Strata Practice Exam 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By 11bRanger
1
11bRanger
Community Contributor
Quizzes Created: 1 | Total Attempts: 742
| Attempts: 742
SettingsSettings
Please wait...
  • 1/90 Questions

    Which of the following refers to the data rate supported by a network conncection or interface?

    • Bandwidth
    • Preboot Execution Environment (PXE)
    • Branding
    • Spam
Please wait...
About This Quiz

Strata Practice Exam 1 assesses knowledge in key IT areas including hardware installation, video technology, power management, file copying commands, and security features like smart cards. Essential for learners aiming to validate fundamental IT skills.

Strata Practice Exam 1 - Quiz

Quiz Preview

  • 2. 

    Which of the following is the most common laptop battery found today?

    • NiMH

    • Lithium-ion

    • Energizer

    • NiCad

    Correct Answer
    A. Lithium-ion
    Explanation
    Lithium-ion batteries are the most common type of laptop batteries found today. They have become popular due to their high energy density, longer lifespan, and lighter weight compared to other types of batteries. Lithium-ion batteries also have a lower self-discharge rate and do not suffer from the memory effect, making them more efficient and convenient for laptop users. Additionally, they have a higher voltage capacity and can provide a consistent power supply for longer periods of time, making them ideal for portable devices like laptops.

    Rate this question:

  • 3. 

    Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?

    • Min in the middle attack

    • Denial of service (DoS) attack

    • Buffer overflow attack

    • Shoulder surfing attack

    Correct Answer
    A. Shoulder surfing attack
    Explanation
    A shoulder surfing attack is a type of attack where an individual looks surreptitiously at the keyboard or monitor of an employee's computer. This allows the attacker to gather sensitive information such as passwords, login credentials, or confidential data. It is a form of social engineering that relies on the attacker's ability to physically observe the victim's actions. This type of attack can be easily executed in public places like coffee shops or airports, where individuals may be less cautious about protecting their screens or keyboards.

    Rate this question:

  • 4. 

    Which of the following devices provides input by analyzing printed text, handwriting, or an abject?

    • Webcam

    • Image Scanner

    • Packet analyzer

    • BD-ROM drive

    Correct Answer
    A. Image Scanner
    Explanation
    An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents or images into digital format. This allows the user to edit, store, or share the scanned information electronically. Unlike a webcam, which captures live video or images, an image scanner specifically focuses on converting physical documents into digital files. A packet analyzer is used for network analysis, and a BD-ROM drive is used for reading Blu-ray discs.

    Rate this question:

  • 5. 

    Which of the following devices contains no moving parts and stores data in a digital format?

    • Solid state drive

    • Cartridge tape drive

    • Floppy disk drive

    • Hard disk drive

    Correct Answer
    A. Solid state drive
    Explanation
    A solid state drive is a device that contains no moving parts and stores data in a digital format. Unlike other options such as a cartridge tape drive, floppy disk drive, or hard disk drive, a solid state drive uses flash memory to store data, making it more reliable and faster in terms of data access. This technology has become increasingly popular due to its durability, low power consumption, and faster read/write speeds, making it a preferred choice for many electronic devices such as computers and smartphones.

    Rate this question:

  • 6. 

    Which of the following software displays advertisements, whether or not the user has consented?

    • Trojan horse

    • Honeypot

    • Spyware

    • Adware

    Correct Answer
    A. Adware
    Explanation
    Adware is a type of software that displays advertisements on a user's device, regardless of whether or not the user has given consent. Unlike other software options listed, such as Trojan horse, Honeypot, and Spyware, Adware specifically focuses on generating revenue through advertising. It is designed to track user behavior and display targeted ads, often disrupting the user's browsing experience. Therefore, Adware is the correct answer to the question.

    Rate this question:

  • 7. 

    Which of the following stores user preferences related to a Web site?

    • Cookie

    • SSID

    • Local user profile

    • MAC address

    Correct Answer
    A. Cookie
    Explanation
    A cookie is a small piece of data that is stored on the user's computer by a website. It is used to store user preferences and information related to the website, such as login credentials, language preferences, and shopping cart contents. This allows the website to remember the user's preferences and provide a personalized experience. Cookies are commonly used in web development to enhance user experience and track user behavior on the site.

    Rate this question:

  • 8. 

    Which of the following ports on a computer are used to connect a keyboard? Choose two

    • USB

    • DB-25

    • PS/2

    • DB-9

    Correct Answer(s)
    A. USB
    A. PS/2
    Explanation
    USB and PS/2 are the correct answers because these ports are commonly used to connect keyboards to a computer. USB (Universal Serial Bus) ports are the most common and widely used ports for connecting peripherals, including keyboards. PS/2 ports, on the other hand, are older and less common but still found on some computers. PS/2 ports are specifically designed for connecting keyboards and mice. DB-25 and DB-9 are not used for connecting keyboards, but rather for other purposes such as serial communication or printer connections.

    Rate this question:

  • 9. 

    Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?

    • Session initiation Protocol

    • Streaming Media

    • HTTP streaming

    • Slipstreaming

    Correct Answer
    A. Streaming Media
    Explanation
    Streaming media is the correct answer because it is a technology that enables users to hear and watch video clips while they are still being downloaded from a website. This eliminates the need to wait for the entire download to complete before accessing the content. Streaming media works by sending small portions of the video or audio file in a continuous stream, allowing users to start experiencing the content in real-time.

    Rate this question:

  • 10. 

    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

    • Bluetooth

    • 802. 11

    • 802. 11b

    • Infrared

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported wireless technology that allows for easy and seamless connections between devices. It has a decent range and is capable of transmitting data at a high speed, making it suitable for connecting peripherals like printers and mice to a laptop. Additionally, Bluetooth is energy-efficient, which helps to conserve battery life on both the laptop and the connected devices.

    Rate this question:

  • 11. 

    Which of the following can be installed in an AGP slot?

    • Video card

    • RAM

    • Micoprocessor

    • Modem card

    Correct Answer
    A. Video card
    Explanation
    An AGP slot is specifically designed to accommodate a video card. It provides a high-speed connection between the video card and the computer's motherboard, allowing for efficient data transfer and enhanced graphics performance. Therefore, a video card is the only option that can be installed in an AGP slot, making it the correct answer.

    Rate this question:

  • 12. 

    Which of the following features are related to power management? Choose two

    • Hot plugging

    • Hibernate mode

    • Standy mode

    • Safe mode

    Correct Answer(s)
    A. Hibernate mode
    A. Standy mode
    Explanation
    Hibernate mode and Standby mode are both related to power management. Hibernate mode allows the computer to save the current state and power off completely, while Standby mode allows the computer to enter a low-power state where it can quickly resume operations. Both features help conserve power and extend battery life in laptops and other devices.

    Rate this question:

  • 13. 

    Which of the following interfaces has the ability to support digital audio as well as video through a single cable?

    • VGA

    • HDMI

    • SVGA

    • DVI

    Correct Answer
    A. HDMI
    Explanation
    HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only interface listed that has the ability to support both digital audio and video through a single cable. VGA (Video Graphics Array) and SVGA (Super Video Graphics Array) are analog interfaces that only support video, while DVI (Digital Visual Interface) supports only video and requires a separate audio cable. HDMI, on the other hand, is a digital interface that can transmit high-quality audio and video signals simultaneously, making it the ideal choice for connecting devices such as TVs, monitors, and audio systems.

    Rate this question:

  • 14. 

    Which of the following types of parental controls is used to limit access to the internet contents?

    • Content filter control

    • Bandwidth control

    • Usage management tool

    • Monitoring control

    Correct Answer
    A. Content filter control
    Explanation
    Content filter control is used to limit access to internet contents by blocking or filtering certain websites or types of content. It allows parents to restrict their children's access to inappropriate or harmful content, ensuring a safer internet experience. This type of parental control can be set up on devices or through internet service providers, and it helps parents to control and monitor the online activities of their children.

    Rate this question:

  • 15. 

    Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?

    • DVI

    • S-Video

    • SVGA

    • HDMI

    Correct Answer
    A. HDMI
    Explanation
    HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only option that transmits all ATSC HDTV standards and supports 8-channel digital audio. DVI (Digital Visual Interface) does not support audio, S-Video does not support HDTV standards, and SVGA (Super Video Graphics Array) does not support audio or HDTV standards.

    Rate this question:

  • 16. 

    Which of the following is an international standard for energy efficient consumer products?

    • Energy star rating

    • Standby mode

    • Trusted Computer System Evaluation Criteria(TCSEC

    • Advanced Configuration and Power Interface(ACPI)

    Correct Answer
    A. Energy star rating
    Explanation
    The Energy Star rating is an international standard for energy efficient consumer products. It is a program developed by the United States Environmental Protection Agency (EPA) and the Department of Energy (DOE) that aims to promote energy efficiency and reduce greenhouse gas emissions. Products that meet the Energy Star criteria are designed to consume less energy and perform efficiently, saving consumers money and reducing their environmental impact. The Energy Star rating is recognized globally and is used to identify energy-efficient appliances, electronics, and other consumer products.

    Rate this question:

  • 17. 

    Which of the following programs can collect various types fo personal information, such as internet surfing habits, and Web sites that the user has visited?

    • Malware

    • Spyware

    • Honeypot

    • Worm

    Correct Answer
    A. Spyware
    Explanation
    Spyware is a type of program that can collect various types of personal information, such as internet surfing habits and websites that the user has visited. Unlike malware, which is a broader term encompassing various malicious software, spyware specifically focuses on gathering personal information without the user's knowledge or consent. Honeypots are decoy systems used to lure and detect hackers, while worms are self-replicating malware that can spread across networks. Therefore, the correct answer in this case is spyware.

    Rate this question:

  • 18. 

    You have a wireless printer that is connected to your Windows XP laptop via infrared, and it prints proplerly. However, when you relocate the wireless infrared printer, you find that your laptop is not able to send print jobs to the printer. What is the most likely cause of the issue?

    • The printer driver is uninstalled from the laptop

    • The printer driver is not updated on the laptop

    • Printer is located at the distance of more than three feet from the laptop

    • The printing option is disabled in the control panel on the laptop

    Correct Answer
    A. Printer is located at the distance of more than three feet from the laptop
    Explanation
    The most likely cause of the issue is that the printer is located at a distance of more than three feet from the laptop. Infrared connections have a limited range, typically around three feet, so if the printer is moved further away, the laptop will not be able to send print jobs to it.

    Rate this question:

  • 19. 

    You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?

    • His operating system is incompatible.

    • A firewall is blocking him

    • His laptop is incompatable

    • MAC filtering is blocking him

    Correct Answer
    A. MAC filtering is blocking him
    Explanation
    The problem is that MAC filtering is blocking him. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's new laptop is not on the approved list of MAC addresses, it is being blocked from connecting to the company wireless network.

    Rate this question:

  • 20. 

    Which of the following protocols handles the reliable delivery data?

    • TCP

    • ARP

    • IPX

    • UDP

    Correct Answer
    A. TCP
    Explanation
    TCP (Transmission Control Protocol) handles the reliable delivery of data. Unlike UDP (User Datagram Protocol), TCP ensures that data is delivered without errors, in the correct order, and with minimal delay. TCP achieves reliability through various mechanisms such as acknowledgment of received data, retransmission of lost packets, and flow control to prevent overwhelming the recipient. ARP (Address Resolution Protocol) is responsible for mapping IP addresses to MAC addresses, IPX (Internetwork Packet Exchange) is a network layer protocol used in Novell NetWare networks, while UDP is a connectionless protocol that does not guarantee reliable delivery.

    Rate this question:

  • 21. 

    Which of the following statements is true about modem?

    • It amplifies the digital signals

    • It converts digital signals into analog signals and vice versa

    • It reduces the noise in analog signal.

    • It converts AC current to DC current and vice versa

    Correct Answer
    A. It converts digital signals into analog signals and vice versa
    Explanation
    A modem is a device that allows computers to connect to the internet by converting digital signals from the computer into analog signals that can be transmitted over telephone lines. It also performs the opposite function, converting analog signals received from the telephone lines back into digital signals that the computer can understand. This conversion process enables communication between digital devices and analog telephone lines, making it possible for data to be transmitted over long distances. Therefore, the statement "It converts digital signals into analog signals and vice versa" is true about modems.

    Rate this question:

  • 22. 

    Which of the following ports is also known as PS/2

    • 6 - pin Mini-Din connector

    • 5- pin DIN connector

    • 4 - pin Mini-Din connector

    • USB connector

    Correct Answer
    A. 6 - pin Mini-Din connector
    Explanation
    The correct answer is 6-pin Mini-Din connector. This connector is commonly used for connecting keyboards and mice to computers. It is also known as the PS/2 port because it was originally introduced by IBM for their Personal System/2 computers. The 6-pin Mini-Din connector has a round shape and is typically color-coded, with purple for keyboards and green for mice. It has been largely replaced by USB connectors in modern computers, but some older systems may still have PS/2 ports for compatibility with legacy devices.

    Rate this question:

  • 23. 

    Which of the following storage devices uses SRAM or DRAM?

    • USB flash drive

    • Solid state drive(SSD)

    • Blu ray disc

    • CD drive

    Correct Answer
    A. Solid state drive(SSD)
    Explanation
    Solid state drives (SSDs) use either SRAM (Static Random Access Memory) or DRAM (Dynamic Random Access Memory) as their primary storage medium. SRAM and DRAM are types of volatile memory that can retain data as long as power is supplied. SSDs use these types of memory because they provide fast access times and high data transfer rates, making them ideal for storing and retrieving data quickly. Unlike traditional hard disk drives (HDDs) which use mechanical components, SSDs have no moving parts, resulting in faster read and write speeds, lower power consumption, and increased durability.

    Rate this question:

  • 24. 

    Which of the following color code is used for a PS/2 keyboard connector on new motherboards?

    • Purple

    • Pink

    • Green

    • Blue

    Correct Answer
    A. Purple
    Explanation
    The correct answer is purple. The PS/2 keyboard connector on new motherboards is typically color-coded purple. This color coding helps users easily identify and connect their PS/2 keyboards to the appropriate port on the motherboard. The other color options listed (pink, green, and blue) are not commonly associated with the PS/2 keyboard connector.

    Rate this question:

  • 25. 

    Which of the following refers to a location away from the computer center where document copies and backups are kept?

    • Off Site storage

    • Network attached storage

    • Storage Area network

    • On site storage

    Correct Answer
    A. Off Site storage
    Explanation
    Off Site storage refers to a location away from the computer center where document copies and backups are kept. This is done to ensure that data is protected in case of any disaster or damage to the computer center. By storing copies and backups off site, organizations can safeguard their data and easily retrieve it when needed. This practice is essential for data security and business continuity.

    Rate this question:

  • 26. 

    Which of the following maximum resolutions does the UXGA video technology supports?

    • 2560 x 1600

    • 1600 x 1200

    • 2048 x 1536

    • 1280 x 1024

    Correct Answer
    A. 1600 x 1200
    Explanation
    The UXGA video technology supports a maximum resolution of 1600 x 1200.

    Rate this question:

  • 27. 

    Which of the following statements are true about USB? Choose two

    • USB supports hot plugging

    • You can connect up to 127 peripheral devices to a single USB port

    • You can connect up to 16 peripheral devices to a single USB port

    • USB does not support plug n play installation

    Correct Answer(s)
    A. USB supports hot plugging
    A. You can connect up to 127 peripheral devices to a single USB port
    Explanation
    USB supports hot plugging, which means that you can connect and disconnect USB devices without having to restart the computer. This feature allows for easy and convenient use of USB devices. Additionally, you can connect up to 127 peripheral devices to a single USB port, making it a versatile and efficient way to connect multiple devices to a computer.

    Rate this question:

  • 28. 

    Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?

    • E book reader

    • Memory card reader

    • Smart card reader

    • Barcode reader

    Correct Answer
    A. Memory card reader
    Explanation
    A memory card reader is used for accessing the data on Secure Digital SD card, MMC, and CompactFlash (CF). This device allows users to transfer data from these types of memory cards to a computer or other devices, making it easier to access and manage the stored information.

    Rate this question:

  • 29. 

    Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two

    • SMPS

    • Floppy drive

    • Monitor

    • Keyboard

    Correct Answer(s)
    A. SMPS
    A. Monitor
    Explanation
    SMPS (Switched Mode Power Supply) and Monitor can cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting and regulating the electrical power supply, and if not handled properly, it can deliver high voltage electric shocks. Similarly, a faulty or damaged monitor can also pose a risk of electric shock due to exposed wires or faulty insulation. Floppy drives and keyboards are not typically associated with delivering lethal electric shocks.

    Rate this question:

  • 30. 

    You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorith. Which encryption standards should you use?

    • WEP

    • WPA

    • TKIP

    • WPA 2

    Correct Answer
    A. WPA 2
    Explanation
    The correct answer is WPA 2. WEP (Wired Equivalent Privacy) is an outdated encryption standard that is easily hacked, so it should not be used. WPA (Wi-Fi Protected Access) is an improvement over WEP but is also vulnerable to certain attacks. TKIP (Temporal Key Integrity Protocol) is a security protocol used with WPA to enhance its security, but it is also considered less secure compared to the newer encryption standards. WPA 2 (Wi-Fi Protected Access 2) is the most secure and up-to-date encryption standard that should be implemented for wireless access at a defense contractor.

    Rate this question:

  • 31. 

    What is the mazimum resolution that the WUXGA video technology supports?

    • 2048 x 1536

    • 1920 x 1200

    • 3840 x 2400

    • 1600 x 1200

    Correct Answer
    A. 1920 x 1200
    Explanation
    WUXGA video technology supports a maximum resolution of 1920 x 1200. This means that the technology can display images or videos with a width of 1920 pixels and a height of 1200 pixels.

    Rate this question:

  • 32. 

    Which of the following statements about a riser card is true?

    • It is used to connect a computer in a network

    • It is used to connect extra microprocessors

    • It provides extra memory for expansion cards

    • It is used to extend slots for expansion cards.

    Correct Answer
    A. It is used to extend slots for expansion cards.
    Explanation
    A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected vertically, providing more flexibility for adding peripherals or upgrading the system. This is different from the other options provided, as a riser card does not connect the computer to a network, add extra microprocessors, or provide extra memory for expansion cards.

    Rate this question:

  • 33. 

    You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?

    • 128 Megabytes

    • 64 Megabytes

    • 2 Gigabytes

    • 1 Gigabyte

    Correct Answer
    A. 64 Megabytes
    Explanation
    Windows XP Professional requires a minimum of 64 Megabytes of RAM to function properly. This amount of memory is sufficient for the operating system to run basic tasks and applications. However, it is important to note that this is the minimum requirement, and for optimal performance, it is recommended to have more RAM installed.

    Rate this question:

  • 34. 

    You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

    • Rambus

    • Non Parity RAM

    • ECC RAM

    • Logic Parity RAM

    Correct Answer
    A. ECC RAM
    Explanation
    ECC RAM, or Error Correcting Code RAM, should be selected for the new PC to ensure that errors are handled properly. ECC RAM is designed to detect and correct errors that occur during data storage and retrieval. It uses additional bits to store error correction codes, allowing it to identify and fix single-bit errors and detect multi-bit errors. This makes ECC RAM more reliable and suitable for systems that require high data integrity, such as servers or workstations used for critical tasks.

    Rate this question:

  • 35. 

    Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?

    • Simply put the Windows Recovery CD in and the recovery process will start

    • Reinstall Windows

    • Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state

    • Simply uninstall any new software.

    Correct Answer
    A. Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state
    Explanation
    The best way to put the customer's Windows XP machine into a working state again is to use the Windows recovery console with the Windows recovery CD. This will allow the user to access advanced troubleshooting options and repair any system files or settings that may be causing the issue. Reinstalling Windows or uninstalling new software may not address the underlying problem, while using the recovery console provides a more targeted and effective solution.

    Rate this question:

  • 36. 

    Your office uses Windows vista. A patch was applied automatically. Suddenly the users who have scanners attached to their computers complain that they cannot access the scanners. When you check their device manager, you notice there is on exlamation point next to the scanner. What should you do now?

    • Reinstall vista

    • Find a Vista compatible scanner

    • Manually uninstall and reinstall the device driver

    • Roll back the patch

    Correct Answer
    A. Manually uninstall and reinstall the device driver
    Explanation
    After the patch was applied automatically, the users with scanners attached to their computers started experiencing issues. When checking the device manager, an exclamation point is seen next to the scanner, indicating a driver problem. Therefore, the best course of action would be to manually uninstall and reinstall the device driver. This will help troubleshoot any conflicts caused by the patch and ensure that the scanner can be accessed properly again. Reinstalling Vista or finding a Vista compatible scanner may not necessarily resolve the driver issue. Rolling back the patch could be an option, but it may not be necessary if the driver reinstallation solves the problem.

    Rate this question:

  • 37. 

    At what voltage does a USB host supply power to the USB bus?

    • 15 volts

    • 5 vots

    • 50 volts

    • 3 volts

    Correct Answer
    A. 5 vots
    Explanation
    A USB host supplies power to the USB bus at a voltage of 5 volts. This is the standard voltage for USB power supply. It is important to maintain this voltage as it ensures compatibility and safe operation of USB devices. Higher voltages can cause damage to the devices, while lower voltages may not provide sufficient power for proper functioning. Therefore, 5 volts is the correct answer for the given question.

    Rate this question:

  • 38. 

    Which of the following software can also be used as a basic security measure?

    • Adware

    • Visual TimeAnalyzer

    • Screensaver

    • Cookie

    Correct Answer
    A. Screensaver
    Explanation
    A screensaver can be used as a basic security measure because it helps to protect the privacy of the computer user. When a computer is left idle for a certain period of time, the screensaver activates and displays a moving image or pattern on the screen. This prevents unauthorized users from viewing sensitive information that may be displayed on the screen. Additionally, screensavers can be configured to require a password to exit, adding an extra layer of security to the computer.

    Rate this question:

  • 39. 

    Which of the following aims to restrict certain dangerous substances commonly used in electronics equipment?

    • RoHS directive

    • IEEE standards

    • IETF standards

    • W3C standards

    Correct Answer
    A. RoHS directive
    Explanation
    The RoHS directive aims to restrict certain dangerous substances commonly used in electronics equipment. It stands for Restriction of Hazardous Substances and is a European Union directive that limits the use of substances such as lead, mercury, cadmium, and certain flame retardants in electronic products. This directive is implemented to protect human health and the environment from the harmful effects of these substances.

    Rate this question:

  • 40. 

    Which of the following are the most likely causes of virus attack? Choose all that apply

    • Installing an application from an unreliable source

    • Downloading a file from an unknown Website

    • Installing a DLL file from an unrelieable souce

    • Using a floppy, a compact disk, or a pen drive from an unreliable souce

    Correct Answer(s)
    A. Installing an application from an unreliable source
    A. Downloading a file from an unknown Website
    A. Installing a DLL file from an unrelieable souce
    A. Using a floppy, a compact disk, or a pen drive from an unreliable souce
    Explanation
    The most likely causes of a virus attack include installing an application from an unreliable source, downloading a file from an unknown website, installing a DLL file from an unreliable source, and using a floppy, a compact disk, or a pen drive from an unreliable source. These actions can expose a computer to malicious software and increase the risk of a virus infecting the system. It is important to be cautious and only download or install files from trusted sources to protect against virus attacks.

    Rate this question:

  • 41. 

    Which of the following sleep modes is the most power hungry mode?

    • S1

    • S2

    • S0

    • S3

    Correct Answer
    A. S1
    Explanation
    S1 sleep mode is the most power hungry mode among the given options. In S1 sleep mode, also known as "Standby" or "Suspend to RAM," the computer enters a low-power state where the CPU and other components are powered down, but the RAM remains active. This allows for a quick wake-up time as the system can resume from where it left off. However, since the RAM still requires power to maintain its data, S1 mode consumes more power compared to other sleep modes like S2, S0, or S3.

    Rate this question:

  • 42. 

    Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?

    • /p

    • /s

    • /r

    • /o

    Correct Answer
    A. /o
    Explanation
    The correct answer is /o. The /o switch is used with the XCOPY command to copy the ownership and NTFS permissions of the files while copying them. This switch ensures that the copied files retain the same permissions and ownership as the original files.

    Rate this question:

  • 43. 

    Which of the following power sources are used to power a laptop?

    • Solar panel

    • AC power

    • Battery

    • Docking station

    Correct Answer(s)
    A. AC power
    A. Battery
    Explanation
    Laptops can be powered using AC power and batteries. AC power refers to the electricity supplied through a power outlet, which is commonly used when the laptop is connected to a charger. On the other hand, laptops also have built-in batteries that can store electrical energy and provide power when the laptop is not connected to an outlet. These batteries can be recharged using AC power. Therefore, both AC power and batteries are used to power a laptop.

    Rate this question:

  • 44. 

    Andrew has a personal computer. One morning, he starts his computer and hinds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose two

    • BIOS has become outdated.

    • The CMOS battery has failed.

    • The CMOS chip has failed

    • Software stored in the CMOS battery is infected by a virus.

    Correct Answer(s)
    A. The CMOS battery has failed.
    A. The CMOS chip has failed
    Explanation
    The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings in Andrew's computer. The CMOS battery is responsible for maintaining these settings, so if it has failed, it can cause this error. Additionally, if the CMOS chip itself has failed, it can also result in a checksum failure. Therefore, the most likely causes of this error are a failed CMOS battery and a failed CMOS chip.

    Rate this question:

  • 45. 

    Which of the following can occur if the power cable runs along with the computer network cable?

    • EMI

    • ESD

    • Broadcast Storm

    • Surge

    Correct Answer
    A. EMI
    Explanation
    If the power cable runs along with the computer network cable, it can lead to Electromagnetic Interference (EMI). EMI occurs when the electrical signals from the power cable interfere with the signals from the network cable, causing distortion or disruption in the network communication. This can result in poor network performance, data errors, or even complete network failure. It is important to keep power cables and network cables separated to minimize the risk of EMI.

    Rate this question:

  • 46. 

    Which of the following conditions does BIOS need to be updated? Choose two

    • If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS

    • If the operating system installed on the computer has bugs

    • If the BIOS does not support new devices

    • If the software application installed on the computer stops responding frequintly.

    Correct Answer(s)
    A. If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS
    A. If the BIOS does not support new devices
    Explanation
    BIOS needs to be updated in two conditions. Firstly, if users need to utilize new hardware features or options that are supported by the motherboard but not supported by the computer BIOS. Secondly, if the BIOS does not support new devices. In both cases, updating the BIOS is necessary to ensure compatibility and proper functioning of the hardware.

    Rate this question:

  • 47. 

    Which of the following are types of LCD monitors? Choose two

    • SVGA

    • Active Matrix

    • Passive Matrix

    • X-Matrix

    Correct Answer(s)
    A. Active Matrix
    A. Passive Matrix
    Explanation
    Active Matrix and Passive Matrix are both types of LCD monitors. Active Matrix refers to a type of display technology that uses thin film transistors (TFTs) to control each individual pixel on the screen, resulting in faster response times and better image quality. Passive Matrix, on the other hand, uses a grid of electrodes to control the pixels, which is less expensive but can lead to slower response times and lower image quality compared to Active Matrix. X-Matrix is not a recognized type of LCD monitor. SVGA refers to a resolution standard and is not specifically a type of LCD monitor.

    Rate this question:

  • 48. 

    Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?

    • Spyware

    • Shareware

    • Freeware

    • Adware

    Correct Answer
    A. Shareware
    Explanation
    Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.

    Rate this question:

  • 49. 

    Which of the following enables third pary developers to create capabilites to extend an application?

    • Plug in

    • Virtual machine

    • Hotfix

    • JavaScript

    Correct Answer
    A. Plug in
    Explanation
    A plug-in is a software component that allows third-party developers to extend the functionality of an application. It provides an interface for developers to add new features or modify existing ones without altering the core code of the application. By creating plug-ins, developers can enhance the application's capabilities and tailor it to meet specific user needs. This enables a more customizable and flexible experience for users, as they can choose the plug-ins that best suit their requirements.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2011
    Quiz Created by
    11bRanger
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.