1.
………………………….occurs when circuit is created that allows electrons to rush from a statically charged body to another an unequal charge.
Correct Answer
B. ESD
Explanation
ESD stands for Electrostatic Discharge. It occurs when a circuit is created that allows electrons to rush from a statically charged body to another body with an unequal charge. This can cause damage to electronic components and devices, as the sudden flow of electrons can disrupt their normal functioning. ESD is a common problem in industries where sensitive electronic equipment is handled, and proper precautions must be taken to prevent it.
2.
Which cooling system is used to cool the, power supply, adapter cards, and CPU?
Correct Answer
B. Fan
Explanation
A fan is used to cool the power supply, adapter cards, and CPU. Fans work by circulating air and dissipating heat. They are commonly used in computer systems to prevent overheating and maintain optimal operating temperatures. Fans are cost-effective and easy to install, making them a popular choice for cooling components. Liquid cooling systems, thermal compound, and heat sinks are also used for cooling purposes, but in this case, the correct answer is a fan.
3.
The primary advantages of the FAT file system are its extremely low disk overhead, which is less than…………
Correct Answer
B. 1 MB
Explanation
The primary advantages of the FAT file system are its extremely low disk overhead, which is less than 1 MB. This means that the file system takes up very little space on the disk, allowing for more storage capacity for user files. Additionally, the low disk overhead makes it easier and faster to access and retrieve files, improving overall system performance.
4.
A user complains that his hard disk is really running slow. As a PC Technician, what should be your first step to resolve the issues?
Correct Answer
A. Defragment the drive. Verify and replace the hard drive cable if necessary.
Explanation
The correct answer is to defragment the drive and verify and replace the hard drive cable if necessary. This is because a fragmented hard drive can slow down the performance of the computer, so defragmenting it can help improve its speed. Additionally, a faulty or damaged hard drive cable can also cause slow performance, so verifying and replacing it if necessary can help resolve the issue. Formatting the hard drive, replacing the main board, or replacing the hard drive itself may not be necessary or effective in resolving the slow performance issue.
5.
While you were testing a resistance of a component on your motherboard, you damaged another component. Amongst the following what could be the possible cause?
Correct Answer
B. The multimeter transmitted some current, thus damaging the component
Explanation
The possible cause for damaging another component while testing the resistance of a component on the motherboard could be that the multimeter transmitted some current, leading to the damage.
6.
What should be done if CMOS contains a password you don’t know?
Correct Answer
B. Install the COMS shorting jumper to erase the CMOS data
Explanation
If the CMOS contains a password that is not known, the best solution would be to install the CMOS shorting jumper to erase the CMOS data. This is because the CMOS shorting jumper is a hardware solution that can reset the CMOS settings, including any passwords that may be set. By doing this, the password will be cleared, allowing access to the CMOS program without needing to know the password.
7.
Which of the following technique is used to troubleshoot if the adapter card and its slots are working fine, but services are unavailable?
Correct Answer
B. Visually inspect cards and cables and reconnect if necessary
Explanation
Visually inspecting cards and cables and reconnecting if necessary is the appropriate technique to troubleshoot if the adapter card and its slots are working fine, but services are unavailable. This is because a loose or disconnected cable or a faulty card connection can cause services to be unavailable even if the card and slots are functioning properly. By visually inspecting and reconnecting cards and cables, any issues related to loose connections or faulty cables can be identified and resolved, potentially restoring the availability of services.
8.
How will you grather information about the modems installed in the computer and the network configuration without checking in the control panel utility?
Correct Answer
B. By using the registry sub tree HKEY_LOCAL_MACHINE
9.
.Which of the following is not a function of fully uninterruptible Power Supply system?
Correct Answer
C. Long term data backup
Explanation
A fully uninterruptible Power Supply system is designed to provide continuous power to critical devices in the event of a power outage or loss. It typically switches to battery power when a loss in power is detected, ensuring uninterrupted power supply. It also keeps the batteries online to ensure they are charged and ready for use. Additionally, it monitors the power input line to detect any issues or fluctuations. However, long term data backup is not a function of a fully uninterruptible Power Supply system. This system is primarily focused on providing immediate power backup and ensuring continuous operation, rather than long-term data storage.
10.
John need to attache an external CD-Rom drive. Which option needs to be verified when installing an external drive that in not checked normally on installing a internal drive on a notebook?
Correct Answer
B. Verify that the power switch, or power supply, is turned off.
Explanation
When installing an external CD-Rom drive, it is important to verify that the power switch or power supply is turned off. This is not typically checked when installing an internal drive on a notebook, as the power is usually automatically disconnected when the notebook is turned off or the screen is closed. However, in the case of an external drive, it is crucial to manually turn off the power to avoid any potential electrical issues or damage to the device.
11.
Which divice does the processor uses to interact with rest of the hardware?
Correct Answer
B. BIOS chip
Explanation
The processor uses the BIOS chip to interact with the rest of the hardware. The BIOS chip contains the firmware that initializes the hardware components of the computer and provides the necessary instructions for the processor to communicate with them. It acts as a bridge between the processor and the other hardware devices, allowing them to work together efficiently.
12.
.---------------------------lasera are capable of creating eye damage through chronic, continous exposure; this classs include barcode readers
Correct Answer
B. Class 2
Explanation
Class 2 lasers are the correct answer because they are capable of creating eye damage through chronic, continuous exposure. This class includes barcode readers, which emit laser beams that can be harmful to the eyes if exposed to them for long periods of time. Class 3 lasers have a higher potential for eye damage, while Class 4 lasers are the most dangerous and can cause immediate eye injury. Class 1 lasers are considered safe for eye exposure.
13.
Port COM1 is type of---------------------------------------.
Correct Answer
D. Serial Port
Explanation
Port COM1 is a type of serial port. Serial ports are used to connect devices such as modems, printers, and mice to a computer. They transmit data one bit at a time, sequentially, over a single communication line. In contrast, parallel ports transmit multiple bits simultaneously over multiple lines. PS/2 ports are used for connecting keyboards and mice, USB ports are used for connecting a variety of devices, and parallel ports are used for connecting printers.
14.
What is the full form of ATAPI?
Correct Answer
B. Advanced Technology Attachment Packet Interface
Explanation
ATAPI stands for Advanced Technology Attachment Packet Interface. This is a protocol that allows devices such as CD-ROM drives, DVD drives, and tape drives to be connected to a computer's motherboard. It is an extension of the ATA (Advanced Technology Attachment) standard, which is used for connecting hard drives and other storage devices. The ATAPI protocol allows for the transfer of data in packets, making it more efficient for devices that use sequential access, such as CD-ROMs.
15.
John is planning to create a data processing-intensive crossword generator software. He had recently purched a good quality processor with L1 and L2 caches but want to increase its speed to allow his software to be tested well. Which of the following methods can he use to increase the speed of his processor at minimal cost?
Correct Answer
D. Use overclocking
Explanation
Overclocking is the process of increasing the clock speed of a processor beyond its default settings. This can be done by adjusting the settings in the computer's BIOS or using specialized software. By overclocking his processor, John can increase its speed without having to purchase a new one or invest in additional hardware. This method allows him to maximize the performance of his existing processor at minimal cost.
16.
An unknown hardware device is buffering its data in the memory, while the CPU is busy runing some other application. Which technique would that device be use?
Correct Answer
B. DMA
Explanation
When a hardware device is buffering its data in memory while the CPU is busy running another application, it would typically use Direct Memory Access (DMA). DMA allows the hardware device to transfer data directly to and from memory without involving the CPU, freeing up the CPU to perform other tasks. This technique is commonly used to improve overall system performance and efficiency.
17.
How can you enable your system to recognize a SCSI devices?
Correct Answer
D. By setting SCSI card to be BIOS enable
Explanation
By setting the SCSI card to be BIOS enabled, you are allowing the system's BIOS to recognize and communicate with SCSI devices. This configuration ensures that the system can detect and interact with any SCSI devices connected to it, enabling proper functionality and data transfer between the system and the SCSI devices.
18.
Which of the following reasons holds true when the mouse works sometimes?
Correct Answer
D. IRQ confict between the mouse and any other divices
Explanation
When the mouse works sometimes, it could be due to an IRQ conflict between the mouse and any other devices. IRQ (Interrupt Request) is a signal sent to the CPU to get its attention for a specific task. If there is a conflict between the mouse and another device trying to use the same IRQ, it can cause intermittent functionality of the mouse. This conflict can disrupt the communication between the mouse and the computer, resulting in the mouse working only sporadically.
19.
You have not used your Ink jet printer for last two days. Which of the following cycle your printer needs to go through in order to come into the ready state?
Correct Answer
A. Cleaning
Explanation
When an inkjet printer is not used for a certain period of time, the ink in the nozzles can dry up and clog the print head. To prevent this, the printer needs to go through a cleaning cycle to remove any dried ink and unclog the nozzles. This process ensures that the printer is ready to print when needed. Therefore, the printer needs to go through the cleaning cycle in order to come into the ready state.
20.
An unwanted software loaded in ti system for the purpose of presenting commercial advertisement to the user is called___________________.
Correct Answer
D. Adware
Explanation
Adware is an unwanted software that is loaded onto a system with the purpose of presenting commercial advertisements to the user. It often comes bundled with other free software and can display pop-up ads, redirect web browsers, and collect user data for targeted advertising. Unlike spyware, which is designed to gather information without the user's consent, adware is primarily focused on delivering advertisements.
21.
GlobeSurf Inc. is planning to expand its ISP operations by implementing the new wireless network. The network team had implemented a 802.11 wireless network for the corporates last year. They now want to use a cost-effective and compatible wireless network which can also connect with their 802.11 wireless network. Which wireless standard they should implement?
Correct Answer
B. 802.11b
Explanation
The correct answer is 802.11b because it is a cost-effective and compatible wireless network that can connect with their existing 802.11 wireless network.
22.
Which statrment is TRUE about DNS Services?
Correct Answer
D. DNS is the primary name resolution service in the internet as well as private IP networks.
Explanation
DNS (Domain Name System) is indeed the primary name resolution service in the internet as well as private IP networks. It translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) so that computers can communicate with each other. DNS eliminates the need for users to remember and enter IP addresses, making it easier to navigate the internet. It also allows for the creation of subdomains and the mapping of multiple IP addresses to a single domain name.
23.
A network in which some nodes act as servers to provide special service on behalf of other nodes is called------------------------------------------------------……..
Correct Answer
A. Client/server network
Explanation
A network in which some nodes act as servers to provide special services on behalf of other nodes is called a client/server network. In this type of network, some nodes (servers) have resources or services that they provide to other nodes (clients) upon request. The clients request and receive these services from the servers, making it a client/server network.
24.
Which of the following statement is NOT true about My Computer in Windows XP?
Correct Answer
D. It is two-pane view
Explanation
The My Computer in Windows XP is a single-pane view, not a two-pane view. This means that when you open My Computer, you will see all the drives and folders in a single window, rather than having a separate pane for each drive or folder.
25.
Mr. Dylan owned a laptop computer, which he used extensively in his office. Now his son, Wally, is insisting him to buy a desktop for he wants to play his favorite MP3 music on the system. Suggest him analternative such that he can avail the functionality of a desktop system
Correct Answer
D. Buy a docking station.
Explanation
Buying a docking station would be a suitable alternative for Mr. Dylan as it would allow him to connect his laptop to a desktop-like setup. He can connect a monitor, keyboard, and mouse to the docking station, essentially turning his laptop into a desktop system. This way, Wally can play his favorite MP3 music on a larger screen and enjoy the functionality of a desktop system without the need to purchase a separate desktop computer.
26.
You have signed up for oneline banking at your financial institution. Just after signing up you receive a email requesting that you reconfirm your name, address, taxpayer identification information, and account number. What should you do?
Correct Answer
C. Assume it is fraud email and report to the company
Explanation
The correct answer is to assume that the email is a fraud and report it to the company. This is because legitimate financial institutions would not request sensitive information like name, address, taxpayer identification information, and account number via email. It is important to be cautious and not provide personal information to potential scammers, as they can use it for fraudulent activities. Reporting the email to the company can help protect yourself and others from falling victim to the scam.
27.
What is the main disadvantage of dot-matrix printer?
Correct Answer
B. Poor image quality
Explanation
The main disadvantage of a dot-matrix printer is poor image quality. Unlike other types of printers, dot-matrix printers use a matrix of small pins to create characters and images on paper. This results in a lower resolution and less sharpness compared to inkjet or laser printers. The dots used to create the images can be visible, leading to a less professional and less visually appealing printout.