Practical Applications 702 IT Technician

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rayandlisaj
R
Rayandlisaj
Community Contributor
Quizzes Created: 5 | Total Attempts: 2,416
| Attempts: 153
SettingsSettings
Please wait...
  • 1/90 Questions

    __________  is the decrease in signal strength along the length of a network wire.

    • Flashing
    • Attenuation
    • Baud
    • Alternating
Please wait...
About This Quiz

Practical Applications 702 IT Technician quiz assesses knowledge in IT support, focusing on spyware, RAM types, disk states, command line operations, security permissions, and processor specifications. Ideal for those improving technical skills in IT environments.

Practical Applications 702 IT Technician - Quiz

Quiz Preview

  • 2. 

    Which pair of CPU manufacturers have the highest market share?

    • Intel and VIA

    • Intel and Motorola

    • Intel and IBM

    • Intel and AMD

    • Intel and SIS

    Correct Answer
    A. Intel and AMD
    Explanation
    Intel and AMD have the highest market share among CPU manufacturers. Intel is a well-known and dominant player in the CPU market, offering high-performance processors for various applications. AMD, on the other hand, has gained significant market share in recent years with its competitive and affordable processors. Together, Intel and AMD capture the majority of the CPU market, making them the pair with the highest market share.

    Rate this question:

  • 3. 

    Before doing a repair on a notebook computer and after backing up data and unplugging the unit.  What is the first item you should remove

    • LCD panel

    • Keyboard

    • Hard drive

    • Battery

    Correct Answer
    A. Battery
    Explanation
    Before performing a repair on a notebook computer, it is important to remove the battery first. This is because the battery provides power to the computer, and removing it ensures that there is no electrical current running through the system, reducing the risk of electric shock or damage to the components. Additionally, removing the battery allows for easier access to other internal components that may need to be repaired or replaced.

    Rate this question:

  • 4. 

      Which RAM type is in this image.

    • SODIMM

    • DIMM

    • RIMM

    • SIMM

    Correct Answer
    A. DIMM
    Explanation
    The correct answer is DIMM because the image shows a Dual Inline Memory Module (DIMM), which is a type of RAM commonly used in desktop computers. DIMMs have a 64-bit data path and are larger in size compared to other RAM types like SODIMM (used in laptops) and SIMM (used in older computers). RIMM is a type of RAM used in older Rambus-based systems, which is not visible in the image.

    Rate this question:

  • 5. 

    The volume is accessable and has no known problems.Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

    • Failed

    • Healthy

    • Healthy (at risk)

    • Initializing

    • Offline

    Correct Answer
    A. Healthy
    Explanation
    The given correct answer, "Healthy," best describes the state of the volume. This means that the volume is accessible and has no known problems. It indicates that the volume is functioning properly and is in a good state.

    Rate this question:

  • 6. 

    Which Secuity level does this describe?Users can view folder contents, and open files and folders.

    • Read & execute

    • Read

    • Write

    • Special permissions

    Correct Answer
    A. Read
    Explanation
    The security level that describes the given scenario is "Read". This level allows users to view the contents of a folder and open files and folders, but does not grant them permission to make any changes or modifications to the files or folders.

    Rate this question:

  • 7. 

    The volume is accessable, but I/O errors have been detected on the disk.Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

    • Failed

    • Healthy

    • Healthy (at risk)

    • Initializing

    • Offline

    Correct Answer
    A. Healthy (at risk)
    Explanation
    The given scenario suggests that the volume is accessible, but there are I/O errors on the disk. This indicates that the disk is still functioning, but there may be potential risks or issues with it. Therefore, the best description for this situation would be "Healthy (at risk)." This implies that the disk is currently in a working state, but there are potential problems that need to be addressed to maintain its health.

    Rate this question:

  • 8. 

    Which is WAN connection technology that  uses encryption and security protocols to create a private network over a public network?

    • Cable

    • DUN

    • Wireless

    • VPN

    • Satelite

    Correct Answer
    A. VPN
    Explanation
    A Virtual Private Network (VPN) is a WAN connection technology that uses encryption and security protocols to create a private network over a public network. It allows users to securely access and transmit data over the internet by establishing a secure and encrypted connection between the user's device and the private network. This ensures that the data transmitted is protected from unauthorized access or interception.

    Rate this question:

  • 9. 

    Which Secuity level does this describe?Users can view the contents of files and folders.  They can also run programs located in the folder.

    • Read and execute

    • Read

    • Write

    • Administrator

    Correct Answer
    A. Read and execute
    Explanation
    The security level that describes the given scenario is "Read and execute." This level allows users to both view the contents of files and folders and run programs located within the folder. It grants the necessary permissions to read the files and execute the programs, but does not provide write or administrative privileges.

    Rate this question:

  • 10. 

    The following information: Connection specific DNS suffix IP address & subnet mask default gateway can be accessed using which command report?

    • Ping

    • Tracert

    • Ipconfig

    • Nslookup

    Correct Answer
    A. Ipconfig
    Explanation
    The correct answer is "ipconfig" because the command "ipconfig" is used to display the IP configuration of a computer, including the connection-specific DNS suffix, IP address, subnet mask, and default gateway. It is a command-line tool that provides detailed information about the network settings of the computer. The other options, such as "ping," "tracert," and "nslookup," are used for different purposes like testing network connectivity, tracing the route to a destination, and querying DNS servers respectively, but they do not provide the specific information mentioned in the question.

    Rate this question:

  • 11. 

    In this power saving mode only some components are turned off or switched to power saving mode.

    • Off

    • Standby

    • Sleep

    • Hibernation

    Correct Answer
    A. Standby
    Explanation
    In standby mode, the device is still receiving power but is not actively performing any tasks. Some components may be turned off or switched to power saving mode to conserve energy. This allows the device to quickly resume its normal operation when needed.

    Rate this question:

  • 12. 

    Which encryption method uses the Advanced encryption system (AES) cipher for stronger encrytion?

    • 802.11i

    • WEP

    • WPA Personal

    • WPA2

    Correct Answer
    A. WPA2
    Explanation
    WPA2 uses the Advanced Encryption Standard (AES) cipher for stronger encryption. AES is a symmetric encryption algorithm that is widely recognized as secure and is used by governments and organizations worldwide. WPA2, which stands for Wi-Fi Protected Access 2, is a security protocol used to protect wireless networks. It provides stronger encryption compared to its predecessor, WPA, by using AES instead of the less secure Temporal Key Integrity Protocol (TKIP) used in WPA. Therefore, WPA2 is the correct answer for this question.

    Rate this question:

  • 13. 

    Which of these backup utilities backs up all files that have been created that day.

    • Copy

    • Daily

    • Normal

    • Incremental

    • Differential

    Correct Answer
    A. Daily
    Explanation
    The backup utility that backs up all files that have been created that day is the "Daily" backup. This type of backup is designed to copy all files that have been modified or created since the last backup was performed. It ensures that all changes made to files on a daily basis are backed up, providing a comprehensive and up-to-date backup of the data.

    Rate this question:

  • 14. 

    In which network tapology is each node connected to a central network transmission device such as a hub or a switch?

    • Bus

    • Mesh

    • Ring

    • Star

    Correct Answer
    A. Star
    Explanation
    In a star network topology, each node is connected to a central network transmission device such as a hub or a switch. This central device acts as a central point of control and communication for all the nodes in the network. It allows for easy management and troubleshooting as each node can be individually connected or disconnected without affecting the rest of the network. Additionally, the star topology provides better performance and reliability as any issues with one node do not affect the entire network.

    Rate this question:

  • 15. 

    Ratified in 2003, which standard is a combination of 802.11a and 802.11b?

    • 802.11g

    • 802.11h

    • 802.11n

    • 802.11x

    Correct Answer
    A. 802.11g
    Explanation
    The correct answer is 802.11g. This standard, ratified in 2003, is a combination of the 802.11a and 802.11b standards. It offers higher data transfer rates compared to 802.11b, reaching speeds of up to 54 Mbps. 802.11g operates in the 2.4 GHz frequency range, like 802.11b, but also supports backward compatibility with 802.11b devices. It provides a good balance between speed, range, and compatibility, making it a popular choice for wireless networking.

    Rate this question:

  • 16. 

    Which port address is resposible for receiving email?

    • IMAP

    • SMTP

    • POP3

    • HTTPS

    Correct Answer
    A. POP3
    Explanation
    POP3 stands for Post Office Protocol version 3, and it is responsible for receiving email. It is a widely used protocol that allows users to retrieve their email from a remote server to their local device. Unlike SMTP (Simple Mail Transfer Protocol) which is responsible for sending email, POP3 is specifically designed for receiving and downloading email messages. IMAP (Internet Message Access Protocol) is another protocol used for receiving email, but it is more advanced and allows users to manage their email directly on the server. HTTPS (Hypertext Transfer Protocol Secure) is a protocol used for secure communication over a computer network and is not specifically designed for email.

    Rate this question:

  • 17. 

    Which port address is responsible for sending email?

    • IMAP

    • SMTP

    • POP3

    • HTTPS

    Correct Answer
    A. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is responsible for sending email. It is a protocol used for transferring email messages from one server to another. SMTP works in conjunction with other protocols such as POP3 or IMAP, which are responsible for receiving email. However, SMTP specifically handles the sending of email, ensuring that it reaches the intended recipient's email server.

    Rate this question:

  • 18. 

      Which RAM type is in this image.

    • SODIMM

    • DIMM

    • RIMM

    • SIMM

    Correct Answer
    A. SODIMM
    Explanation
    The correct answer is SODIMM. SODIMM stands for Small Outline Dual Inline Memory Module. It is a type of RAM module commonly used in laptops and small form factor computers. SODIMM modules are smaller in size compared to DIMM modules, making them suitable for compact devices. This image likely shows a SODIMM module, based on its size and form factor. DIMM, RIMM, and SIMM are different types of RAM modules, but they are not depicted in the image.

    Rate this question:

  • 19. 

    The volume is being initialized and will be shown as health when complete.Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

    • Healthy

    • Healthy (at risk)

    • Initializing

    • Offline

    • Unreadable

    Correct Answer
    A. Initializing
    Explanation
    The correct answer is "Initializing." This option best describes the state of a dynamic disk in Computer Management when the volume is being initialized and will be shown as healthy when the process is complete.

    Rate this question:

  • 20. 

    What multimeter modes can you use to determine if a wire is whole or broken?

    • Ohmmeter

    • Capacimeter

    • Continuity

    • Component test

    • Temperature

    Correct Answer
    A. Continuity
    Explanation
    Continuity mode on a multimeter is used to determine if a wire is whole or broken. When the probes are connected to both ends of a wire, if there is continuity (a complete path for electrical current), the multimeter will emit a beep or display a low resistance value. If there is a break in the wire, there will be no continuity, and the multimeter will not emit a beep or display a high resistance value. Therefore, continuity mode is the appropriate mode to use for this purpose.

    Rate this question:

  • 21. 

    What would likely cause ghosting or shadows on a printed page

    • Low toner

    • Residual toner on the drum

    • Damp paper

    • Debris on the laser scanning mirror

    Correct Answer
    A. Residual toner on the drum
    Explanation
    Residual toner on the drum can cause ghosting or shadows on a printed page. When there is leftover toner on the drum, it can transfer onto the paper during the printing process. This results in faint or duplicate images appearing on the page, creating a ghosting effect. By cleaning the drum properly and ensuring there is no residual toner, the issue of ghosting or shadows can be resolved.

    Rate this question:

  • 22. 

      Which RAM type is in this image.

    • SODIMM

    • DIMM

    • RIMM

    • SIMM

    Correct Answer
    A. SIMM
    Explanation
    The image is not provided, so it is not possible to determine the RAM type based on the given information.

    Rate this question:

  • 23. 

    The number of bits of data that can be transferred to the CPU in a single operation is know as?

    • Bus, address

    • Bus, data

    • Bus, internal

    • Front side bus speed

    Correct Answer
    A. Bus, data
    Explanation
    The correct answer is "Bus, data." The number of bits of data that can be transferred to the CPU in a single operation is known as the "bus, data." The bus is a communication pathway that allows data to be transferred between different components of a computer system. In this case, the bus is specifically referring to the data bus, which is responsible for transferring data between the CPU and other components such as memory or input/output devices.

    Rate this question:

  • 24. 

    In the advanced start up modes in Windows Vista you can try this one to get to command prompt if Safe mode will not load.

    • Safe mode with networking

    • Enable boot loging

    • Safe mode with command prompt

    • Debugging mode

    Correct Answer
    A. Safe mode with command prompt
    Explanation
    In Windows Vista, if the Safe mode fails to load, the user can try accessing the command prompt through the "Safe mode with command prompt" option. This mode allows the user to troubleshoot and fix any issues by directly accessing the command line interface. It provides a basic environment with minimal drivers and services, allowing the user to perform various troubleshooting tasks or execute specific commands to resolve any problems.

    Rate this question:

  • 25. 

    Which of a computers internal components generally uses the most power?

    • CPU

    • RAM

    • Hard drive

    • Power supply

    Correct Answer
    A. CPU
    Explanation
    The CPU (Central Processing Unit) generally uses the most power among a computer's internal components. This is because the CPU is responsible for executing instructions and performing calculations, which requires a significant amount of power. The CPU is the brain of the computer and is responsible for carrying out the majority of the processing tasks, making it the component that consumes the most power.

    Rate this question:

  • 26. 

    Which of these backup utilities backs up all files, but does not mark the files as backed up; does not clear the archive attribute.

    • Copy

    • Daily

    • Normal

    • Incremental

    • Differential

    Correct Answer
    A. Copy
    Explanation
    The backup utility "Copy" backs up all files without marking them as backed up or clearing the archive attribute. This means that the files will not be flagged as backed up and the archive attribute will remain unchanged after the backup process.

    Rate this question:

  • 27. 

    Which network protocol is  non routable, proprietary Microsoft protocol for Windows 9x, Me, NT and 2000?

    • IPX/SPX

    • TCP/IP

    • NetBEUI

    • AppleTalk

    Correct Answer
    A. NetBEUI
    Explanation
    NetBEUI is a non-routable, proprietary Microsoft protocol used for networking in Windows 9x, Me, NT, and 2000. It is not designed to be used over large networks or the internet, as it lacks the necessary routing capabilities. Instead, NetBEUI is suitable for small, local networks where simplicity and ease of use are prioritized over scalability and interoperability.

    Rate this question:

  • 28. 

      Which RAM type is in this image.

    • SODIMM

    • DIMM

    • SIMM

    • RIMM

    Correct Answer
    A. RIMM
    Explanation
    The image is not provided in the question, so it is not possible to determine the RAM type based on the image. Therefore, an explanation cannot be provided.

    Rate this question:

  • 29. 

    A Type I PC card is how thick?

    • 3.3mm

    • 5mm

    • 7.4mm

    • 10.5mm

    Correct Answer
    A. 3.3mm
    Explanation
    A Type I PC card is 3.3mm thick. This indicates that it is relatively thin compared to other options.

    Rate this question:

  • 30. 

    This is an advanced start up option in Windows Vista where as everything loads normally, yet if you are having trouble with a device you can check the file ntblog.txt to see which devices loaded successfully or which ones did not.

    • Debugging mode

    • Safe mode with networking

    • Safe mode with command prompt

    • Enable boot logging

    Correct Answer
    A. Enable boot logging
    Explanation
    Enable boot logging is the correct answer because it is an advanced startup option in Windows Vista that allows users to check the file ntblog.txt to see which devices loaded successfully and which ones did not. This option can be helpful when troubleshooting device-related issues during the boot process.

    Rate this question:

  • 31. 

    Which 802.11 standard is in progress as a 200+ Mpbs standard?

    • 802.11c

    • 802.11f

    • 802.11n

    • 802.11t

    Correct Answer
    A. 802.11n
    Explanation
    802.11n is the correct answer because it is the standard that supports speeds of over 200 Mbps. This standard introduced multiple-input multiple-output (MIMO) technology, which allows for the use of multiple antennas to improve wireless performance. It also operates on both the 2.4 GHz and 5 GHz frequency bands, providing greater flexibility and reducing interference. 802.11n also utilizes channel bonding and other techniques to increase data rates, making it capable of delivering higher speeds compared to previous standards such as 802.11a, 802.11b, and 802.11g.

    Rate this question:

  • 32. 

    Which command would you use to verify name resolution (DNS) settings?

    • Ping

    • Tracert

    • Ipconfig

    • Nslookup

    Correct Answer
    A. Nslookup
    Explanation
    The nslookup command is used to verify name resolution (DNS) settings. It allows users to query DNS servers to obtain information about domain names, IP addresses, and other DNS records. By using nslookup, users can test and troubleshoot DNS configurations, check if a domain name is resolving correctly, and obtain details about DNS servers and their responses.

    Rate this question:

  • 33. 

    The speed at which the processor interacts with the rest of the system is know as what?

    • Bus, address

    • Bus, data

    • Bus, internal

    • Front side bus speed

    Correct Answer
    A. Front side bus speed
    Explanation
    The correct answer is "Front side bus speed." The front side bus speed refers to the speed at which the processor communicates with other components in the system, such as memory and input/output devices. It determines how quickly data can be transferred between the processor and these components, thus affecting overall system performance.

    Rate this question:

  • 34. 

    The bus (pathway) that connects the processor with the main memory.  The wider the ____________  the more memory can be accessed. (Data isn't transferred over this buss)

    • Bus, address

    • Bus, data

    • Bus, internal

    • Front side bus speed

    Correct Answer
    A. Bus, address
    Explanation
    The wider the bus, the more memory can be accessed because the bus is responsible for transferring data between the processor and the main memory. The "address" in this context refers to the specific location in the memory that the processor wants to access. Therefore, a wider bus allows for more memory addresses to be accessed, increasing the overall memory capacity that can be utilized.

    Rate this question:

  • 35. 

    As far as processor specifications go, Clock speed, front side bus speed, addressable RAM and cache sizes are considered ____________  specifications.

    • Primary

    • Secondary

    • Bus width

    • Internal

    Correct Answer
    A. Primary
    Explanation
    Clock speed, front side bus speed, addressable RAM, and cache sizes are considered primary specifications because they directly affect the performance and capabilities of the processor. These specifications determine how fast the processor can execute instructions, how quickly it can communicate with other components, and how much data it can store and access. Therefore, they are essential factors in determining the overall performance and efficiency of the processor.

    Rate this question:

  • 36. 

    Especially maliciuos programs that will effect the privacy and security of your computer and can damage your system and should be removed immediatly.  This describes which security alert level?

    • Severe

    • High

    • Medium

    • Low

    • Not Yet Classified

    Correct Answer
    A. Severe
    Explanation
    The given description states that there are malicious programs that can harm the privacy, security, and functioning of a computer, and they should be removed immediately. This indicates a high level of risk and urgency, suggesting that the security alert level is severe.

    Rate this question:

  • 37. 

    The volume cannot be restarted manually and must be repaired.Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

    • Failed

    • Healthy (at risk)

    • Initializing

    • Offline

    • Unreadable

    Correct Answer
    A. Failed
    Explanation
    This best describes the "Failed" state of the dynamic disk hardware. When a disk is in the "Failed" state, it means that it cannot be restarted manually and needs to be repaired. This indicates a critical issue with the disk, such as hardware failure or corruption, which prevents it from functioning properly.

    Rate this question:

  • 38. 

    The General tab in the System Configuration utility allows you to start the computer in any of three modes when trouble shooting.Which mode loads only basic devices and services?

    • Normal Startup

    • Diagnostic Startup

    • Selective Startup

    Correct Answer
    A. Diagnostic Startup
    Explanation
    The Diagnostic Startup mode loads only basic devices and services. This mode is used for troubleshooting purposes when there is a suspected issue with a specific device or service. By starting the computer in Diagnostic Startup mode, unnecessary startup items and services are disabled, allowing the user to isolate and identify the cause of the problem. This mode helps in narrowing down the potential causes of the issue and facilitates troubleshooting by eliminating unnecessary variables.

    Rate this question:

  • 39. 

    This software was typically installed with your knowledge and according to the licensing terms you agreed to, but still might collect information or change the configuration of your computer.  This describes which security alert level?

    • Severe

    • High

    • Medium

    • Low

    • Not Yet Determined

    Correct Answer
    A. Low
    Explanation
    This software being typically installed with the user's knowledge and according to the licensing terms implies that it is not a malicious or unauthorized program. However, it is mentioned that the software might collect information or change the configuration of the computer, which could be a potential security concern. Despite this, the fact that it is categorized as "Low" suggests that the overall security risk associated with this software is relatively minimal compared to the other alert levels.

    Rate this question:

  • 40. 

    In which Task manager tab can you end an application is not responding or experienced a fault?

    • Task manager

    • Performance

    • Applications

    • Processes

    Correct Answer
    A. Applications
    Explanation
    In the Applications tab of the Task Manager, you can end an application that is not responding or experiencing a fault. This tab displays a list of all the applications currently running on the system, allowing you to easily identify and terminate any problematic applications. By selecting the application and clicking on the "End Task" button, you can force the application to close and resolve any issues it may be causing.

    Rate this question:

  • 41. 

    Which Windows versions support Wireless Zero Configuration?(choose all that apply)

    • Windows NT

    • Windows 2000

    • Windows XP

    • Windows Vista

    Correct Answer(s)
    A. Windows XP
    A. Windows Vista
    Explanation
    Windows XP and Windows Vista support Wireless Zero Configuration. This feature allows Windows to automatically configure and connect to wireless networks. Windows NT and Windows 2000 do not have this feature.

    Rate this question:

  • 42. 

    Which of these backup utilities backs up all files that have been created or modified since the last normal or incremental back up does not clear the archive attribute?

    • Copy

    • Daily

    • Normal

    • Incremental

    • Differential

    Correct Answer
    A. Differential
    Explanation
    Differential backup is the correct answer because it backs up all files that have been created or modified since the last normal or incremental backup without clearing the archive attribute. This means that it only backs up the changes made since the last full backup, making it faster than a full backup but slower than an incremental backup.

    Rate this question:

  • 43. 

    Which Secuity level does this describe?Users can perform management tasks, such as managing documents.

    • Read & execute

    • Read

    • Write

    • Special permissions

    Correct Answer
    A. Special permissions
    Explanation
    Special permissions is the correct answer because it allows users to perform management tasks, such as managing documents. Special permissions provide a more granular level of control over access to resources, allowing administrators to define specific actions that users can perform, such as read, write, execute, delete, etc. This level of security is often used when more specific control is required beyond the standard read, write, and execute permissions.

    Rate this question:

  • 44. 

    The physical layer in the OSI model is ____________?

    • Layer 1

    • Layer 3

    • Layer 6

    • Layer 7

    Correct Answer
    A. Layer 1
    Explanation
    The physical layer in the OSI model is Layer 1. This layer is responsible for the transmission and reception of raw bit streams over a physical medium. It defines the electrical, mechanical, and procedural characteristics for transmitting bits between network devices. This includes specifications for cables, connectors, signaling, and modulation techniques. The physical layer ensures that the data sent from one device can be reliably received by another device, without any errors or loss of information.

    Rate this question:

  • 45. 

    Of the four components to secutity on a wireless network, which one does a radius server belong?

    • Access control

    • Authentication

    • Encryption

    • Isolation

    Correct Answer
    A. Authentication
    Explanation
    A radius server belongs to the authentication component of security on a wireless network. It is responsible for verifying the credentials of users who are trying to access the network. The radius server authenticates the identity of users by checking their usernames and passwords against a database of authorized users. This helps ensure that only legitimate users are granted access to the network, enhancing its overall security.

    Rate this question:

  • 46. 

    The dynamic disk has suffered a hardware failure and has become corrupted in some way.If the status changes to missing the disk can no longer be located.Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

    • Failed

    • Healthy (at risk)

    • Initializing

    • Offline

    • Unreadable

    Correct Answer
    A. Offline
    Explanation
    This best describes the "Offline" state in the dynamic disk hardware states in Computer Management. When a dynamic disk suffers a hardware failure and becomes corrupted, its status changes to "Offline" because it can no longer be located or accessed by the system.

    Rate this question:

  • 47. 

    In the system configuration utility, which mode can you use to load only basic devices and services while trouble shooting a problem?

    • Debug

    • Selective

    • Diagnostic

    • Normal

    Correct Answer
    A. Diagnostic
    Explanation
    In the system configuration utility, the Diagnostic mode can be used to load only basic devices and services while troubleshooting a problem. This mode helps in identifying and resolving issues by loading only the necessary components, which can be useful in isolating and resolving conflicts or errors. It allows for a focused approach to troubleshooting and can help in identifying the root cause of the problem more effectively.

    Rate this question:

  • 48. 

    As far as processor specifications go, The width, or number of bits, that can pass one at a time over the processors internal bus and data bus, plus the address bus width which determines maximum addressable memory are considered ____________  specifications.

    • Primary

    • Secondary

    • Bus width

    • Internal

    Correct Answer
    A. Bus width
    Explanation
    The question is asking about the specifications related to the width of the processor's internal bus, data bus, and address bus. These specifications are referred to as "bus width" specifications. The bus width determines the number of bits that can pass through the bus at a time and also affects the maximum addressable memory. Therefore, "Bus width" is the correct answer.

    Rate this question:

  • 49. 

    Which Secuity level does this describe?Users can create and modify files and folders.

    • Read & execute

    • Read

    • Write

    • Special permissions

    Correct Answer
    A. Write
    Explanation
    The security level that allows users to create and modify files and folders is "Write". This level grants the permission to make changes to existing files and folders as well as create new ones. Users with this level of security can add, edit, and delete content within the files and folders they have access to.

    Rate this question:

Quiz Review Timeline (Updated): Sep 11, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 11, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 08, 2010
    Quiz Created by
    Rayandlisaj
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.