CompTIA A+ Preparation Part 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dogma1029
D
Dogma1029
Community Contributor
Quizzes Created: 2 | Total Attempts: 5,550
Questions: 50 | Attempts: 3,452

SettingsSettingsSettings
CompTIA A+ Preparation Part 1 - Quiz

Part one of three quizzes based on the 220-701 and the 220-702 exams.


Questions and Answers
  • 1. 

    You have been tasked with adding more RAM to a notebook computer. After purchasing the new SODIMM RAM it will not fit into the notebook. Why is this?

    • A.

      The laptop uses a proprietary version of SODIMM and you must contact the manufacturer for the correct module.

    • B.

      It does fit, all SODIMM's are a standard size and configuration.

    • C.

      The keying notch differs on different types of SODIMM's, you must match the memory type to board.

    • D.

      It's Hammer Time!

    Correct Answer
    C. The keying notch differs on different types of SODIMM's, you must match the memory type to board.
    Explanation
    The keying notch differs on different types of SODIMM's, which means that not all SODIMM modules will fit into every notebook computer. In order to successfully add more RAM to the notebook, you must match the memory type to the board by ensuring that the keying notch on the SODIMM module aligns with the slot on the motherboard.

    Rate this question:

  • 2. 

    IEEE 1394 is commonly known as ..?

    • A.

      USB 2.0

    • B.

      Serial Port

    • C.

      PS/2

    • D.

      Firewire

    Correct Answer
    D. Firewire
    Explanation
    IEEE 1394 is commonly known as Firewire. Firewire is a high-speed communication interface that is used to connect devices such as computers, digital cameras, and external hard drives. It provides fast data transfer rates and is commonly used in the audio and video industry for devices like camcorders and audio interfaces. Firewire allows for the transfer of large amounts of data in real-time, making it ideal for applications that require high-speed data transfer.

    Rate this question:

  • 3. 

    What is the current standard expansion slot for high end graphics cards?

    • A.

      PCI

    • B.

      AGP

    • C.

      PCIe

    • D.

      PATA

    Correct Answer
    C. PCIe
    Explanation
    The current standard expansion slot for high-end graphics cards is PCIe. PCIe stands for Peripheral Component Interconnect Express and it is a high-speed serial computer expansion bus standard. It offers higher bandwidth and faster data transfer rates compared to older standards like PCI and AGP. PCIe is widely used in modern computers and is the preferred choice for connecting high-performance graphics cards.

    Rate this question:

  • 4. 

    You've just moved to another country and brought your old computer with you. After purchasing a power cord that will let you plug the computer into the wall socket of your new home what should you do before you turn on the computer?

    • A.

      Make sure that the two-position slider switch on the rear of the power supply is set to the voltage level of the country where it is located.

    • B.

      Make sure your USB mouse is rated for the voltage level of the country you are in.

    • C.

      Boot into BIOS setup and change your power settings.

    • D.

      Make sure that there is a local internet provider available for your language.

    Correct Answer
    A. Make sure that the two-position slider switch on the rear of the power supply is set to the voltage level of the country where it is located.
    Explanation
    Before turning on the computer, it is important to ensure that the two-position slider switch on the rear of the power supply is set to the voltage level of the country where it is located. This is because different countries have different voltage standards, and using the wrong voltage can damage the computer's power supply or other components. By setting the slider switch to the correct voltage level, the computer can safely receive the appropriate power supply and function properly in the new country.

    Rate this question:

  • 5. 

    The average power supply produces which five output voltages?

    • A.

      +3.3 VDC

    • B.

      -0.3 VDC

    • C.

      +5 VDC

    • D.

      -5 VDC

    • E.

      +12 VDC

    • F.

      -12 VDC

    • G.

      +115 VDC

    • H.

      -230 VDC

    Correct Answer(s)
    A. +3.3 VDC
    C. +5 VDC
    D. -5 VDC
    E. +12 VDC
    F. -12 VDC
    Explanation
    The correct answer is +3.3 VDC, +5 VDC, -5 VDC, +12 VDC, -12 VDC. This means that the average power supply produces five different output voltages: +3.3 volts, +5 volts, -5 volts, +12 volts, and -12 volts. These voltages are commonly used in electronic devices to power various components and circuits.

    Rate this question:

  • 6. 

    You've been instructed to degauss a monitor. When you get to the computer in question there are two monitors there. One is a CRT and the other is a LCD screen. Which one or ones should you perform this operation on?

    • A.

      The LCD screen

    • B.

      The CRT screen

    • C.

      Both, a monitor is a monitor after all

    • D.

      Neither, degaussing is not done to monitors at all

    Correct Answer
    B. The CRT screen
    Explanation
    Degaussing is a process used to demagnetize the screen of a CRT (cathode ray tube) monitor. This process is necessary to correct color distortion or discoloration caused by magnetic fields. LCD (liquid crystal display) screens do not use a cathode ray tube and therefore do not require degaussing. Therefore, in this scenario, only the CRT screen should be degaussed.

    Rate this question:

  • 7. 

    WUXGA has a maximum resolution of......?

    • A.

      1900 x 1200

    • B.

      1680 x 1050

    • C.

      1024 x 768

    • D.

      800 x 600

    Correct Answer
    A. 1900 x 1200
    Explanation
    WUXGA stands for Wide Ultra Extended Graphics Array and it has a maximum resolution of 1900 x 1200 pixels. This resolution is higher than the other options listed, which are 1680 x 1050, 1024 x 768, and 800 x 600.

    Rate this question:

  • 8. 

    The DVI connector that is a combination analog/digital connector is?

    • A.

      DVI-A

    • B.

      DVI-D

    • C.

      DVI-I

    • D.

      DVI-7

    Correct Answer
    C. DVI-I
    Explanation
    The DVI-I connector is a combination analog/digital connector. It supports both analog and digital signals, allowing it to be compatible with a wide range of devices. This means that it can be used to connect both analog and digital displays, providing flexibility and versatility in connectivity options.

    Rate this question:

  • 9. 

    What is the standard form factor size of a laptop hard drive?

    • A.

      Three and a half inches

    • B.

      Two and a half inches

    • C.

      Four inches

    • D.

      The same size as a standard desktop had drive.

    Correct Answer
    B. Two and a half inches
    Explanation
    The standard form factor size of a laptop hard drive is two and a half inches. This size is commonly used in laptops and allows for a compact design while still providing sufficient storage capacity.

    Rate this question:

  • 10. 

    The built in pointing device on most laptops is called a ________?

    • A.

      Touchpad

    • B.

      Mouse Pad

    • C.

      Touch screen

    • D.

      Finger Mouse

    Correct Answer
    A. Touchpad
    Explanation
    A touchpad is a built-in pointing device commonly found on laptops. It allows users to control the cursor on the screen by moving their fingers across the touch-sensitive surface. Unlike a traditional mouse, a touchpad does not require any physical movement or space to operate, making it a convenient and space-saving option for laptop users.

    Rate this question:

  • 11. 

    The most common PC Card slot on a laptop for modems and Lan adapters is which type of slot?

    • A.

      Type I slot

    • B.

      Type II slot

    • C.

      Type III slot

    • D.

      Type O negative slot

    Correct Answer
    B. Type II slot
    Explanation
    The most common PC Card slot on a laptop for modems and LAN adapters is the Type II slot. This type of slot is specifically designed for these types of devices and is widely used in laptops to provide expansion options for connectivity. Type II slots are larger than Type I slots and can accommodate a variety of different PC Cards, making them suitable for a range of different devices.

    Rate this question:

  • 12. 

    Which Global state of laptop power management is the normal working state?

    • A.

      G0

    • B.

      G1

    • C.

      G2

    • D.

      G3

    • E.

      S4

    Correct Answer
    A. G0
    Explanation
    The Global state of laptop power management that is considered the normal working state is G0. This state indicates that the system is fully powered on and functioning normally, with all components active and ready for use. In G0 state, the laptop is able to perform all tasks and operations as expected without any power-saving measures or limitations.

    Rate this question:

  • 13. 

    You have to clean the pick-up rollers of a printer. Why should you or shouldn't you use alcohol?

    • A.

      Have you ever seen a drunk roller?

    • B.

      It gives the rollers better grip to pick up paper.

    • C.

      It can dry out the rollers causing them not to work as desired.

    • D.

      It can leave greasy marks on the paper.

    Correct Answer
    C. It can dry out the rollers causing them not to work as desired.
    Explanation
    Alcohol should not be used to clean the pick-up rollers of a printer because it can dry out the rollers, which can lead to them not working properly.

    Rate this question:

  • 14. 

    You  are asked to ship a laser printer to another office in your company. The printer has been in use in your office. What should you do before shipping it?

    • A.

      Remove the toner cartridge

    • B.

      Package it in foam peanuts

    • C.

      Unplug the power cord from the printer

    • D.

      Remove the paper from the tray. Let them buy their own supplies!

    Correct Answer
    A. Remove the toner cartridge
    Explanation
    Before shipping the laser printer to another office, it is important to remove the toner cartridge. This is because the toner cartridge contains ink that can spill or leak during transportation, potentially damaging the printer or other items in the package. By removing the toner cartridge, the risk of any ink leakage or damage is minimized, ensuring that the printer arrives at the destination in good condition.

    Rate this question:

  • 15. 

    The maximum Bluetooth range is?

    • A.

      65 feet

    • B.

      330 feet

    • C.

      225 feet

    • D.

      15 feet

    Correct Answer
    B. 330 feet
    Explanation
    Bluetooth technology typically has a maximum range of 330 feet. This range can vary depending on the specific devices being used and any potential obstacles or interference in the surrounding environment. However, in ideal conditions, Bluetooth devices can communicate with each other within a range of up to 330 feet.

    Rate this question:

  • 16. 

    What is the last step in installing and configuring a printer?

    • A.

      Educate users about basic functionality.

    • B.

      Print a test page.

    • C.

      Configure default settings.

    • D.

      Print out a personal email.

    Correct Answer
    A. Educate users about basic functionality.
    Explanation
    The last step in installing and configuring a printer is to educate users about its basic functionality. This step ensures that users are aware of how to use the printer effectively and efficiently. By providing information on the printer's features, settings, and troubleshooting tips, users can make the most out of their printing experience. This step is crucial in ensuring that users are able to utilize the printer to its full potential and avoid any unnecessary issues or errors.

    Rate this question:

  • 17. 

    What are three ways to open the Task Manager?

    • A.

      Ctrl + Alt + Del > Click Task Manager.

    • B.

      Windows key + T.

    • C.

      Ctrl + Shift + Esc.

    • D.

      Right click on the Task Bar and select " Task Manager" from the popup menu.

    • E.

      Start > Control Panel > System > Task Manager.

    Correct Answer(s)
    A. Ctrl + Alt + Del > Click Task Manager.
    C. Ctrl + Shift + Esc.
    D. Right click on the Task Bar and select " Task Manager" from the popup menu.
    Explanation
    You can open the Task Manager in three ways: by pressing Ctrl + Alt + Del and then clicking on Task Manager, by pressing Ctrl + Shift + Esc, or by right-clicking on the Task Bar and selecting "Task Manager" from the popup menu.

    Rate this question:

  • 18. 

    Which hive of the registry includes information about which file extensions map to particular applications?

    • A.

      HKEY_LOCAL_MACHINE

    • B.

      HKEY_CURRENT_CONFIG

    • C.

      HKEY_CLASSES_ROOT

    • D.

      HKEY_USERS

    Correct Answer
    C. HKEY_CLASSES_ROOT
    Explanation
    HKEY_CLASSES_ROOT is the correct answer because it is the hive of the registry that contains information about file associations. This includes the mapping of file extensions to particular applications. It is a centralized location where Windows stores information about file types and the default programs associated with them. This information is used by the operating system to determine which application should be used to open a specific file based on its extension.

    Rate this question:

  • 19. 

    Which file loads first when starting Windows?

    • A.

      NTLDR

    • B.

      NTOSKRNL.EXE

    • C.

      BOOT.INI

    • D.

      BOOT.EXE

    Correct Answer
    A. NTLDR
    Explanation
    NTLDR (NT Loader) is the correct answer. When starting Windows, NTLDR is the first file that loads. It is responsible for initializing the boot process and locating the operating system files on the hard drive. NTLDR then passes control to the NTOSKRNL.EXE (NT Kernel) file, which is the core of the Windows operating system. BOOT.INI is a configuration file that stores information about the available operating systems on the computer, and BOOT.EXE is not a valid file related to the Windows boot process.

    Rate this question:

  • 20. 

    What does the three character file extension say about a file?

    • A.

      That it can have a longer name.

    • B.

      What type of file it is.

    • C.

      What program is used to open the file.

    • D.

      Information regarding when the file was first made.

    Correct Answer
    B. What type of file it is.
    Explanation
    The three character file extension indicates the type of file it is. File extensions are used to identify the format or structure of a file, allowing the operating system to determine which program should be used to open and interpret the file. Different file extensions correspond to different file types, such as .docx for Microsoft Word documents or .jpg for image files.

    Rate this question:

  • 21. 

    Which task is not available using Windows Explorer?

    • A.

      Viewing files and directories.

    • B.

      Changing file attributes.

    • C.

      Launching programs.

    • D.

      Formatting new disks

    • E.

      Set a restore point.

    Correct Answer
    E. Set a restore point.
    Explanation
    The correct answer is "Set a restore point." This option is not available in Windows Explorer. Windows Explorer is primarily used for viewing files and directories, changing file attributes, launching programs, and formatting new disks. Setting a restore point is a system function that is typically accessed through the Control Panel or the System Restore utility, rather than through Windows Explorer.

    Rate this question:

  • 22. 

    What tool lets you test Direct X?

    • A.

      MSConfig.

    • B.

      DXDiag.

    • C.

      GraphX.

    • D.

      Nvidia Control Panel.

    Correct Answer
    B. DXDiag.
    Explanation
    DXDiag is a tool that allows users to test and diagnose the DirectX functionality on their computer. It provides detailed information about the DirectX version, display drivers, audio drivers, and other related components. Users can also perform tests to check the performance and compatibility of DirectX with their hardware and software. Therefore, DXDiag is the correct answer for testing DirectX.

    Rate this question:

  • 23. 

    Installing two operating systems to one computer is known as?

    • A.

      Dual-boot configuration.

    • B.

      Doubling up

    • C.

      Twin system configuration.

    • D.

      Bi-directional bootstraping.

    Correct Answer
    A. Dual-boot configuration.
    Explanation
    Installing two operating systems on one computer is commonly referred to as a dual-boot configuration. This allows the user to choose which operating system to use when the computer starts up. It is a popular setup for users who need to run different operating systems for various purposes, such as using Windows for gaming and Linux for development.

    Rate this question:

  • 24. 

    Partition information is contained in the_______?

    • A.

      BIOS.

    • B.

      Master File Table(MFT)

    • C.

      Master Boot Record(MBR).

    • D.

      HAL

    Correct Answer
    C. Master Boot Record(MBR).
    Explanation
    The correct answer is Master Boot Record (MBR). The MBR is a small section of the hard drive that contains important information about the disk's partitions, including their size, location, and file system type. It is located in the first sector of the disk and is crucial for the computer's boot process, as it contains the code that initiates the loading of the operating system.

    Rate this question:

  • 25. 

    Windows XP Professional can be upgraded to Windows Vista Home Premium. True or False?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Windows XP Professional cannot be directly upgraded to Windows Vista Home Premium. The upgrade path from Windows XP Professional to Windows Vista Home Premium is not supported by Microsoft.

    Rate this question:

  • 26. 

    You have been tasked with fixing a problem with a computer display. You talk to the User to try to determine what the problem may be. What do you not ask the User?

    • A.

      Have any changes been made recently?

    • B.

      How often does the problem occur?

    • C.

      Can you replicate the problem?

    • D.

      What did you do?

    Correct Answer
    D. What did you do?
    Explanation
    Asking the User "What did you do?" is not necessary because it assumes that the User is responsible for the problem with the computer display. This question may come across as accusatory and could potentially make the User defensive. It is more productive to focus on gathering information about the changes made, the frequency of the problem, and whether it can be replicated in order to identify the root cause of the issue.

    Rate this question:

  • 27. 

    To avoid ESD you should____________?

    • A.

      Maintain 50 to 80 percent humidity.

    • B.

      Lick your fingers before touching the computer chassis.

    • C.

      Keep the computer in a room that is lower than 70°f/21°c.

    • D.

      Work on a carpeted surface.

    Correct Answer
    A. Maintain 50 to 80 percent humidity.
    Explanation
    Maintaining 50 to 80 percent humidity helps to avoid electrostatic discharge (ESD) because it helps to dissipate static electricity. When the humidity is within this range, it creates a more conductive environment, reducing the buildup and discharge of static electricity. This helps to protect sensitive electronic components from damage that can be caused by ESD.

    Rate this question:

  • 28. 

    What type of file has a file extension of .BKF?

    • A.

      Binding Key File.

    • B.

      Burger King Fries.

    • C.

      Backup file.

    • D.

      Binary Key Function.

    Correct Answer
    C. Backup file.
    Explanation
    The correct answer is "Backup file." A file with a .BKF file extension is typically associated with backup files. These files are created to store copies of important data in case of data loss or system failure.

    Rate this question:

  • 29. 

    A User complains that he has issues with software compatibility problems and that his Internet Explorer version is older than the occupant of the cubicle next to him. What must you do to negate compatibility problems and prevent them from happening in the future?

    • A.

      Insert the Windows installation disk into his computer and load newer versions of his programs.

    • B.

      Turn on Windows Update in the Control Panel.

    • C.

      Restore the computer to an earlier point.

    • D.

      Restart the computer in safe mode where all the updates are kept.

    Correct Answer
    B. Turn on Windows Update in the Control Panel.
    Explanation
    To negate compatibility problems and prevent them from happening in the future, the best solution is to turn on Windows Update in the Control Panel. This will allow the computer to automatically download and install the latest updates and patches for the operating system and software programs. By keeping the software up to date, compatibility issues can be minimized, ensuring that the user's system is compatible with the latest versions of software and applications.

    Rate this question:

  • 30. 

    A User calls you because he is receiving General Protection Faults. He is working within several programs at the same time to perform his duties and uses two flat panel monitors. One of the programs was written specifically for the company by a software vendor and the other programs are part of Microsoft Office. What is the usual reason for receiving this error?

    • A.

      He opened an email and a virus infected attachment. His antivirus has failed to maintain the integrity of his system.

    • B.

      He has performed an illegal action.

    • C.

      He is downloading streaming media to his computer which violates company policy and has been caught.

    • D.

      A program has tried to access memory that is in use by another program or a memory address that doesn't exist.

    Correct Answer
    D. A program has tried to access memory that is in use by another program or a memory address that doesn't exist.
    Explanation
    The usual reason for receiving General Protection Faults is that a program has tried to access memory that is in use by another program or a memory address that doesn't exist. This can occur when multiple programs are running simultaneously and trying to access the same memory space. It is a common error that can cause system instability and crashes.

    Rate this question:

  • 31. 

    Wendy's computer was working fine yesterday, now when she turns it on there is no display on the screen.  What three things should you check first to diagnose this problem?

    • A.

      Make sure that the cable is plugged into the monitor and computer.

    • B.

      That the screen is tilted to an acceptable viewing height.

    • C.

      Connect another monitor to the computer.

    • D.

      That the monitor is switched on.

    • E.

      That the correct drivers are installed and haven't become corrupted.

    Correct Answer(s)
    A. Make sure that the cable is plugged into the monitor and computer.
    C. Connect another monitor to the computer.
    D. That the monitor is switched on.
    Explanation
    The three things that should be checked first to diagnose the problem of no display on the screen are: 1) making sure that the cable is plugged into the monitor and computer, 2) connecting another monitor to the computer to see if the issue is with the original monitor, and 3) ensuring that the monitor is switched on. These steps will help identify if the problem lies with the connection, the monitor itself, or if it is a power issue.

    Rate this question:

  • 32. 

    Barry, your company's salesman calls you from his hotel where he is trying to work from while on the road. The hotel provides a wireless connection but he can't seem to connect to it. You direct him to open a command prompt and run IPCONFIG. He responds that he receives the network address of 169.254.255.250. What must Barry do to connect to the WAP?

    • A.

      Turn on the wireless function of his laptop, he was probably hard wired last time he was in the office.

    • B.

      Call the front desk and ask them for information for the default gateway so he can reach the DHCP server.

    • C.

      Buy an ethernet cable and connect the wire to the laptop and an ethernet port in his room.

    • D.

      Move to a different hotel that has the same wireless protocol as his laptop.

    Correct Answer
    A. Turn on the wireless function of his laptop, he was probably hard wired last time he was in the office.
    Explanation
    Barry needs to turn on the wireless function of his laptop because he is currently unable to connect to the wireless network. This is indicated by the fact that when he runs IPCONFIG, he receives a network address of 169.254.255.250, which is an Automatic Private IP Address. This address is assigned when a device is unable to obtain an IP address from a DHCP server, which suggests that Barry's laptop is not connected to the wireless network. Therefore, turning on the wireless function of his laptop will allow him to connect to the WAP.

    Rate this question:

  • 33. 

    A computer connected to a network that performs daily business functions such as e-mail, word processing, database design and other office tasks is known as what?

    • A.

      A laptop.

    • B.

      A server.

    • C.

      A NOS.

    • D.

      A workstation.

    Correct Answer
    D. A workstation.
    Explanation
    A computer connected to a network that performs daily business functions such as email, word processing, database design, and other office tasks is known as a workstation. This term is used to describe a computer that is primarily used for individual productivity and is not specifically designed to serve or manage network resources like a server. A workstation is typically used by an individual user to perform their daily work tasks efficiently.

    Rate this question:

  • 34. 

    You have been tasked with designing a new network for new offices in another location. Because it is considered an extremely expensive topology which topology do you not want to use if at all possible?

    • A.

      Ring.

    • B.

      Mesh.

    • C.

      Hybrid.

    • D.

      Star.

    • E.

      Bus.

    Correct Answer
    B. Mesh.
    Explanation
    Mesh topology is considered an extremely expensive topology because it requires every device to be connected to every other device in the network, resulting in a large number of physical connections and increased cost. Therefore, if possible, it is not desirable to use a mesh topology for the new network in order to minimize expenses.

    Rate this question:

  • 35. 

    Which layer of the OSI model verifies that all packets were received by the destination host on a TCP/IP network?

    • A.

      Session Layer.

    • B.

      Network Layer.

    • C.

      Data Link Layer.

    • D.

      Application Layer.

    • E.

      Transport Layer.

    • F.

      Presentation Layer.

    Correct Answer
    E. Transport Layer.
    Explanation
    The Transport Layer of the OSI model is responsible for ensuring reliable delivery of data between hosts on a TCP/IP network. It establishes a connection, breaks data into packets, and reassembles them at the destination. It also verifies that all packets were received by the destination host through mechanisms like acknowledgments and retransmissions. Therefore, the Transport Layer is the correct layer for verifying packet reception in a TCP/IP network.

    Rate this question:

  • 36. 

    127.0.0.1 is known as what?

    • A.

      APIPA.

    • B.

      Loopback address.

    • C.

      Default gateway address.

    • D.

      Subnet mask.

    Correct Answer
    B. Loopback address.
    Explanation
    The IP address 127.0.0.1 is known as the loopback address. It is used to test network connectivity on a local machine without actually connecting to a network. When a packet is sent to the loopback address, it is immediately returned back to the sender without being sent over the network. This address is often used for troubleshooting network issues and testing network applications on the same machine.

    Rate this question:

  • 37. 

    NIC cards can send data using what two modes?

    • A.

      Full-duplex.

    • B.

      Double-duplex.

    • C.

      Half-duplex.

    • D.

      Partial weighted-duplex.

    Correct Answer(s)
    A. Full-duplex.
    C. Half-duplex.
    Explanation
    NIC cards can send data using two modes: Full-duplex and Half-duplex. Full-duplex mode allows for simultaneous two-way communication, where data can be sent and received at the same time. Half-duplex mode allows for communication in both directions, but only one direction at a time.

    Rate this question:

  • 38. 

    How far can you extend an Ethernet 10Base2 network using a repeater?

    • A.

      300m.

    • B.

      1000m.

    • C.

      400m.

    • D.

      800m.

    Correct Answer
    C. 400m.
    Explanation
    The maximum distance that an Ethernet 10Base2 network can be extended using a repeater is 400m. This is because the 10Base2 standard, also known as Thinnet or Cheapernet, uses coaxial cable as its transmission medium. Coaxial cable has a maximum segment length of 185 meters. By adding a repeater, which regenerates the signal, the maximum distance can be extended to 400m. However, beyond this distance, the signal will degrade and become unreliable.

    Rate this question:

  • 39. 

    Bluetooth Class 2 is used mainly for mobile devices. What is it's range?

    • A.

      30ft.

    • B.

      10ft.

    • C.

      55ft.

    • D.

      120ft.

    Correct Answer
    A. 30ft.
    Explanation
    Class 2 Bluetooth devices have a range of approximately 30ft. This means that mobile devices such as smartphones and tablets, which typically use Class 2 Bluetooth, can communicate with other devices within a range of 30ft. This range is suitable for most personal use cases, such as connecting a smartphone to a wireless headset or a wireless speaker. However, it is important to note that the range can be affected by various factors such as obstacles, interference, and the specific Bluetooth implementation in the devices.

    Rate this question:

  • 40. 

    Which network cabling option offers the longest possible segment length?

    • A.

      STP

    • B.

      Coaxial

    • C.

      Fiber-optic

    • D.

      UTP

    Correct Answer
    C. Fiber-optic
    Explanation
    Fiber-optic cabling offers the longest possible segment length compared to the other options. This is because fiber-optic cables use light signals to transmit data, allowing for longer distances without signal degradation. Unlike STP, coaxial, and UTP cables, fiber-optic cables are not affected by electromagnetic interference, making them ideal for long-distance communication.

    Rate this question:

  • 41. 

    A___________is a program that enters the system under the guise of another program.

    • A.

      Virus.

    • B.

      Worm.

    • C.

      Trojan Horse.

    • D.

      Spam.

    Correct Answer
    C. Trojan Horse.
    Explanation
    A Trojan Horse is a type of malicious program that disguises itself as a legitimate program in order to gain access to a system. Unlike viruses and worms, which can replicate and spread themselves, a Trojan Horse relies on the user to unknowingly install it. Once inside the system, it can perform various harmful actions, such as stealing personal information or providing unauthorized access to the attacker. Therefore, a Trojan Horse fits the description of a program that enters the system under the guise of another program.

    Rate this question:

  • 42. 

    After returning to your company after a service call to one of your satellite offices you find that the receptionist let in the "Network Repair Guy" to the server room. You are quickly alarmed as you never called anyone in to fix anything. The receptionist tells you that he had a work order, tools and a uniform that all looked legitimate. What type of attack is this on your network?

    • A.

      Brute Force.

    • B.

      Phishing.

    • C.

      Social Engineering.

    • D.

      Back door.

    Correct Answer
    C. Social Engineering.
    Explanation
    This is an example of a social engineering attack. The attacker manipulated the receptionist by posing as a legitimate network repair person, using a fake work order, tools, and uniform to gain access to the server room. Social engineering involves manipulating people to gain unauthorized access to systems or information, often by exploiting their trust or lack of knowledge. In this case, the attacker used deception and impersonation to bypass security measures and gain access to the network.

    Rate this question:

  • 43. 

    You are setting up two rooms with computers for a special inventory project. The two rooms are across the hall from each other and the computers need to all be connected together in a small subnet. What can you do about the cables that are crossing the hallway?

    • A.

      Use a floor cable guard to cover the wires and prevent tripping hazards.

    • B.

      Do nothing. People have enough common sense to know that they are there.

    • C.

      Hang a sign in the hallway informing co-workers of the hazard.

    • D.

      Run the wires up the wall and down the other side into the next room.

    Correct Answer
    A. Use a floor cable guard to cover the wires and prevent tripping hazards.
    Explanation
    Using a floor cable guard to cover the wires and prevent tripping hazards is the best solution for the situation. This will ensure the safety of individuals crossing the hallway by preventing them from tripping over the cables. Hanging a sign may not be enough to prevent accidents, and assuming that people have enough common sense is not a reliable solution. Running the wires up the wall and down the other side may not be feasible or practical. Therefore, using a floor cable guard is the most effective and practical solution.

    Rate this question:

  • 44. 

    Where should you never attach the alligator clip of an ESD strap?

    • A.

      The computer chassis.

    • B.

      The ground pin of an extension cord.

    • C.

      Inside a CRT monitor.

    • D.

      An anti-static mat.

    Correct Answer
    C. Inside a CRT monitor.
    Explanation
    The alligator clip of an ESD strap should never be attached inside a CRT monitor because it can cause damage to the monitor's components. CRT monitors contain high voltages that can discharge through the clip and potentially harm the user or damage the monitor. It is important to always follow proper ESD safety procedures and guidelines to prevent any accidents or equipment damage.

    Rate this question:

  • 45. 

    You arrive on-site at a customer's location. He is frustrated and annoyed that his equipment is not working and begins to verbally attack you and the computer manufacturer. How do you handle this situation?

    • A.

      Get defensive and argue back that it is probably a User error and it's probably all his own fault.

    • B.

      Agree with the customer that the computer equipment is substandard.

    • C.

      Respond to the customer in a calm and professional manner.

    • D.

      Pick up your tools and leave the premises.

    Correct Answer
    C. Respond to the customer in a calm and professional manner.
    Explanation
    It is important to respond to the customer in a calm and professional manner because getting defensive or arguing back will only escalate the situation further. Agreeing with the customer that the equipment is substandard may not be accurate and may not solve the problem. Leaving the premises without addressing the issue is not a productive solution. Therefore, responding calmly and professionally will help defuse the situation and allow for a more constructive resolution.

    Rate this question:

  • 46. 

    What is the minimal level of a static charge that human can feel?

    • A.

      3,000 volts.

    • B.

      300 volts.

    • C.

      13,000 volts.

    • D.

      3,300 volts.

    Correct Answer
    A. 3,000 volts.
    Explanation
    The minimal level of a static charge that humans can feel is 3,000 volts. This means that any static charge below this level would not be perceptible to the human body.

    Rate this question:

  • 47. 

    SCSI devices must be ___________?

    • A.

      Run in a raid array.

    • B.

      Formatted at the same time.

    • C.

      Terminated.

    • D.

      Washed. Because they are scuzzy.

    Correct Answer
    C. Terminated.
    Explanation
    SCSI devices must be terminated. Termination refers to the process of adding a termination resistor to the end of a SCSI chain. This resistor ensures that the electrical signals sent along the SCSI bus are properly terminated, preventing signal reflections and ensuring reliable communication between the SCSI devices. Without proper termination, SCSI devices may experience data corruption or other communication issues. Therefore, it is important to terminate SCSI devices correctly to maintain the integrity of the SCSI bus.

    Rate this question:

  • 48. 

    What is the purpose of a loopback plug?

    • A.

      To make sure that your power supply is working correctly.

    • B.

      To neaten up the wires inside your case.

    • C.

      Testing the NIC cards ability to send and receive signals.

    • D.

      To plug the hole above or below a peripheral card, such as a video card.

    Correct Answer
    C. Testing the NIC cards ability to send and receive signals.
    Explanation
    A loopback plug is used to test the network interface card's (NIC) ability to send and receive signals. It is a device that plugs into the NIC and allows the computer to send and receive data to itself, simulating network communication. This is helpful in troubleshooting network connectivity issues and ensuring that the NIC is functioning properly.

    Rate this question:

  • 49. 

    Memory addresses are expressed in what range?

    • A.

      Hexadecimal.

    • B.

      Binary.

    • C.

      Ghz.

    • D.

      Vectors.

    Correct Answer
    A. Hexadecimal.
    Explanation
    Memory addresses are expressed in hexadecimal range because hexadecimal is a base-16 numbering system that uses digits 0-9 and letters A-F to represent values. This system is commonly used in computer science and programming because it can represent large numbers in a concise and easily readable format. In the context of memory addresses, hexadecimal is used to represent the location of data in computer memory, making it easier for programmers to work with and manipulate memory addresses.

    Rate this question:

  • 50. 

    Laptop parts are interchangeable with other laptop systems. True or False?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Laptop parts are not generally interchangeable with other laptop systems. Each laptop model is designed with specific components that fit its unique form factor and architecture. While some parts may be compatible across different models from the same manufacturer, it is not guaranteed that all parts will be interchangeable. Additionally, different laptop brands may have different designs and specifications, making it even less likely for parts to be interchangeable between different brands. Therefore, the statement that laptop parts are interchangeable with other laptop systems is false.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 03, 2010
    Quiz Created by
    Dogma1029

Related Topics

Back to Top Back to top
Advertisement