1.
You
have been tasked with adding more RAM to a notebook computer. After purchasing
the new SODIMM RAM it will not fit into the notebook. Why is this?
Correct Answer
C. The keying notch differs on different types of SODIMM's, you must match the memory type to board.
Explanation
The keying notch differs on different types of SODIMM's, which means that not all SODIMM modules will fit into every notebook computer. In order to successfully add more RAM to the notebook, you must match the memory type to the board by ensuring that the keying notch on the SODIMM module aligns with the slot on the motherboard.
2.
IEEE
1394 is commonly known as ..?
Correct Answer
D. Firewire
Explanation
IEEE 1394 is commonly known as Firewire. Firewire is a high-speed communication interface that is used to connect devices such as computers, digital cameras, and external hard drives. It provides fast data transfer rates and is commonly used in the audio and video industry for devices like camcorders and audio interfaces. Firewire allows for the transfer of large amounts of data in real-time, making it ideal for applications that require high-speed data transfer.
3.
What
is the current standard expansion slot for high end graphics cards?
Correct Answer
C. PCIe
Explanation
The current standard expansion slot for high-end graphics cards is PCIe. PCIe stands for Peripheral Component Interconnect Express and it is a high-speed serial computer expansion bus standard. It offers higher bandwidth and faster data transfer rates compared to older standards like PCI and AGP. PCIe is widely used in modern computers and is the preferred choice for connecting high-performance graphics cards.
4.
You've just moved to another country and brought your old computer with you.
After purchasing a power cord that will let you plug the computer into the wall
socket of your new home what should you do before you turn on the computer?
Correct Answer
A. Make sure that the two-position slider switch on the rear of the power supply is set to the voltage level of the country where it is located.
Explanation
Before turning on the computer, it is important to ensure that the two-position slider switch on the rear of the power supply is set to the voltage level of the country where it is located. This is because different countries have different voltage standards, and using the wrong voltage can damage the computer's power supply or other components. By setting the slider switch to the correct voltage level, the computer can safely receive the appropriate power supply and function properly in the new country.
5.
The
average power supply produces which five output voltages?
Correct Answer(s)
A. +3.3 VDC
C. +5 VDC
D. -5 VDC
E. +12 VDC
F. -12 VDC
Explanation
The correct answer is +3.3 VDC, +5 VDC, -5 VDC, +12 VDC, -12 VDC. This means that the average power supply produces five different output voltages: +3.3 volts, +5 volts, -5 volts, +12 volts, and -12 volts. These voltages are commonly used in electronic devices to power various components and circuits.
6.
You've
been instructed to degauss a monitor. When you get to the computer in question
there are two monitors there. One is a CRT and the other is a LCD screen. Which
one or ones should you perform this operation on?
Correct Answer
B. The CRT screen
Explanation
Degaussing is a process used to demagnetize the screen of a CRT (cathode ray tube) monitor. This process is necessary to correct color distortion or discoloration caused by magnetic fields. LCD (liquid crystal display) screens do not use a cathode ray tube and therefore do not require degaussing. Therefore, in this scenario, only the CRT screen should be degaussed.
7.
WUXGA
has a maximum resolution of......?
Correct Answer
A. 1900 x 1200
Explanation
WUXGA stands for Wide Ultra Extended Graphics Array and it has a maximum resolution of 1900 x 1200 pixels. This resolution is higher than the other options listed, which are 1680 x 1050, 1024 x 768, and 800 x 600.
8.
The
DVI connector that is a combination analog/digital connector is?
Correct Answer
C. DVI-I
Explanation
The DVI-I connector is a combination analog/digital connector. It supports both analog and digital signals, allowing it to be compatible with a wide range of devices. This means that it can be used to connect both analog and digital displays, providing flexibility and versatility in connectivity options.
9.
What
is the standard form factor size of a laptop hard drive?
Correct Answer
B. Two and a half inches
Explanation
The standard form factor size of a laptop hard drive is two and a half inches. This size is commonly used in laptops and allows for a compact design while still providing sufficient storage capacity.
10.
The built in pointing device on most laptops is
called a ________?
Correct Answer
A. Touchpad
Explanation
A touchpad is a built-in pointing device commonly found on laptops. It allows users to control the cursor on the screen by moving their fingers across the touch-sensitive surface. Unlike a traditional mouse, a touchpad does not require any physical movement or space to operate, making it a convenient and space-saving option for laptop users.
11.
The most common PC Card slot on a laptop
for modems and Lan adapters is which type of slot?
Correct Answer
B. Type II slot
Explanation
The most common PC Card slot on a laptop for modems and LAN adapters is the Type II slot. This type of slot is specifically designed for these types of devices and is widely used in laptops to provide expansion options for connectivity. Type II slots are larger than Type I slots and can accommodate a variety of different PC Cards, making them suitable for a range of different devices.
12.
Which Global state of laptop power management is
the normal working state?
Correct Answer
A. G0
Explanation
The Global state of laptop power management that is considered the normal working state is G0. This state indicates that the system is fully powered on and functioning normally, with all components active and ready for use. In G0 state, the laptop is able to perform all tasks and operations as expected without any power-saving measures or limitations.
13.
You have to clean the pick-up rollers of a
printer. Why should you or shouldn't you use alcohol?
Correct Answer
C. It can dry out the rollers causing them not to work as desired.
Explanation
Alcohol should not be used to clean the pick-up rollers of a printer because it can dry out the rollers, which can lead to them not working properly.
14.
You are
asked to ship a laser printer to another office in your company. The printer
has been in use in your office. What should you do before shipping it?
Correct Answer
A. Remove the toner cartridge
Explanation
Before shipping the laser printer to another office, it is important to remove the toner cartridge. This is because the toner cartridge contains ink that can spill or leak during transportation, potentially damaging the printer or other items in the package. By removing the toner cartridge, the risk of any ink leakage or damage is minimized, ensuring that the printer arrives at the destination in good condition.
15.
The maximum Bluetooth range is?
Correct Answer
B. 330 feet
Explanation
Bluetooth technology typically has a maximum range of 330 feet. This range can vary depending on the specific devices being used and any potential obstacles or interference in the surrounding environment. However, in ideal conditions, Bluetooth devices can communicate with each other within a range of up to 330 feet.
16.
What is the last step in installing and
configuring a printer?
Correct Answer
A. Educate users about basic functionality.
Explanation
The last step in installing and configuring a printer is to educate users about its basic functionality. This step ensures that users are aware of how to use the printer effectively and efficiently. By providing information on the printer's features, settings, and troubleshooting tips, users can make the most out of their printing experience. This step is crucial in ensuring that users are able to utilize the printer to its full potential and avoid any unnecessary issues or errors.
17.
What
are three ways to open the Task Manager?
Correct Answer(s)
A. Ctrl + Alt + Del > Click Task Manager.
C. Ctrl + Shift + Esc.
D. Right click on the Task Bar and select " Task Manager" from the popup menu.
Explanation
You can open the Task Manager in three ways: by pressing Ctrl + Alt + Del and then clicking on Task Manager, by pressing Ctrl + Shift + Esc, or by right-clicking on the Task Bar and selecting "Task Manager" from the popup menu.
18.
Which hive of the registry includes information about which
file extensions map to particular applications?
Correct Answer
C. HKEY_CLASSES_ROOT
Explanation
HKEY_CLASSES_ROOT is the correct answer because it is the hive of the registry that contains information about file associations. This includes the mapping of file extensions to particular applications. It is a centralized location where Windows stores information about file types and the default programs associated with them. This information is used by the operating system to determine which application should be used to open a specific file based on its extension.
19.
Which
file loads first when starting Windows?
Correct Answer
A. NTLDR
Explanation
NTLDR (NT Loader) is the correct answer. When starting Windows, NTLDR is the first file that loads. It is responsible for initializing the boot process and locating the operating system files on the hard drive. NTLDR then passes control to the NTOSKRNL.EXE (NT Kernel) file, which is the core of the Windows operating system. BOOT.INI is a configuration file that stores information about the available operating systems on the computer, and BOOT.EXE is not a valid file related to the Windows boot process.
20.
What
does the three character file extension say about a file?
Correct Answer
B. What type of file it is.
Explanation
The three character file extension indicates the type of file it is. File extensions are used to identify the format or structure of a file, allowing the operating system to determine which program should be used to open and interpret the file. Different file extensions correspond to different file types, such as .docx for Microsoft Word documents or .jpg for image files.
21.
Which
task is not available using Windows Explorer?
Correct Answer
E. Set a restore point.
Explanation
The correct answer is "Set a restore point." This option is not available in Windows Explorer. Windows Explorer is primarily used for viewing files and directories, changing file attributes, launching programs, and formatting new disks. Setting a restore point is a system function that is typically accessed through the Control Panel or the System Restore utility, rather than through Windows Explorer.
22.
What
tool lets you test Direct X?
Correct Answer
B. DXDiag.
Explanation
DXDiag is a tool that allows users to test and diagnose the DirectX functionality on their computer. It provides detailed information about the DirectX version, display drivers, audio drivers, and other related components. Users can also perform tests to check the performance and compatibility of DirectX with their hardware and software. Therefore, DXDiag is the correct answer for testing DirectX.
23.
Installing
two operating systems to one computer is known as?
Correct Answer
A. Dual-boot configuration.
Explanation
Installing two operating systems on one computer is commonly referred to as a dual-boot configuration. This allows the user to choose which operating system to use when the computer starts up. It is a popular setup for users who need to run different operating systems for various purposes, such as using Windows for gaming and Linux for development.
24.
Partition
information is contained in the_______?
Correct Answer
C. Master Boot Record(MBR).
Explanation
The correct answer is Master Boot Record (MBR). The MBR is a small section of the hard drive that contains important information about the disk's partitions, including their size, location, and file system type. It is located in the first sector of the disk and is crucial for the computer's boot process, as it contains the code that initiates the loading of the operating system.
25.
Windows
XP Professional can be upgraded to Windows Vista Home Premium. True or False?
Correct Answer
B. False
Explanation
Windows XP Professional cannot be directly upgraded to Windows Vista Home Premium. The upgrade path from Windows XP Professional to Windows Vista Home Premium is not supported by Microsoft.
26.
You
have been tasked with fixing a problem with a computer display. You talk to the
User to try to determine what the problem may be. What do you not ask the User?
Correct Answer
D. What did you do?
Explanation
Asking the User "What did you do?" is not necessary because it assumes that the User is responsible for the problem with the computer display. This question may come across as accusatory and could potentially make the User defensive. It is more productive to focus on gathering information about the changes made, the frequency of the problem, and whether it can be replicated in order to identify the root cause of the issue.
27.
To
avoid ESD you should____________?
Correct Answer
A. Maintain 50 to 80 percent humidity.
Explanation
Maintaining 50 to 80 percent humidity helps to avoid electrostatic discharge (ESD) because it helps to dissipate static electricity. When the humidity is within this range, it creates a more conductive environment, reducing the buildup and discharge of static electricity. This helps to protect sensitive electronic components from damage that can be caused by ESD.
28.
What type of file has a file extension of .BKF?
Correct Answer
C. Backup file.
Explanation
The correct answer is "Backup file." A file with a .BKF file extension is typically associated with backup files. These files are created to store copies of important data in case of data loss or system failure.
29.
A User complains that he has issues with software compatibility problems
and that his Internet Explorer version is older than the occupant of the cubicle
next to him. What must you do to negate compatibility problems and prevent them
from happening in the future?
Correct Answer
B. Turn on Windows Update in the Control Panel.
Explanation
To negate compatibility problems and prevent them from happening in the future, the best solution is to turn on Windows Update in the Control Panel. This will allow the computer to automatically download and install the latest updates and patches for the operating system and software programs. By keeping the software up to date, compatibility issues can be minimized, ensuring that the user's system is compatible with the latest versions of software and applications.
30.
A User calls you because he is receiving General Protection Faults. He
is working within several programs at the same time to perform his duties and
uses two flat panel monitors.
One of the programs was written specifically for the company by a
software vendor and the other programs are part of Microsoft Office. What is
the usual reason for receiving this error?
Correct Answer
D. A program has tried to access memory that is in use by another program or a memory address that doesn't exist.
Explanation
The usual reason for receiving General Protection Faults is that a program has tried to access memory that is in use by another program or a memory address that doesn't exist. This can occur when multiple programs are running simultaneously and trying to access the same memory space. It is a common error that can cause system instability and crashes.
31.
Wendy's
computer was working fine yesterday, now when she turns it on there is no
display on the screen. What three things
should you check first to diagnose this problem?
Correct Answer(s)
A. Make sure that the cable is plugged into the monitor and computer.
C. Connect another monitor to the computer.
D. That the monitor is switched on.
Explanation
The three things that should be checked first to diagnose the problem of no display on the screen are: 1) making sure that the cable is plugged into the monitor and computer, 2) connecting another monitor to the computer to see if the issue is with the original monitor, and 3) ensuring that the monitor is switched on. These steps will help identify if the problem lies with the connection, the monitor itself, or if it is a power issue.
32.
Barry,
your company's salesman calls you from his hotel where he is trying to work
from while on the road. The hotel provides a wireless connection but he can't
seem to connect to it. You direct him to open a command prompt and run
IPCONFIG. He responds that he receives the network address of 169.254.255.250.
What must Barry do to connect to the WAP?
Correct Answer
A. Turn on the wireless function of his laptop, he was probably hard wired last time he was in the office.
Explanation
Barry needs to turn on the wireless function of his laptop because he is currently unable to connect to the wireless network. This is indicated by the fact that when he runs IPCONFIG, he receives a network address of 169.254.255.250, which is an Automatic Private IP Address. This address is assigned when a device is unable to obtain an IP address from a DHCP server, which suggests that Barry's laptop is not connected to the wireless network. Therefore, turning on the wireless function of his laptop will allow him to connect to the WAP.
33.
A
computer connected to a network that performs daily business functions such as
e-mail, word processing, database design and other office tasks is known as
what?
Correct Answer
D. A workstation.
Explanation
A computer connected to a network that performs daily business functions such as email, word processing, database design, and other office tasks is known as a workstation. This term is used to describe a computer that is primarily used for individual productivity and is not specifically designed to serve or manage network resources like a server. A workstation is typically used by an individual user to perform their daily work tasks efficiently.
34.
You
have been tasked with designing a new network for new offices in another
location. Because it is considered an extremely expensive topology which
topology do you not want to use if at all possible?
Correct Answer
B. Mesh.
Explanation
Mesh topology is considered an extremely expensive topology because it requires every device to be connected to every other device in the network, resulting in a large number of physical connections and increased cost. Therefore, if possible, it is not desirable to use a mesh topology for the new network in order to minimize expenses.
35.
Which
layer of the OSI model verifies that all packets were received by the
destination host on a TCP/IP network?
Correct Answer
E. Transport Layer.
Explanation
The Transport Layer of the OSI model is responsible for ensuring reliable delivery of data between hosts on a TCP/IP network. It establishes a connection, breaks data into packets, and reassembles them at the destination. It also verifies that all packets were received by the destination host through mechanisms like acknowledgments and retransmissions. Therefore, the Transport Layer is the correct layer for verifying packet reception in a TCP/IP network.
36.
127.0.0.1
is known as what?
Correct Answer
B. Loopback address.
Explanation
The IP address 127.0.0.1 is known as the loopback address. It is used to test network connectivity on a local machine without actually connecting to a network. When a packet is sent to the loopback address, it is immediately returned back to the sender without being sent over the network. This address is often used for troubleshooting network issues and testing network applications on the same machine.
37.
NIC
cards can send data using what two modes?
Correct Answer(s)
A. Full-duplex.
C. Half-duplex.
Explanation
NIC cards can send data using two modes: Full-duplex and Half-duplex. Full-duplex mode allows for simultaneous two-way communication, where data can be sent and received at the same time. Half-duplex mode allows for communication in both directions, but only one direction at a time.
38.
How
far can you extend an Ethernet 10Base2 network using a repeater?
Correct Answer
C. 400m.
Explanation
The maximum distance that an Ethernet 10Base2 network can be extended using a repeater is 400m. This is because the 10Base2 standard, also known as Thinnet or Cheapernet, uses coaxial cable as its transmission medium. Coaxial cable has a maximum segment length of 185 meters. By adding a repeater, which regenerates the signal, the maximum distance can be extended to 400m. However, beyond this distance, the signal will degrade and become unreliable.
39.
Bluetooth
Class 2 is used mainly for mobile devices. What is it's range?
Correct Answer
A. 30ft.
Explanation
Class 2 Bluetooth devices have a range of approximately 30ft. This means that mobile devices such as smartphones and tablets, which typically use Class 2 Bluetooth, can communicate with other devices within a range of 30ft. This range is suitable for most personal use cases, such as connecting a smartphone to a wireless headset or a wireless speaker. However, it is important to note that the range can be affected by various factors such as obstacles, interference, and the specific Bluetooth implementation in the devices.
40.
Which
network cabling option offers the longest possible segment length?
Correct Answer
C. Fiber-optic
Explanation
Fiber-optic cabling offers the longest possible segment length compared to the other options. This is because fiber-optic cables use light signals to transmit data, allowing for longer distances without signal degradation. Unlike STP, coaxial, and UTP cables, fiber-optic cables are not affected by electromagnetic interference, making them ideal for long-distance communication.
41.
A___________is
a program that enters the system under the guise of another program.
Correct Answer
C. Trojan Horse.
Explanation
A Trojan Horse is a type of malicious program that disguises itself as a legitimate program in order to gain access to a system. Unlike viruses and worms, which can replicate and spread themselves, a Trojan Horse relies on the user to unknowingly install it. Once inside the system, it can perform various harmful actions, such as stealing personal information or providing unauthorized access to the attacker. Therefore, a Trojan Horse fits the description of a program that enters the system under the guise of another program.
42.
After
returning to your company after a service call to one of your satellite offices
you find that the receptionist let in the "Network Repair Guy" to the
server room. You are quickly alarmed as you never called anyone in to fix
anything. The receptionist tells you that he had a work order, tools and a
uniform that all looked legitimate. What type of attack is this on your
network?
Correct Answer
C. Social Engineering.
Explanation
This is an example of a social engineering attack. The attacker manipulated the receptionist by posing as a legitimate network repair person, using a fake work order, tools, and uniform to gain access to the server room. Social engineering involves manipulating people to gain unauthorized access to systems or information, often by exploiting their trust or lack of knowledge. In this case, the attacker used deception and impersonation to bypass security measures and gain access to the network.
43.
You
are setting up two rooms with computers for a special inventory project. The
two rooms are across the hall from each other and the computers need to all be
connected together in a small subnet. What can you do about the cables that are
crossing the hallway?
Correct Answer
A. Use a floor cable guard to cover the wires and prevent tripping hazards.
Explanation
Using a floor cable guard to cover the wires and prevent tripping hazards is the best solution for the situation. This will ensure the safety of individuals crossing the hallway by preventing them from tripping over the cables. Hanging a sign may not be enough to prevent accidents, and assuming that people have enough common sense is not a reliable solution. Running the wires up the wall and down the other side may not be feasible or practical. Therefore, using a floor cable guard is the most effective and practical solution.
44.
Where should you never attach the alligator clip of an ESD
strap?
Correct Answer
C. Inside a CRT monitor.
Explanation
The alligator clip of an ESD strap should never be attached inside a CRT monitor because it can cause damage to the monitor's components. CRT monitors contain high voltages that can discharge through the clip and potentially harm the user or damage the monitor. It is important to always follow proper ESD safety procedures and guidelines to prevent any accidents or equipment damage.
45.
You
arrive on-site at a customer's location. He is frustrated and annoyed that his
equipment is not working and begins to verbally attack you and the computer
manufacturer. How do you handle this situation?
Correct Answer
C. Respond to the customer in a calm and professional manner.
Explanation
It is important to respond to the customer in a calm and professional manner because getting defensive or arguing back will only escalate the situation further. Agreeing with the customer that the equipment is substandard may not be accurate and may not solve the problem. Leaving the premises without addressing the issue is not a productive solution. Therefore, responding calmly and professionally will help defuse the situation and allow for a more constructive resolution.
46.
What
is the minimal level of a static charge that human can feel?
Correct Answer
A. 3,000 volts.
Explanation
The minimal level of a static charge that humans can feel is 3,000 volts. This means that any static charge below this level would not be perceptible to the human body.
47.
SCSI
devices must be ___________?
Correct Answer
C. Terminated.
Explanation
SCSI devices must be terminated. Termination refers to the process of adding a termination resistor to the end of a SCSI chain. This resistor ensures that the electrical signals sent along the SCSI bus are properly terminated, preventing signal reflections and ensuring reliable communication between the SCSI devices. Without proper termination, SCSI devices may experience data corruption or other communication issues. Therefore, it is important to terminate SCSI devices correctly to maintain the integrity of the SCSI bus.
48.
What
is the purpose of a loopback plug?
Correct Answer
C. Testing the NIC cards ability to send and receive signals.
Explanation
A loopback plug is used to test the network interface card's (NIC) ability to send and receive signals. It is a device that plugs into the NIC and allows the computer to send and receive data to itself, simulating network communication. This is helpful in troubleshooting network connectivity issues and ensuring that the NIC is functioning properly.
49.
Memory
addresses are expressed in what range?
Correct Answer
A. Hexadecimal.
Explanation
Memory addresses are expressed in hexadecimal range because hexadecimal is a base-16 numbering system that uses digits 0-9 and letters A-F to represent values. This system is commonly used in computer science and programming because it can represent large numbers in a concise and easily readable format. In the context of memory addresses, hexadecimal is used to represent the location of data in computer memory, making it easier for programmers to work with and manipulate memory addresses.
50.
Laptop parts are interchangeable with other laptop systems.
True or False?
Correct Answer
B. False
Explanation
Laptop parts are not generally interchangeable with other laptop systems. Each laptop model is designed with specific components that fit its unique form factor and architecture. While some parts may be compatible across different models from the same manufacturer, it is not guaranteed that all parts will be interchangeable. Additionally, different laptop brands may have different designs and specifications, making it even less likely for parts to be interchangeable between different brands. Therefore, the statement that laptop parts are interchangeable with other laptop systems is false.