Strata Practice Exam 1-25 50-150

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ranger1
R
Ranger1
Community Contributor
Quizzes Created: 3 | Total Attempts: 694
| Attempts: 80 | Questions: 106
Please wait...
Question 1 / 106
0 %
0/100
Score 0/100
1. Which of the following refers to the data rate supported by a network connection or interface?

Explanation

Bandwidth refers to the data rate supported by a network connection or interface. It represents the maximum amount of data that can be transmitted over a network in a given amount of time. A higher bandwidth allows for faster data transfer, while a lower bandwidth may result in slower or limited data transmission.

Submit
Please wait...
About This Quiz
Strata Practice Exam 1-25 50-150 - Quiz

STRATA Practice Exam 1-25 50-150 assesses knowledge in computer hardware, video technology, system commands, and security features. It enhances skills in troubleshooting, system management, and security protocol handling.

2. Which of the following features are related to power management? Choose two.

Explanation

Hibernate mode and standby mode are both related to power management. Hibernate mode is a power-saving state that saves the current state of your computer to the hard drive and shuts down, allowing you to resume where you left off when you power it back on. Standby mode, on the other hand, puts your computer into a low-power state while still keeping your session and open documents in memory, allowing for quick resumption of work. Both of these features help conserve power by allowing the computer to enter a low-power state when not in use.

Submit
3. Which of the following types of connectors is used by 1000BASE-TX gigabit ethernet?

Explanation

The correct answer is RJ-45. RJ-45 is a type of connector commonly used for Ethernet connections, including 1000BASE-TX gigabit Ethernet. It is a standard connector that allows for reliable and high-speed data transmission. RJ-45 connectors have eight pins and are typically used with twisted pair cables. They are widely used in networking applications and are compatible with various Ethernet standards. RJ-59 is a different type of connector used for coaxial cables, BNC is another type of connector used for video and RF applications, and LC is a type of connector used for fiber optic cables.

Submit
4. Which of the following is a block of data stored on a client computer by a web browser?

Explanation

A cookie is a block of data stored on a client computer by a web browser. Cookies are used to store information about the user's browsing activity, preferences, and login credentials. This information is then sent back to the server with each subsequent request, allowing the server to personalize the user's experience and remember their settings. Cookies are commonly used for tracking, session management, and targeted advertising purposes.

Submit
5. Which of the following is generally defined as the difference between the brightest color (white) and the darkest color (black)?

Explanation

Contrast ratio is generally defined as the difference between the brightest color (white) and the darkest color (black). It is a measure of the range of tones that can be displayed on a screen or captured by a camera. A high contrast ratio indicates a greater difference between the brightest and darkest colors, resulting in more vibrant and detailed images.

Submit
6. Which of the followintg is a technology that allows you to hear and watch video clips as soon as they start downloading from the Web site, instead of waiting for the download to complete?

Explanation

Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, without having to wait for the download to complete. This technology enables the continuous playback of audio or video content while it is being transferred over the internet. It is commonly used for online video platforms, live streaming, and on-demand services, providing users with immediate access to multimedia content without the need to fully download it beforehand.

Submit
7. Which of the following devices provides input by analyzing printed text, handwriting, or an object?

Explanation

An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert the physical content into digital data that can be processed by a computer. This allows users to easily digitize documents, images, or physical objects and store or manipulate them electronically. Unlike a webcam, which captures live video footage, an image scanner focuses on capturing and converting static visual information into a digital format. Packet analyzers and BD-ROM drives are not designed for analyzing printed text, handwriting, or objects.

Submit
8. Which of the following statements are true about Universal Serial Bus (USB)? Each correct Answer represents a complete solution. Choose two.

Explanation

USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without having to restart the computer. This allows for convenient and seamless connectivity. Additionally, USB allows for the connection of up to 127 peripheral devices to a single USB port, making it a versatile and efficient technology for connecting multiple devices to a computer.

Submit
9. Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Explanation

A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. In this type of attack, the attacker tries to gain unauthorized access to sensitive information such as passwords, PINs, or other confidential data by observing the victim's actions. By physically observing the victim's keystrokes or screen, the attacker can gather valuable information without the victim's knowledge. This type of attack can be easily carried out in public places or shared workspaces where the attacker can easily position themselves to view the victim's screen or keyboard.

Submit
10. Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

Explanation

Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop because it is a widely supported and versatile technology that allows for easy and reliable connections between devices. Bluetooth provides a low-power, short-range wireless connection that is ideal for connecting peripherals like printers and mice to laptops without the need for additional cables or adapters. Additionally, Bluetooth offers a secure and stable connection, making it a popular choice for wireless device connectivity.

Submit
11. Mark has purchased a new working USB webcam. He connects the webcam to a USB port on his computer and finds that the computer does not detect it. He connects other working USB devices to the port and discovers that the USB port is not functioning. What should Mark do first to resolve the issue?

Explanation

Mark should first verify that the USB functionality is enabled in the BIOS. The BIOS (Basic Input/Output System) is responsible for controlling the hardware of the computer, including USB ports. By checking the BIOS settings, Mark can ensure that the USB functionality is enabled and functioning properly. This step is necessary before considering purchasing another webcam, changing the motherboard, or replacing the USB port wires.

Submit
12. Which of the following program is used to collect personal information stored in the computer and send it to a third party without the permission of the user?

Explanation

Spyware is a program that is used to collect personal information stored in the computer and send it to a third party without the permission of the user. It is a type of malicious software that secretly monitors and gathers information about an individual's online activities, such as browsing habits, passwords, and credit card details. This information is then typically used for malicious purposes, such as identity theft or unauthorized access to financial accounts.

Submit
13. Which of the following types of parental controls is used to limit access to the Internet contents?

Explanation

Content filter control is used to limit access to Internet contents by blocking or filtering certain websites or types of content. It allows parents or guardians to restrict access to inappropriate or potentially harmful material, ensuring a safer online experience for children. This type of parental control can be customized to block specific websites, keywords, or categories of content, providing a more tailored and effective approach to internet filtering.

Submit
14. Your customers WinXP machine has become unusable due to some unknown cause. You want to put the computer into a working state again. What is the best way to do this?

Explanation

The best way to put the customer's WinXP machine back into a working state is to use the Windows Recovery Console with the Windows Recovery CD. This option allows the user to access advanced troubleshooting tools and repair the system. Simply putting the Windows Recovery CD in will not initiate the recovery process, and reinstalling Windows may not be necessary if the issue can be resolved using the recovery console. Uninstalling any new software may not address the underlying cause of the problem.

Submit
15. Which of the following programs can collect various types of personal info, such as internet surfing habits and websites that the user has visited?

Explanation

Spyware is a type of program that can collect various types of personal information, including internet surfing habits and websites that the user has visited. It is designed to secretly monitor and gather data about a user's online activities without their knowledge or consent. This information can then be used for malicious purposes, such as identity theft or targeted advertising. Spyware is often installed on a user's device without their knowledge, typically through deceptive tactics or bundled with other software.

Submit
16. Which of the following term is used for any small mobile hand held device that provides computing, information storage and retrieval capabilities for business or personal use?

Explanation

A personal digital assistant (PDA) is a small mobile handheld device that provides computing, information storage, and retrieval capabilities for both business and personal use. PDAs are designed to be portable and offer features such as calendars, address books, note-taking, and task management. They also often have wireless connectivity options, allowing users to access the internet and send/receive emails. PDAs have been widely used in the past for their convenience and functionality, although they have largely been replaced by smartphones in recent years.

Submit
17. Which of the following ports is also known as PS/2?

Explanation

The 6-pin Mini-DIN connector is also known as PS/2. This connector is commonly used for connecting keyboards and mice to computers.

Submit
18. You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

Explanation

The most likely problem is that MAC filtering is blocking the employee's laptop from connecting to the company wireless network. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's laptop is new, it is possible that its MAC address has not been added to the list of allowed devices. This would result in the laptop being blocked from connecting to the network, even if the correct password/passkey is entered.

Submit
19. Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC card, and CompactFlash (CF)?

Explanation

A memory card reader is used for accessing the data on Secure Digital (SD) cards, MMC cards, and CompactFlash (CF) cards. It is a device that allows you to transfer data between your memory card and a computer or other devices. By connecting the memory card reader to a computer, you can easily access and transfer files, photos, videos, and other data from your memory card without the need for the original device the card was used in.

Submit
20. Which of the following devices has an acoustic sensor that provides input by converting sound into electrical signals?

Explanation

A microphone is a device that has an acoustic sensor, which converts sound into electrical signals. It is commonly used to capture audio and provide input for various applications such as recording, voice recognition, and communication. The microphone's acoustic sensor detects sound waves and converts them into electrical signals that can be processed and transmitted to other devices or systems. Therefore, the correct answer is Microphone.

Submit
21. Which of the following software displays advertisements, whether or not the user has consented?

Explanation

Adware is a type of software that displays advertisements without the user's consent. It is often bundled with other free software and installed without the user's knowledge. Adware generates revenue for its developers by displaying ads, which can be intrusive and disruptive to the user's browsing experience. Unlike other options listed, such as Trojan Horse, Honeypot, and Spyware, Adware specifically focuses on displaying advertisements.

Submit
22. Mark works as a Network Administrator for NetTech Inc. The network has 150 Windoes 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware? Each correct Answer represents a complete solution. Choose two.

Explanation

To protect the client computers from malware, Mark will educate the users about the problems arising due to malware and how to avoid it. By providing information and awareness about the risks and consequences of malware infections, users will be more cautious and take necessary precautions while using the internet. This will help in reducing the chances of malware infecting the client computers and ensure a safer network environment.

Submit
23. You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

Explanation

ECC RAM, or Error Correcting Code RAM, is the type of RAM that should be selected to ensure errors are handled effectively. ECC RAM has the ability to detect and correct errors that may occur during data storage and retrieval processes. It uses additional bits to store error correction codes, allowing it to identify and fix errors in real-time. This makes ECC RAM more reliable and stable compared to other types of RAM, making it the ideal choice for someone who is concerned about error handling in their new PC.

Submit
24. Which of the following can be installed in an AGP slot?

Explanation

An AGP slot is specifically designed to accommodate a video card. AGP stands for Accelerated Graphics Port, which is a high-speed interface primarily used for connecting a graphics card to a computer's motherboard. Therefore, a video card is the only option that can be installed in an AGP slot. RAM, microprocessors, and modem cards require different types of slots or connectors to be installed in a computer.

Submit
25. Which of the following methods is based on the user's roles and responsibilities?

Explanation

Role based access control is a method that is based on the user's roles and responsibilities. In this method, access to resources is granted based on the user's assigned role within an organization. Each role has a set of permissions associated with it, and users are granted access based on their assigned role. This approach helps to ensure that users only have access to the resources that are necessary for their job functions, reducing the risk of unauthorized access and potential security breaches.

Submit
26. You have a customer who wants to install WinXP professional on her computer. What is the minimum amount of RAM she must have for this to work?

Explanation

To install Windows XP Professional, the minimum amount of RAM required is 64 MB. This is the smallest amount of memory needed for the operating system to function properly. However, it is important to note that this is the bare minimum requirement and having more RAM would lead to better performance and smoother operation of the computer.

Submit
27. Andrew has a personal computer. One morning, he starts his computer and finds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose Two

Explanation

The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings. The CMOS battery is responsible for providing power to the CMOS chip, which stores the computer's BIOS settings. If the battery fails, it can cause the CMOS chip to fail as well, resulting in the error message. Therefore, the most likely causes of this error are a failed CMOS battery and a failed CMOS chip.

Submit
28. Which of the following statements about a riser card is true?

Explanation

A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected to the motherboard by raising them vertically, providing more space for installation. This is useful when there are limited slots available on the motherboard or when specific configurations require additional expansion capabilities.

Submit
29. Which of the following ports on ac omputer are used to connect a keyboard? Choose two

Explanation

USB and PS/2 ports are used to connect a keyboard to a computer. USB (Universal Serial Bus) is a common port found on most modern computers and is widely used for connecting various peripherals, including keyboards. PS/2 ports, on the other hand, are older ports specifically designed for connecting keyboards and mice. Although less common nowadays, some computers still have PS/2 ports for backward compatibility with older devices. DB-25 and DB-9 ports are not typically used for connecting keyboards.

Submit
30. Which of the following are types of LCD Monitors? Each correct answer represents a complete solution. Choose two that do this.

Explanation

Active Matrix and Passive Matrix are both types of LCD Monitors. Active Matrix LCD monitors use a transistor for each pixel, allowing for faster response times and better image quality. Passive Matrix LCD monitors use a grid of electrodes to control the pixels, resulting in slower response times and lower image quality compared to Active Matrix. X-Matrix is not a type of LCD Monitor.

Submit
31. Which of the following transmits all HTSC HDTV standards and supports 8 channel digital audio?

Explanation

HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only option that transmits all HTSC HDTV standards and supports 8 channel digital audio. DVI (Digital Visual Interface) supports high-quality video signals but does not support audio. S-Video (Separate Video) transmits analog video signals but does not support audio or HDTV standards. SVGA (Super Video Graphics Array) is a video display standard but does not support audio or HDTV standards. HDMI, on the other hand, supports both high-quality video and audio signals, making it the most suitable option for transmitting HTSC HDTV standards with 8 channel digital audio.

Submit
32. You are implementing wireless access at a defense contractor. You must use AES encryption algorithm. Which encryption should you use?

Explanation

WPA2 should be used for implementing wireless access at a defense contractor because it provides the highest level of security among the given options. WEP is outdated and easily cracked, while WPA and TKIP have known vulnerabilities. WPA2, on the other hand, uses the AES encryption algorithm, which is currently considered the most secure encryption method for wireless networks. Therefore, WPA2 is the best choice for ensuring the confidentiality and integrity of sensitive data transmitted over the wireless network.

Submit
33. Which of the following storage device uses SRAM or DRAM?

Explanation

Solid State drives (SSD) use either SRAM (Static Random Access Memory) or DRAM (Dynamic Random Access Memory) as storage devices. SRAM and DRAM are types of volatile memory that can retain data as long as power is supplied to them. SSDs use these types of memory to store data and provide fast access to it. USB flash drives, Blu-ray Discs, and CD drives, on the other hand, do not use SRAM or DRAM as storage devices.

Submit
34. Which of the following defines power management for various types of computers and peripherals?

Explanation

ACPI (Advanced Configuration and Power Interface) is a standard that defines power management for various types of computers and peripherals. It provides a framework for the operating system to control the power usage of hardware components, allowing for efficient power management and conservation. ACPI enables features such as system sleep states, dynamic frequency scaling, and device hot-plugging, making it an essential component in modern computer systems.

Submit
35. Which of the following devices allows television signals to be received by a computer?

Explanation

A Video Capture card is the correct answer because it is a device that allows television signals to be received by a computer. It is used to convert analog video signals from a television or other video source into digital format, which can then be processed and displayed on the computer. This allows users to watch and record television programs on their computers.

Submit
36. Which of the following precautions should be taken to minimize the risk of damage to add on-cards and motherboard? Choose three

Explanation

To minimize the risk of damage to add-on cards and motherboard, three precautions should be taken. Firstly, it is important to keep water and liquids away from them as contact with moisture can cause short circuits and other damage. Secondly, wearing an anti-static wrist strap when handling them is necessary to prevent static electricity from damaging the sensitive components. Lastly, keeping them in anti-static bags helps to protect them from electrostatic discharge and other potential hazards.

Submit
37. You are handling IT supports for a sales company. One of the sales reps complains that his laptop does not have a network card. You wish to add via expansion slot. "What type of expansion card do you use?"

Explanation

PCMCIA stands for Personal Computer Memory Card International Association. It is a type of expansion card that is commonly used to add additional functionality to laptops, such as network cards, modems, or wireless adapters. In this scenario, the sales rep's laptop does not have a network card, so the appropriate expansion card to use would be a PCMCIA card.

Submit
38. Which of following is a 1 terminal standard for energy efficient consumer products?

Explanation

The Energy Star rating is a 1 terminal standard for energy efficient consumer products. This rating is given to products that meet specific energy efficiency guidelines set by the Environmental Protection Agency (EPA) and the Department of Energy (DOE) in the United States. Products with the Energy Star rating are designed to consume less energy and save money on utility bills while still providing high performance and quality. This rating helps consumers make informed decisions when purchasing appliances, electronics, and other products, encouraging the use of energy-efficient technologies and reducing greenhouse gas emissions.

Submit
39. You work as a Network Administrator for NetTec h Inc. The company has a wireless local area network (WLAN). You want to prevent your wireless access point from being accessed by intruders

Explanation

Implementing WEP (Wired Equivalent Privacy) is a suitable solution to prevent unauthorized access to the wireless access point. WEP is a security protocol that encrypts data transmitted over the WLAN, making it difficult for intruders to intercept and understand the information. By implementing WEP, the network administrator can ensure that only authorized users with the correct encryption key can access the network, enhancing the overall security of the WLAN.

Submit
40. Mark works as a Network Administrator for Net Tech Inc. The company has a Win2000 domain based network. A user working on a Win2000 Professional client computer reports that he is unable to access some files on the hard disk. However, he is able to successfully log on and access other files. What should Mark do to resolve the issue?

Explanation

Mark should check the file permissions on the hard disk drive to resolve the issue. This is because the user is able to log on and access some files, but not others. This suggests that the issue is related to the permissions set for those specific files. By checking the file permissions, Mark can ensure that the user has the necessary rights and privileges to access the files that are currently inaccessible.

Submit
41. Which of the following devices has its own BIOS?

Explanation

A video adapter, also known as a graphics card, has its own BIOS. The BIOS (Basic Input/Output System) is a firmware that is responsible for initializing the hardware components of a computer system. In the case of a video adapter, the BIOS is responsible for initializing and configuring the graphics card, allowing it to communicate with the computer's operating system and display output on the monitor. This BIOS contains specific settings and instructions for the video adapter, allowing it to function properly and provide the necessary graphics capabilities.

Submit
42. Which of the following can occur if the power cable runs along with the computer network cable?

Explanation

If the power cable runs along with the computer network cable, it can cause electromagnetic interference (EMI). EMI occurs when the electrical signals from the power cable interfere with the signals in the network cable, resulting in data corruption or loss. This interference can disrupt the functioning of the network and lead to communication errors and performance issues. It is important to separate power cables from network cables to minimize the risk of EMI.

Submit
43. Which of the following substances are restricted under Restriction of Hazardous Substances (RoHS)? Choose all that apply

Explanation

Mercury (Hg), Lead (Pb), and Cadmium (Cd) are all substances that are restricted under Restriction of Hazardous Substances (RoHS). This regulation restricts the use of certain hazardous substances in electrical and electronic equipment to protect human health and the environment. Iron (Fe) is not restricted under RoHS, so it is not included in the answer.

Submit
44. Which of the following maxium resolutions does the UXGA video technology supports?

Explanation

The correct answer is 1600 X 1200. UXGA video technology supports a maximum resolution of 1600 X 1200.

Submit
45. Mark has a computer with a CD-ROM drive. He is unable to open the CD-ROM drive tray by pushing the Eject button on the front panel of the drive. What else can he do to open the tray?

Explanation

When the Eject button on the front panel of the CD-ROM drive is not working, inserting a pen into the eject hole on the drive is a common alternative method to manually open the tray. The eject hole is usually a small hole located near the Eject button and is designed for situations like this, allowing users to manually eject the tray by applying pressure with a small object like a pen.

Submit
46. What is the maximum resolution that the WUXGA video technology supports?

Explanation

WUXGA (Wide Ultra Extended Graphics Array) video technology supports a maximum resolution of 1920 X 1200. This resolution refers to the number of pixels displayed horizontally and vertically on a screen. WUXGA provides a high-quality display with a widescreen aspect ratio, making it suitable for various applications such as multimedia, gaming, and professional use. The other resolution options mentioned in the question (2048 X 1536, 3840 X 2400, and 1600 X 1200) are not the maximum resolutions supported by WUXGA.

Submit
47. You are working with a team that will be bringing in new pcs to a Sales Dept at a company. The sales team would like to keep not only, their old files but systems settings. What should you do?

Explanation

The User State Migration tool is specifically designed for transferring system settings and files from one computer to another. It ensures that not only the files but also the system settings are preserved during the migration process. This tool is the most appropriate solution for the sales team's requirement of keeping their old files and system settings intact on the new machines.

Submit
48. You are responsible for the wireless network at your company. You have been asked to create SSID's for wireless routers. What are the limits on an SSID? Choose two.

Explanation

The correct answer is that an SSID must be 32 or fewer characters long and it is case sensitive. This means that when creating SSIDs for wireless routers, they should not exceed 32 characters in length and the capitalization of letters should be taken into account. This information is important for ensuring the proper functioning and compatibility of the wireless network.

Submit
49. Youa re using infrared devices in your network. You want to improve the quality of connections and achieve better communication between infrared devices. What will you do to achieve this? Choose three.

Explanation

To improve the quality of connections and achieve better communication between infrared devices, three actions can be taken. First, moving the devices closer together will reduce the distance between them, resulting in a stronger and more reliable signal. Second, keeping the devices in line of sight ensures that there are no physical barriers blocking the infrared signals, allowing for uninterrupted communication. Lastly, removing any obstructions between the devices, such as objects or obstacles, will further enhance the signal strength and clarity. These three measures collectively contribute to optimizing the quality of connections and facilitating better communication between infrared devices.

Submit
50. Which of the following is a software program that collects email addresses of users and creates a mailing list to send unwanted emails to the users?

Explanation

A spambot is a software program that collects email addresses of users and creates a mailing list to send unwanted emails to the users. It is designed to automate the process of sending spam emails to a large number of recipients. Spambots are commonly used by spammers to distribute unsolicited and often malicious emails, such as phishing scams or malware-infected attachments. They can cause significant inconvenience and potential harm to individuals and organizations by clogging up email inboxes, spreading malware, and stealing personal information.

Submit
51. Which of the following switches of the ATTRB command clears the attributes of a file?

Explanation

The correct answer is "-". The "-" switch is used with the ATTRB command to clear the attributes of a file. By using this switch, all the attributes associated with the file, such as read-only, hidden, and system, will be removed. This allows the file to be modified, accessed, and viewed without any restrictions or special attributes applied to it.

Submit
52. Which of the following switches of the XCOPY command copies file ownerships and NTFS permission on files while copying the files?

Explanation

The /o switch of the XCOPY command is used to copy file ownerships and NTFS permissions on files while copying them.

Submit
53. At what voltage does a USB host supply power to the USB bus?

Explanation

USB hosts typically supply power to the USB bus at a voltage of 5 volts. This voltage is standard for USB devices and is used to power and charge various devices such as smartphones, tablets, and other peripherals. The 5-volt power supply ensures compatibility and safe operation of USB devices across different platforms and manufacturers.

Submit
54. Which of the following processors have 64-bit data bus width? Choose three

Explanation

The Pentium 4, AMD Athlon, and AMD K6 processors all have a 64-bit data bus width. The data bus width refers to the number of bits that can be transferred simultaneously between the processor and memory. A 64-bit data bus allows for the transfer of larger chunks of data, which can result in improved performance and faster data processing. The 386SX processor, on the other hand, has a 16-bit data bus width, which is significantly smaller.

Submit
55. Which of the following are the advantages of Standby mode over Hibernate mode?

Explanation

Standby mode has a shorter wake-up period compared to Hibernate mode. This means that when the computer is in Standby mode, it can be quickly resumed and ready for use within a shorter amount of time. In contrast, Hibernate mode takes longer to wake up as it saves the current state of the computer onto the hard disk before shutting down. Therefore, Standby mode offers the advantage of a quicker transition from sleep to active mode, allowing users to resume their work or activities more promptly.

Submit
56. Which of the following are dual core processors? Each correct Answer represents a complete solution. Choose two.

Explanation

The AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition are both dual core processors. The AMD Athlon(tm) 64 X2 is a dual-core processor from AMD, while the Intel(r) Pentium(r) processor Extreme Edition is a dual-core processor from Intel.

Submit
57. What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct Answer represents a complete solution. Choose all that apply.

Explanation

Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data transmitted between devices remains intact and has not been tampered with. Encryption secures the data by encoding it, making it unreadable to unauthorized users. Authentication verifies the identity of the devices involved in the communication, ensuring that only trusted devices can access the network. Bandwidth, on the other hand, refers to the amount of data that can be transmitted in a given time and is not directly provided by WTLS.

Submit
58. Which of the following power sources are used to power a laptop?

Explanation

Laptops can be powered by AC power and batteries. AC power refers to the electricity that is supplied through a power outlet, allowing the laptop to be plugged in and charged. On the other hand, laptops also have built-in batteries that store electrical energy and provide power when the laptop is not connected to an outlet. This allows users to use their laptops without being tethered to a power source. Therefore, both AC power and batteries are used to power laptops.

Submit
59. What is the4 maximum data transmission speed of IEEE 802.11b wireless networks?

Explanation

The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This is the correct answer because IEEE 802.11b is a standard for wireless local area networks (WLANs) that operates in the 2.4 GHz frequency band and has a maximum data rate of 11 Mbps.

Submit
60. Which of the following terms refers to proprietary software that is provided to users without payment on a trail basis and is often limited by any combination of functionality, vailability or convenience?

Explanation

Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience. Unlike freeware, which is completely free, shareware typically includes some restrictions or limitations that encourage users to purchase the full version of the software. Shareware allows users to try out the software before deciding whether to buy it, making it a popular distribution model for software developers.

Submit
61. Which of the following term refers to an anti-virus software file that is updated from time to time to protect a computer from a new virus?

Explanation

An anti-virus software file that is updated from time to time to protect a computer from a new virus is referred to as a "definition". Definitions contain information about the characteristics and behavior of viruses, allowing the anti-virus software to detect and remove them from the computer. Regularly updating the definitions ensures that the anti-virus software can effectively identify and protect against new and emerging threats.

Submit
62. What is max color length to connect a device to IEEE 1394a port

Explanation

The maximum color length to connect a device to an IEEE 1394a port is 4.5 meters.

Submit
63. Which one of the following AT attachment (ATA) Standards supports transfer Mode Ultra DMA/133?

Explanation

ATA-7 is the correct answer because it is the ATA standard that supports transfer mode Ultra DMA/133. ATA-6, ATA-4, and ATA-5 do not support this transfer mode.

Submit
64. Which of the following statements about expansion bus is true?

Explanation

The expansion bus is responsible for connecting expansion cards to the system bus. Expansion cards are additional hardware components that can be added to a computer system to enhance its functionality. The system bus, on the other hand, is a communication pathway that connects various components of the computer system, such as the CPU, memory, and input/output devices. Therefore, the expansion bus acts as an intermediary between the expansion cards and the system bus, allowing the cards to communicate with the other components of the computer system.

Submit
65. You have just taken over network support for a small company. They are currently using MAC filtering to secure their wireless network. Is this adequate or not and why or why not?

Explanation

MAC filtering alone is not adequate to secure a wireless network. MAC filtering only allows devices with approved MAC addresses to connect to the network, but it does not provide any encryption to protect the data being transmitted. WEP and WPA encryption should be implemented in addition to MAC filtering to ensure the security of the wireless network.

Submit
66. You are selecting memory for a new computer. You need to use DDR2 memory. However, the catalog from which you are ordering has incomplete information. Which of the following types of RAM does DDR2 come under?

Explanation

DDR2 memory comes under the category of SDRAM (Synchronous Dynamic Random Access Memory). SDRAM is a type of memory that synchronizes with the computer's bus speed, allowing for faster data transfer rates. DDR2 is an improved version of DDR (Double Data Rate) memory, which also falls under the SDRAM category.

Submit
67. Which of the following protocols transmits error messages and network statistics?

Explanation

ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. It is used by network devices to send diagnostic information, such as error messages, to indicate problems with the network or to provide information about the network status. ICMP is commonly used by tools like ping and traceroute to test network connectivity and troubleshoot network issues. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices, TCP (Transmission Control Protocol) is responsible for establishing and maintaining a connection between devices, and NNTP (Network News Transfer Protocol) is used for distributing news articles in a network.

Submit
68. Which of the following are types of social engineering attacks? Choose two.

Explanation

The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks where individuals manipulate human behavior to gain unauthorized access to systems or information. In the first scenario, the attacker uses impersonation to deceive employees and gain physical access to the server. In the second scenario, the attacker uses deception and impersonation to trick a user into revealing their password. Both examples highlight the social engineering aspect of exploiting human vulnerabilities rather than technical vulnerabilities.

Submit
69. Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

Explanation

Anycast is the correct answer because it is an IPv6 address type that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that is assigned that address. This allows for efficient routing and load balancing, as multiple interfaces can share the same anycast address.

Submit
70. WHich of the following bus interfaces are used by the video capture cards? Choose two.

Explanation

The video capture cards use the AGP and PCIe bus interfaces. AGP (Accelerated Graphics Port) is a high-speed interface specifically designed for graphics cards, providing a direct connection between the card and the computer's motherboard. PCIe (Peripheral Component Interconnect Express) is a newer and faster bus interface that is commonly used for various expansion cards, including video capture cards. Both AGP and PCIe offer the necessary bandwidth and performance required for video capture and processing tasks.

Submit
71. What are the benefits of using USB 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply.

Explanation

USB 2.0 offers several benefits over legacy communication ports such as RS-232 and parallel ports. Firstly, it provides easy configuration of hardware devices, allowing for a more user-friendly setup process. Secondly, USB 2.0 supports expansion, allowing for the connection of multiple devices simultaneously. Lastly, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, enabling quicker and more efficient communication between devices.

Submit
72. Which of the following statements about a smart card are true? Each correct answer represents a complete solution. Choose two.

Explanation

A smart card is a device that contains a microprocessor and permanent memory. It is used to securely store public and private keys for long on, email signing and encryption, and file encryption. This means that it can securely store sensitive information such as encryption keys and certificates. Additionally, it can be used for tasks such as email signing and encryption, as well as file encryption.

Submit
73. Which of the following statements about multi-or authentication is true?

Explanation

The correct answer is "It involves two or more methods as part of the authentication process." Multi-factor authentication is a security measure that requires users to provide two or more different types of evidence to verify their identity. This can include something the user knows (password), something the user has (smart card), or something the user is (biometric data). By combining multiple methods, it adds an extra layer of security and makes it more difficult for unauthorized individuals to gain access to sensitive information or systems.

Submit
74. You are responsible for technical support at a company. An employee complains that they cannot open a particular file. When you see the file in Windows Explorer you note that it is in green. What is causing their problem?

Explanation

The file being encrypted by another user is causing the employee's problem. Encryption is a security measure that converts data into a form that cannot be easily understood by unauthorized individuals. When a file is encrypted by another user, it becomes inaccessible to anyone who does not have the encryption key. Therefore, the employee is unable to open the file.

Submit
75. Which of the following are serial interfaces? Choose all that apply.

Explanation

USB and FireWire are both examples of serial interfaces. USB (Universal Serial Bus) is a standard interface that allows for the connection of various devices to a computer. It is widely used for connecting peripherals such as keyboards, mice, printers, and external storage devices. FireWire (also known as IEEE 1394) is another serial interface that is commonly used for high-speed data transfer between devices, particularly in audio and video applications. EPP (Enhanced Parallel Port) and IEEE 1284, on the other hand, are parallel interfaces and not serial interfaces.

Submit
76. Which of the following provides authentication, encryption, and data integrity for wireless devices?

Explanation

WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. WTLS is a security protocol specifically designed for wireless communication, ensuring that data transmitted between devices is secure and protected. It offers authentication to verify the identities of the wireless devices, encryption to protect the confidentiality of the data, and data integrity to ensure that the data has not been tampered with during transmission. Therefore, WTLS is the correct answer for this question.

Submit
77. Which of the following buses has a maximum data transfer rate of 2400 Mbsp?

Explanation

eSATA (External Serial Advanced Technology Attachment) is the correct answer because it has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps, USB 1.1 has a maximum data transfer rate of 12 Mbps, and USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the only option that matches the given data transfer rate of 2400 Mbps.

Submit
78. Which of the following sleep modes is the most power hungry mode?

Explanation

S1 is the most power hungry sleep mode because it is the deepest sleep state where the processor is completely powered off and all the context is saved to the main memory. In this mode, the system consumes the least amount of power, but it takes longer to wake up and resume normal operation.

Submit
79. Which of the following enables third-party developers to create capabilities to extend an application?

Explanation

A plug-in is a software component that allows third-party developers to add new features or functionalities to an existing application. It provides an interface for developers to extend the capabilities of the application without modifying its core code. By creating a plug-in, developers can integrate their own code into the application and enhance its functionality according to their specific needs. This enables the application to be more flexible and customizable, as users can choose which plug-ins to install based on their requirements.

Submit
80. What is the difference between the USB 2.0 and IEEE 1294 bus standards?

Explanation

not-available-via-ai

Submit
81. Which of the following can be used to accomplish authentication? Choose all that apply.

Explanation

Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to the use of unique physical characteristics, such as fingerprints or facial recognition, to verify a person's identity. Passwords are a common method of authentication, where users must enter a secret code to access a system. Tokens are physical devices, such as smart cards or USB tokens, that generate one-time passwords or provide a secure means of authentication. All three methods provide different levels of security and can be used individually or in combination to authenticate users.

Submit
82. You work as a Network Administrator for McNeil Inc. The company has a Windows-based network. You want to upgrade a client computer from Win98 SE to Windows 2000 Professional. Which of the following steps will you take before the upgrade? Choose two.

Explanation

Before upgrading a client computer from Windows 98 SE to Windows 2000 Professional, it is important to verify that each component of the computer is in the hardware compatibility list (HCL). This ensures that all hardware devices and peripherals are compatible with the new operating system and will function properly. Additionally, it is necessary to verify that the client computer meets the minimum requirements for Windows 2000 Professional in order to ensure optimal performance and compatibility. By performing these two steps, the network administrator can ensure a smooth and successful upgrade process.

Submit
83. Youa re responsible for assigning equipment in your company. An employee has requested a docking station. Which of the following would NOT be a valid reason for the employee to request a docking station?

Explanation

not-available-via-ai

Submit
84. You have a customer who wants to move files and settings from an old PC to a new one she is buying. What tool do you recommend?

Explanation

The File and Setting Transfer Wizard is the recommended tool for transferring files and settings from an old PC to a new one. This tool is specifically designed for this purpose and allows for a seamless transfer of files, settings, and even user accounts. It simplifies the process and ensures that all important data and configurations are transferred accurately to the new PC.

Submit
85. Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?

Explanation

The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.

Submit
86. What is the difference bewteen SRAM and DRAM? Choose two

Explanation

SRAM and DRAM differ in two main aspects. Firstly, SRAM has in-built switches, which means that it does not require refreshing. On the other hand, DRAM needs to be refreshed periodically. Secondly, SRAM is faster than DRAM. These differences make SRAM a preferred choice for applications that require high-speed access to data, such as cache memory, while DRAM is commonly used for main memory due to its higher density and lower cost.

Submit
87. You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a compleye solution. Choose all that apply.

Explanation

The correct answer suggests that the second hard disk drive should be installed on the primary IDE controller and designated as a Slave, while the first hard disk drive should be installed on the secondary IDE controller and designated as a Master. This configuration allows for optimal performance and compatibility between the two drives. Additionally, designating both drives as Master on the secondary IDE controller would not be a correct solution, as it can cause conflicts and compatibility issues.

Submit
88. Which of the following expansion slots can be used to plug a SCSI adapter?

Explanation

The VESA, PCI, and EISA expansion slots can be used to plug a SCSI adapter. These slots provide the necessary connectivity and compatibility for the SCSI adapter to be connected to the computer's motherboard. VESA, PCI, and EISA are common expansion slot types found in computers, and they support a wide range of peripherals, including SCSI adapters.

Submit
89. Which of the following provides only blcok based storage and leaves file systems concerns on the client side?

Explanation

A Storage Area Network (SAN) provides only block-based storage, meaning it treats storage as a collection of fixed-size blocks rather than files. SANs leave file system concerns on the client side, allowing the client to manage the file system and file access. This separation of file system concerns allows for more flexibility and scalability in managing storage resources.

Submit
90. Which of the following resolutions is supported by the SVGA video technology?

Explanation

SVGA (Super Video Graphics Array) video technology supports a resolution of 800 x 600. This resolution refers to the number of pixels displayed horizontally and vertically on a screen. SVGA is an enhancement of VGA (Video Graphics Array) and offers higher resolution and color depth. The other resolutions mentioned, 640 x 200, 640 x 480, and 1024 x 768, are not specifically supported by SVGA.

Submit
91. Which of the following sleep modes is also known as Hibernation in Windows operating systems?

Explanation

S4 is the correct answer because it is the sleep mode that is commonly referred to as Hibernation in Windows operating systems. In this mode, the computer saves all open documents and running programs to the hard drive and then shuts down. When the computer is turned back on, it resumes from where it left off, allowing for a quick startup and the restoration of all previously open files and applications.

Submit
92. Which of the following are types of Single Inline Memory Modules (SIMMs)? Choose all that apply.

Explanation

The correct answer is 72 pin and 30 pin. Single Inline Memory Modules (SIMMs) are types of memory modules used in computers. 72 pin SIMMs were commonly used in older computers, while 30 pin SIMMs were used in even older systems. 184-pin and 168-pin are not types of SIMMs, but are instead used for other types of memory modules like DIMMs (Dual Inline Memory Modules).

Submit
93. Which of the following encryption algorithm is used by Wired Equivalent Privacy (WEP)?

Explanation

Wired Equivalent Privacy (WEP) uses the RC4 encryption algorithm. RC4 is a symmetric stream cipher that is widely used in various security protocols. It is known for its simplicity and speed, making it suitable for wireless network encryption like WEP. Despite its initial popularity, RC4 is now considered insecure due to vulnerabilities in its key scheduling algorithm.

Submit
94. Which of the following devices can cause great harm to one's life with lethal electric shocks?

Explanation

SMPS (Switched Mode Power Supply) and Monitor can both cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting and regulating the electrical power from the main supply to the required voltage for the computer components. If not handled properly, it can deliver high voltage electric shocks. Similarly, a faulty or damaged monitor can also pose a risk of electric shock due to exposed wires or internal malfunctions. Floppy drives and keyboards, on the other hand, do not have the capability to cause lethal electric shocks.

Submit
95. You want to add broadband wireless access to a laptop. What type of card will you use to accomplish this?

Explanation

Aircards are specifically designed to provide broadband wireless access to laptops. These cards can be inserted into the laptop's PCMCIA slot or USB port, allowing users to connect to the internet wirelessly. They typically use cellular networks to establish a connection, providing internet access wherever there is cellular coverage. This makes aircards a convenient and portable solution for accessing the internet on the go.

Submit
96. Which of the following are Internet standard protocols for email retrieval? Choose two

Explanation

POP3 and IMAP4 are both Internet standard protocols for email retrieval. POP3 stands for Post Office Protocol version 3 and is used to retrieve emails from a mail server to a client device. IMAP4 stands for Internet Message Access Protocol version 4 and is also used for email retrieval. Both protocols allow users to access and manage their emails, but they have some differences. POP3 typically downloads emails to the client device and removes them from the server, while IMAP4 allows users to view and manage emails directly on the server without downloading them.

Submit
97. Which of the following connectors are used to connect a keyboard to the computer? Choose three

Explanation

The correct answer is the Six-pin mini-DIN connector, USB, and Five pin DIN connector. These connectors are commonly used to connect a keyboard to a computer. The Six-pin mini-DIN connector, also known as PS/2 connector, is a round connector that was widely used in older computers. USB (Universal Serial Bus) is a standard connector that is commonly used for various devices, including keyboards. The Five pin DIN connector is another type of connector that was used in older computers. The Nine-pin D type male connector, on the other hand, is commonly used for serial ports and is not typically used for connecting keyboards.

Submit
98. Which of the following switches of the XCOPY command continues to copy files even if errors occur?

Explanation

The switch "/c" in the XCOPY command allows the copying process to continue even if errors occur. This means that if any files encounter errors during the copying process, the command will not stop and will continue copying the remaining files.

Submit
99. Which of the following types of batteries has shortest life?

Explanation

NiCd batteries have the shortest life compared to the other types of batteries listed. This is because NiCd batteries have a lower energy density and are more prone to memory effect, which reduces their overall lifespan. Additionally, NiCd batteries have a higher self-discharge rate, leading to a shorter shelf life. In comparison, NiMH, lead-acid, and silver-zinc batteries generally have longer lifespans and higher energy densities.

Submit
100. Which of the following processor states does not save power?

Explanation

C0 is the processor state that does not save power. In the C0 state, the processor is fully powered and actively executing instructions. This state consumes the maximum amount of power as the processor is fully operational and not in a low-power mode. On the other hand, C1, C2, and C3 are lower power states where the processor reduces its power consumption by reducing its clock speed, voltage, or by turning off certain components.

Submit
101. Which of the following virus is a script that attaches itself to a file or template?

Explanation

A macro virus is a type of virus that attaches itself to a file or template. It is typically written in a programming language that is used to automate tasks within software applications, such as Microsoft Word or Excel. When the infected file or template is opened, the macro virus is executed and can spread to other files or templates. This type of virus is often spread through email attachments or shared documents, and can cause damage by corrupting or deleting files, or by stealing sensitive information.

Submit
102. Andrew purchases a laptop that has the Win2000 Professional operating system. He wants to know about the BIOS version of the computer. Which of the following steps will he take to determine the version of the BIOS? Choose two.

Explanation

Andrew will determine the version of the BIOS by clicking the Start menu, choosing Programs > Accessories > System Tools > System Information. Then, in the System Information window, he will click the System Summary folder in the left pane. This will provide him with the information about the BIOS version of his computer.

Submit
103. What are the differences between the microprocessor of a desktop and that of a laptop? Choose two.

Explanation

A laptop microprocessor generates less heat than a desktop microprocessor does. This is because laptops are designed to be more compact and portable, so they have limited space for cooling systems. To prevent overheating, laptop microprocessors are designed to consume less power and generate less heat. On the other hand, desktop microprocessors have more space for cooling systems, allowing them to operate at higher power levels and generate more heat without overheating.

Submit
104. In what order are SCSI ID numbers prioritized? Choose all that apply

Explanation

SCSI ID numbers are prioritized in ascending order, with the lowest number being the highest priority. Therefore, the correct answer is 7 = highest and 8 = lowest.

Submit
105. Which of the following devices are known as Input/Output devices? Choose two.

Explanation

The network interface card and the floppy disk drive are known as Input/Output devices. A network interface card allows a computer to connect to a network and send or receive data, making it an input/output device. A floppy disk drive is used to read and write data to floppy disks, making it another example of an input/output device. Both devices are capable of both inputting and outputting data, hence they are classified as Input/Output devices.

Submit
106. Which of the following items are configured on a user workstation for wireless networking? Choose two.

Explanation

The correct answer is Service Set Identifier (SSID) and Encryption. These two items are configured on a user workstation for wireless networking. The Service Set Identifier (SSID) is a unique name that identifies a wireless network, and it is used by devices to connect to the correct network. Encryption is a security measure that protects data transmitted over the wireless network by encoding it, ensuring that only authorized users can access the information. Both the SSID and encryption settings need to be properly configured on a user workstation to establish a secure and functional wireless connection.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 27, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 27, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2011
    Quiz Created by
    Ranger1
Cancel
  • All
    All (106)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following refers to the data rate supported by a network...
Which of the following features are related to power management?...
Which of the following types of connectors is used by 1000BASE-TX...
Which of the following is a block of data stored on a client computer...
Which of the following is generally defined as the difference between...
Which of the followintg is a technology that allows you to hear and...
Which of the following devices provides input by analyzing printed...
Which of the following statements are true about Universal Serial Bus...
Which of the following types of attacks is often performed by looking...
Mark wants to connect a printer and mouse to his laptop. Which of the...
Mark has purchased a new working USB webcam. He connects the webcam to...
Which of the following program is used to collect personal information...
Which of the following types of parental controls is used to limit...
Your customers WinXP machine has become unusable due to some unknown...
Which of the following programs can collect various types of personal...
Which of the following term is used for any small mobile hand held...
Which of the following ports is also known as PS/2?
You are responsible for technical support at a company. One of the...
Which of the following devices is used for accessing the data on...
Which of the following devices has an acoustic sensor that provides...
Which of the following software displays advertisements, whether or...
Mark works as a Network Administrator for NetTech Inc. The network has...
You are selecting RAM for a new PC. You are very concerned about...
Which of the following can be installed in an AGP slot?
Which of the following methods is based on the user's roles and...
You have a customer who wants to install WinXP professional on her...
Andrew has a personal computer. One morning, he starts his computer...
Which of the following statements about a riser card is true?
Which of the following ports on ac omputer are used to connect a...
Which of the following are types of LCD Monitors? Each correct answer...
Which of the following transmits all HTSC HDTV standards and supports...
You are implementing wireless access at a defense contractor. You must...
Which of the following storage device uses SRAM or DRAM?
Which of the following defines power management for various types of...
Which of the following devices allows television signals to be...
Which of the following precautions should be taken to minimize the...
You are handling IT supports for a sales company. One of the sales...
Which of following is a 1 terminal standard for energy efficient...
You work as a Network Administrator for NetTec h Inc. The company has...
Mark works as a Network Administrator for Net Tech Inc. The company...
Which of the following devices has its own BIOS?
Which of the following can occur if the power cable runs along with...
Which of the following substances are restricted under Restriction of...
Which of the following maxium resolutions does the UXGA video...
Mark has a computer with a CD-ROM drive. He is unable to open the...
What is the maximum resolution that the WUXGA video technology...
You are working with a team that will be bringing in new pcs to a...
You are responsible for the wireless network at your company. You have...
Youa re using infrared devices in your network. You want to improve...
Which of the following is a software program that collects email...
Which of the following switches of the ATTRB command clears the...
Which of the following switches of the XCOPY command copies file...
At what voltage does a USB host supply power to the USB bus?
Which of the following processors have 64-bit data bus width? Choose...
Which of the following are the advantages of Standby mode over...
Which of the following are dual core processors?...
What does Wireless Transport Layer Security (WTLS) provide for...
Which of the following power sources are used to power a laptop?
What is the4 maximum data transmission speed of IEEE 802.11b wireless...
Which of the following terms refers to proprietary software that is...
Which of the following term refers to an anti-virus software file that...
What is max color length to connect a device to IEEE 1394a port
Which one of the following AT attachment (ATA) Standards supports...
Which of the following statements about expansion bus is true?
You have just taken over network support for a small company. They are...
You are selecting memory for a new computer. You need to use DDR2...
Which of the following protocols transmits error messages and network...
Which of the following are types of social engineering attacks? Choose...
Which of the following IPv6 address types is a single address that can...
WHich of the following bus interfaces are used by the video capture...
What are the benefits of using USB 2.0 over legacy communication ports...
Which of the following statements about a smart card are true? Each...
Which of the following statements about multi-or authentication is...
You are responsible for technical support at a company. An employee...
Which of the following are serial interfaces? Choose all that apply.
Which of the following provides authentication, encryption, and data...
Which of the following buses has a maximum data transfer rate of 2400...
Which of the following sleep modes is the most power hungry mode?
Which of the following enables third-party developers to create...
What is the difference between the USB 2.0 and IEEE 1294 bus...
Which of the following can be used to accomplish authentication?...
You work as a Network Administrator for McNeil Inc. The company has a...
Youa re responsible for assigning equipment in your company. An...
You have a customer who wants to move files and settings from an old...
Which of the following switches is used with the XCOPY command to copy...
What is the difference bewteen SRAM and DRAM? Choose two
You are installing two hard disk drives on a computer. Which of the...
Which of the following expansion slots can be used to plug a SCSI...
Which of the following provides only blcok based storage and leaves...
Which of the following resolutions is supported by the SVGA video...
Which of the following sleep modes is also known as Hibernation in...
Which of the following are types of Single Inline Memory Modules...
Which of the following encryption algorithm is used by Wired...
Which of the following devices can cause great harm to one's life...
You want to add broadband wireless access to a laptop. What type of...
Which of the following are Internet standard protocols for email...
Which of the following connectors are used to connect a keyboard to...
Which of the following switches of the XCOPY command continues to copy...
Which of the following types of batteries has shortest life?
Which of the following processor states does not save power?
Which of the following virus is a script that attaches itself to a...
Andrew purchases a laptop that has the Win2000 Professional operating...
What are the differences between the microprocessor of a desktop and...
In what order are SCSI ID numbers prioritized? Choose all that apply
Which of the following devices are known as Input/Output devices?...
Which of the following items are configured on a user workstation for...
Alert!

Advertisement