1.
You are working on a computer. Which of the following are considered essential?(Choose all correct answers.)
Correct Answer(s)
A. Motherboard
B. CPU
C. Memory
D. Video Card
Explanation
The motherboard, CPU, memory, and video card are all considered essential components of a computer. The motherboard is the main circuit board that connects all the other components together. The CPU (central processing unit) is the brain of the computer, responsible for executing instructions and performing calculations. Memory (RAM) is used to temporarily store data and instructions that the CPU needs to access quickly. The video card, also known as the graphics card, is responsible for rendering and displaying images and videos on the computer's monitor.
2.
Which of the following devices can be found on BOTH the front and back of a computer?(Choose all correct answers.)
Correct Answer(s)
A. Activity Lights
B. Power Switch
C. USB ports
Explanation
Activity lights, power switch, and USB ports can be found on both the front and back of a computer. Activity lights are typically located on the front and back panels of a computer to indicate the status of various components such as power, hard drive activity, and network connectivity. The power switch is usually located on the front panel for easy access, but some computers also have a secondary power switch on the back. USB ports are commonly found on both the front and back panels of a computer to provide convenient access for connecting peripherals and devices.
3.
Which of the following can cause a desktop computer to fail? (Choose allthat apply.)
Correct Answer(s)
A. Overheating
B. Loose add-on cards
C. Drive failures
D. Adding more memory
Explanation
Overheating can cause a desktop computer to fail because excessive heat can damage the internal components, leading to system instability or complete failure. Loose add-on cards can also cause failure as they may not be properly connected, resulting in issues with hardware functionality. Drive failures can cause the computer to fail as well, as it can lead to data loss and inability to access the operating system. Adding more memory, however, is unlikely to cause a desktop computer to fail, as long as the memory is compatible and properly installed.
4.
Which of the following are the most commonly used Windows operating systems?(Choose the three best answers.)
Correct Answer(s)
A. Windows XP
B. Windows 2000
C. Windows Vista
Explanation
The three most commonly used Windows operating systems are Windows XP, Windows 2000, and Windows Vista. These operating systems have been widely adopted by users and have a large user base. Windows XP was particularly popular and widely used for a long time before newer versions were released. Windows 2000 was also widely used in business environments. Windows Vista, although not as popular as XP, was still commonly used by many users. Snow Leopard, on the other hand, is not a Windows operating system but rather a version of Mac OS X, so it is not one of the commonly used Windows operating systems.
5.
Which of the following can be used in your day-to-day work on a standardWindows computer? (Choose the two best answers.)
Correct Answer(s)
A. CHKDSK
C. Disk Defragmenter
Explanation
CHKDSK and Disk Defragmenter can be used in your day-to-day work on a standard Windows computer. CHKDSK is a command-line tool that checks the file system and file metadata of a disk for errors and fixes them if possible. Disk Defragmenter is a utility that rearranges fragmented data on a disk, improving the performance and speed of the computer.
6.
Which of the following steps is important to perform when opening the case toaccess the internal parts of a computer?
Correct Answer
A. Check the system manual
Explanation
When opening the case to access the internal parts of a computer, it is important to check the system manual. The system manual provides instructions and guidelines specific to the computer model, which can help ensure that the case is opened correctly without causing any damage. It may also provide information on any specific precautions that need to be taken while accessing the internal parts. Checking the system manual is essential to avoid any potential mistakes or mishaps during the process.
7.
How do you identify the cable that connects to the floppy drive?
Correct Answer
C. There is a twist at one end
Explanation
The cable that connects to the floppy drive can be identified by the twist at one end. This twist is a distinguishing feature that sets it apart from other cables.
8.
Which of the following can help in preventing ESD? (Choose two)
Correct Answer(s)
A. Touch the unpainted metal of the chassis
D. Wear an antistatic wrist strap
Explanation
Touching the unpainted metal of the chassis helps in preventing ESD because it allows the person to discharge any static electricity they may have built up before handling sensitive electronic components. Wearing an antistatic wrist strap also helps prevent ESD as it grounds the person and prevents the buildup of static electricity.
9.
Which of the following types of hardware resources do both onboard and addoncard devices use? (Choose all that apply.)
Correct Answer(s)
A. IRQ
B. DMA
C. Memory
D. I/O port
Explanation
Onboard and addoncard devices both use IRQ, DMA, Memory, and I/O port as types of hardware resources. IRQ (Interrupt Request) is used to signal the processor that a device needs attention. DMA (Direct Memory Access) allows devices to transfer data directly to and from memory without involving the processor. Memory is used by devices to store data and instructions. I/O ports are used for communication between devices and the computer's processor.
10.
How do you attach the VGA cable to the video card to prevent it from losingconnection?
Correct Answer
D. By turning the thumbscrews
Explanation
To prevent the VGA cable from losing connection, you can attach it to the video card by turning the thumbscrews. This action ensures that the cable is securely fastened to the video port, reducing the chances of it becoming loose or disconnected. The thumbscrews provide a convenient and effective method of securing the VGA cable in place.
11.
What is the process of bypassing the CPU called?
Correct Answer
A. Direct Memory Access
Explanation
Direct Memory Access (DMA) is the process of bypassing the CPU and allowing external devices to transfer data directly to and from the computer's memory. This helps to improve the overall efficiency and speed of data transfer, as it reduces the burden on the CPU. DMA is commonly used in tasks such as disk drive operations, network communication, and audio/video processing. It allows devices to access the memory without requiring constant involvement from the CPU, thus freeing up its resources for other tasks.
12.
The system bus and I/O bus carry four different types of signals throughout thecomputer. Which of the following are the signals? (Choose all that apply.)
Correct Answer(s)
A. Data
B. Power
C. Control
Explanation
The system bus and I/O bus carry data signals, power signals, and control signals throughout the computer. Data signals are used to transfer information between different components of the computer. Power signals are used to provide electrical power to the various components. Control signals are used to coordinate and control the operation of the different components. Adapters, on the other hand, are not signals but rather devices used to connect different types of hardware or software together.
13.
Which of the following are considered expansion slots? (Choose all that apply.)
Correct Answer(s)
A. PCI
C. AGP
Explanation
PCI and AGP are considered expansion slots because they are both types of slots on a computer's motherboard that allow for the installation of additional hardware components. These slots provide the necessary connection and communication between the motherboard and the expansion card, allowing for the expansion of the computer's capabilities. Bluetooth and USB, on the other hand, are not expansion slots but rather technologies for wireless communication and data transfer.
14.
Which of the following can you use with SCSI (Small Computer Systems Interface)?(Choose all that apply.)
Correct Answer(s)
A. Hard drives
B. Scanners
C. Laser Printers
D. DVD-Roms
Explanation
SCSI (Small Computer Systems Interface) is a standard interface that allows multiple peripheral devices to be connected to a computer. It is commonly used for connecting storage devices, such as hard drives and DVD-ROMs, as well as input/output devices like scanners and laser printers. Therefore, all the options listed - hard drives, scanners, laser printers, and DVD-ROMs - can be used with SCSI.
15.
Which of the following are in the ATX family of motherboards? (Choose allthat apply.)
Correct Answer(s)
A. ATX
B. Mini-ATX
C. Flex ATX
Explanation
ATX, Mini-ATX, and Flex ATX are all part of the ATX family of motherboards. ATX is the standard size, while Mini-ATX is a smaller version designed for compact cases. Flex ATX is another smaller form factor that is even more compact than Mini-ATX. BTX, on the other hand, is not part of the ATX family and is a different form factor altogether.
16.
Which of the following are causes of overheating? (Choose all that apply.)
Correct Answer(s)
A. Fan Failure
C. Incorrect heatsink
Explanation
Fan failure can cause overheating because without a functioning fan, the airflow inside the system is reduced, leading to a buildup of heat. Incorrect heatsink can also cause overheating as it may not effectively dissipate the heat generated by the CPU. Incorrect CPU, on the other hand, may not be compatible with the motherboard or generate excessive heat, leading to overheating. PSU fan being too large is not a cause of overheating, as long as it is functioning properly.
17.
Which of the following are considered integrated I/O ports? (Choose all that apply)
Correct Answer(s)
A. Serial Port
B. Parallel Port
C. USB port
D. PS/2 ports
Explanation
Integrated I/O ports are ports that are built directly into a computer system and are used for input and output purposes. The Serial Port, Parallel Port, USB port, and PS/2 ports are all examples of integrated I/O ports. These ports allow for the connection of various peripherals such as printers, keyboards, mice, and external storage devices to the computer system. The RJ-44 is not considered an integrated I/O port as it is a type of connector used for Ethernet networking.
18.
Which one of the listed processors was the last slot-based processor designedby Intel?
Correct Answer
D. Pentium 3
Explanation
The Pentium 3 processor was the last slot-based processor designed by Intel.
19.
Which of the following processors was the first dual-core design by AMD?
Correct Answer
A. Athlon 64 X2
Explanation
The correct answer is Athlon 64 X2. This processor was the first dual-core design by AMD.
20.
Which of the following best describes hyperthreading?
Correct Answer
A. Processing two execution threads simultaneously
Explanation
Hyperthreading is a technology that allows a single physical processor core to behave like two logical processors. It achieves this by duplicating certain components within the processor, enabling it to handle multiple execution threads simultaneously. This means that the processor can work on two different tasks at the same time, improving overall performance and efficiency. Therefore, the answer "Processing two execution threads simultaneously" accurately describes hyperthreading.
21.
Before you remove the processor from the motherboard, what device shouldyou remove first?
Correct Answer
C. Heatsink
Explanation
Before removing the processor from the motherboard, it is important to remove the heatsink first. The heatsink is designed to dissipate heat generated by the processor, and it is typically attached to the processor using thermal compound or paste. Removing the heatsink before the processor ensures that the processor is not damaged or overheated during the removal process.
22.
You have been dispatched to a client’s computer. You have decided that theprocessor is overheating. Which of the following steps can you take to help withthe air flow around the processor?
Correct Answer
E. All of the above
Explanation
All of the above options can help with improving air flow around the processor. Blowing out the computer with compressed air can remove any dust or debris that may be blocking the air flow. Removing the heatsink from the CPU allows for better access to clean it or replace it if necessary. Placing the computer on a surface covered with old newspapers or waste paper can prevent the intake vents from being blocked. Lastly, cleaning off the old thermal paste and reapplying a small amount ensures proper heat transfer between the processor and the heatsink.
23.
To connect speakers to the sound card, which of the following must you use?
Correct Answer
B. 1/8 inch mini-jack cable
Explanation
To connect speakers to the sound card, you must use a 1/8 inch mini-jack cable. This type of cable is commonly used to connect audio devices such as speakers, headphones, or microphones to computers and other audio devices. It has a small connector that fits into the audio output port on the sound card and the other end of the cable usually has a standard 3.5mm stereo jack that can be plugged into the speakers.
24.
What is the CMOS memory used for?
Correct Answer
B. To store Bios settings
Explanation
CMOS memory is used to store the BIOS settings. The BIOS (Basic Input/Output System) is a firmware that is responsible for initializing and controlling hardware components during the boot process. It contains important settings and configurations for the computer's hardware, such as the boot order, system date and time, and various hardware parameters. The CMOS memory, which stands for Complementary Metal-Oxide-Semiconductor, is a type of memory that retains data even when the computer is powered off. Therefore, it is used to store the BIOS settings so that they are not lost when the computer is restarted or turned off.
25.
What happens when the CMOS battery fails?
Correct Answer
A. Cmos configuration is lost
Explanation
When the CMOS battery fails, the CMOS configuration is lost. The CMOS (Complementary Metal-Oxide-Semiconductor) configuration stores important settings for the computer, such as date and time, boot order, and hardware settings. Without the CMOS battery, the computer is unable to retain these settings, causing them to reset to default values. This can lead to issues such as incorrect date and time, inability to boot from the correct device, or hardware not being recognized properly. However, it does not result in the destruction of the computer or the death of the motherboard.
26.
To make changes to the default settings in the BIOS, what must you do atstartup?
Correct Answer
A. Press the f2 key
Explanation
To make changes to the default settings in the BIOS, you need to press the f2 key at startup. The BIOS (Basic Input/Output System) is a firmware that initializes the hardware and software components of a computer. By pressing the f2 key during startup, you can access the BIOS settings and make modifications to the default configurations. This allows you to customize various aspects of your computer's hardware and software, such as boot order, system time, and device settings.
27.
Which of the following will not work when configuring or viewing BIOS settings?
Correct Answer
D. Mouse
Explanation
The mouse will not work when configuring or viewing BIOS settings because the BIOS interface typically does not support mouse input. BIOS settings are accessed and navigated using the keyboard, specifically the arrow keys to move between options, the Enter key to select an option, and the Esc key to exit or go back. The mouse is not recognized or functional in this context.
28.
In today’s most recent systems, what common feature is used to help prevent excessiveheat from damaging you computer?
Correct Answer
C. Hardware Monitor
Explanation
Hardware Monitor is the correct answer because it is a common feature used in modern systems to prevent excessive heat from damaging the computer. Hardware Monitor monitors the temperature of various components such as the CPU, GPU, and hard drive, and alerts the user if the temperature exceeds a certain threshold. This helps prevent overheating and potential damage to the computer. It is an essential tool for maintaining the health and performance of the system.
29.
Which of the following security features are included in most of the currentlyused BIOSs programs?
Correct Answer
E. All of the above
Explanation
The correct answer is "All of the above." Most currently used BIOS programs include all of the mentioned security features. BIOS password is a common security measure that requires a password to access the BIOS settings. Power on password is another security feature that requires a password to start the computer. Chassis intrusion is a feature that detects if the computer case has been opened, providing additional security. Boot sector protection is a security feature that prevents unauthorized modification of the boot sector of the computer's hard drive. Therefore, all of these security features are typically included in most BIOS programs.
30.
If you are installing a new drive in your computer and it is not recognized, whatcan you do to fix the problem?
Correct Answer
D. Update the Bios
Explanation
If you are installing a new drive in your computer and it is not recognized, updating the BIOS can be a potential solution. The BIOS (Basic Input/Output System) is responsible for initializing hardware components, including drives. Updating the BIOS can provide compatibility with new hardware and resolve recognition issues. It is a common troubleshooting step when encountering problems with unrecognized drives. Referring to the information that came with the drive, searching for problems online, or contacting the company may also be helpful, but updating the BIOS specifically addresses the issue of drive recognition.
31.
What is the process called when upgrading the BIOS?
Correct Answer
C. Flashing the bios
Explanation
Flashing the BIOS refers to the process of updating or upgrading the firmware of the computer's BIOS (Basic Input/Output System). This process involves replacing the existing BIOS software with a newer version, which can bring improvements in performance, compatibility, and security. It is typically done by using a specific software provided by the motherboard manufacturer, which writes the new BIOS code onto a chip on the motherboard. This process is essential for keeping the computer's hardware and software up to date.
32.
What BIOS settings will allow you to automatically configure your system?(Choose all that apply.)
Correct Answer(s)
A. Bios defaults
B. Setup Defaults
C. Turbo
Explanation
The BIOS settings that will allow you to automatically configure your system are BIOS defaults, Setup Defaults, and Turbo. BIOS defaults refer to the default settings of the BIOS that are pre-configured by the manufacturer. Setup Defaults, on the other hand, allow you to reset all the BIOS settings to their default values. Turbo is a feature that automatically adjusts the system's performance settings to optimize performance. Function is not mentioned as an option for automatically configuring the system, so it is not applicable in this case.
33.
What features can be found in the advanced BIOS settings? (Choose two.)
Correct Answer(s)
A. Enable quick boot
D. Enable boot sector protection
Explanation
In the advanced BIOS settings, two features that can be found are enabling quick boot and enabling boot sector protection. Enabling quick boot allows the system to start up faster by skipping certain tests and processes during the booting process. Enabling boot sector protection helps to prevent unauthorized modifications to the boot sector of the system's hard drive, enhancing the security of the system.
34.
What option would you use if you are in the BIOS of your computer and youwant to exit without making any changes? (Choose all that apply.)
Correct Answer(s)
B. Discard changes
C. Hit the Esc Key
Explanation
In the BIOS of a computer, if you want to exit without making any changes, you can choose the options "Discard changes" and "Hit the Esc Key". "Discard changes" allows you to discard any modifications you have made to the BIOS settings and exit without saving them. "Hit the Esc Key" is another way to exit the BIOS without saving any changes. The other options, "Save configuration" and "Press f8 to return to desktop", are not applicable in this scenario as they involve saving or returning to the desktop, which is not the desired outcome in this case.
35.
What are BIOS beep codes used for? (Choose two.)
Correct Answer(s)
A. A fatal error
C. A serious error
Explanation
BIOS beep codes are used to indicate the occurrence of a fatal error and a serious error in a computer system. These codes are a series of beeps produced by the BIOS during the startup process to alert the user about critical issues. By listening to these beep codes, users can identify and troubleshoot hardware or software problems that may prevent the system from functioning properly. These codes serve as a diagnostic tool, providing valuable information to help users understand and resolve the errors that occurred during the system boot-up.
36.
When you start your computer, it performs an important test. What is this testknown as?
Correct Answer
B. POST
Explanation
POST stands for Power-On Self-Test. It is a diagnostic test that is performed by the computer's firmware or BIOS (Basic Input/Output System) when the computer is powered on. The purpose of the POST is to check the hardware components of the computer, such as the CPU, memory, and peripherals, to ensure that they are functioning properly. It helps to identify any potential hardware issues or errors that may prevent the computer from starting up correctly.
37.
Of the following system information, which can be viewed in the BIOS?(Choose all that apply.)
Correct Answer(s)
A. Installed Ram
B. Bios information
C. Processor type
D. Processor Speed
Explanation
The BIOS (Basic Input/Output System) is a firmware that is responsible for initializing and testing hardware during the booting process. It provides low-level access to the computer's hardware components. Therefore, the information that can be viewed in the BIOS includes the installed RAM, BIOS information, processor type, and processor speed. These details are essential for system configuration and troubleshooting purposes. Feature settings, on the other hand, are typically accessed through the operating system or specific software, not the BIOS.
38.
Which of the following would you use to keep the power supply workingproperly? (Choose two.)
Correct Answer(s)
A. Surge protector
C. UPS units
Explanation
A surge protector is used to protect electronic devices from power surges, which can damage the power supply and other components. It regulates the voltage and prevents sudden spikes in electricity from reaching the devices. On the other hand, UPS units (Uninterruptible Power Supply) are used to provide backup power during outages or fluctuations in the main power supply. They ensure continuous power to the devices, preventing any disruption or damage to the power supply. Therefore, using surge protectors and UPS units together helps to keep the power supply working properly by protecting it from surges and providing backup power when needed.
39.
Most power supplies in use today are designed to handle which two voltageranges? (Choose two.)
Correct Answer(s)
A. 115
C. 230
Explanation
Most power supplies in use today are designed to handle two voltage ranges: 115 volts and 230 volts. These voltage ranges are commonly used in different regions around the world. 115 volts is the standard voltage in North America, while 230 volts is the standard voltage in many other countries. Power supplies are designed to be compatible with these two voltage ranges to ensure that electronic devices can be powered safely and efficiently in different locations.
40.
To avoid power supply hazards you must never do which of the following?(Choose two.)
Correct Answer(s)
A. Disassemble the power supply
C. Switch the voltage to 220
Explanation
To avoid power supply hazards, it is important to never disassemble the power supply as it can expose dangerous electrical components. Switching the voltage to 220 can also be hazardous as it may overload the power supply and cause damage or even fire.
41.
What is the major difference between a UPS and a SPS? (Choose all that apply.)
Correct Answer(s)
A. The battery is only used when AC power fails
C. A momentary gap in power occurs between loss of AC power
D. They are far less expensive
Explanation
The major difference between a UPS and a SPS is that the battery in a UPS is only used when AC power fails, whereas in a SPS, a momentary gap in power occurs between the loss of AC power. Additionally, SPS systems are far less expensive compared to UPS systems.
42.
If a system is dead and gives no signs of life when you turn on the computer,which of the following might be the cause? (Choose all that apply.)
Correct Answer(s)
A. Defects in AC power to the system
B. Power Supply failure or misconfiguration
C. Temporary short circuits in internal or external components
D. Power button or other component failure
Explanation
The system being dead and showing no signs of life when the computer is turned on can be caused by multiple factors. Defects in AC power to the system can cause the computer to not receive any power. Power supply failure or misconfiguration can result in a lack of power distribution to the components. Temporary short circuits in internal or external components can cause the system to fail to start up. Finally, a failure in the power button or another component can prevent the system from turning on.
43.
All processors require a finned metal device to help with cooling. What is thisdevice called? (Choose two.)
Correct Answer(s)
A. Passive heatsink
C. Active heatsink
Explanation
Processors generate heat when they are in operation, and this heat needs to be dissipated to prevent damage to the processor. A heatsink is a device that helps in cooling the processor by absorbing and dissipating the heat. There are two types of heatsinks mentioned in the answer: passive heatsink and active heatsink. A passive heatsink relies on natural convection to cool the processor, while an active heatsink uses a fan or other mechanical means to enhance the cooling process. Both types of heatsinks are commonly used in processors to maintain optimal operating temperatures.
44.
Power supplies are rated using which of the following units?
Correct Answer
C. Watts
Explanation
Power supplies are rated using watts because watts measure the rate at which electrical energy is transferred or consumed. It represents the power output or capacity of the power supply. Amps measure the current flow, volts measure the electrical potential difference, and output is a general term that does not specifically measure the power rating of the supply.
45.
Newer computers’ power supplies typically have which of the following poweroutput ratings?
Correct Answer
D. 500 or higher
Explanation
Newer computers' power supplies typically have a power output rating of 500 or higher. This means that the power supply is capable of delivering a minimum of 500 watts of power to the computer components. This higher power output is necessary to meet the demands of modern computer hardware, which often includes high-performance processors, graphics cards, and other power-hungry components. Having a power supply with a rating of 500 or higher ensures that the computer has enough power to operate efficiently and reliably.
46.
Which of the following are causes of power supply overheating?
Correct Answer
D. All of the above
Explanation
Overloading the power supply can cause overheating because it puts excessive strain on the components, leading to increased heat production. Fan failure can also cause overheating as the fan is responsible for cooling the power supply. If the fan is not working properly or stops working altogether, the power supply will not be adequately cooled. Dirt or dust can obstruct the airflow and prevent proper cooling, resulting in overheating. Therefore, all of the mentioned factors can contribute to power supply overheating.
47.
How many pins are used for the main power connection by recent ATX/BTXmotherboards with ATX12V 2.2 power supplies?
Correct Answer
A. 24
Explanation
Recent ATX/BTX motherboards with ATX12V 2.2 power supplies typically use 24 pins for the main power connection. This is the standard for modern motherboards and power supplies, providing the necessary power and compatibility for the system.
48.
Which of the following steps would you use to remove a power supply?
Correct Answer
D. All of these options are correct
Explanation
All of the given options are correct steps to remove a power supply. To safely remove a power supply, it is important to first shut down the computer and turn off the power supply if it has an on-off switch. Then, disconnecting the AC power cord from the computer is necessary. Finally, disconnecting power connections from the motherboard, hard drives, and optical drives ensures that the power supply is completely removed.
49.
What device provides emergency power to a computer in case of a completepower failure?
Correct Answer
C. UPS
Explanation
A UPS (Uninterruptible Power Supply) is a device that provides emergency power to a computer in case of a complete power failure. It acts as a backup power source, allowing the computer to continue running and preventing data loss or damage. It typically includes a battery that can power the computer for a short period of time until the main power source is restored or until the computer is safely shut down. UTP (Unshielded Twisted Pair) and STP (Shielded Twisted Pair) are types of network cables, while surge protectors and power strips are devices used to protect electrical equipment from power surges.
50.
What is the minimum time recommendation for a UPS to supply power for anindividual workstation?
Correct Answer
B. 15 minutes
Explanation
The minimum time recommendation for a UPS to supply power for an individual workstation is 15 minutes. This means that the UPS should be able to provide uninterrupted power to the workstation for at least 15 minutes in case of a power outage. This allows the user to save their work, shut down the computer properly, or switch to an alternative power source without any data loss or disruption.