Practical Applications 702 IT Technician

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rayandlisaj
R
Rayandlisaj
Community Contributor
Quizzes Created: 5 | Total Attempts: 2,418
| Attempts: 153 | Questions: 90
Please wait...
Question 1 / 90
0 %
0/100
Score 0/100
1. __________  is the decrease in signal strength along the length of a network wire.

Explanation

Attenuation is the decrease in signal strength along the length of a network wire. As the signal travels through the wire, it encounters resistance and other factors that cause it to weaken. Attenuation can result in loss of data and degradation of the signal quality. It is an important consideration in network design and can be mitigated by using signal boosters, repeaters, or shorter cable lengths.

Submit
Please wait...
About This Quiz
Practical Applications 702 IT Technician - Quiz

Practical Applications 702 IT Technician quiz assesses knowledge in IT support, focusing on spyware, RAM types, disk states, command line operations, security permissions, and processor specifications. Ideal for... see morethose improving technical skills in IT environments. see less

2. Before doing a repair on a notebook computer and after backing up data and unplugging the unit.  What is the first item you should remove

Explanation

Before performing a repair on a notebook computer, it is important to remove the battery first. This is because the battery provides power to the computer, and removing it ensures that there is no electrical current running through the system, reducing the risk of electric shock or damage to the components. Additionally, removing the battery allows for easier access to other internal components that may need to be repaired or replaced.

Submit
3. Which pair of CPU manufacturers have the highest market share?

Explanation

Intel and AMD have the highest market share among CPU manufacturers. Intel is a well-known and dominant player in the CPU market, offering high-performance processors for various applications. AMD, on the other hand, has gained significant market share in recent years with its competitive and affordable processors. Together, Intel and AMD capture the majority of the CPU market, making them the pair with the highest market share.

Submit
4.   Which RAM type is in this image.

Explanation

The correct answer is DIMM because the image shows a Dual Inline Memory Module (DIMM), which is a type of RAM commonly used in desktop computers. DIMMs have a 64-bit data path and are larger in size compared to other RAM types like SODIMM (used in laptops) and SIMM (used in older computers). RIMM is a type of RAM used in older Rambus-based systems, which is not visible in the image.

Submit
5. The volume is accessable and has no known problems.
Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

Explanation

The given correct answer, "Healthy," best describes the state of the volume. This means that the volume is accessible and has no known problems. It indicates that the volume is functioning properly and is in a good state.

Submit
6. The volume is accessable, but I/O errors have been detected on the disk.
Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

Explanation

The given scenario suggests that the volume is accessible, but there are I/O errors on the disk. This indicates that the disk is still functioning, but there may be potential risks or issues with it. Therefore, the best description for this situation would be "Healthy (at risk)." This implies that the disk is currently in a working state, but there are potential problems that need to be addressed to maintain its health.

Submit
7. Which is WAN connection technology that  uses encryption and security protocols to create a private network over a public network?

Explanation

A Virtual Private Network (VPN) is a WAN connection technology that uses encryption and security protocols to create a private network over a public network. It allows users to securely access and transmit data over the internet by establishing a secure and encrypted connection between the user's device and the private network. This ensures that the data transmitted is protected from unauthorized access or interception.

Submit
8. Which Secuity level does this describe?
Users can view folder contents, and open files and folders.

Explanation

The security level that describes the given scenario is "Read". This level allows users to view the contents of a folder and open files and folders, but does not grant them permission to make any changes or modifications to the files or folders.

Submit
9. In this power saving mode only some components are turned off or switched to power saving mode.

Explanation

In standby mode, the device is still receiving power but is not actively performing any tasks. Some components may be turned off or switched to power saving mode to conserve energy. This allows the device to quickly resume its normal operation when needed.

Submit
10. Which encryption method uses the Advanced encryption system (AES) cipher for stronger encrytion?

Explanation

WPA2 uses the Advanced Encryption Standard (AES) cipher for stronger encryption. AES is a symmetric encryption algorithm that is widely recognized as secure and is used by governments and organizations worldwide. WPA2, which stands for Wi-Fi Protected Access 2, is a security protocol used to protect wireless networks. It provides stronger encryption compared to its predecessor, WPA, by using AES instead of the less secure Temporal Key Integrity Protocol (TKIP) used in WPA. Therefore, WPA2 is the correct answer for this question.

Submit
11. Which Secuity level does this describe?
Users can view the contents of files and folders.  They can also run programs located in the folder.

Explanation

The security level that describes the given scenario is "Read and execute." This level allows users to both view the contents of files and folders and run programs located within the folder. It grants the necessary permissions to read the files and execute the programs, but does not provide write or administrative privileges.

Submit
12. The following information: Connection specific DNS suffix IP address & subnet mask default gateway can be accessed using which command report?

Explanation

The correct answer is "ipconfig" because the command "ipconfig" is used to display the IP configuration of a computer, including the connection-specific DNS suffix, IP address, subnet mask, and default gateway. It is a command-line tool that provides detailed information about the network settings of the computer. The other options, such as "ping," "tracert," and "nslookup," are used for different purposes like testing network connectivity, tracing the route to a destination, and querying DNS servers respectively, but they do not provide the specific information mentioned in the question.

Submit
13. In which network tapology is each node connected to a central network transmission device such as a hub or a switch?

Explanation

In a star network topology, each node is connected to a central network transmission device such as a hub or a switch. This central device acts as a central point of control and communication for all the nodes in the network. It allows for easy management and troubleshooting as each node can be individually connected or disconnected without affecting the rest of the network. Additionally, the star topology provides better performance and reliability as any issues with one node do not affect the entire network.

Submit
14. Ratified in 2003, which standard is a combination of 802.11a and 802.11b?

Explanation

The correct answer is 802.11g. This standard, ratified in 2003, is a combination of the 802.11a and 802.11b standards. It offers higher data transfer rates compared to 802.11b, reaching speeds of up to 54 Mbps. 802.11g operates in the 2.4 GHz frequency range, like 802.11b, but also supports backward compatibility with 802.11b devices. It provides a good balance between speed, range, and compatibility, making it a popular choice for wireless networking.

Submit
15. Which of these backup utilities backs up all files that have been created that day.

Explanation

The backup utility that backs up all files that have been created that day is the "Daily" backup. This type of backup is designed to copy all files that have been modified or created since the last backup was performed. It ensures that all changes made to files on a daily basis are backed up, providing a comprehensive and up-to-date backup of the data.

Submit
16. Which port address is resposible for receiving email?

Explanation

POP3 stands for Post Office Protocol version 3, and it is responsible for receiving email. It is a widely used protocol that allows users to retrieve their email from a remote server to their local device. Unlike SMTP (Simple Mail Transfer Protocol) which is responsible for sending email, POP3 is specifically designed for receiving and downloading email messages. IMAP (Internet Message Access Protocol) is another protocol used for receiving email, but it is more advanced and allows users to manage their email directly on the server. HTTPS (Hypertext Transfer Protocol Secure) is a protocol used for secure communication over a computer network and is not specifically designed for email.

Submit
17. Which port address is responsible for sending email?

Explanation

SMTP (Simple Mail Transfer Protocol) is responsible for sending email. It is a protocol used for transferring email messages from one server to another. SMTP works in conjunction with other protocols such as POP3 or IMAP, which are responsible for receiving email. However, SMTP specifically handles the sending of email, ensuring that it reaches the intended recipient's email server.

Submit
18.   Which RAM type is in this image.

Explanation

The correct answer is SODIMM. SODIMM stands for Small Outline Dual Inline Memory Module. It is a type of RAM module commonly used in laptops and small form factor computers. SODIMM modules are smaller in size compared to DIMM modules, making them suitable for compact devices. This image likely shows a SODIMM module, based on its size and form factor. DIMM, RIMM, and SIMM are different types of RAM modules, but they are not depicted in the image.

Submit
19. The volume is being initialized and will be shown as health when complete.
Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

Explanation

The correct answer is "Initializing." This option best describes the state of a dynamic disk in Computer Management when the volume is being initialized and will be shown as healthy when the process is complete.

Submit
20. What multimeter modes can you use to determine if a wire is whole or broken?

Explanation

Continuity mode on a multimeter is used to determine if a wire is whole or broken. When the probes are connected to both ends of a wire, if there is continuity (a complete path for electrical current), the multimeter will emit a beep or display a low resistance value. If there is a break in the wire, there will be no continuity, and the multimeter will not emit a beep or display a high resistance value. Therefore, continuity mode is the appropriate mode to use for this purpose.

Submit
21. The number of bits of data that can be transferred to the CPU in a single operation is know as?

Explanation

The correct answer is "Bus, data." The number of bits of data that can be transferred to the CPU in a single operation is known as the "bus, data." The bus is a communication pathway that allows data to be transferred between different components of a computer system. In this case, the bus is specifically referring to the data bus, which is responsible for transferring data between the CPU and other components such as memory or input/output devices.

Submit
22. In the advanced start up modes in Windows Vista you can try this one to get to command prompt if Safe mode will not load.

Explanation

In Windows Vista, if the Safe mode fails to load, the user can try accessing the command prompt through the "Safe mode with command prompt" option. This mode allows the user to troubleshoot and fix any issues by directly accessing the command line interface. It provides a basic environment with minimal drivers and services, allowing the user to perform various troubleshooting tasks or execute specific commands to resolve any problems.

Submit
23. What would likely cause ghosting or shadows on a printed page

Explanation

Residual toner on the drum can cause ghosting or shadows on a printed page. When there is leftover toner on the drum, it can transfer onto the paper during the printing process. This results in faint or duplicate images appearing on the page, creating a ghosting effect. By cleaning the drum properly and ensuring there is no residual toner, the issue of ghosting or shadows can be resolved.

Submit
24.   Which RAM type is in this image.

Explanation

The image is not provided, so it is not possible to determine the RAM type based on the given information.

Submit
25. Which of a computers internal components generally uses the most power?

Explanation

The CPU (Central Processing Unit) generally uses the most power among a computer's internal components. This is because the CPU is responsible for executing instructions and performing calculations, which requires a significant amount of power. The CPU is the brain of the computer and is responsible for carrying out the majority of the processing tasks, making it the component that consumes the most power.

Submit
26. Which of these backup utilities backs up all files, but does not mark the files as backed up; does not clear the archive attribute.

Explanation

The backup utility "Copy" backs up all files without marking them as backed up or clearing the archive attribute. This means that the files will not be flagged as backed up and the archive attribute will remain unchanged after the backup process.

Submit
27. Which network protocol is  non routable, proprietary Microsoft protocol for Windows 9x, Me, NT and 2000?

Explanation

NetBEUI is a non-routable, proprietary Microsoft protocol used for networking in Windows 9x, Me, NT, and 2000. It is not designed to be used over large networks or the internet, as it lacks the necessary routing capabilities. Instead, NetBEUI is suitable for small, local networks where simplicity and ease of use are prioritized over scalability and interoperability.

Submit
28. A Type I PC card is how thick?

Explanation

A Type I PC card is 3.3mm thick. This indicates that it is relatively thin compared to other options.

Submit
29. This is an advanced start up option in Windows Vista where as everything loads normally, yet if you are having trouble with a device you can check the file ntblog.txt to see which devices loaded successfully or which ones did not.

Explanation

Enable boot logging is the correct answer because it is an advanced startup option in Windows Vista that allows users to check the file ntblog.txt to see which devices loaded successfully and which ones did not. This option can be helpful when troubleshooting device-related issues during the boot process.

Submit
30. Which 802.11 standard is in progress as a 200+ Mpbs standard?

Explanation

802.11n is the correct answer because it is the standard that supports speeds of over 200 Mbps. This standard introduced multiple-input multiple-output (MIMO) technology, which allows for the use of multiple antennas to improve wireless performance. It also operates on both the 2.4 GHz and 5 GHz frequency bands, providing greater flexibility and reducing interference. 802.11n also utilizes channel bonding and other techniques to increase data rates, making it capable of delivering higher speeds compared to previous standards such as 802.11a, 802.11b, and 802.11g.

Submit
31.   Which RAM type is in this image.

Explanation

The image is not provided in the question, so it is not possible to determine the RAM type based on the image. Therefore, an explanation cannot be provided.

Submit
32. Which command would you use to verify name resolution (DNS) settings?

Explanation

The nslookup command is used to verify name resolution (DNS) settings. It allows users to query DNS servers to obtain information about domain names, IP addresses, and other DNS records. By using nslookup, users can test and troubleshoot DNS configurations, check if a domain name is resolving correctly, and obtain details about DNS servers and their responses.

Submit
33. The speed at which the processor interacts with the rest of the system is know as what?

Explanation

The correct answer is "Front side bus speed." The front side bus speed refers to the speed at which the processor communicates with other components in the system, such as memory and input/output devices. It determines how quickly data can be transferred between the processor and these components, thus affecting overall system performance.

Submit
34. The bus (pathway) that connects the processor with the main memory.  The wider the
____________  the more memory can be accessed. (Data isn't transferred over this buss)

Explanation

The wider the bus, the more memory can be accessed because the bus is responsible for transferring data between the processor and the main memory. The "address" in this context refers to the specific location in the memory that the processor wants to access. Therefore, a wider bus allows for more memory addresses to be accessed, increasing the overall memory capacity that can be utilized.

Submit
35. The volume cannot be restarted manually and must be repaired.
Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

Explanation

This best describes the "Failed" state of the dynamic disk hardware. When a disk is in the "Failed" state, it means that it cannot be restarted manually and needs to be repaired. This indicates a critical issue with the disk, such as hardware failure or corruption, which prevents it from functioning properly.

Submit
36. The General tab in the System Configuration utility allows you to start the computer in any of three modes when trouble shooting.

Which mode loads only basic devices and services?

Explanation

The Diagnostic Startup mode loads only basic devices and services. This mode is used for troubleshooting purposes when there is a suspected issue with a specific device or service. By starting the computer in Diagnostic Startup mode, unnecessary startup items and services are disabled, allowing the user to isolate and identify the cause of the problem. This mode helps in narrowing down the potential causes of the issue and facilitates troubleshooting by eliminating unnecessary variables.

Submit
37. As far as processor specifications go, Clock speed, front side bus speed, addressable RAM and cache sizes are considered ____________  specifications.

Explanation

Clock speed, front side bus speed, addressable RAM, and cache sizes are considered primary specifications because they directly affect the performance and capabilities of the processor. These specifications determine how fast the processor can execute instructions, how quickly it can communicate with other components, and how much data it can store and access. Therefore, they are essential factors in determining the overall performance and efficiency of the processor.

Submit
38. Especially maliciuos programs that will effect the privacy and security of your computer and can damage your system and should be removed immediatly.  This describes which security alert level?

Explanation

The given description states that there are malicious programs that can harm the privacy, security, and functioning of a computer, and they should be removed immediately. This indicates a high level of risk and urgency, suggesting that the security alert level is severe.

Submit
39. This software was typically installed with your knowledge and according to the licensing terms you agreed to, but still might collect information or change the configuration of your computer.  This describes which security alert level?

Explanation

This software being typically installed with the user's knowledge and according to the licensing terms implies that it is not a malicious or unauthorized program. However, it is mentioned that the software might collect information or change the configuration of the computer, which could be a potential security concern. Despite this, the fact that it is categorized as "Low" suggests that the overall security risk associated with this software is relatively minimal compared to the other alert levels.

Submit
40. In which Task manager tab can you end an application is not responding or experienced a fault?

Explanation

In the Applications tab of the Task Manager, you can end an application that is not responding or experiencing a fault. This tab displays a list of all the applications currently running on the system, allowing you to easily identify and terminate any problematic applications. By selecting the application and clicking on the "End Task" button, you can force the application to close and resolve any issues it may be causing.

Submit
41. Which Windows versions support Wireless Zero Configuration?
(choose all that apply)

Explanation

Windows XP and Windows Vista support Wireless Zero Configuration. This feature allows Windows to automatically configure and connect to wireless networks. Windows NT and Windows 2000 do not have this feature.

Submit
42. Which of these backup utilities backs up all files that have been created or modified since the last normal or incremental back up does not clear the archive attribute?

Explanation

Differential backup is the correct answer because it backs up all files that have been created or modified since the last normal or incremental backup without clearing the archive attribute. This means that it only backs up the changes made since the last full backup, making it faster than a full backup but slower than an incremental backup.

Submit
43. Which Secuity level does this describe?
Users can perform management tasks, such as managing documents.

Explanation

Special permissions is the correct answer because it allows users to perform management tasks, such as managing documents. Special permissions provide a more granular level of control over access to resources, allowing administrators to define specific actions that users can perform, such as read, write, execute, delete, etc. This level of security is often used when more specific control is required beyond the standard read, write, and execute permissions.

Submit
44. The physical layer in the OSI model is ____________?

Explanation

The physical layer in the OSI model is Layer 1. This layer is responsible for the transmission and reception of raw bit streams over a physical medium. It defines the electrical, mechanical, and procedural characteristics for transmitting bits between network devices. This includes specifications for cables, connectors, signaling, and modulation techniques. The physical layer ensures that the data sent from one device can be reliably received by another device, without any errors or loss of information.

Submit
45. Of the four components to secutity on a wireless network, which one does a radius server belong?

Explanation

A radius server belongs to the authentication component of security on a wireless network. It is responsible for verifying the credentials of users who are trying to access the network. The radius server authenticates the identity of users by checking their usernames and passwords against a database of authorized users. This helps ensure that only legitimate users are granted access to the network, enhancing its overall security.

Submit
46. The dynamic disk has suffered a hardware failure and has become corrupted in some way.If the status changes to missing the disk can no longer be located.
Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

Explanation

This best describes the "Offline" state in the dynamic disk hardware states in Computer Management. When a dynamic disk suffers a hardware failure and becomes corrupted, its status changes to "Offline" because it can no longer be located or accessed by the system.

Submit
47. In the system configuration utility, which mode can you use to load only basic devices and services while trouble shooting a problem?

Explanation

In the system configuration utility, the Diagnostic mode can be used to load only basic devices and services while troubleshooting a problem. This mode helps in identifying and resolving issues by loading only the necessary components, which can be useful in isolating and resolving conflicts or errors. It allows for a focused approach to troubleshooting and can help in identifying the root cause of the problem more effectively.

Submit
48. As far as processor specifications go, The width, or number of bits, that can pass one at a time over the processors internal bus and data bus, plus the address bus width which determines maximum addressable memory are considered ____________  specifications.

Explanation

The question is asking about the specifications related to the width of the processor's internal bus, data bus, and address bus. These specifications are referred to as "bus width" specifications. The bus width determines the number of bits that can pass through the bus at a time and also affects the maximum addressable memory. Therefore, "Bus width" is the correct answer.

Submit
49. A type III PC card is usually how thick

Explanation

A type III PC card is usually 10.5mm thick.

Submit
50. Fire walls at thier core protect networks by using some combination of which of the following?

Explanation

Firewalls protect networks by using a combination of NAT (network address translation), basic packet filtering, and stateful packet inspection (SPI). NAT allows multiple devices on a network to share a single public IP address, enhancing security by hiding internal IP addresses. Basic packet filtering examines packets based on predefined rules, allowing or blocking them based on criteria such as source and destination IP addresses or ports. SPI goes beyond basic packet filtering by keeping track of the state of network connections and only allowing packets that are part of established connections. Together, these techniques help protect networks from unauthorized access and malicious activity.

Submit
51. Which Secuity level does this describe?
Users can create and modify files and folders.

Explanation

The security level that allows users to create and modify files and folders is "Write". This level grants the permission to make changes to existing files and folders as well as create new ones. Users with this level of security can add, edit, and delete content within the files and folders they have access to.

Submit
52. Which of these backup utilities backs up all files and clears the archive attributes?

Explanation

The "Normal" backup utility backs up all files and clears the archive attributes. This means that it will create a complete backup of all selected files and folders, and after the backup is done, it will reset the archive attribute on those files, indicating that they have been backed up. This ensures that in the next backup, only the files that have been modified since the last backup will be included, reducing the backup time and storage space required.

Submit
53. The _____  switch copies subdirectories even if they are empty.

Explanation

The "/e" switch in the given question is used to copy subdirectories even if they are empty. This means that when this switch is used, the command will copy all subdirectories, regardless of whether they have any files or not.

Submit
54. When Windows detects the begining of a request to make a system configuraion change, what type of restore point is created?

Explanation

When Windows detects the beginning of a request to make a system configuration change, it creates a system checkpoint restore point. This type of restore point is automatically created by Windows before any major system changes, such as installing new software or making significant configuration modifications. System checkpoint restore points allow users to revert their system back to a previous state if any issues or errors occur as a result of the changes made.

Submit
55. When testing a print job from an aplication what is the first thing you check?

Explanation

When testing a print job from an application, the first thing you check is the application itself. This is because the application is responsible for sending the print job to the printer. If there are any issues or errors within the application, it may prevent the print job from being sent or cause it to print incorrectly. Therefore, it is crucial to verify that the application is functioning properly before troubleshooting other components such as the printer driver, system tools, or printer cable.

Submit
56. The presentation layer in the OSI model is ___________?

Explanation

The correct answer is Layer 6. In the OSI model, the presentation layer is responsible for the formatting and translation of data to be exchanged between different systems. It ensures that the data is in a format that can be understood by the receiving system. This layer also handles encryption and decryption of data for secure communication. Therefore, Layer 6 is the correct answer for the presentation layer in the OSI model.

Submit
57. In _______,  modern processors overlap steps to speed up overall execution.  While one instruction is being executed, another is being decoded and a third is being fetched.

Explanation

Pipelining is a technique used in modern processors to improve overall execution speed. It allows for overlapping of different steps of instruction execution. While one instruction is being executed, another instruction is being decoded and a third instruction is being fetched. This parallel processing of instructions helps to reduce the overall execution time and increase the efficiency of the processor.

Submit
58. Which of these backup utilities backs up all files that have been created or modified since the last normal or incremental back up, clears the archive attribute?

Explanation

The correct answer is Incremental. Incremental backup utility backs up all files that have been created or modified since the last normal or incremental backup and clears the archive attribute. This means that only the files that have changed since the last backup are backed up, making it a more efficient option compared to full or differential backups.

Submit
59. Which tab in task manager will tell you if an application is overloading the CPU?

Explanation

The Processes tab in Task Manager will tell you if an application is overloading the CPU. This tab displays all the running processes on the computer, including both system processes and user applications. By monitoring the CPU usage column in the Processes tab, you can identify which application is using a high percentage of the CPU resources. This information helps in troubleshooting performance issues and determining if an application is causing the CPU to be overloaded.

Submit
60. The status indicates a failure or I/O errors.
Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

Explanation

The status "Unreadable" best describes the given situation where there is a failure or I/O errors. This means that the disk cannot be read or accessed properly, indicating a problem with the hardware or data on the disk.

Submit
61. Which type of memory has edge connectors vs. pins?

Explanation

RIMM (Rambus Inline Memory Module) is the correct answer because it is a type of memory module that uses edge connectors instead of pins. Edge connectors are located along the edge of the module and are used to connect the module to the motherboard. This is in contrast to other types of memory modules like SODIMM (Small Outline Dual Inline Memory Module), DIMM (Dual Inline Memory Module), and SIMM (Single Inline Memory Module), which use pins for connection.

Submit
62. Spyware programs that might effect the privacy and security of your computer and damage your system shoud be removed immediatly.  Could make changes on your computer without your concent  This describes which security alert level?

Explanation

The given statement suggests that spyware programs can have severe consequences for the privacy and security of a computer system. It mentions that these programs can make changes on the computer without the user's consent, indicating a high level of security alert. Therefore, the correct answer is "High."

Submit
63. Which parameter switch allows you to delete a directory and it's comtents without being prompted to confirm?

Explanation

The parameter switch "/y" allows you to delete a directory and its contents without being prompted to confirm. This switch overrides any confirmation prompts and ensures that the deletion process is carried out without interruption.

Submit
64. To obtain the IEEE speed of High, clients must be within how many meters of the AP (Access Point)?

Explanation

To obtain the IEEE speed of High, clients must be within the range of 40 to 125 meters from the AP (Access Point). This means that if clients are located within this distance, they will be able to achieve the maximum speed offered by the IEEE standard.

Submit
65. Which internet connection type that uses a phone line does not convert the signal to analog, it must have a digital signal

Explanation

ISDN stands for Integrated Services Digital Network. It is an internet connection type that uses a phone line but does not convert the signal to analog. Instead, it requires a digital signal. This means that the data is transmitted in a digital format, allowing for faster and more reliable connections compared to analog signals. ISDN is often used for businesses and individuals who require high-speed internet access and the ability to transmit voice, video, and data simultaneously.

Submit
66. At a minimum, which IPv4 address components must you configure in order to communicate on your local computer to communicate on your local subnet mask? (choose 2)

Explanation

To communicate on a local subnet, you need to configure the IP address and the subnet mask. The IP address is necessary to identify your computer on the network, while the subnet mask determines the range of IP addresses that belong to the local subnet. The default gateway and DNS server address are not essential for local communication within the subnet. The default gateway is used to communicate with devices outside the local subnet, and the DNS server address is used to resolve domain names to IP addresses.

Submit
67. As far as processor specifications go, the internal and external voltages used by the chips, the number of transistors that make up the processor, and whether it includes an integrated FPU (floating point unit) is considered ____________  specifications.

Explanation

The given question asks about the specifications that are considered when it comes to processor specifications. The correct answer is "Internal." This means that the internal voltage and external voltage used by the chips, the number of transistors that make up the processor, and whether it includes an integrated FPU are all part of the internal specifications of the processor. These specifications are important for understanding the performance and capabilities of the processor.

Submit
68. When adding Ram memory it is not necessary to fill up all the slots in a memory bank.

Explanation

Whether there os 1, 2 or 4 slots in the bank they must all be filled if not with a memory chip than with a continuity module.

Submit
69. Which of the following display types can you use to display data in the performance monitor?
(choose all that apply)

Explanation

The line graph and histogram display types can be used to display data in the performance monitor. A line graph is useful for showing the trend or changes in data over time, while a histogram is used to display the distribution of data into different categories or intervals. The pie chart and pictogram, on the other hand, are not typically used in the performance monitor for displaying data.

Submit
70. Which type of backup requires that you have the most recent normal back up in addition to this backup if you want to restore files?
(choose all that apply)

Explanation

Differential and Incremental backups both require the most recent normal backup in addition to the backup itself in order to restore files. A Differential backup saves all the files that have changed since the last normal backup, while an Incremental backup only saves the files that have changed since the last backup, whether it was a normal or incremental backup. Therefore, both types of backups rely on the previous normal backup to restore files correctly.

Submit
71. In which network tapology is each node connected to a central device by two wires?

Explanation

In a ring network topology, each node is connected to a central device by two wires, forming a circular loop. This allows for data to flow in both directions, creating a redundant path and increasing network reliability. In contrast, bus, mesh, and star network topologies do not have this characteristic of dual-wire connections to a central device.

Submit
72. You receive a general windows protection fault message, what does this indicate?

Explanation

A general Windows protection fault message typically indicates that there is an issue with the software running on the Windows system. This can be caused by poorly written software that is not compatible with the operating system or contains bugs that cause conflicts. It is not related to bad memory location, parity error, or virus/malware.

Submit
73. A problem with physical memory can cause which operating system startup errors?
(choose all that apply)

Explanation

If there is a problem with the physical memory, it can cause the operating system to fail to load the Himem.sys file. This file is responsible for managing high memory in the system, and if it is not loaded or is missing or corrupted, it can result in startup errors. This can lead to issues such as the system failing to start or certain devices or services failing to start properly.

Submit
74. Spyware programs that might effect your privacy or make changes to your computer.  This describes which security alert level?

Explanation

The given description states that the spyware programs might affect privacy or make changes to the computer. While this is a concern, it is not as severe as other security threats such as malware or viruses. Therefore, the appropriate security alert level for this description would be medium.

Submit
75. You should place your WLAN access points within how many meters of the users?

Explanation

The WLAN access points should be placed within 60 to 90 meters of the users. This distance range ensures that the users receive a strong and stable wireless signal without any significant degradation in performance. Placing the access points too far away may result in weak signal strength and slower connection speeds, while placing them too close may cause interference and congestion. Therefore, positioning the access points within this optimal distance range helps to provide an efficient and reliable wireless network for the users.

Submit
76. An outdated device driver that needs to be updated can cause what type of Operating System load error?

Explanation

An outdated device driver can cause a Windows protection error-illegal operation. When a device driver is outdated, it may not be compatible with the current version of the operating system, leading to errors and conflicts. This can result in a Windows protection error, which occurs when the operating system detects an illegal operation or an attempt to access protected memory. Updating the device driver to a compatible version can resolve this issue and prevent the error from occurring.

Submit
77. What is the standard low LAN speed?

Explanation

The standard low LAN speed is 0.8 Mbps. This means that the Local Area Network (LAN) has a maximum data transfer rate of 0.8 megabits per second. This speed is considered to be relatively slow compared to higher speed options available for LAN connections.

Submit
78. Which of the following dial up connections have a speed rating of up to 1.5 GB?
(choose two)

Explanation

DSL and Satellite are the two dial-up connections that have a speed rating of up to 1.5 GB. DSL, which stands for Digital Subscriber Line, uses existing telephone lines to provide internet connectivity. Satellite internet, on the other hand, uses satellites in space to transmit and receive data. Both of these options offer higher speeds compared to traditional dial-up connections.

Submit
79. Which type of events are used only in Security log?
(choose all that apply)

Explanation

Success audit and Failure audit events are used only in the Security log. These events are generated when an audited security event occurs, such as a successful or failed login attempt, access to a secure resource, or changes to security policies. These events are essential for monitoring and investigating security incidents and ensuring the integrity of the system. Warning, Information, and Error events can occur in various logs, not just the Security log, and may not be specific to security-related events.

Submit
80. Which wireless standard for Air Interface is a point to multipoint broadband wireless standard?

Explanation

802.16 is the correct answer because it is a wireless standard for Air Interface that specifically supports point-to-multipoint broadband wireless communication. This standard, also known as WiMAX, is designed to provide high-speed internet access over a wide area, making it suitable for applications such as last-mile connectivity, rural broadband, and wireless backhaul. It offers a long-range transmission and can support multiple users simultaneously, making it an efficient and cost-effective solution for delivering broadband connectivity in various scenarios.

Submit
81. Most components in the computer are turned off.  Power is supplied to the computers memory chips to preserve the information held there.  Most programms are stopped in this power saving mode.

Explanation

Sleep mode is a power-saving state in which most components of the computer are turned off, but power is still supplied to the computer's memory chips to preserve the information held there. In sleep mode, most programs are stopped, allowing the computer to quickly resume full power and operation when awakened. This mode is commonly used when the computer is not in use for a short period of time and allows for faster startup compared to hibernation mode.

Submit
82. To abtain the high IEEE LAN speed of 4.3 Mbps how many meters should your workstation be from the AP?

Explanation

The correct answer is 40 to 125. This range of distance is required to achieve a high IEEE LAN speed of 4.3 Mbps. If the workstation is located within this range from the Access Point (AP), it will be able to maintain a stable and fast connection, allowing for efficient data transmission at the desired speed.

Submit
83. The DDR SDRAM package made for desktops have how many pins?

Explanation

The DDR SDRAM package made for desktops has 184 pins. The number of pins in a DDR SDRAM package determines the number of electrical connections between the memory module and the motherboard. In this case, 184 pins are required to establish the necessary connections for the DDR SDRAM module to function properly in a desktop computer.

Submit
84. The _____  switch lists the directory or file names one per line with no heading information or summary displayed and also over rides the /w switch.

Explanation

The /b switch is the correct answer because it lists the directory or file names one per line with no heading information or summary displayed. It also overrides the /w switch, which would normally display the file names in a wide format.

Submit
85. These programs typically do no harm to your computer unless they were installed without your knowledge.  This describes which security alert level?

Explanation

The given statement suggests that the programs mentioned in the question do not cause harm to the computer unless they were installed without the user's knowledge. This indicates that these programs are not classified under any specific security alert level, as they do not pose a severe, high, medium, or low threat to the computer. Therefore, the correct answer is "Not Yet Classified."

Submit
86. The ______  switch copies source files that have the archive attribite set and turns off the archive.

Explanation

The "/m" switch is used to copy source files that have the archive attribute set and turns off the archive.

Submit
87. Which type of error presents as the computer system booting successfully, but reports an error message when loading the operating system?

Explanation

A boot error is a type of error that occurs when a computer system is able to successfully boot up but encounters an error message while loading the operating system. This error indicates a problem in the initial stages of the boot process, such as issues with the bootloader or the configuration files that are necessary for the operating system to load properly. It can be caused by various factors, including corrupted system files, hardware conflicts, or incorrect boot settings.

Submit
88. The DIMM memory package designed for early Pentium and Macintosh desktop comprters had how many pins? (Choose all that apply)

Explanation

The DIMM memory package designed for early Pentium and Macintosh desktop computers had two different pin configurations: 30 pins and 72 pins. These pins were used to connect the memory module to the motherboard, allowing for data transfer between the memory and the processor. The other options, 100, 168, and 240 pins, were not used in the DIMM memory package for these computers.

Submit
89. SODIMM DDR and DDR2 memory chips typically have how many pins? (Choose all that apply)

Explanation

SODIMM DDR and DDR2 memory chips typically have 144 and 200 pins. SODIMM stands for Small Outline Dual Inline Memory Module, and it is a smaller form factor compared to regular DIMM modules. DDR and DDR2 are different generations of memory technology, with DDR2 being the newer one. The number of pins corresponds to the physical connection points on the memory module, and in this case, SODIMM DDR and DDR2 modules have 144 and 200 pins respectively.

Submit
90. ____________ is the bus that determines how many bits of information the processor can work with at once.  If the internal bus is smaller than the data buss, data must be manipulated in parts.

Explanation

The internal bus is the bus that determines how many bits of information the processor can work with at once. If the internal bus is smaller than the data bus, data must be manipulated in parts.

Submit
View My Results

Quiz Review Timeline (Updated): Sep 11, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 11, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 08, 2010
    Quiz Created by
    Rayandlisaj
Cancel
  • All
    All (90)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
__________  is the decrease in signal strength along the length...
Before doing a repair on a notebook computer and after backing up data...
Which pair of CPU manufacturers have the highest market share?
  Which RAM type is in this image.
The volume is accessable and has no known problems.Of the Dycipher...
The volume is accessable, but I/O errors have been detected on the...
Which is WAN connection technology that  uses encryption and...
Which Secuity level does this describe?Users can view folder contents,...
In this power saving mode only some components are turned off or...
Which encryption method uses the Advanced encryption system (AES)...
Which Secuity level does this describe?Users can view the contents of...
The following information: Connection specific DNS suffix IP address...
In which network tapology is each node connected to a central network...
Ratified in 2003, which standard is a combination of 802.11a and...
Which of these backup utilities backs up all files that have been...
Which port address is resposible for receiving email?
Which port address is responsible for sending email?
  Which RAM type is in this image.
The volume is being initialized and will be shown as health when...
What multimeter modes can you use to determine if a wire is whole or...
The number of bits of data that can be transferred to the CPU in a...
In the advanced start up modes in Windows Vista you can try this one...
What would likely cause ghosting or shadows on a printed page
  Which RAM type is in this image.
Which of a computers internal components generally uses the most...
Which of these backup utilities backs up all files, but does not mark...
Which network protocol is  non routable, proprietary Microsoft...
A Type I PC card is how thick?
This is an advanced start up option in Windows Vista where as...
Which 802.11 standard is in progress as a 200+ Mpbs standard?
  Which RAM type is in this image.
Which command would you use to verify name resolution (DNS) settings?
The speed at which the processor interacts with the rest of the system...
The bus (pathway) that connects the processor with the main...
The volume cannot be restarted manually and must be repaired.Of the...
The General tab in the System Configuration utility allows you to...
As far as processor specifications go, Clock speed, front side bus...
Especially maliciuos programs that will effect the privacy and...
This software was typically installed with your knowledge and...
In which Task manager tab can you end an application is not responding...
Which Windows versions support Wireless Zero Configuration?(choose all...
Which of these backup utilities backs up all files that have been...
Which Secuity level does this describe?Users can perform management...
The physical layer in the OSI model is ____________?
Of the four components to secutity on a wireless network, which one...
The dynamic disk has suffered a hardware failure and has become...
In the system configuration utility, which mode can you use to load...
As far as processor specifications go, The width, or number of...
A type III PC card is usually how thick
Fire walls at thier core protect networks by using some combination of...
Which Secuity level does this describe?Users can create and modify...
Which of these backup utilities backs up all files and clears the...
The _____  switch copies subdirectories even if they are empty.
When Windows detects the begining of a request to make a system...
When testing a print job from an aplication what is the first thing...
The presentation layer in the OSI model is ___________?
In _______,  modern processors overlap steps to speed up overall...
Which of these backup utilities backs up all files that have been...
Which tab in task manager will tell you if an application is...
The status indicates a failure or I/O errors.Of the Dycipher...
Which type of memory has edge connectors vs. pins?
Spyware programs that might effect the privacy and security of your...
Which parameter switch allows you to delete a directory and it's...
To obtain the IEEE speed of High, clients must be within how many...
Which internet connection type that uses a phone line does not convert...
At a minimum, which IPv4 address components must you configure in...
As far as processor specifications go, the internal and external...
When adding Ram memory it is not necessary to fill up all the slots in...
Which of the following display types can you use to display data in...
Which type of backup requires that you have the most recent normal...
In which network tapology is each node connected to a central...
You receive a general windows protection fault message, what does this...
A problem with physical memory can cause which operating system...
Spyware programs that might effect your privacy or make changes...
You should place your WLAN access points within how many meters of the...
An outdated device driver that needs to be updated can cause what type...
What is the standard low LAN speed?
Which of the following dial up connections have a speed rating of up...
Which type of events are used only in Security log?(choose all that...
Which wireless standard for Air Interface is a point to multipoint...
Most components in the computer are turned off.  Power is...
To abtain the high IEEE LAN speed of 4.3 Mbps how many meters should...
The DDR SDRAM package made for desktops have how many pins?
The _____  switch lists the directory or file names one per line...
These programs typically do no harm to your computer unless they were...
The ______  switch copies source files that have the archive...
Which type of error presents as the computer system booting...
The DIMM memory package designed for early Pentium and Macintosh...
SODIMM DDR and DDR2 memory chips typically have how many pins? (Choose...
____________ is the bus that determines how many bits of information...
Alert!

Advertisement