Strata Practice Exam 1, 10-18-11 {part Two}

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Pedd
P
Pedd
Community Contributor
Quizzes Created: 1 | Total Attempts: 127
| Attempts: 127 | Questions: 22
Please wait...
Question 1 / 22
0 %
0/100
Score 0/100
1. 77. which of the following power sources are used to power a laptop?

Explanation

AC power and battery are the correct answers because laptops can be powered either by plugging them into an electrical outlet using AC power or by using the laptop's built-in battery. Solar panels and docking stations are not typically used as primary power sources for laptops.

Submit
Please wait...
About This Quiz
Strata Practice Exam 1, 10-18-11 {part Two} - Quiz

Strata Practice Exam 1, dated 10-18-11 (PART TWO), assesses knowledge in various computer-related fields including network security, operating systems, and hardware specifications. It tests practical skills in managing... see moremalware threats, understanding system requirements for Windows XP, and selecting appropriate hardware for error management. see less

2. Mark works as a network administrator for netTech inc the network has 150 windows 2000 pro client computers and four win 2000 servers. all the client computers are able to connect to the internet. mark is concerned about malware infecting the client computers through the internet. what will mark do to protect the client computers from malware? wach correct answer represents a complete solution. choose two

Explanation

Mark should educate the users of the client computers about the problems arising due to malware and how to avoid it. By providing awareness and knowledge about malware, users can become more cautious and take necessary precautions while browsing the internet. This will help in preventing malware from infecting the client computers and ensure their protection.

Submit
3. You have a customer who wants to install windows XP pro on her computer what is the minimum amount of RAM she should use for this to work?

Explanation

The minimum amount of RAM required to install Windows XP Pro is 64 megabytes. This means that the customer's computer should have at least 64 megabytes of RAM in order for the operating system to function properly.

Submit
4. You are selecting RAM for a new PC you are very concerned about making sure errors are handled. which of the following types of RAM should you select?

Explanation

To ensure errors are handled efficiently, it is important to select ECC RAM (Error Correcting Code RAM). ECC RAM has an additional memory chip that checks for and corrects errors that may occur during data storage or transmission. This type of RAM is commonly used in critical systems such as servers, workstations, and data centers, where data integrity is crucial. ECC RAM provides an extra layer of protection against potential errors, making it the ideal choice for someone concerned about error handling in their new PC.

Submit
5. What is the maximum data transmission speed of IEEE 802.11b wireless networks?

Explanation

The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard was introduced in 1999 and operates in the 2.4 GHz frequency range. It was one of the earliest Wi-Fi standards and provided a significant improvement over its predecessor, IEEE 802.11a, in terms of compatibility and cost-effectiveness. However, compared to more modern Wi-Fi standards such as 802.11ac or 802.11ax, the data transmission speed of 11 Mbps is relatively slow.

Submit
6. Which of the following types of parental controls is used to limit acces to the internet contents?

Explanation

Content filter control is a type of parental control that is used to limit access to internet contents. It allows parents to block or filter specific websites, apps, or types of content that they deem inappropriate or unsuitable for their children. This control helps in creating a safe and age-appropriate online environment for children by restricting their access to potentially harmful or explicit content on the internet.

Submit
7. Andrew has a personal computer. one morning he starts his computer and finds the following error message "cmos checksum failure" what are the most likely causes of this error? each correct answer represents a complete solution choose 2

Explanation

The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings on Andrew's computer. The most likely causes of this error are the failure of the CMOS battery and the failure of the CMOS chip. The CMOS battery is responsible for maintaining the CMOS settings when the computer is powered off, and if it fails, the settings may be lost or corrupted. Similarly, if the CMOS chip itself fails, it can result in the checksum failure error.

Submit
8. What are the benefits of using Universal Serial Bus 2.0  (USB) over legacy communication ports such as RS-232 and parellel ports? each correct answer represents a complete solution choose all that apply

Explanation

The benefits of using Universal Serial Bus 2.0 (USB) over legacy communication ports such as RS-232 and parallel ports include easy configuration of hardware devices, expansion, and speed. USB allows for plug-and-play functionality, making it easier to connect and configure hardware devices without the need for manual configuration. It also supports the connection of multiple devices through hubs, allowing for easy expansion of the system. Additionally, USB 2.0 offers faster data transfer speeds compared to legacy ports, enabling quicker communication between devices.

Submit
9. Which of the following sleep modes is also known as hibernation in windows operating systems?

Explanation

S4 is the correct answer because it refers to the sleep mode known as hibernation in Windows operating systems. In this mode, the computer saves all the open documents and running programs to the hard drive and then shuts down completely. When the computer is turned back on, it restores the previous state, allowing the user to resume their work from where they left off. This sleep mode is particularly useful for conserving energy while still being able to quickly resume work.

Submit
10. Which of the following can occur if the power cable runs along with the the computer network cable?

Explanation

If the power cable runs along with the computer network cable, it can cause electromagnetic interference (EMI). EMI is the disturbance caused by electromagnetic radiation from an external source, such as the power cable, that affects the performance of the network cable. This interference can lead to signal degradation, data loss, and communication errors in the network.

Submit
11. Which of the following are types of social engineering attacks? each correct answer represents a complete solution choose two

Explanation

The given correct answer states that two types of social engineering attacks are:
1) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee. This is an example of a physical social engineering attack, where the attacker manipulates their physical presence to gain unauthorized access.
2) An unauthorized person calls the user and pretends to be a system administrator in order to get the person's password. This is an example of a phishing attack, where the attacker manipulates the user through impersonation to obtain sensitive information.

Submit
12. Your customer uses windows XP machine has become unstable due to some unknown cause you want to put the computer into a working state again what is the best way to do this?

Explanation

The best way to put the Windows XP machine back into a working state is to use the Windows recovery CD and access the Windows recovery console. This console allows the user to perform various repair and troubleshooting tasks to fix any issues causing instability in the system. Reinstalling Windows or uninstalling new software may not address the root cause of the problem, whereas using the recovery console provides a more comprehensive solution.

Submit
13. Which of the following terms are first to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality viability or convenience?

Explanation

Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, viability, or convenience. This means that users can try the software before deciding to purchase it, but there may be limitations or restrictions in place.

Submit
14. Which of the following buses has a maximum data transfer rate of 2400 in MBPS?

Explanation

eSATA has a maximum data transfer rate of 2400 MBPS. FireWire 800 has a maximum data transfer rate of 800 MBPS, USB 1.1 has a maximum data transfer rate of 12 MBPS, and USB 2.0 has a maximum data transfer rate of 480 MBPS. Therefore, eSATA is the correct answer as it has the highest data transfer rate among the given options.

Submit
15. Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

Explanation

Anycast is the correct answer because it refers to a single IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that has that address assigned. This allows for efficient routing and load balancing, as multiple interfaces can share the same anycast address and handle incoming traffic.

Submit
16. Which of the following can be installed in the AGP slot?

Explanation

The AGP slot is specifically designed for installing a video card. It is not compatible with RAM, microprocessors, or modem cards. Therefore, the correct answer is a video card.

Submit
17. At one voltage does a USB host supply power to a USB bus?

Explanation

A USB host typically supplies power to a USB bus at a voltage of 5 Volts. This voltage is standardized and is used to power various USB devices such as keyboards, mice, and external hard drives. The 5V power supply is sufficient for most USB devices and ensures compatibility and safety. Higher voltages like 15 Volts or 50 Volts are not commonly used for USB power supply as they may cause damage to the connected devices.

Submit
18. Which of the following enables third-party developers to create capabilities to extend an application?

Explanation

A plug-in is a software component that allows third-party developers to add new features or functionalities to an existing application. By creating plug-ins, developers can extend the capabilities of the application without modifying its core code. This enables customization and flexibility, as different users can choose which plug-ins to install based on their specific needs.

Submit
19. Which of the following statements about multi-or authentication is true?

Explanation

The statement "it involves two or more methods as part of the authentication process" is true. Multi-factor authentication (MFA) is a security measure that requires users to provide two or more different types of authentication factors to verify their identity. These factors can include something the user knows (such as a password), something the user has (such as a fingerprint or smart card), or something the user is (such as biometric data). By requiring multiple factors, MFA adds an extra layer of security and makes it more difficult for unauthorized individuals to access sensitive information or systems.

Submit
20. What is the difference between the USB 2.0 and IEEE 1394 bus standards?

Explanation

The given answer states that IEEE 1394 is slower than USB 2.0. This is the correct answer because USB 2.0 has a higher data transfer rate compared to IEEE 1394. USB 2.0 has a maximum transfer rate of 480 Mbps, while IEEE 1394, also known as FireWire, has a maximum transfer rate of 400 Mbps. Therefore, USB 2.0 is faster than IEEE 1394.

Submit
21. Which of the following devices provides input by analyzing printed text handwriting or an object?

Explanation

An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents into digital images, which can then be edited, stored, or transmitted electronically. This makes it a useful tool for tasks such as document archiving, data entry, and image editing. Unlike a webcam, which captures live video footage, an image scanner focuses specifically on capturing and digitizing physical documents or objects. Therefore, an image scanner is the correct answer to the question.

Submit
22. Which of the following substances are restricted under restriction of hazardous substances (RoHS)? Each correct answer represents a complete solution choose all that apply.

Explanation

Mercury (HG), lead (pb), and cadmium (Cd) are restricted under the Restriction of Hazardous Substances (RoHS). These substances are known to be hazardous to human health and the environment. The RoHS directive aims to limit the use of these substances in electrical and electronic equipment to reduce their negative impact. Iron (Fe) is not restricted under RoHS as it is not considered a hazardous substance in this context.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 18, 2011
    Quiz Created by
    Pedd
Cancel
  • All
    All (22)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
77. which of the following power sources are used to power a laptop?
Mark works as a network administrator for netTech inc the network has...
You have a customer who wants to install windows XP pro on her...
You are selecting RAM for a new PC you are very concerned about making...
What is the maximum data transmission speed of IEEE 802.11b...
Which of the following types of parental controls is used to limit...
Andrew has a personal computer. one morning he starts his computer and...
What are the benefits of using Universal Serial Bus 2.0  (USB)...
Which of the following sleep modes is also known as hibernation in...
Which of the following can occur if the power cable runs along with...
Which of the following are types of social engineering attacks?...
Your customer uses windows XP machine has become unstable due to some...
Which of the following terms are first to proprietary software that is...
Which of the following buses has a maximum data transfer rate of 2400...
Which of the following IPv6 address types is a single address that can...
Which of the following can be installed in the AGP slot?
At one voltage does a USB host supply power to a USB bus?
Which of the following enables third-party developers to create...
Which of the following statements about multi-or authentication is...
What is the difference between the USB 2.0 and IEEE 1394 bus...
Which of the following devices provides input by analyzing printed...
Which of the following substances are restricted under restriction of...
Alert!

Advertisement