Strata Practice Exam 1-25 50-150

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ranger1
R
Ranger1
Community Contributor
Quizzes Created: 3 | Total Attempts: 687
Questions: 107 | Attempts: 76

SettingsSettingsSettings
Strata Practice Exam 1-25 50-150 - Quiz

STRATA Practice Exam
Good Luck!


Questions and Answers
  • 1. 

    You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a compleye solution. Choose all that apply.

    • A.

      Install the second hard disk drive on the primary IDE controller. Designate one drive as Master and the other as Slave.

    • B.

      Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on primary IDE controller. Designate both drives as Master.

    • C.

      Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on the primary controller. Desidnate the second hard disk drive as Slave.

    • D.

      Install both the hard disk drives on the primary IDE controller. Designate both drives as Secondary

    Correct Answer(s)
    A. Install the second hard disk drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
    B. Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on primary IDE controller. Designate both drives as Master.
    Explanation
    The correct answer suggests that the second hard disk drive should be installed on the primary IDE controller and designated as a Slave, while the first hard disk drive should be installed on the secondary IDE controller and designated as a Master. This configuration allows for optimal performance and compatibility between the two drives. Additionally, designating both drives as Master on the secondary IDE controller would not be a correct solution, as it can cause conflicts and compatibility issues.

    Rate this question:

  • 2. 

    Which of the following maxium resolutions does the UXGA video technology supports?

    • A.

      2560 x 1600

    • B.

      1600 X 1200

    • C.

      2048 X 1536

    • D.

      1280 X 1024

    Correct Answer
    B. 1600 X 1200
    Explanation
    The correct answer is 1600 X 1200. UXGA video technology supports a maximum resolution of 1600 X 1200.

    Rate this question:

  • 3. 

    Which of the following sleep modes is the most power hungry mode?

    • A.

      S1

    • B.

      S2

    • C.

      S0

    • D.

      S3

    Correct Answer
    A. S1
    Explanation
    S1 is the most power hungry sleep mode because it is the deepest sleep state where the processor is completely powered off and all the context is saved to the main memory. In this mode, the system consumes the least amount of power, but it takes longer to wake up and resume normal operation.

    Rate this question:

  • 4. 

    Which of the following switches of the XCOPY command copies file ownerships and NTFS permission on files while copying the files?

    • A.

      /p

    • B.

      /s

    • C.

      /r

    • D.

      /o

    Correct Answer
    D. /o
    Explanation
    The /o switch of the XCOPY command is used to copy file ownerships and NTFS permissions on files while copying them.

    Rate this question:

  • 5. 

    Step 1 - Talk to the Customer Step 2 - Document Your Work Step 3 - Continue to gather information Step 4 - Eliminate possibilities to find the problem Step 5 - Test your results

  • 6. 

    Which of the following statements about a smart card are true? Each correct answer represents a complete solution. Choose two.

    • A.

      It is used to securely store public and private keys for long on, email signing and encryption, and file encryption.

    • B.

      It is a device that works as an interface between a computer and a network

    • C.

      It is a device that routes data packets between computers in different network

    • D.

      It is a device that contains a microprocessor and permanent memory

    Correct Answer(s)
    A. It is used to securely store public and private keys for long on, email signing and encryption, and file encryption.
    D. It is a device that contains a microprocessor and permanent memory
    Explanation
    A smart card is a device that contains a microprocessor and permanent memory. It is used to securely store public and private keys for long on, email signing and encryption, and file encryption. This means that it can securely store sensitive information such as encryption keys and certificates. Additionally, it can be used for tasks such as email signing and encryption, as well as file encryption.

    Rate this question:

  • 7. 

    Which of the following ports is also known as PS/2?

    • A.

      6-pin Mini-DIN connector

    • B.

      5-pin DIN connector

    • C.

      4-pin Mini-DIN connector

    • D.

      USB Connector

    Correct Answer
    A. 6-pin Mini-DIN connector
    Explanation
    The 6-pin Mini-DIN connector is also known as PS/2. This connector is commonly used for connecting keyboards and mice to computers.

    Rate this question:

  • 8. 

    Which of the following statements are true about Universal Serial Bus (USB)? Each correct Answer represents a complete solution. Choose two.

    • A.

      USB supports hot plugging

    • B.

      You can connect up to 127 peripheral devices to a single USB port

    • C.

      You can connect up to 16 peripheral devices to a single USB port

    • D.

      USB does not support Plug n Play installation

    Correct Answer(s)
    A. USB supports hot plugging
    B. You can connect up to 127 peripheral devices to a single USB port
    Explanation
    USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without having to restart the computer. This allows for convenient and seamless connectivity. Additionally, USB allows for the connection of up to 127 peripheral devices to a single USB port, making it a versatile and efficient technology for connecting multiple devices to a computer.

    Rate this question:

  • 9. 

    Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

    • A.

      Man-in-the-middle attack

    • B.

      Denial-of0Service (DoS) attack

    • C.

      Buffer-overflow attack

    • D.

      Shoulder surfing attack

    Correct Answer
    D. Shoulder surfing attack
    Explanation
    A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. In this type of attack, the attacker tries to gain unauthorized access to sensitive information such as passwords, PINs, or other confidential data by observing the victim's actions. By physically observing the victim's keystrokes or screen, the attacker can gather valuable information without the victim's knowledge. This type of attack can be easily carried out in public places or shared workspaces where the attacker can easily position themselves to view the victim's screen or keyboard.

    Rate this question:

  • 10. 

    You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

    • A.

      His operating system is incompatible

    • B.

      A firewall is blocking him

    • C.

      His laptop is incompatible

    • D.

      MAC filtering is blocking him

    Correct Answer
    D. MAC filtering is blocking him
    Explanation
    The most likely problem is that MAC filtering is blocking the employee's laptop from connecting to the company wireless network. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's laptop is new, it is possible that its MAC address has not been added to the list of allowed devices. This would result in the laptop being blocked from connecting to the network, even if the correct password/passkey is entered.

    Rate this question:

  • 11. 

    Which of the followintg is a technology that allows you to hear and watch video clips as soon as they start downloading from the Web site, instead of waiting for the download to complete?

    • A.

      Session Initiation protocol

    • B.

      Streaming Media

    • C.

      HTTP streaming

    • D.

      Slipstreaming

    Correct Answer
    B. Streaming Media
    Explanation
    Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, without having to wait for the download to complete. This technology enables the continuous playback of audio or video content while it is being transferred over the internet. It is commonly used for online video platforms, live streaming, and on-demand services, providing users with immediate access to multimedia content without the need to fully download it beforehand.

    Rate this question:

  • 12. 

    Which of the following refers to the data rate supported by a network connection or interface?

    • A.

      Bandwidth

    • B.

      Preboot Execution Environment (PXE)

    • C.

      Branding

    • D.

      Spam

    Correct Answer
    A. Bandwidth
    Explanation
    Bandwidth refers to the data rate supported by a network connection or interface. It represents the maximum amount of data that can be transmitted over a network in a given amount of time. A higher bandwidth allows for faster data transfer, while a lower bandwidth may result in slower or limited data transmission.

    Rate this question:

  • 13. 

    Which of the following are serial interfaces? Choose all that apply.

    • A.

      EPP

    • B.

      USB

    • C.

      FireWire

    • D.

      IEEE 1284

    Correct Answer(s)
    B. USB
    C. FireWire
    Explanation
    USB and FireWire are both examples of serial interfaces. USB (Universal Serial Bus) is a standard interface that allows for the connection of various devices to a computer. It is widely used for connecting peripherals such as keyboards, mice, printers, and external storage devices. FireWire (also known as IEEE 1394) is another serial interface that is commonly used for high-speed data transfer between devices, particularly in audio and video applications. EPP (Enhanced Parallel Port) and IEEE 1284, on the other hand, are parallel interfaces and not serial interfaces.

    Rate this question:

  • 14. 

    Which of the following devices has its own BIOS?

    • A.

      Hard disk drive

    • B.

      Sound card

    • C.

      Network interface card

    • D.

      Video adapter

    Correct Answer
    D. Video adapter
    Explanation
    A video adapter, also known as a graphics card, has its own BIOS. The BIOS (Basic Input/Output System) is a firmware that is responsible for initializing the hardware components of a computer system. In the case of a video adapter, the BIOS is responsible for initializing and configuring the graphics card, allowing it to communicate with the computer's operating system and display output on the monitor. This BIOS contains specific settings and instructions for the video adapter, allowing it to function properly and provide the necessary graphics capabilities.

    Rate this question:

  • 15. 

    Which of the following are dual core processors? Each correct Answer represents a complete solution. Choose two.

    • A.

      AMD Athlon(tm) 64 X2

    • B.

      Intel Pentium 4

    • C.

      Intel(r) Pentium(r) processor Extreme Edition

    • D.

      AMD Athlon (tm)

    Correct Answer(s)
    A. AMD Athlon(tm) 64 X2
    C. Intel(r) Pentium(r) processor Extreme Edition
    Explanation
    The AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition are both dual core processors. The AMD Athlon(tm) 64 X2 is a dual-core processor from AMD, while the Intel(r) Pentium(r) processor Extreme Edition is a dual-core processor from Intel.

    Rate this question:

  • 16. 

    Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?

    • A.

      /q

    • B.

      /o

    • C.

      /s

    • D.

      /e

    Correct Answer
    D. /e
    Explanation
    The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.

    Rate this question:

  • 17. 

    Which of the following provides authentication, encryption, and data integrity for wireless devices?

    • A.

      PAP

    • B.

      WAN

    • C.

      WAP

    • D.

      WTLS

    Correct Answer
    D. WTLS
    Explanation
    WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. WTLS is a security protocol specifically designed for wireless communication, ensuring that data transmitted between devices is secure and protected. It offers authentication to verify the identities of the wireless devices, encryption to protect the confidentiality of the data, and data integrity to ensure that the data has not been tampered with during transmission. Therefore, WTLS is the correct answer for this question.

    Rate this question:

  • 18. 

    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

    • A.

      Bluetooth

    • B.

      802.11

    • C.

      802.11b

    • D.

      Infrared

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop because it is a widely supported and versatile technology that allows for easy and reliable connections between devices. Bluetooth provides a low-power, short-range wireless connection that is ideal for connecting peripherals like printers and mice to laptops without the need for additional cables or adapters. Additionally, Bluetooth offers a secure and stable connection, making it a popular choice for wireless device connectivity.

    Rate this question:

  • 19. 

    What is the maximum resolution that the WUXGA video technology supports?

    • A.

      2048 X 1536

    • B.

      1920 X 1200

    • C.

      3840 X 2400

    • D.

      1600 X 1200

    Correct Answer
    B. 1920 X 1200
    Explanation
    WUXGA (Wide Ultra Extended Graphics Array) video technology supports a maximum resolution of 1920 X 1200. This resolution refers to the number of pixels displayed horizontally and vertically on a screen. WUXGA provides a high-quality display with a widescreen aspect ratio, making it suitable for various applications such as multimedia, gaming, and professional use. The other resolution options mentioned in the question (2048 X 1536, 3840 X 2400, and 1600 X 1200) are not the maximum resolutions supported by WUXGA.

    Rate this question:

  • 20. 

    What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct Answer represents a complete solution. Choose all that apply.

    • A.

      Data integrity

    • B.

      Encryption

    • C.

      Bandwidth

    • D.

      Authentication

    Correct Answer(s)
    A. Data integrity
    B. Encryption
    D. Authentication
    Explanation
    Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data transmitted between devices remains intact and has not been tampered with. Encryption secures the data by encoding it, making it unreadable to unauthorized users. Authentication verifies the identity of the devices involved in the communication, ensuring that only trusted devices can access the network. Bandwidth, on the other hand, refers to the amount of data that can be transmitted in a given time and is not directly provided by WTLS.

    Rate this question:

  • 21. 

    Which of the following software displays advertisements, whether or not the user has consented?

    • A.

      Trojan Horse

    • B.

      Honeypot

    • C.

      Spyware

    • D.

      Adware

    Correct Answer
    D. Adware
    Explanation
    Adware is a type of software that displays advertisements without the user's consent. It is often bundled with other free software and installed without the user's knowledge. Adware generates revenue for its developers by displaying ads, which can be intrusive and disruptive to the user's browsing experience. Unlike other options listed, such as Trojan Horse, Honeypot, and Spyware, Adware specifically focuses on displaying advertisements.

    Rate this question:

  • 22. 

    Which of the following protocols transmits error messages and network statistics?

    • A.

      ICMP

    • B.

      DHCP

    • C.

      TCP

    • D.

      NNTP

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. It is used by network devices to send diagnostic information, such as error messages, to indicate problems with the network or to provide information about the network status. ICMP is commonly used by tools like ping and traceroute to test network connectivity and troubleshoot network issues. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices, TCP (Transmission Control Protocol) is responsible for establishing and maintaining a connection between devices, and NNTP (Network News Transfer Protocol) is used for distributing news articles in a network.

    Rate this question:

  • 23. 

    Which of the following power sources are used to power a laptop?

    • A.

      Solar panel

    • B.

      AC power

    • C.

      Battery

    • D.

      Docking Station

    Correct Answer(s)
    B. AC power
    C. Battery
    Explanation
    Laptops can be powered by AC power and batteries. AC power refers to the electricity that is supplied through a power outlet, allowing the laptop to be plugged in and charged. On the other hand, laptops also have built-in batteries that store electrical energy and provide power when the laptop is not connected to an outlet. This allows users to use their laptops without being tethered to a power source. Therefore, both AC power and batteries are used to power laptops.

    Rate this question:

  • 24. 

    Mark works as a Network Administrator for NetTech Inc. The network has 150 Windoes 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware? Each correct Answer represents a complete solution. Choose two.

    • A.

      Educate users of the client computers about the problems arising due to malware

    • B.

      Educate users of the client computers to avoid malware

    • C.

      Prevent users of the client computers from executing any programs

    • D.

      Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

    Correct Answer(s)
    A. Educate users of the client computers about the problems arising due to malware
    B. Educate users of the client computers to avoid malware
    Explanation
    To protect the client computers from malware, Mark will educate the users about the problems arising due to malware and how to avoid it. By providing information and awareness about the risks and consequences of malware infections, users will be more cautious and take necessary precautions while using the internet. This will help in reducing the chances of malware infecting the client computers and ensure a safer network environment.

    Rate this question:

  • 25. 

    You have a customer who wants to install WinXP professional on her computer. What is the minimum amount of RAM she must have for this to work?

    • A.

      129 MB

    • B.

      64 MB

    • C.

      2 GB

    • D.

      1 GB

    Correct Answer
    B. 64 MB
    Explanation
    To install Windows XP Professional, the minimum amount of RAM required is 64 MB. This is the smallest amount of memory needed for the operating system to function properly. However, it is important to note that this is the bare minimum requirement and having more RAM would lead to better performance and smoother operation of the computer.

    Rate this question:

  • 26. 

    You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

    • A.

      RamBus

    • B.

      Non Parity RAM

    • C.

      ECC RAM

    • D.

      Logic Parity RAM

    Correct Answer
    C. ECC RAM
    Explanation
    ECC RAM, or Error Correcting Code RAM, is the type of RAM that should be selected to ensure errors are handled effectively. ECC RAM has the ability to detect and correct errors that may occur during data storage and retrieval processes. It uses additional bits to store error correction codes, allowing it to identify and fix errors in real-time. This makes ECC RAM more reliable and stable compared to other types of RAM, making it the ideal choice for someone who is concerned about error handling in their new PC.

    Rate this question:

  • 27. 

    What is the4 maximum data transmission speed of IEEE 802.11b wireless networks?

    • A.

      54 Mbps

    • B.

      600 Mbps

    • C.

      600 Gbps

    • D.

      11 Mbps

    Correct Answer
    D. 11 Mbps
    Explanation
    The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This is the correct answer because IEEE 802.11b is a standard for wireless local area networks (WLANs) that operates in the 2.4 GHz frequency band and has a maximum data rate of 11 Mbps.

    Rate this question:

  • 28. 

    Which of the following types of parental controls is used to limit access to the Internet contents?

    • A.

      Conent filter control

    • B.

      Bandwidth control

    • C.

      Usage management tool

    • D.

      Monitoring control

    Correct Answer
    A. Conent filter control
    Explanation
    Content filter control is used to limit access to Internet contents by blocking or filtering certain websites or types of content. It allows parents or guardians to restrict access to inappropriate or potentially harmful material, ensuring a safer online experience for children. This type of parental control can be customized to block specific websites, keywords, or categories of content, providing a more tailored and effective approach to internet filtering.

    Rate this question:

  • 29. 

    Andrew has a personal computer. One morning, he starts his computer and finds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose Two

    • A.

      BIOS has become outdated

    • B.

      The CMOS battery has failed

    • C.

      The CMOS chip has failed

    • D.

      Software stored in the CMOS battery is infected by a virus

    Correct Answer(s)
    B. The CMOS battery has failed
    C. The CMOS chip has failed
    Explanation
    The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings. The CMOS battery is responsible for providing power to the CMOS chip, which stores the computer's BIOS settings. If the battery fails, it can cause the CMOS chip to fail as well, resulting in the error message. Therefore, the most likely causes of this error are a failed CMOS battery and a failed CMOS chip.

    Rate this question:

  • 30. 

    What are the benefits of using USB 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply.

    • A.

      Easy configuration of hardware devices

    • B.

      Expansion

    • C.

      Security

    • D.

      Speed

    Correct Answer(s)
    A. Easy configuration of hardware devices
    B. Expansion
    D. Speed
    Explanation
    USB 2.0 offers several benefits over legacy communication ports such as RS-232 and parallel ports. Firstly, it provides easy configuration of hardware devices, allowing for a more user-friendly setup process. Secondly, USB 2.0 supports expansion, allowing for the connection of multiple devices simultaneously. Lastly, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, enabling quicker and more efficient communication between devices.

    Rate this question:

  • 31. 

    Which of the following sleep modes is also known as Hibernation in Windows operating systems?

    • A.

      S3

    • B.

      S2

    • C.

      S4

    • D.

      S1

    Correct Answer
    C. S4
    Explanation
    S4 is the correct answer because it is the sleep mode that is commonly referred to as Hibernation in Windows operating systems. In this mode, the computer saves all open documents and running programs to the hard drive and then shuts down. When the computer is turned back on, it resumes from where it left off, allowing for a quick startup and the restoration of all previously open files and applications.

    Rate this question:

  • 32. 

    Which of the following can occur if the power cable runs along with the computer network cable?

    • A.

      EMI

    • B.

      ESD

    • C.

      Broadcast storm

    • D.

      Surge

    Correct Answer
    A. EMI
    Explanation
    If the power cable runs along with the computer network cable, it can cause electromagnetic interference (EMI). EMI occurs when the electrical signals from the power cable interfere with the signals in the network cable, resulting in data corruption or loss. This interference can disrupt the functioning of the network and lead to communication errors and performance issues. It is important to separate power cables from network cables to minimize the risk of EMI.

    Rate this question:

  • 33. 

    Which of the following are types of social engineering attacks? Choose two.

    • A.

      An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee

    • B.

      An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two host.

    • C.

      An unauthorized person calls a user and pretends to be a system administrator in orber to get the user's password

    • D.

      An unauthorized person modifies packet headers by using someone else's IP address to his identity.

    Correct Answer(s)
    A. An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee
    C. An unauthorized person calls a user and pretends to be a system administrator in orber to get the user's password
    Explanation
    The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks where individuals manipulate human behavior to gain unauthorized access to systems or information. In the first scenario, the attacker uses impersonation to deceive employees and gain physical access to the server. In the second scenario, the attacker uses deception and impersonation to trick a user into revealing their password. Both examples highlight the social engineering aspect of exploiting human vulnerabilities rather than technical vulnerabilities.

    Rate this question:

  • 34. 

    Your customers WinXP machine has become unusable due to some unknown cause. You want to put the computer into a working state again. What is the best way to do this?

    • A.

      Simply put the Windows Recovery CD in and the recovery process will start

    • B.

      Reinstall Windows

    • C.

      Use the Windows Recovery Console witht he Windoes Recovery CD to put the system back in a working state

    • D.

      Simply uninstall any new software

    Correct Answer
    C. Use the Windows Recovery Console witht he Windoes Recovery CD to put the system back in a working state
    Explanation
    The best way to put the customer's WinXP machine back into a working state is to use the Windows Recovery Console with the Windows Recovery CD. This option allows the user to access advanced troubleshooting tools and repair the system. Simply putting the Windows Recovery CD in will not initiate the recovery process, and reinstalling Windows may not be necessary if the issue can be resolved using the recovery console. Uninstalling any new software may not address the underlying cause of the problem.

    Rate this question:

  • 35. 

    Which of the following terms refers to proprietary software that is provided to users without payment on a trail basis and is often limited by any combination of functionality, vailability or convenience?

    • A.

      Spyware

    • B.

      Shareware

    • C.

      Freeware

    • D.

      Adware

    Correct Answer
    B. Shareware
    Explanation
    Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience. Unlike freeware, which is completely free, shareware typically includes some restrictions or limitations that encourage users to purchase the full version of the software. Shareware allows users to try out the software before deciding whether to buy it, making it a popular distribution model for software developers.

    Rate this question:

  • 36. 

    Which of the following buses has a maximum data transfer rate of 2400 Mbsp?

    • A.

      FireWire 800

    • B.

      ESATA

    • C.

      USB 1.1

    • D.

      USB 2.0

    Correct Answer
    B. ESATA
    Explanation
    eSATA (External Serial Advanced Technology Attachment) is the correct answer because it has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps, USB 1.1 has a maximum data transfer rate of 12 Mbps, and USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the only option that matches the given data transfer rate of 2400 Mbps.

    Rate this question:

  • 37. 

    Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

    • A.

      Unicast

    • B.

      Multicast

    • C.

      Loopback

    • D.

      Anycast

    Correct Answer
    D. Anycast
    Explanation
    Anycast is the correct answer because it is an IPv6 address type that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that is assigned that address. This allows for efficient routing and load balancing, as multiple interfaces can share the same anycast address.

    Rate this question:

  • 38. 

    Which of the following can be installed in an AGP slot?

    • A.

      Video card

    • B.

      RAM

    • C.

      Microprocessor

    • D.

      Modem card

    Correct Answer
    A. Video card
    Explanation
    An AGP slot is specifically designed to accommodate a video card. AGP stands for Accelerated Graphics Port, which is a high-speed interface primarily used for connecting a graphics card to a computer's motherboard. Therefore, a video card is the only option that can be installed in an AGP slot. RAM, microprocessors, and modem cards require different types of slots or connectors to be installed in a computer.

    Rate this question:

  • 39. 

    At what voltage does a USB host supply power to the USB bus?

    • A.

      15 volts

    • B.

      5 volts

    • C.

      50 volts

    • D.

      3 volts

    Correct Answer
    B. 5 volts
    Explanation
    USB hosts typically supply power to the USB bus at a voltage of 5 volts. This voltage is standard for USB devices and is used to power and charge various devices such as smartphones, tablets, and other peripherals. The 5-volt power supply ensures compatibility and safe operation of USB devices across different platforms and manufacturers.

    Rate this question:

  • 40. 

    Which of the following enables third-party developers to create capabilities to extend an application?

    • A.

      Plug-in

    • B.

      Virtual machine

    • C.

      Hotfix

    • D.

      JavaScript

    Correct Answer
    A. Plug-in
    Explanation
    A plug-in is a software component that allows third-party developers to add new features or functionalities to an existing application. It provides an interface for developers to extend the capabilities of the application without modifying its core code. By creating a plug-in, developers can integrate their own code into the application and enhance its functionality according to their specific needs. This enables the application to be more flexible and customizable, as users can choose which plug-ins to install based on their requirements.

    Rate this question:

  • 41. 

    Which of the following statements about multi-or authentication is true?

    • A.

      It uses a Key Distribution Center (KDC)

    • B.

      It protects a computer from malicious software such as worms

    • C.

      It involves two or more methods as part of the authentication process

    • D.

      It is a process in which a client process and a server are required to prove their indentities to each other before performing any application function.

    Correct Answer
    C. It involves two or more methods as part of the authentication process
    Explanation
    The correct answer is "It involves two or more methods as part of the authentication process." Multi-factor authentication is a security measure that requires users to provide two or more different types of evidence to verify their identity. This can include something the user knows (password), something the user has (smart card), or something the user is (biometric data). By combining multiple methods, it adds an extra layer of security and makes it more difficult for unauthorized individuals to gain access to sensitive information or systems.

    Rate this question:

  • 42. 

    What is the difference between the USB 2.0 and IEEE 1294 bus standards?

    • A.

      IEEE 1394 is faster than USB 2.0

    • B.

      IEEE 1394 supports hot swapping

    • C.

      IEEE 1394 is slower than USB 2.0

    • D.

      USB 2.0 supports Plug and Play feature.

    Correct Answer
    C. IEEE 1394 is slower than USB 2.0
  • 43. 

    Which of the following devices provides input by analyzing printed text, handwriting, or an object?

    • A.

      Webcam

    • B.

      Image scanner

    • C.

      Packet analyzer

    • D.

      BD-ROM Drive

    Correct Answer
    B. Image scanner
    Explanation
    An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert the physical content into digital data that can be processed by a computer. This allows users to easily digitize documents, images, or physical objects and store or manipulate them electronically. Unlike a webcam, which captures live video footage, an image scanner focuses on capturing and converting static visual information into a digital format. Packet analyzers and BD-ROM drives are not designed for analyzing printed text, handwriting, or objects.

    Rate this question:

  • 44. 

    Which of the following substances are restricted under Restriction of Hazardous Substances (RoHS)? Choose all that apply

    • A.

      Mercury (Hg)

    • B.

      Lead (Pb)

    • C.

      Iron (Fe)

    • D.

      Cadmium (Cd)

    Correct Answer(s)
    A. Mercury (Hg)
    B. Lead (Pb)
    D. Cadmium (Cd)
    Explanation
    Mercury (Hg), Lead (Pb), and Cadmium (Cd) are all substances that are restricted under Restriction of Hazardous Substances (RoHS). This regulation restricts the use of certain hazardous substances in electrical and electronic equipment to protect human health and the environment. Iron (Fe) is not restricted under RoHS, so it is not included in the answer.

    Rate this question:

  • 45. 

    Which of the following statements about a riser card is true?

    • A.

      It is used to connect a computer in a network

    • B.

      It is used to connect extra microprocessors

    • C.

      It provides extra memory for expansion cards

    • D.

      It is used to extend to slots for expansion cards

    Correct Answer
    D. It is used to extend to slots for expansion cards
    Explanation
    A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected to the motherboard by raising them vertically, providing more space for installation. This is useful when there are limited slots available on the motherboard or when specific configurations require additional expansion capabilities.

    Rate this question:

  • 46. 

    Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC card, and CompactFlash (CF)?

    • A.

      E-book reader

    • B.

      Memory card reader

    • C.

      Smart card reader

    • D.

      Barcode reader

    Correct Answer
    B. Memory card reader
    Explanation
    A memory card reader is used for accessing the data on Secure Digital (SD) cards, MMC cards, and CompactFlash (CF) cards. It is a device that allows you to transfer data between your memory card and a computer or other devices. By connecting the memory card reader to a computer, you can easily access and transfer files, photos, videos, and other data from your memory card without the need for the original device the card was used in.

    Rate this question:

  • 47. 

    Which of the following can be used to accomplish authentication? Choose all that apply.

    • A.

      Biometrics

    • B.

      Encryption

    • C.

      Password

    • D.

      Token

    Correct Answer(s)
    A. Biometrics
    C. Password
    D. Token
    Explanation
    Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to the use of unique physical characteristics, such as fingerprints or facial recognition, to verify a person's identity. Passwords are a common method of authentication, where users must enter a secret code to access a system. Tokens are physical devices, such as smart cards or USB tokens, that generate one-time passwords or provide a secure means of authentication. All three methods provide different levels of security and can be used individually or in combination to authenticate users.

    Rate this question:

  • 48. 

    Which of the following devices can cause great harm to one's life with lethal electric shocks?

    • A.

      SMPS

    • B.

      Floppy drive

    • C.

      Monitor

    • D.

      Keyboard

    Correct Answer(s)
    A. SMPS
    C. Monitor
    Explanation
    SMPS (Switched Mode Power Supply) and Monitor can both cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting and regulating the electrical power from the main supply to the required voltage for the computer components. If not handled properly, it can deliver high voltage electric shocks. Similarly, a faulty or damaged monitor can also pose a risk of electric shock due to exposed wires or internal malfunctions. Floppy drives and keyboards, on the other hand, do not have the capability to cause lethal electric shocks.

    Rate this question:

  • 49. 

    Which of the following ports on ac omputer are used to connect a keyboard? Choose two

    • A.

      USB

    • B.

      DB-25

    • C.

      PS/2

    • D.

      DB-9

    Correct Answer(s)
    A. USB
    C. PS/2
    Explanation
    USB and PS/2 ports are used to connect a keyboard to a computer. USB (Universal Serial Bus) is a common port found on most modern computers and is widely used for connecting various peripherals, including keyboards. PS/2 ports, on the other hand, are older ports specifically designed for connecting keyboards and mice. Although less common nowadays, some computers still have PS/2 ports for backward compatibility with older devices. DB-25 and DB-9 ports are not typically used for connecting keyboards.

    Rate this question:

  • 50. 

    Which of the following features are related to power management? Choose two.

    • A.

      Hot plugging

    • B.

      Hibernate mode

    • C.

      Standby mode

    • D.

      Safe mode

    Correct Answer(s)
    B. Hibernate mode
    C. Standby mode
    Explanation
    Hibernate mode and standby mode are both related to power management. Hibernate mode is a power-saving state that saves the current state of your computer to the hard drive and shuts down, allowing you to resume where you left off when you power it back on. Standby mode, on the other hand, puts your computer into a low-power state while still keeping your session and open documents in memory, allowing for quick resumption of work. Both of these features help conserve power by allowing the computer to enter a low-power state when not in use.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 27, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2011
    Quiz Created by
    Ranger1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.