To solve the problem, the recommendation is to filter out emails from the sender at the email server. By implementing this filtering mechanism, the user will be able to block the incoming junk emails and prevent them from overwhelming their system.

Submit
57. When installing a used CPU, you must clean the CPU and the base of the heat sink with ........

Explanation

When installing a used CPU, it is important to clean both the CPU and the base of the heat sink to remove any dirt, dust, or thermal paste residue that may be present. Isopropyl alcohol is commonly used for this purpose as it evaporates quickly, leaves no residue, and is safe to use on electronic components. It effectively dissolves and removes any contaminants, ensuring a clean and proper connection between the CPU and the heat sink, which is crucial for efficient heat transfer and optimal performance.

Submit
58. A sudden increase in voltage that lasts for a very short period and exceeds 100 percent of the normal voltage on a line is called?

Explanation

A sudden increase in voltage that exceeds 100 percent of the normal voltage on a line is called a spike. This spike is a temporary and brief occurrence, typically lasting for a very short period. It can occur due to various reasons such as lightning strikes, power grid fluctuations, or switching on/off high-power electrical devices. A spike can potentially damage electronic equipment and appliances connected to the power line if they are not protected by surge protectors or voltage regulators.

Submit
59. Which type of ROM can be erased by UV light?

Explanation

EPROM stands for Erasable Programmable Read-Only Memory. It is a type of ROM that can be erased by exposing it to ultraviolet (UV) light. EPROM chips have a transparent window on the top that allows UV light to pass through. When the EPROM needs to be erased, the chip is taken out of the circuit and exposed to UV light for a specified amount of time. This erases the data stored in the EPROM, making it ready to be reprogrammed with new data.

Submit
60. Which items are hot-swappable on a laptop? (pick 2)

Explanation

The two items that are hot-swappable on a laptop are the USB flash drive and the optical drive. Hot-swappable means that these devices can be connected or disconnected from the laptop while it is still running, without the need to restart the system. The hard drive, LCD screen, and RAM are not hot-swappable as they require the laptop to be powered off before they can be replaced or upgraded.

Submit
61. Which type of video connector has a 24 pin or 29 pin female connector and provides compressed digital output to a monitor?

Explanation

DVI stands for Digital Visual Interface. It is a video connector that has a 24 pin or 29 pin female connector. DVI provides compressed digital output to a monitor, making it the correct answer for this question. HDMI, VGA, AAV, and RCA are all different types of video connectors, but they do not match the given description.

Submit
62. Which class of IP address is used for multicasting?

Explanation

Class D IP addresses are used for multicasting. Multicasting is a method of sending data packets to a group of destination computers simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are specifically reserved for multicast purposes. These addresses are used by applications that need to deliver data to multiple recipients efficiently, such as streaming videos or audio broadcasts.

Submit
63. What type of LAN physical topology creates the best redundancy?

Explanation

A mesh LAN physical topology creates the best redundancy because it provides multiple interconnected paths between devices. This means that if one link or device fails, there are alternative paths for data to flow, ensuring continuous network connectivity. In a mesh topology, each device is connected to every other device, forming a redundant network. This redundancy improves fault tolerance and minimizes the risk of network downtime or data loss.

Submit
64. Which wireless ethernet standards are compatible with each other?

Explanation

802.11b, 802.11g, and 802.11n are compatible with each other because they all operate on the same frequency band (2.4 GHz). This means that devices using any of these standards can communicate with each other and share the same wireless network. However, 802.11a operates on a different frequency band (5 GHz), so it is not compatible with the other standards.

Submit
65. A technician is attempting to secure a wireless network.  Which 2 options should be performed to secure access to the network? (pick 2)

Explanation

To secure access to the wireless network, the technician should change the default administrator password for all access points. This ensures that unauthorized individuals cannot easily gain access to the network settings and make unauthorized changes. Additionally, using MAC filtering is recommended, as it allows the network to only accept connections from devices with specific MAC addresses. This adds an extra layer of security by restricting access to only trusted devices. By implementing these two measures, the technician can enhance the security of the wireless network.

Submit
66. This standard specifies that networks must implement the CSMA/CD access control method.  (note: it is not a wireless network)

Explanation

This standard, 802.3, specifies that networks must implement the CSMA/CD access control method. CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection, which is a protocol used in Ethernet networks to manage access to the shared medium and avoid collisions. Therefore, the correct answer is 802.3.

Submit
67. A user has contacted the helpdesk and stated that their computer cannot connect to a popular website.  What could be the possible solution?

Explanation

The possible solution for the user's computer not being able to connect to a popular website could be to check the DNS settings, hardware, and software firewall settings. This is because DNS settings could be misconfigured, and the hardware or software firewall settings might be blocking access to the website. By checking these settings, any issues can be identified and resolved, allowing the user's computer to connect to the website successfully.

Submit
68. In the laser print process, what is the phase called when the photosensitive drum is scanned with the laser beam?

Explanation

The phase called "Writing" refers to the process in laser printing where the photosensitive drum is scanned with the laser beam. During this phase, the laser beam selectively charges the drum's surface to create an electrostatic image of the content to be printed. This image will later be developed and transferred onto the paper during subsequent stages of the printing process.

Submit
69. What are the pin configurations for the PC ExpressCard? (pick 2)

Explanation

The PC ExpressCard has two pin configurations, which are 34-pin and 54-pin. These pin configurations refer to the number of pins or connectors on the ExpressCard. The 34-pin configuration is commonly used for ExpressCards that provide USB or FireWire functionality, while the 54-pin configuration is used for ExpressCards that offer additional features such as eSATA or PCI Express.

Submit
70. Which type of cell phone standard uses the standard name GPRS (General Packet Radio Service)?

Explanation

GPRS (General Packet Radio Service) is a mobile data standard that was introduced as an enhancement to the original 2G (second generation) cell phone standard. It provided faster data transfer rates compared to traditional 2G networks, allowing for basic internet browsing and email capabilities on mobile devices. Therefore, the correct answer is 2.5G.

Submit
71. A user has contacted the helpdesk and stated that their scanner is not scanning.  They are using a SCSI connected scanner.  What would you advise the user to do?

Explanation

The correct answer advises the user to make sure the scanner is started before the computer. This is because when using a SCSI connected scanner, it is important to ensure that the scanner is powered on and ready before the computer is turned on. This allows the computer to properly detect and communicate with the scanner. Starting the scanner before the computer can help resolve any issues related to the scanner not scanning.

Submit
72. Which of the following protocols function is the downloading of e-mail messages from an e-mail server (there may be more than one answer)

Explanation

POP3 and IMAP are both protocols that are used for the downloading of e-mail messages from an e-mail server. POP3 (Post Office Protocol version 3) is a standard protocol used for receiving e-mail. It allows the user to download messages from the server to their local device and then delete them from the server. IMAP (Internet Message Access Protocol) is another standard protocol used for receiving e-mail. It allows the user to access and manage their e-mail messages directly on the server, without downloading them to their local device. Both protocols are commonly used by e-mail clients to retrieve messages from the server.

Submit
73. Which level of the OSI model establishes, manages and terminates the connection between the local and remote applications?

Explanation

The session layer of the OSI model is responsible for establishing, managing, and terminating the connection between the local and remote applications. It handles the coordination and synchronization of communication sessions, allowing for the exchange of data between applications on different devices. This layer ensures that the connection remains stable and manages any interruptions or errors that may occur during the session.

Submit
74. 10BASE5 is a coaxial cable used in networks.  It has a maximum length of...........

Explanation

10BASE5 is a type of Ethernet networking cable that uses coaxial cable. It is known for its long maximum length, which is 500 meters. This means that the cable can span up to 500 meters without any significant loss of signal quality or data transmission issues. The longer length makes it suitable for larger network setups or installations where devices are spread out over a larger area.

Submit
75. This operates between router devices to discover paths between networks and chooses routes based on the distance or hop count to the destination.

Explanation

RIP (Routing Information Protocol) is a routing protocol that operates between router devices. It is used to discover paths between networks and chooses routes based on the distance or hop count to the destination. RIP uses a metric called hop count to determine the best route, where each router along the path adds 1 to the hop count. The route with the lowest hop count is considered the best route to reach the destination network. Therefore, RIP is the correct answer for this question.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2009
    Quiz Created by
    Mikaela647
Cancel
  • All
    All (75)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
NTFS can be converted back to FAT32 file system. (TRUE or FALSE)
What does ACPI stand for?
The ............. .............. slot uses an open standard interface...
In Windows XP, the ACPI power management mode must be enabled in BIOS...
Laptops processors use CPU .................................. to...
Documents and applications are saved to a temporary file on the hard...
............ is the type of display technology used in laptops. (1or 3...
The average length of time that a printer will work without failing is...
Some scanners can create text documents using...
..................  is a method of gaining access to resources on...
A .................  .................... , like a worm, does not...
With ........... ...................... the user can control the type...
E-mail and text communications have a set of personal and business...
A .......................... is a contract that defines expectations...
You can make changes to the system software or hardware configuration...
.........................  ........................... is a...
When system, user, or software errors occurs on a computer, the...
Where would you check on your computer to see if all your devices are...
You would wear an antistatic wrist strap when replacing power supplies...
A vacuum cleaner ia ideal for cleaning the inside of a computer case...
If the humidity level is too low, the chance of .....................
This type of cable has either 40 or 80 conductors. (1 or 4 words)
................... ................... are installed to add...
Whereas a switch connect segments of a network, ................. are...
.................. is a method to carry telephone calls over the data...
The most commonly used DSL technology is ..................... (1 or 4...
10BASE-T is not susceptible to EMI.  (TRUE or FALSE)
What socket does the CPU fit into? (1 or 3 words)
What architecture uses a relatively small set of instructions...
Computer components use ................. to request information from...
How many conductors does a SATA cable have?
What type of cache memory is external cache originally mounted on the...
The operating system enables the user to interact with software and...
This partition normally uses the remaining free space on a hard drive...
This is a type of Token Ring network that combines high speed...
What is meant by a laptop device being hot-swappable?
What is the easiest way to extend the life of a laptop and keep it in...
What list provides a detailed inventory of hardware that has been...
How can you toggle between a connected desktop monitor and the laptop?
Which registry file contains information about the hardware and...
What type of memory is used in laptops?
What would you use to clean a laptop screen?
A user obtains a new laptop and reports that it does not fit into the...
Information or data that is subject to ethical customs includes the...
What would you include on a software maintenance schedule? (pick 3)
Which type of customer is the only type you should politely interrupt?
To optimise the space on a hard drive to allow faster access to...
Wireless NICs can be installed on a computer system by .............
What print technology do laser printers use?
Which dotted decimal number is used to distinguish the network portion...
Which technique enhances the CPUs performance by executing multiple...
What IEE standard is Firewire and how many devices can it support?
Which common tasks are carried out during preventative maintenance?...
What happens if pin 1 on the floppy drive data cable is not aligned...
Which circuit board holds SDRAM, DDR SDRAM and DDR2 SDRAM chips?
A user complains that their system receives hundreds or thousands of...
When installing a used CPU, you must clean the CPU and the base of the...
A sudden increase in voltage that lasts for a very short period and...
Which type of ROM can be erased by UV light?
Which items are hot-swappable on a laptop? (pick 2)
Which type of video connector has a 24 pin or 29 pin female connector...
Which class of IP address is used for multicasting?
What type of LAN physical topology creates the best redundancy?
Which wireless ethernet standards are compatible with each other?
A technician is attempting to secure a wireless network.  Which 2...
This standard specifies that networks must implement the CSMA/CD...
A user has contacted the helpdesk and stated that their computer...
In the laser print process, what is the phase called when the...
What are the pin configurations for the PC ExpressCard? (pick 2)
Which type of cell phone standard uses the standard name GPRS (General...
A user has contacted the helpdesk and stated that their scanner is not...
Which of the following protocols function is the downloading of e-mail...
Which level of the OSI model establishes, manages and terminates the...
10BASE5 is a coaxial cable used in networks.  It has a maximum...
This operates between router devices to discover paths between...
Alert!

Advertisement