# Strata Practice Exam 25-50

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
| By Ranger1
R
Ranger1
Community Contributor
Quizzes Created: 3 | Total Attempts: 689
Questions: 21 | Attempts: 475

Settings

• 1.

### In which of the following sizes are the Express Card modules available? Choose two.

• A.

54 mm Wide

• B.

64 mm Wide

• C.

20 mm Wide

• D.

34 mm Wide

A. 54 mm Wide
D. 34 mm Wide
Explanation
Express Card modules are available in two sizes: 54 mm wide and 34 mm wide. These sizes refer to the width of the modules. Therefore, the correct answer is 54 mm Wide and 34 mm Wide.

Rate this question:

• 2.

### Which of the following statements about the DVI-I connector are true? Choose two

• A.

It contains 4 more more pins than the DVI-D connector

• B.

It is used only for digital signal connection

• C.

It is used for both digital and analog signal connections

• D.

It contains 15 more pins than the DVI-D connector

A. It contains 4 more more pins than the DVI-D connector
C. It is used for both digital and analog signal connections
Explanation
The DVI-I connector is capable of supporting both digital and analog signal connections, making the statement "It is used for both digital and analog signal connections" true. Additionally, the DVI-I connector has 4 or more pins than the DVI-D connector, making the statement "It contains 4 more or more pins than the DVI-D connector" true.

Rate this question:

• 3.

### Your client currently has Win98 and wishes to upgrade to WinXP. What is the most efficient way to accomplish this goal?

• A.

• B.

Install a full copy of WinXP

• C.

First upgrade to Win2000, then to WinXP

• D.

You cannot upgrade from Win98 to XP

Explanation
The most efficient way to upgrade from Win98 to WinXP is to buy and install the WinXP Upgrade. This option allows the client to directly upgrade their operating system without the need for any intermediate steps or installations. It is a straightforward and streamlined process that saves time and effort compared to other options such as installing a full copy of WinXP or upgrading first to Win2000 and then to WinXP.

Rate this question:

• 4.

### Which of the following is the most common laptop battery found today?

• A.

NiMH

• B.

Lithium Ion

• C.

Energizer

• D.

B. Lithium Ion
Explanation
Lithium Ion batteries are the most common type of laptop battery found today. These batteries offer a high energy density, longer lifespan, and lighter weight compared to other types of batteries. They also have a low self-discharge rate, allowing them to hold their charge for longer periods of time. Additionally, Lithium Ion batteries do not suffer from the memory effect, which means they do not need to be fully discharged before recharging. These advantages make Lithium Ion batteries the preferred choice for laptops and other portable electronic devices.

Rate this question:

• 5.

### Which of the following refers to a location away from the computer center where document copies and backup media are kept?

• A.

Off-site storage

• B.

Network attached storage

• C.

Storage Area network

• D.

On-site storage

A. Off-site storage
Explanation
Off-site storage refers to a location away from the computer center where document copies and backup media are kept. This is done to ensure that in case of any disaster or damage to the computer center, the important data and backups are safe and can be accessed from an alternate location. By storing the documents and backup media off-site, organizations can minimize the risk of losing critical information and ensure business continuity.

Rate this question:

• 6.

### Which of the following statements is true about modem?

• A.

It amplifies the digital signals

• B.

It converts digital signals into analog signals and vice versa

• C.

It reduces the noise in analog signal

• D.

It converts AC current to DC current and vice versa

B. It converts digital signals into analog signals and vice versa
Explanation
A modem is a device that allows computers to connect to the internet. It works by converting digital signals from the computer into analog signals that can be transmitted over telephone lines or cable lines. On the receiving end, the modem converts the analog signals back into digital signals that the computer can understand. This allows for the transmission of data between computers and the internet. Therefore, the statement "It converts digital signals into analog signals and vice versa" is true.

Rate this question:

• 7.

### Which of the following devices contains no moving parts and stores data in a digital format?

• A.

Solid-state drives

• B.

Cartridge tape drive

• C.

Floppy disk drive

• D.

Hard disk drive

A. Solid-state drives
Explanation
Solid-state drives (SSDs) contain no moving parts and store data in a digital format. Unlike traditional hard disk drives (HDDs) that use spinning disks to read and write data, SSDs use flash memory technology to store data electronically. This makes SSDs faster, more reliable, and less prone to physical damage or failure. Cartridge tape drives, floppy disk drives, and hard disk drives all have moving parts and do not store data in a purely digital format. Therefore, SSDs are the only option in the given list that fits the description.

Rate this question:

• 8.

### Which of the follopwing statements about the G3 state of a computer are true? Choose two

• A.

It is a normal working state of a computer

• B.

A complete power loss occurs in this state such as power cord unplugged from a computer

• C.

A computer can be disassembled in this state

• D.

This state is also known as soft off

B. A complete power loss occurs in this state such as power cord unplugged from a computer
C. A computer can be disassembled in this state
Explanation
In the G3 state of a computer, a complete power loss occurs, such as when the power cord is unplugged from the computer. Additionally, a computer can be disassembled in this state.

Rate this question:

• 9.

### Which of the following display standards provides four times more pixels than an 800 x 600 display?

• A.

SXGA

• B.

SXGA +

• C.

SVGA

• D.

UXGA

D. UXGA
Explanation
UXGA stands for Ultra eXtended Graphics Array, which is a display standard that provides four times more pixels than an 800 x 600 display. This means that UXGA has a resolution of 1600 x 1200 pixels, which is four times the number of pixels found in an 800 x 600 display. Therefore, UXGA is the correct answer.

Rate this question:

• 10.

### Which of the following statements is true about a brownout?

• A.

It is the situation of voltage drop in power supply

• B.

It supplies power to the devices in case of a power failure

• C.

It is a brief decrease in voltage at the power source

• D.

It is a device used to filter out the effects of voltage spikes and surges

A. It is the situation of voltage drop in power supply
Explanation
A brownout refers to a situation of voltage drop in the power supply. This means that the voltage level provided by the power source temporarily decreases, which can cause a reduction in the performance of electrical devices. Unlike a blackout where the power is completely cut off, a brownout still allows some level of power supply but at a lower voltage than normal. This can lead to dimming lights, slower device operation, and potential damage to sensitive electronics.

Rate this question:

• 11.

### Which of the following protocols handles the reliable delivery of data?

• A.

TCP

• B.

ARP

• C.

IPX

• D.

UDP

A. TCP
Explanation
TCP (Transmission Control Protocol) is the correct answer because it is specifically designed to provide reliable delivery of data over a network. It ensures that data packets are delivered in the correct order, without errors, and with acknowledgment from the receiving end. TCP uses various mechanisms like sequencing, acknowledgment, and retransmission to guarantee reliable delivery, making it suitable for applications that require error-free and ordered data transmission, such as web browsing, file transfer, and email. In contrast, UDP (User Datagram Protocol) does not provide reliable delivery and is more suitable for applications where speed and efficiency are prioritized over reliability. ARP (Address Resolution Protocol) and IPX (Internetwork Packet Exchange) are network protocols that handle different functions and do not specifically deal with reliable data delivery.

Rate this question:

• 12.

### Your office uses Windows Vista. This morning, a patch was applied automatically. Suddenly, the users who have scanners attached to their computers complain that they cannot access the scanners. When you check their Device manager, you notice there is no excalmation point next to the scanner. What should you do now?

• A.

Reinstall Vista

• B.

Find a Vista compatible scanner

• C.

Manually unistall and reinstall the device driver

• D.

Roll back the patch

C. Manually unistall and reinstall the device driver
Explanation
The absence of an exclamation point next to the scanner in Device Manager indicates that there is no issue with the driver itself. Therefore, reinstalling Vista or finding a compatible scanner would not solve the problem. Since the issue occurred after a patch was applied, it is likely that the patch caused a conflict with the scanner driver. Manually uninstalling and reinstalling the device driver would refresh the driver and potentially resolve the issue. Rolling back the patch could also be a valid solution, but it is not mentioned in the given options.

Rate this question:

• 13.

### You have a wireless printer that is connected to your WinXP laptop via infrared, and it prints properly. However, when you relocate the wireless infrared printer, you find that your laptop is not able to send print jobs to the printer. What is the most likely cause of the issue?

• A.

The printer driver is unistalled from the laptop

• B.

The printer driver is not updated on the laptop

• C.

Printer is located at the distance of more than three feet from the laptop

• D.

The printing option is disable in the Control Panel on the laptop

C. Printer is located at the distance of more than three feet from the laptop
Explanation
The most likely cause of the issue is that the printer is located at a distance of more than three feet from the laptop. Infrared technology typically has a limited range, and if the printer is too far away, the laptop may not be able to establish a connection with it.

Rate this question:

• 14.

### What iof the following is the most common method used by attackers to identify wireless networks?

• A.

Back door

• B.

Packet sniffling

• C.

Packet filtering

• D.

War driving

D. War driving
Explanation
War driving is the most common method used by attackers to identify wireless networks. War driving involves driving around with a device that can detect and map out wireless networks in the vicinity. Attackers can then use this information to gain unauthorized access to the network or launch further attacks. This method is popular because it allows attackers to easily identify vulnerable networks and exploit them for their own purposes.

Rate this question:

• 15.

### In which of the following conditions does BIOS need to be updated?

• A.

If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS.

• B.

If the operating system installed on the computer has bugs

• C.

If the BIOS does not support new devices

• D.

If the software application installed on the computer stops responding frequently

A. If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS.
C. If the BIOS does not support new devices
Explanation
BIOS (Basic Input/Output System) needs to be updated in two specific conditions. Firstly, when users want to use new hardware features or options that are supported by the motherboard but not supported by the computer BIOS. This update ensures compatibility and functionality with the new hardware. Secondly, if the computer BIOS does not support new devices, updating the BIOS becomes necessary to enable support for these devices. In both cases, updating the BIOS allows users to take advantage of new hardware features and ensures compatibility with new devices.

Rate this question:

• 16.

### Which of the following is the clock speed of the Accelerated Graphics Port (AGP) 8X expansion slot?

• A.

266 MHz

• B.

133 MHz

• C.

533 MHz

• D.

633 MHz

C. 533 MHz
Explanation
The clock speed of the Accelerated Graphics Port (AGP) 8X expansion slot is 533 MHz. This means that data can be transferred at a rate of 533 million cycles per second between the graphics card and the computer's memory. A higher clock speed allows for faster data transfer and better performance in graphics-intensive applications.

Rate this question:

• 17.

### Which of the following stores user preferences related to a Web Site?

• A.

• B.

SSID

• C.

Local User profile

• D.

Explanation
A cookie is a small piece of data that is stored on a user's computer by a website. It is used to store user preferences related to a website, such as login information, language preference, and personalized settings. Cookies allow websites to remember user preferences and provide a personalized browsing experience. They are commonly used for tracking user behavior and providing targeted advertising.

Rate this question:

• 18.

### Which of the following software can also be used as a basic security measure?

• A.

• B.

Visual TimeAnalyzer

• C.

Screensaver

• D.

C. Screensaver
Explanation
A screensaver can be used as a basic security measure because it can help protect sensitive information by automatically activating after a period of inactivity on a computer. When a screensaver is activated, it can require a password to unlock the computer, preventing unauthorized access. This can be especially useful in public or shared environments where multiple users have access to the same computer. Additionally, screensavers can also be set to display a message or warning to deter potential unauthorized users.

Rate this question:

• 19.

### Which of the following aims to restrict certain dangerous substances comnmonly used in electronics and electronic equipment?

• A.

RoHS directive

• B.

IEEE standards

• C.

IETF standards

• D.

W3C standards

A. RoHS directive
Explanation
The RoHS directive aims to restrict certain dangerous substances commonly used in electronics and electronic equipment. It stands for Restriction of Hazardous Substances and is a European Union directive that restricts the use of substances such as lead, mercury, cadmium, and others in electrical and electronic products. The directive was implemented to protect human health and the environment by reducing the hazardous waste generated from electronic devices. It requires manufacturers to ensure their products comply with the specified limits of these substances before they can be sold in the EU market.

Rate this question:

• 20.

### Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computers, he has authorized can get on his Wi-Fi. What is the most appropriate security measure you can recommend?

• A.

A Firewall

• B.

WPA encryption

• C.

MAC Filtering

• D.

WEP encryption

C. MAC Filtering
Explanation
MAC Filtering is the most appropriate security measure to recommend in this scenario. MAC Filtering allows the customer to create a list of authorized devices by specifying their unique MAC addresses. Only devices with MAC addresses on the list will be able to connect to the Wi-Fi network, providing an extra layer of security and ensuring that only authorized computers can access the network. This measure helps to prevent unauthorized access and protect the customer's Wi-Fi network from potential security breaches.

Rate this question:

• 21.

### Which of the following are most likelyc auses of a virus attack?

• A.

Installing an application from an unreliable source

• B.

• C.

Installing a .DLL file from an unreliable source

• D.

Using a floppy, compact disk, or a pen drive form an unreliable source

A. Installing an application from an unreliable source
C. Installing a .DLL file from an unreliable source
D. Using a floppy, compact disk, or a pen drive form an unreliable source
Explanation
The given answer includes all the possible causes of a virus attack. Installing an application from an unreliable source can introduce malicious software onto a system. Downloading a file from an unknown website can also result in downloading a virus or malware. Installing a .DLL file from an unreliable source can lead to the execution of malicious code. Using a floppy disk, compact disk, or a pen drive from an unreliable source can transfer viruses or malware onto a computer system.

Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

• Current Version
• Mar 18, 2023
Quiz Edited by
ProProfs Editorial Team
• Oct 24, 2011
Quiz Created by
Ranger1

Related Topics