1.
If you have a PC with an ATX motherboard and case, can you replace it with a BTX motherboard?
Correct Answer
E. No!
Explanation
The correct answer is No! The reason is that ATX and BTX motherboards have different form factors and layouts. ATX motherboards have their expansion slots and I/O ports on the back, while BTX motherboards have them on the front. Additionally, the screw hole placements and power connector locations are different between the two. Therefore, it is not possible to replace an ATX motherboard with a BTX motherboard without significant modifications to the case.
2.
You are installing an additional drive into a working computer. The computer won't power up at all, no lights, no spinning drives, nothing. What's most likely the problem?
Correct Answer
D. Dead power supply
Explanation
If the computer won’t power up at all, with no lights or spinning drives, the most likely problem is a “Dead power supply” (Option D). The power supply unit (PSU) is responsible for converting AC power from the outlet into DC power for your computer components. If it’s dead, it would prevent the computer from powering up at all. Other options, like a dead hard drive or a corrupted driver, would typically still allow the computer to power up, but it might fail to boot or operate correctly. Insufficient wattage could potentially cause power issues, but it would be more likely to cause instability or shutdowns under load rather than preventing power up entirely.
3.
What should you look at to verify the authentication of a file?
Correct Answer
C. Digital signature
Explanation
sigverif.exe is a tool to verify the system files digital signature.
4.
What tool is used to troubleshoot problems with Windows, applications, etc?
Correct Answer
C. Event Viewer
Explanation
Event Viewer is a Windows tool that allows users to view detailed information about system events, warnings, and errors. It is a utility used for diagnosing issues by providing a log of events that occurred on the computer.
5.
_____ protects Windows file systems from being changed or deleted.
Correct Answer
C. Windows file protection
Explanation
Windows File Protection (WFP) is a feature in Microsoft Windows operating systems designed to protect critical system files from being altered or deleted. When system files are modified, corrupted, or replaced, it can lead to stability and functionality issues. Windows File Protection helps maintain the integrity of these files by monitoring them and automatically restoring the original versions if any unauthorized changes are detected.
So, option C, "Windows file protection," is the correct answer as it accurately describes the feature that safeguards Windows file systems.
6.
Which of the following user accounts is created on a local computer and allows a user access to only that computer?
Correct Answer
D. Local user
Explanation
A local user account is created on a specific individual computer and is designed to grant access to that particular computer only. Local user accounts are not global or centrally managed across a network; instead, they are specific to the computer on which they are created. Users with local accounts typically have permissions and access limited to the resources and services on the computer where the account is established.
Option D, "Local user," is the correct answer as it accurately describes an account created on a local computer, providing access solely to that specific machine.
7.
What is the protocol used on the Internet?
Correct Answer
C. TCP/IP
Explanation
TCP/IP is the correct answer because it is the most widely used protocol in the Internet. TCP/IP stands for Transmission Control Protocol/Internet Protocol and it is responsible for the communication and data transfer between devices on the Internet. It provides a set of rules and procedures for devices to establish connections, exchange data packets, and ensure reliable delivery of information. TCP/IP is a fundamental protocol suite that enables the functioning of the Internet as we know it today.
8.
In a monitor what can be the cause for the flickering?
Correct Answer
B. Poor cable connection
Explanation
A flickering monitor can be caused by various factors, but in this context, "Poor cable connection" (option B) is a likely cause. Here's an explanation:
When the cable connecting the monitor to the video output (typically from the graphics card) is not securely attached or is damaged, it can result in a poor or intermittent connection. This poor connection can lead to issues such as flickering, screen artifacts, or even a complete loss of signal.
If the cable is loose, damaged, or not properly seated in the ports, it can disrupt the flow of data between the computer and the monitor, causing the display to flicker. Checking and ensuring a secure and properly functioning cable connection is a common troubleshooting step when dealing with monitor flickering issues. If the cable appears to be in good condition, other factors like graphics card problems or monitor issues might need further investigation.
9.
What is it that uses a single public IP address to access the internet on behalf of all hosts on the network using IP addresses?
Correct Answer
A. NAT
Explanation
NAT is Network Address Translation.
10.
You are explaining to Jim that if you don't _______ it can cause PC parts to overheat.
Correct Answer
E. Remove the dust inside the PC
Explanation
Over time, dust can accumulate inside a computer, particularly on components such as fans, heat sinks, and other cooling systems. If this dust is not regularly removed, it can impede airflow and lead to overheating of PC parts. Efficient cooling is crucial for maintaining optimal performance and preventing damage to hardware components.
Regularly removing dust from inside the PC case helps ensure that cooling systems function effectively, preventing the risk of overheating. Dust buildup can insulate heat-producing components, causing them to operate at higher temperatures than intended. This can lead to reduced performance, instability, and potential long-term damage.
Therefore, it's advisable to clean the inside of a computer periodically to maintain proper airflow and cooling efficiency, ultimately preventing overheating issues.
11.
After you get a call from a company. You have the task to dispose of a storage media. What would you do with it?
Correct Answer
B. You destroy it
Explanation
When disposing of storage media that may contain sensitive or confidential information, it is advisable to ensure that the data is securely erased or the storage device is physically destroyed to prevent any potential data breaches. Simply throwing it in the regular trash may expose the data to unauthorized access. Recycling is an environmentally friendly option, but it should be done securely, ensuring that data is irreversibly removed before recycling.
12.
When troubleshooting, what is the first step?
Correct Answer
A. Check the obvious
Explanation
The first step in troubleshooting is to check the obvious. This means looking for any obvious issues or problems that may be causing the trouble. It could be something as simple as a loose cable or a power outage. By checking the obvious, you can quickly identify and resolve any simple problems before moving on to more complex troubleshooting steps.
13.
In Windows 2000/XP the _____ can read from and write to parts of the system other than their own local drive, install applications and perform a limited administrative task.
Correct Answer
A. Power user
Explanation
A power user in Windows 2000/XP can read from and write to parts of the system other than their own local drive, install applications, and perform limited administrative tasks. This means that they have elevated privileges and can perform certain administrative functions without having full control over the system, like an administrator.
14.
What type of service is DHCP?
Correct Answer
B. Addressing
Explanation
DHCP stands for Dynamic Host Configuration Protocol, which is a network management protocol used to assign IP addresses to devices on a network. It is primarily used for addressing purposes, allowing devices to obtain an IP address automatically without manual configuration. DHCP ensures efficient and automatic allocation of IP addresses, subnet masks, default gateways, and other network parameters. Therefore, the correct answer is "Addressing."
15.
What is critical to a successful O.S. load?
Correct Answer
D. System boot files
Explanation
For a successful Operating System (OS) load, all the options you provided play a crucial role. However, if we have to choose one, “System boot files” (Option D) could be considered the most critical. System boot files, which include files like the bootloader and the kernel, are essential for the OS to boot up. The bootloader is the first software program that runs when a computer starts and is responsible for loading the kernel. The kernel, in turn, initializes the rest of the operating system. Without these boot files, the OS cannot load. Please note that this is a simplified explanation, and the exact process can vary depending on the specific operating system.
16.
Which of the following is an important part of preventive maintenance?
Correct Answer
D. Getting rid of the dust
Explanation
Getting rid of the dust is an important part of preventive maintenance because dust can accumulate inside a computer and cause overheating and damage to the components. Regularly cleaning the computer and removing dust helps to prevent these issues and ensures that the computer operates efficiently.
17.
Using a normal vacuum cleaner inside a PC can cause:
Correct Answer
C. ESD
Explanation
Using a normal vacuum cleaner inside a PC can cause ESD (Electrostatic Discharge). ESD occurs when there is a sudden flow of electricity between two objects with different electrical potentials. Vacuum cleaners generate static electricity, which can build up and discharge when in contact with sensitive electronic components of a PC. This discharge can damage the components and potentially lead to malfunctions or complete failure of the PC. It is recommended to use specialized tools and techniques, such as compressed air or anti-static brushes, to clean the inside of a PC safely.
18.
What should you do when interacting with a customer?
Correct Answer
C. Listen to him/her
Explanation
When interacting with a customer, it is important to listen to them. This shows respect and attentiveness towards their needs and concerns. By actively listening, you can understand their requirements better and provide appropriate solutions or assistance. It also helps in building rapport and trust with the customer, making them feel valued and heard.
19.
What's important to achieve customer satisfaction?
Correct Answer
B. Be prepared
Explanation
Being prepared is important to achieve customer satisfaction because it allows you to anticipate and address any potential issues or concerns that the customer may have. By being prepared, you can provide prompt and effective solutions, demonstrate your expertise and professionalism, and ensure a positive customer experience. This includes having a thorough understanding of the product or service, being knowledgeable about common customer queries or problems, and having the necessary resources or tools to assist the customer effectively. Overall, being prepared enables you to meet and exceed customer expectations, leading to higher satisfaction levels.
20.
When should you ask permission to use customer property?
Correct Answer
B. Always
Explanation
Asking permission to use customer property is a professional and respectful practice. It shows that you value the customer's belongings and are considerate of their personal space. By asking for permission, you are ensuring that you have their consent before using their property, which helps in building trust and maintaining a positive customer relationship. Therefore, it is important to always ask permission to use customer property.
21.
Which of the following features are present in Windows XP Professional but lacks in Windows Home? Select all that apply.
Correct Answer(s)
B. Support for remote desktop
C. Support for group policy
D. Encryption of files/folders
Explanation
Windows XP Professional includes the features of support for remote desktop, support for group policy, and encryption of files/folders. These features are not available in Windows Home.
22.
You are on-site working on a computer while a user comes to you and starts asking detailed questions about what you are doing. He seems really interested in your job. What should you do?
Correct Answer
D. Stop what you are doing and answer
Explanation
It's essential to provide assistance and address the user's questions when they approach you with genuine interest. By stopping momentarily and answering their inquiries, you can help foster a positive relationship with the user and potentially improve their understanding of the work being done. However, it's important to manage your time effectively and ensure that addressing their questions does not significantly disrupt your workflow.
23.
Select the true statement about notched ribbon cables.
Correct Answer
D. Can be inserted in one way.
Explanation
In Floppy Drive cables the first pin is marked with red. Notched cables go only in one way.
24.
What should you do if you are running 10 minutes late to a customer site?
Correct Answer
C. Call the customer to let him/her know that you are late
Explanation
If you are running 10 minutes late to a customer site, it is important to call the customer to let them know that you are late. This shows professionalism and courtesy towards the customer, keeping them informed about the delay. It allows them to adjust their schedule accordingly and manage their expectations. Communication is key in maintaining a good customer relationship and ensuring customer satisfaction.
25.
What is used by Microsoft to prevent the unlicensed use of software?
Correct Answer
D. Windows product activation
Explanation
Windows product activation is used by Microsoft to prevent unlicensed use of software. This feature requires users to activate their copy of Windows by entering a valid product key. Activation verifies that the software is genuine and legally obtained. It helps prevent unauthorized copying and distribution of Microsoft software, ensuring that users are using licensed versions.
26.
Which device amplifies the incoming signal and noise?
Correct Answer
A. Signal repeater
Explanation
The device that amplifies the incoming signal and noise is a Signal Repeater. So, the correct answer is option A. Signal repeaters are network devices that operate at the physical layer of the OSI model. They amplify or regenerate an incoming signal before retransmitting it, hence they are also known as "signal enhancers"1. Please note that while they amplify the signal, they also inevitably amplify the noise that comes with the signal.
27.
What is the first step in preparing the motherboard to go in the case?
Correct Answer
A. Set the spacers
Explanation
The first step in preparing the motherboard to go in the case is typically to set the standoffs or spacers. These are small, usually metal components that you attach to the case's motherboard tray. They create a gap between the motherboard and the case to prevent electrical contact with the case and provide support for the motherboard. Properly aligning and securing the standoffs is essential to ensure that the motherboard fits correctly and doesn't short-circuit against the case.
28.
What is the term when we speak about a device that can be plugged into a USB port while the computer is on?
Correct Answer
E. Hot-swappable
Explanation
Hot-swappable refers to a device that can be connected or disconnected from a computer's USB port while the computer is still powered on. This means that the device can be plugged in or unplugged without the need to restart or shut down the computer. It allows for easy and convenient addition or removal of devices without causing any disruption to the computer's operation.
29.
You are not able to send e-mails. Which of the following is the cause?
Correct Answer
D. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the protocol responsible for sending emails from the sender's email client to the recipient's mail server. If you are unable to send emails, it is likely due to an issue with the SMTP server or configuration settings.
30.
NTFS uses:
Correct Answer
C. Master file table
Explanation
NTFS (New Technology File System) is a file system used by Windows operating systems. The Master File Table (MFT) is a crucial component of NTFS, as it contains metadata about all files and directories on a disk. It serves as a directory for the file system and keeps track of file names, locations, and attributes. Therefore, the correct answer is "Master file table" as it accurately represents one of the key components of NTFS.
31.
The acronym of HTTPS stands for:
Correct Answer
E. HyperText Transfer Protocol Secure
Explanation
The acronym "HTTPS" stands for "HyperText Transfer Protocol Secure." It is a secure version of the standard HTTP (HyperText Transfer Protocol) used for transmitting data between a user's web browser and a website. HTTPS uses encryption to protect the confidentiality and integrity of the data being exchanged between the user and the website, making it more secure for activities like online transactions and data submission.
32.
What is the maximum speed of IrDA?
Correct Answer
C. 4 Mb/s
Explanation
IrDA stands for Infrared Data Association, which is a standard for wireless communication using infrared light. The maximum speed of IrDA is 4 Mb/s, as indicated in the given answer. This means that data can be transmitted at a rate of 4 megabits per second using IrDA technology.
33.
You want to make sure that a new scanner is working properly. What is the best test you can do?
Correct Answer
B. Scan using a test pattern
Explanation
The best test to ensure that a new scanner is working properly is to scan using a test pattern. This is because a test pattern contains various elements such as lines, grids, and colors that can help identify any issues with the scanner's resolution, color accuracy, and overall scanning quality. By scanning a test pattern, you can evaluate the scanner's performance and determine if it meets the desired standards.
34.
A customer reports that she is the only one in the company that cannot access the network resources. She is using Windows XP Professional and her IP is 169.254.107.199. What should you do?
Correct Answer
B. Run Ipconfig/release and Ipconfig /renew on her computer
Explanation
The customer is unable to access network resources and is using Windows XP Professional with an IP address of 169.254.107.199. Running Ipconfig/release and Ipconfig/renew on her computer can help resolve the issue. This command will release the current IP address and request a new one from the DHCP server, which can potentially fix any network connectivity problems.
35.
What is the current energy-saving standard used by most PCs?
Correct Answer
C. ACPI
Explanation
ACPI stands for Advanced Configuration and Power Interface. It is a power management standard used by most PCs. ACPI allows the operating system to control and manage power usage, enabling features such as sleep mode and hibernation. It helps in conserving energy by optimizing the power consumption of the computer's hardware components. This standard ensures efficient power management and contributes to energy-saving practices in PC systems.
36.
From where do you configure the sticky keys, filter keys, and toggle keys options?
Correct Answer
A. You use accessibility options in control panel
Explanation
The accessibility options in the control panel are where you can configure the sticky keys, filter keys, and toggle keys options. These options are designed to assist individuals with disabilities in using their computers more easily. By accessing the accessibility options in the control panel, users can customize these features to meet their specific needs and preferences.
37.
Which utilities are used to isolate a problem between two computers on a TCP/IP network? Select two.
Correct Answer(s)
D. Tracert
E. Pathping
Explanation
Tracert and Pathping are utilities used to isolate a problem between two computers on a TCP/IP network. Tracert (short for Traceroute) is used to trace the route that packets take from the source computer to the destination computer, helping to identify any network issues along the way. Pathping is similar to Tracert but provides more detailed information about packet loss and latency on each hop of the network path. By using these utilities, network administrators can pinpoint where the problem lies and troubleshoot accordingly.
38.
You have accepted a certificate, but you are not sure if you did the right thing. How can you remove the certificate?
Correct Answer
A. You open Internet Explorer and select the Internet option.
Explanation
On the content tab in Internet options, there are 3 buttons to clear the SSL state, certificates and Publishers.
39.
The printouts of an impact printer are good on the left but fade when printed on the right. What is most likely the cause?
Correct Answer
C. A misaligned Platen
Explanation
If the printouts are fading on the right side, it suggests that there is a misalignment issue with the platen. The platen is the roller that feeds the paper through the printer, and if it is misaligned, it can cause uneven pressure on the paper, resulting in fading on one side. This can be resolved by adjusting the platen to ensure proper alignment and even pressure on the paper during printing.
40.
As a computer technician, what is the most effective first step to take when troubleshooting a computer that won't start?
Correct Answer
B. Check all cable connections to ensure they are secure.
Explanation
When a computer does not start, the most basic and often overlooked step is to ensure that all cable connections are secure. This includes power cables to the computer and monitor, as well as internal connections if accessible and safe to check. Loose cables are a common issue and can prevent the computer from starting properly. This step should be performed before considering more complex and costly actions such as reinstalling the operating system, replacing hardware components like the motherboard, or upgrading the RAM, which may not be necessary if the issue is simply a loose connection.
41.
When a user boots his computer the monitor goes black. After investigating you find out that he set the refresh rate too high. How can you fix this problem?
Correct Answer
B. Boot on safe mode
Explanation
When a user sets the refresh rate too high, it can cause the monitor to go black upon booting the computer. Booting the computer in safe mode is the recommended solution to fix this problem. Safe mode starts the computer with only the necessary drivers and services, allowing the user to troubleshoot and fix any issues. By booting in safe mode, the computer will start with a lower resolution and refresh rate, which should allow the user to access the display settings and adjust the refresh rate to a suitable level.
42.
A computer technician encounters a system with a suspected faulty CPU. Which of the following troubleshooting steps would be the LEAST effective in isolating the issue?
Correct Answer
B. Running a memory diagnostic test to check for RAM errors.
Explanation
While a memory diagnostic test can identify RAM problems, it's unlikely to pinpoint a faulty CPU. The most effective methods for isolating a CPU issue involve directly examining the CPU itself (checking temperature, physical condition) or replacing it with a known working unit to see if the problem is resolved. Examining the motherboard for damage can also help identify potential causes related to the CPU's interaction with other components.
43.
Which of the following types of damage is caused by ESD?
Correct Answer
C. Upset failure
Explanation
ESD, or Electrostatic Discharge, refers to the sudden flow of electricity between two electrically charged objects. This discharge can cause damage to electronic components and disrupt their normal functioning. Upset failure refers to a type of damage where the electronic device experiences a temporary malfunction or disruption due to ESD. Therefore, ESD can cause upset failure in electronic devices.
44.
While troubleshooting a printing problem. The customer starts explaining in great detail what he was trying to do when he tried to print and the fix he tried to do. At what point should you interrupt him?
Correct Answer
E. Never
Explanation
The customer should never be interrupted while explaining the printing problem. It is important to listen attentively and allow the customer to provide all the necessary details. Interrupting the customer may cause frustration and hinder the troubleshooting process. By letting the customer explain in great detail, it ensures that all relevant information is gathered, which can help in identifying the root cause of the issue and finding an appropriate solution.
45.
A user reported that the stylus in his Tablet PC is not working well. What should you try first?
Correct Answer
D. Clean the stylus
Explanation
The first thing to try when a stylus in a Tablet PC is not working well is to clean the stylus. So, the correct answer is option D. This can be done by removing any obstructions or dirt from the tip of the stylus. If cleaning the stylus doesn’t resolve the issue, other troubleshooting steps can be considered, such as checking the battery level of the stylus, aligning the screen, or updating the drivers. However, these are subsequent steps and not the first thing to try
46.
What you shouldn't forget to do in front of a customer?
Correct Answer
C. Identify yourself and your organization.
Explanation
In front of a customer, it is important to identify yourself and your organization. This helps establish trust and credibility, as the customer knows who they are dealing with and can verify your affiliation. It also allows the customer to contact you or your organization if they have any questions or concerns. By identifying yourself and your organization, you are presenting a professional image and demonstrating that you take the customer's needs seriously.
47.
What term is used to describe one way to replicate an entire drive?
Correct Answer
D. Disk Imaging
Explanation
Disk imaging is the term used to describe one way to replicate an entire drive. Disk imaging involves creating an exact copy or image of the entire drive, including all files, folders, and even the operating system. This image can then be used to restore the drive to its original state if needed. Partitioning refers to dividing a drive into separate sections, disk copy refers to copying individual files or folders, and disk replication is not a commonly used term for replicating an entire drive. Therefore, the correct answer is disk imaging.
48.
What are the symptoms of a dried-out ink nozzle?
Correct Answer
B. Missing lines or dots on the page
Explanation
The symptoms of a dried-out ink nozzle include missing lines or dots on the page. This means that when you try to print something, certain parts of the text or image may not appear on the page. This can happen when the ink nozzle becomes clogged or dried out, preventing the ink from flowing properly onto the paper.
49.
What should you try first when an application locks up?
Correct Answer
D. Press Ctrl + alt + delete
Explanation
You press Ctrl + alt + delete to call the task manager.
50.
Which one of the following errors, means that the BIOS cannot read the partition table information?
Correct Answer
E. Invalid drive or drive specification
Explanation
Invalid drive or drive specification means that the BIOS cannot read the partition table information. This error occurs when the BIOS is unable to recognize the connected drive or when the drive's specifications do not match the requirements of the system. It could be due to incorrect drive settings in the BIOS, faulty cables or connectors, or a defective drive. In such cases, the BIOS is unable to access the partition table information, leading to this error.