CompTIA A+ Essentials Trivia Quiz For IT Technician!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Michael.labombar
M
Michael.labombar
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,557
Questions: 62 | Attempts: 1,557

SettingsSettingsSettings
A Plus Essential Quizzes & Trivia

This Trivia quiz on CompTIA A+ IT technician has been created to test whether you are completely prepared for the real exam. This test will help you pass by familiarizing you with the material and the ensuring that you know the structure of the CompTIA A+ Essentials format. Questions are based on networking, hardware and software. Read the questions carefully and answer. So, let's try out the quiz. Good Luck!


Questions and Answers
  • 1. 

    Which of the following ports will support surround sound?

    • A.

      DB-25

    • B.

      S/PDIF

    • C.

      Firewire

    • D.

      DB-15

    • E.

      USB 2.0

    Correct Answer
    B. S/PDIF
    Explanation
    S/PDIF (Sony/Philips Digital Interface) is a digital audio interface that can support surround sound. It allows for the transmission of high-quality audio signals from one device to another, such as from a DVD player to a surround sound system. The other ports listed (DB-25, Firewire, DB-15, USB 2.0) are not specifically designed for audio transmission and may not support surround sound capabilities.

    Rate this question:

  • 2. 

    On a Windows XP system, which of the following commands will provide you with information on the route your packets take on the way to a destination host?

    • A.

      IPConfig /Hostname

    • B.

      Ping Hostname

    • C.

      NSLookup Hostname

    • D.

      Tracert Hostname

    Correct Answer
    D. Tracert Hostname
    Explanation
    The correct answer is "Tracert Hostname". The Tracert command in Windows XP is used to trace the route that packets take from the local computer to a destination host. It provides information on each hop along the path, including the IP address and response time of each intermediate router or gateway. This command is useful for troubleshooting network connectivity issues and identifying any network bottlenecks or delays.

    Rate this question:

  • 3. 

    What is the single biggest reason for the technological advancements of the Video Card?

    • A.

      The advent of Adobe Photoshop

    • B.

      Digital Photography

    • C.

      CAD

    • D.

      Windows XP and WIndows Vista

    • E.

      Video Games

    Correct Answer
    E. Video Games
    Explanation
    Video games have been the single biggest reason for the technological advancements of the Video Card. Video games have consistently pushed the boundaries of graphics and visual effects, demanding more powerful and advanced video cards to deliver immersive gaming experiences. The need for high-resolution graphics, realistic textures, and smooth gameplay has driven the development of video card technology. As video games continue to evolve, video card manufacturers strive to meet the demands of gamers by constantly improving and innovating their products.

    Rate this question:

  • 4. 

    Which of these components of a laser printer might be at fault if your pages are getting stuck to the photosensitive drum and will not come out?

    • A.

      The Fuser Assembly

    • B.

      The Primary Corona

    • C.

      The Static Charge Eliminator

    • D.

      The Conditioning Unit

    Correct Answer
    C. The Static Charge Eliminator
    Explanation
    The Static Charge Eliminator is responsible for neutralizing any static charge on the paper before it reaches the photosensitive drum in a laser printer. If the pages are getting stuck to the drum and not coming out, it suggests that the static charge is not being properly eliminated, which could be due to a faulty or malfunctioning Static Charge Eliminator.

    Rate this question:

  • 5. 

    A customer is explaining her computer issue when you receive a message on your beeper from your boss. What should you do?

    • A.

      Listen to her full explanation, go over some quick possibilities, then inform her that you must make a quick call to your boss, and you will step out of her office.

    • B.

      Listen to her full explanation, go over some quick possibilities, then inform her that you must make a quick call to your boss, and quickly dial him up on her phone.

    • C.

      Listen to her then tell her you need to make a quick call, and dialing up your boss on your cell phone in the office.

    • D.

      Interrupt her immediately, and inform her that you regret it but must make a quick call to your boss.

    Correct Answer
    A. Listen to her full explanation, go over some quick possibilities, then inform her that you must make a quick call to your boss, and you will step out of her office.
    Explanation
    The correct answer is to listen to her full explanation, go over some quick possibilities, then inform her that you must make a quick call to your boss, and you will step out of her office. This is the most professional and respectful approach, as it acknowledges the customer's issue and demonstrates that you are actively engaged in finding a solution. It also shows respect for your boss by informing them of the situation and stepping out of the office to make the call.

    Rate this question:

  • 6. 

    Which of the following units may cause serious injury or even death to an unwary technician even when unplugged? (Choose 2)

    • A.

      A CRT

    • B.

      A Motherboard

    • C.

      A SCSI Adapter Card

    • D.

      A Laser Printer

    • E.

      A Multimeter

    Correct Answer(s)
    A. A CRT
    D. A Laser Printer
    Explanation
    A CRT (Cathode Ray Tube) and a Laser Printer may cause serious injury or even death to an unwary technician even when unplugged. A CRT contains a high voltage capacitor that can retain a dangerous charge even after it has been unplugged. Accidental contact with this charge can result in electric shock. Similarly, a Laser Printer utilizes high voltage components and laser beams that can cause harm if mishandled, even when the printer is not connected to a power source. Therefore, both a CRT and a Laser Printer pose potential risks to technicians even when they are unplugged.

    Rate this question:

  • 7. 

    Why would one ever want to use a infrared port for networking?

    • A.

      Fast and reliable transfer of files over long distances

    • B.

      Secure transfer of files

    • C.

      Easy transfer of small files over a short distance

    • D.

      Transfer of OS patches from an application server closet to workstations down the hall

    • E.

      To transfer files without a risk of data interception

    Correct Answer
    C. Easy transfer of small files over a short distance
    Explanation
    The correct answer is "Easy transfer of small files over a short distance". Infrared ports can be used for short-range wireless communication, typically within a few meters. They are suitable for transferring small files quickly and easily between devices in close proximity. However, they are not ideal for long distances or large file transfers due to their limited range and slower transfer speeds compared to other networking options.

    Rate this question:

  • 8. 

    Which of the following is a big reason why plasma screens are not used on desktop units?

    • A.

      They provide too low of a resolution for most applications.

    • B.

      They produce a lot of glare when viewed from close-up.

    • C.

      They are very prone to burn-ins.

    • D.

      They are not compatible with HD signals.

    • E.

      They conflict with most Video Cards.

    Correct Answer
    C. They are very prone to burn-ins.
    Explanation
    Plasma screens are not used on desktop units primarily because they are very prone to burn-ins. Burn-ins occur when static images are displayed for extended periods, causing permanent damage to the screen. This is a significant drawback as desktop units often display static elements such as taskbars and icons. Therefore, the risk of burn-ins makes plasma screens less suitable for desktop use compared to other display technologies.

    Rate this question:

  • 9. 

    It is generally safe to assume that the ground of a power outlet is indeed grounded, because the building would not have passed inspection with out it.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Never assume this, you can always test the multimeter with a multimeter. You may be surprised by how often they are not grounded properly.

    Rate this question:

  • 10. 

    What is a major disadvantage to the bus network topology?

    • A.

      There is zero network fault tolerance

    • B.

      Traffic on a bus is not routable

    • C.

      CSMA/CD has too little overhead

    • D.

      Only 10 users can simultaneously use any one segment

    Correct Answer
    A. There is zero network fault tolerance
    Explanation
    The major disadvantage of the bus network topology is that it has zero network fault tolerance. This means that if there is a break or failure in the main communication line (the bus), the entire network will be affected and communication between devices will be disrupted. Unlike other network topologies, such as the star or mesh, where alternative paths can be taken if one fails, the bus topology does not have this capability. Therefore, any fault or failure in the bus can bring down the entire network.

    Rate this question:

  • 11. 

    If you want to speed up your system, which of the following components typically will provide the most noticeable difference?

    • A.

      A CPU with a faster clock rate

    • B.

      Formatting a HDD with NTFS

    • C.

      Creating smaller partition sizes on your HDD

    • D.

      Upgrading all drivers and flashing your BIOS

    • E.

      Installing more RAM

    Correct Answer
    E. Installing more RAM
    Explanation
    Installing more RAM can significantly improve the performance of a system by increasing its multitasking capabilities and reducing the need for virtual memory. RAM is responsible for temporarily storing data that the CPU needs to access quickly, so having more RAM allows the system to handle more data at once, resulting in faster and smoother operation. This upgrade is especially noticeable when running memory-intensive tasks or multiple applications simultaneously.

    Rate this question:

  • 12. 

    When troubleshooting a non responsive network printer, which of the following choices represents the best thing to check first.

    • A.

      The Printer BIOS

    • B.

      The Printer Drivers

    • C.

      The Print Server Configuration

    • D.

      The Print Spooler

    • E.

      The Platten Assembly

    Correct Answer
    D. The Print Spooler
    Explanation
    The print spooler is responsible for managing print jobs in a queue, so it is the best thing to check first when troubleshooting a non-responsive network printer. If the print spooler is not functioning properly, it can cause issues with print jobs getting stuck or not being sent to the printer at all. By checking the print spooler, you can ensure that print jobs are being processed correctly and troubleshoot any issues that may be causing the printer to be unresponsive.

    Rate this question:

  • 13. 

    Which of the following is a major flaw with peer-to-peer networking?

    • A.

      There is too much overhead on the network

    • B.

      Security is decentralized and networks are hard to maintain

    • C.

      Workgroups don't support Access Control Lists on NTFS drives

    • D.

      There is no security for shares in a workgroup

    Correct Answer
    B. Security is decentralized and networks are hard to maintain
    Explanation
    Peer-to-peer networking has a major flaw in that security is decentralized and networks are hard to maintain. In a peer-to-peer network, each device has equal privileges and responsibilities, making it difficult to enforce security measures consistently across the network. Additionally, since there is no central authority or server, managing and maintaining the network becomes more challenging. This decentralization of security and maintenance can lead to vulnerabilities and difficulties in ensuring the overall security and stability of the network.

    Rate this question:

  • 14. 

    Which of the following technologies supplies data to the CPU the fastest?

    • A.

      An SATA HDD

    • B.

      L1 Cache

    • C.

      L2 Cache

    • D.

      DDR SDRAM

    • E.

      A 40x CD-RW

    Correct Answer
    B. L1 Cache
    Explanation
    L1 Cache is the correct answer because it is the closest and fastest cache to the CPU. It stores frequently accessed data and instructions, allowing the CPU to quickly retrieve and process them. SATA HDD, L2 Cache, DDR SDRAM, and a 40x CD-RW are all slower compared to L1 Cache in terms of data transfer speed to the CPU.

    Rate this question:

  • 15. 

    The more circuits that are added to a CPU: (Choose 2)

    • A.

      The more wattage the CPU will use

    • B.

      The more voltage the CPU will use

    • C.

      The more powerful a CPU will become

    • D.

      The more L3 Cache a CPU will require

    Correct Answer(s)
    A. The more wattage the CPU will use
    C. The more powerful a CPU will become
    Explanation
    As more circuits are added to a CPU, the number of transistors and components increase, leading to a higher power consumption. This is because each circuit requires energy to function, and the more circuits there are, the more power is needed to support them. Additionally, adding more circuits can enhance the CPU's performance by increasing its processing power. Therefore, the more circuits added to a CPU, the more wattage it will use and the more powerful it will become.

    Rate this question:

  • 16. 

    Which of the following network protocols must you install on a Windows Client to Access a Novell Netware 6.0 Server?

    • A.

      IPX/SPX

    • B.

      NetBEUI

    • C.

      TCP/IP

    • D.

      NWLink

    Correct Answer
    C. TCP/IP
    Explanation
    Remember that Novell dropped IPX/SPX with the advent of Netware 5.0 in favor of the much more popular TCP/IP, making IPX/SPX and NWLink obsolete.

    Rate this question:

  • 17. 

    Which of the following CPU makers has implemented a Land Grid Array (LGA) package?

    • A.

      AMD

    • B.

      Pentium

    • C.

      Cyrix

    • D.

      NVidia

    Correct Answer
    B. Pentium
    Explanation
    Pentium is the correct answer because it is a CPU brand developed by Intel, and Intel has implemented the Land Grid Array (LGA) package. LGA is a type of CPU socket that uses an array of pins on the socket instead of on the CPU, allowing for better heat dissipation and improved contact between the CPU and the motherboard. AMD, Cyrix, and NVidia are not known for implementing LGA packages in their CPUs.

    Rate this question:

  • 18. 

    List, in the correct order, the layers of the OSI Model.

    • A.

      Physical, Data-Link, Transfer, Network, Session, Presentation, Application

    • B.

      Physical, Data-Link, Transfer, Network, Presentation, Session, Application

    • C.

      Physical, Data-Link, Network, Transfer, Session, Presentation, Application

    • D.

      Physical, Transfer, Data-Link, Network, Session, Presentation, Application

    • E.

      Physical, Network, Data-Link, Transfer, Session, Presentation, Application

    Correct Answer
    C. pHysical, Data-Link, Network, Transfer, Session, Presentation, Application
    Explanation
    The correct order of the layers in the OSI Model is as follows: Physical, Data-Link, Network, Transport, Session, Presentation, Application. This order represents the hierarchy of functions and responsibilities in the model, starting from the physical transmission of data and progressing to the higher-level functions of data presentation and application interaction.

    Rate this question:

  • 19. 

    How does DDR2 RAM make drastic speed increases over previous technologies?

    • A.

      By Increasing internal or core speeds

    • B.

      By Double pumping the FSB

    • C.

      By Quad Pumping the FSB

    • D.

      By Increasing the I/O Circuitry Speeds

    • E.

      By enhanced paging, or virtual memory technology

    Correct Answer
    D. By Increasing the I/O Circuitry Speeds
    Explanation
    DDR2 RAM makes drastic speed increases over previous technologies by increasing the I/O Circuitry Speeds. This means that the input/output circuitry of DDR2 RAM is designed to operate at higher speeds, allowing for faster data transfer between the RAM and other components of the computer system. This improvement in I/O circuitry speeds results in overall faster performance and better efficiency of the RAM.

    Rate this question:

  • 20. 

    In which of these situations is ESD a major threat to hardware integrity? (Choose the best 2)

    • A.

      Cleaning the screen of a CRT

    • B.

      Installing new RAM

    • C.

      Replacing a CPU's fan and heat sink

    • D.

      Swapping out a DVD +R

    • E.

      Unplugging a Soft Power switch

    Correct Answer(s)
    B. Installing new RAM
    C. Replacing a CPU's fan and heat sink
    Explanation
    ESD (Electrostatic Discharge) can be a major threat to hardware integrity in situations where there is a high risk of static electricity being discharged. When installing new RAM or replacing a CPU's fan and heat sink, there is a possibility of generating static electricity due to the handling of sensitive electronic components. This static electricity can damage the hardware if not discharged properly or if precautions are not taken to prevent ESD. Therefore, these two situations pose a significant risk to hardware integrity.

    Rate this question:

  • 21. 

    Which of the following 802.11 Standards are compatible?

    • A.

      802.11a and 802.11b

    • B.

      802.11a and 802.11g

    • C.

      802. 11b and 802.11g

    • D.

      802.11g and 802.11f

    Correct Answer
    C. 802. 11b and 802.11g
    Explanation
    802.11b and 802.11g are compatible because both standards operate in the 2.4 GHz frequency range. They use the same modulation technique (Direct Sequence Spread Spectrum) and can communicate with each other. 802.11a operates in the 5 GHz frequency range, while 802.11f is not a valid 802.11 standard.

    Rate this question:

  • 22. 

    What is the safest way to ensure proper functionality when installing new RAM? (Choose all that apply)

    • A.

      Always use the latest technology

    • B.

      Ensure that your Motherboard supports the RAM

    • C.

      Make sure your RAM is of the same quality

    • D.

      Make sure each unit is of the same speed

    • E.

      Make sure each unit holds the same amount of data

    Correct Answer(s)
    B. Ensure that your Motherboard supports the RAM
    C. Make sure your RAM is of the same quality
    D. Make sure each unit is of the same speed
    E. Make sure each unit holds the same amount of data
    Explanation
    To ensure proper functionality when installing new RAM, it is important to ensure that the motherboard supports the RAM. This is because different motherboards have different RAM compatibility and may not be able to recognize or utilize certain types of RAM. Additionally, it is important to make sure that the RAM is of the same quality to ensure compatibility and avoid any potential issues. Furthermore, each unit of RAM should be of the same speed to ensure proper synchronization and performance. Lastly, it is important to make sure that each unit of RAM holds the same amount of data to avoid any potential conflicts or compatibility issues.

    Rate this question:

  • 23. 

    Which of the following is most valuable to an IT department and the hardest to replace?

    • A.

      System boards

    • B.

      Windows OS CD's

    • C.

      Site Licenses

    • D.

      User Data

    • E.

      Event Logs

    Correct Answer
    D. User Data
    Explanation
    User data is the most valuable to an IT department and the hardest to replace because it contains all the important information and files created and stored by the users. This data includes documents, presentations, spreadsheets, databases, emails, and other important files that are essential for the daily operations of the organization. Losing user data can result in significant financial losses, legal implications, and damage to the reputation of the company. While system boards, Windows OS CDs, site licenses, and event logs are important components and resources for an IT department, they can be replaced or reinstalled.

    Rate this question:

  • 24. 

    Which of the following would be considered a consumable of a dot-matrix printer? (Choose 2)

    • A.

      Ink Cartridge

    • B.

      Toner Cartridge

    • C.

      Ribbon

    • D.

      Platen assembly

    • E.

      Paper

    Correct Answer(s)
    C. Ribbon
    E. Paper
    Explanation
    A dot-matrix printer uses a ribbon to transfer ink onto the paper, so the ribbon is considered a consumable. Additionally, the printer requires paper to print on, making it another consumable.

    Rate this question:

  • 25. 

    Which of the following represents the biggest security breach?

    • A.

      Forgetting your username/password

    • B.

      Keeping your account locked out for several days

    • C.

      Leaving files encrypted permanently because you changed your password

    • D.

      Writing your password down so as never to forget it

    • E.

      Accidentally blocking extra ports on your firewall

    Correct Answer
    D. Writing your password down so as never to forget it
    Explanation
    Writing your password down so as never to forget it represents the biggest security breach because it increases the risk of unauthorized access to your account. By writing down your password, you are exposing it to potential physical theft or unauthorized viewing, which could lead to someone else gaining access to your account without your knowledge or consent. This practice goes against the principle of keeping passwords confidential and secure.

    Rate this question:

  • 26. 

    A User has accidentally plugged a molex connection to his IDE HDD in backwards! Consequently his PC is now on fire. Which of the following extinguisher ratings is safe to use to put out that fire?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    C. Class C
    Explanation
    Class C fire extinguishers are specifically designed to extinguish fires involving electrical equipment. Since the PC fire was caused by the incorrect connection of an electrical component, using a Class C fire extinguisher would be the appropriate choice to safely put out the fire. Class A extinguishers are for ordinary combustible materials, Class B for flammable liquids, and Class D for combustible metals.

    Rate this question:

  • 27. 

    Which of the following is a Transport-layer protocol?

    • A.

      IP

    • B.

      DNS

    • C.

      TCP

    • D.

      Telnet

    • E.

      FTP

    Correct Answer
    C. TCP
    Explanation
    TCP (Transmission Control Protocol) is a Transport-layer protocol. It is responsible for establishing a reliable and error-free connection between two devices over a network. TCP ensures that data packets are delivered in the correct order and without any loss or corruption. It also manages flow control, congestion control, and error recovery. IP (Internet Protocol) is a Network-layer protocol responsible for addressing and routing packets, while DNS (Domain Name System) is an Application-layer protocol used for translating domain names into IP addresses. Telnet and FTP are Application-layer protocols used for remote login and file transfer, respectively.

    Rate this question:

  • 28. 

    What is the purpose of a MAC address?

    • A.

      To provide each NIC with a unique identifier for access at the physical level of a network.

    • B.

      To provide each NIC with a unique identifier for access at the data-link level of a network.

    • C.

      To provide each NIC with the same identifier for access at the physical level of a network.

    • D.

      To provide each NIC with the same identifier for access at the data-link level of a network.

    Correct Answer
    A. To provide each NIC with a unique identifier for access at the pHysical level of a network.
    Explanation
    The purpose of a MAC address is to provide each NIC (Network Interface Card) with a unique identifier for access at the physical level of a network. This identifier is used to distinguish one device from another on the same network and is assigned by the manufacturer. The MAC address is essential for data transmission and helps ensure that data is sent to the correct device within a network.

    Rate this question:

  • 29. 

    Which of the following protocols is secure?

    • A.

      HTTP

    • B.

      HTTPS

    • C.

      FTP

    • D.

      Telnet

    Correct Answer
    B. HTTPS
    Explanation
    HTTPS is the secure protocol among the given options. Unlike HTTP, which transmits data in plain text, HTTPS encrypts the data using SSL/TLS protocols, providing secure communication between the client and the server. This encryption ensures that sensitive information, such as login credentials or financial data, remains protected from unauthorized access or interception by malicious entities. FTP and Telnet, on the other hand, do not provide encryption, making them less secure options for transmitting sensitive information.

    Rate this question:

  • 30. 

    Why would you want to consider cleaning your Laser Printer outdoors?

    • A.

      There is less chance of ESD outside

    • B.

      Laser printers can benefit from some occasional direct sunlight

    • C.

      Toner gets everywhere when cleaned with condensed air

    • D.

      The noise from your dry/wet Vacuum is less invasive to clients

    • E.

      Wind power can be used to clean toner

    Correct Answer
    C. Toner gets everywhere when cleaned with condensed air
    Explanation
    Cleaning a laser printer with condensed air can cause the toner to become airborne and spread throughout the surrounding area. This can result in a messy cleanup process and potential damage to other equipment or surfaces nearby. Cleaning the printer outdoors reduces the risk of toner spreading indoors and makes it easier to contain and clean up any loose toner particles.

    Rate this question:

  • 31. 

    What represents a physical threat to network servers?

    • A.

      Unblocked Ports on a Firewall

    • B.

      Buffer overflow bugs in the OS

    • C.

      Unlocked Server Closet

    • D.

      Non-Authoritative Directory Service restores

    Correct Answer
    C. Unlocked Server Closet
    Explanation
    An unlocked server closet represents a physical threat to network servers because it allows unauthorized access to the servers. If the server closet is unlocked, anyone can enter and tamper with the servers, potentially causing damage or stealing sensitive data. This lack of physical security puts the network servers at risk and compromises the overall security of the network.

    Rate this question:

  • 32. 

    Your boss calls to tell you that as of today all of the company's WAPs must be made as secure as can be. Which of these steps would you take on each WAP? (Choose all that apply)

    • A.

      Upgrade to WEP encryption

    • B.

      Upgrade to WPA2 encryption

    • C.

      Disable the SSID broadcasts

    • D.

      Use the Default SSID

    • E.

      Use MAC filtering

    Correct Answer(s)
    B. Upgrade to WPA2 encryption
    C. Disable the SSID broadcasts
    E. Use MAC filtering
    Explanation
    Upgrading to WPA2 encryption is a recommended step as it is currently the most secure encryption protocol for wireless networks. Disabling the SSID broadcasts adds an extra layer of security by making the network invisible to unauthorized users. Using MAC filtering allows only specific devices with pre-approved MAC addresses to connect to the network, further enhancing security. However, upgrading to WEP encryption is not recommended as it is an outdated and easily compromised encryption protocol. Using the default SSID is also not recommended as it can make the network more vulnerable to attacks.

    Rate this question:

  • 33. 

    What advantage does Bluetooth have over Infrared technology?

    • A.

      It boasts the exact same specifications of IR

    • B.

      It has a faster data rate

    • C.

      It is an older more supported technology

    • D.

      It is easier to configure and use

    Correct Answer
    B. It has a faster data rate
    Explanation
    Bluetooth has a faster data rate compared to Infrared technology. This means that Bluetooth can transmit data at a higher speed, allowing for quicker transfer of information between devices. This advantage makes Bluetooth more efficient and suitable for tasks that require fast data transfer, such as streaming audio or video.

    Rate this question:

  • 34. 

    Which of the following operating systems would most likely be installed on a slate PC?

    • A.

      Windows 2000 Professional

    • B.

      Windows XP Media Center

    • C.

      Windows Tablet PC Edition

    • D.

      Windows CE

    • E.

      Windows Vista

    Correct Answer
    C. Windows Tablet PC Edition
    Explanation
    Windows Tablet PC Edition would most likely be installed on a slate PC because it is specifically designed for tablet devices. It includes features and functionalities that are optimized for touch input and pen-based computing, making it ideal for use on a slate PC. The other operating systems listed, such as Windows 2000 Professional, Windows XP Media Center, Windows CE, and Windows Vista, are not specifically designed for tablet devices and may not offer the same level of touch and pen-based functionality.

    Rate this question:

  • 35. 

    What happens to the bandwidth and power usage of a USB Hub when you install new USB devices?

    • A.

      Bandwidth goes down, Power usage goes down

    • B.

      Bandwidth goes down, Power usage goes up

    • C.

      Bandwidth goes up, Power usage goes down

    • D.

      Bandwidth goes up, Power usage goes up

    • E.

      Nothing, these remain constant regardless of how many devices are plugged in

    Correct Answer
    B. Bandwidth goes down, Power usage goes up
    Explanation
    When you install new USB devices on a USB Hub, the bandwidth decreases because the data transfer is shared among all the connected devices. As more devices are added, the available bandwidth for each device decreases. On the other hand, the power usage increases because the USB Hub needs to provide power to all the connected devices. The more devices are plugged in, the more power is required to support their operation.

    Rate this question:

  • 36. 

    Your Hard Drive has recently been partitioned, reformatted, and equipped with a new version of Windows. You wish that all of the free space remaining on the drive could be wiped of any data remnants from the previous installation. Sadly this is not possible and one must simply learn to secure your hard drive.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because it is possible to wipe the free space on a hard drive to remove any data remnants from the previous installation. This can be done using various tools and software that specialize in securely erasing data.

    Rate this question:

  • 37. 

    Which of these describes the definition of a thread?

    • A.

      One chunk of data

    • B.

      The smallest useable block on a hard drive

    • C.

      Portions of processes than can be run by the CPU

    • D.

      The largest amount of data the RAM can output at any one time

    • E.

      What seems to be holding your Pentium Pro machine together to this day

    Correct Answer
    C. Portions of processes than can be run by the CPU
    Explanation
    A thread is a portion of a process that can be executed independently by the CPU. It allows for concurrent execution within a single process, enabling multiple tasks to be performed simultaneously. Threads share the same memory space and resources of the process they belong to, but each thread has its own stack and program counter. By dividing a process into multiple threads, the CPU can switch between them to achieve multitasking and improve overall performance.

    Rate this question:

  • 38. 

    Sally, a user in Human Resources complains that her user logon isn't allowing her to access her PC. Upon checking the account in Active Directory you see that she has been locked out for a week. The Director of HR has told you that this is not necessary and is not allowing her staff to remain productive. Which tool should you use to change the account lockout duration?

    • A.

      Local Security Policy on your Help Desk PC

    • B.

      The Group Policy Object that is applied to Sally's Group

    • C.

      Local Security Policy on Sally's PC

    • D.

      The Group Policy Object that is applied to all user's of the domain

    • E.

      Force a registry patch directly to Sally's Machine

    Correct Answer
    B. The Group Policy Object that is applied to Sally's Group
    Explanation
    The Group Policy Object that is applied to Sally's Group should be used to change the account lockout duration. This is because the account lockout duration is a policy setting that is typically configured and enforced through Group Policy. By modifying the Group Policy Object that is applied to Sally's Group, the account lockout duration can be adjusted to meet the requirements of the Director of HR and allow Sally to access her PC.

    Rate this question:

  • 39. 

    You recently discover that your e-mail server is being flooded by Spam from multiple sources. You suspect some users may not be aware of what their actions on the internet are doing to the network. You decide to send out a memo; which of these precautions should be urged to help eliminate some of the spam.

    • A.

      Tell users to install a toolbar such a Google's or Yahoo's

    • B.

      Tell users to never give out their company e-mail ID unless it is for/with company clientele or associates.

    • C.

      Tell users to never go outside the company intranet

    • D.

      Tell users that the IT department is watching their every move

    • E.

      Tell users to use their e-mail program sparingly

    Correct Answer
    B. Tell users to never give out their company e-mail ID unless it is for/with company clientele or associates.
    Explanation
    The most effective precaution to help eliminate some of the spam is to tell users to never give out their company e-mail ID unless it is for/with company clientele or associates. This will prevent users from unknowingly sharing their e-mail address with spam sources, reducing the likelihood of their e-mail server being flooded with spam.

    Rate this question:

  • 40. 

    Which of the following is a major reason why FDD's are finally becoming obsolete?

    • A.

      They are not portable

    • B.

      They are not suitable for all Platforms

    • C.

      The Advent of Infrared data ports

    • D.

      The liftoff of portable flash ROM technology

    Correct Answer
    D. The liftoff of portable flash ROM technology
    Explanation
    The reason why FDD's (Floppy Disk Drives) are becoming obsolete is due to the introduction and popularity of portable flash ROM technology. Portable flash ROM technology provides a more efficient and convenient way of storing and transferring data compared to FDD's. Flash ROM technology offers larger storage capacities, faster data transfer speeds, and is more durable and reliable. As a result, FDD's are no longer necessary or widely used in modern computing devices.

    Rate this question:

  • 41. 

    Which utility could you use to tell your computer to boot off of a CD?

    • A.

      Windows Recovery Console

    • B.

      Windows Safe Mode

    • C.

      CMOS Setup

    • D.

      Your PC manufacturers diagnostic utility

    • E.

      Windows Last Known Good Configuration

    Correct Answer
    C. CMOS Setup
    Explanation
    CMOS Setup is the correct answer because it is a utility that allows users to configure various settings in the computer's BIOS, including the boot order. By accessing the CMOS Setup, users can change the boot priority to make the computer boot from a CD first, thus allowing them to install or run software from the CD.

    Rate this question:

  • 42. 

    Which format is required by a BIOS to recognize a bootable CD?

    • A.

      CSMA/CD

    • B.

      CDFS

    • C.

      ISO

    • D.

      NTFS

    • E.

      Bootable HPFS

    Correct Answer
    C. ISO
    Explanation
    The BIOS requires the ISO format to recognize a bootable CD. ISO is a standard file format used for creating and storing disc images of CDs and DVDs. It contains all the necessary files and data to boot the system from the CD. The BIOS uses the ISO format to identify and access the bootable files on the CD, allowing the system to start up from the CD-ROM drive.

    Rate this question:

  • 43. 

    Which resource can you check to find out the acceptable disposal procedures for hazardous materials around the office?

    • A.

      The OSHA website

    • B.

      The BBB website

    • C.

      An MSDS

    • D.

      Call Misdig

    • E.

      Call your senator

    Correct Answer
    C. An MSDS
    Explanation
    An MSDS (Material Safety Data Sheet) is a document that provides information on the potential hazards and proper handling procedures for hazardous materials. It contains details about the composition, physical and chemical properties, and disposal methods of the substance. Therefore, checking an MSDS would be the appropriate resource to find out the acceptable disposal procedures for hazardous materials around the office. The OSHA website may also provide relevant information on workplace safety, but it may not specifically address disposal procedures. The BBB website, calling Misdig, or calling your senator are unrelated to hazardous material disposal procedures.

    Rate this question:

  • 44. 

    Which of the following has the fastest real world data rate?

    • A.

      USB 1.1

    • B.

      USB 2.0

    • C.

      Firewire 400

    Correct Answer
    C. Firewire 400
    Explanation
    Firewire 400 has the fastest real-world data rate compared to USB 1.1 and USB 2.0. Firewire 400 has a maximum data transfer rate of 400 Mbps, while USB 1.1 has a maximum data transfer rate of 12 Mbps and USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, Firewire 400 is capable of transferring data at a faster rate than both USB 1.1 and USB 2.0.

    Rate this question:

  • 45. 

    Which of these situations might require the involvement of your supervisor? (Choose 2)

    • A.

      A customer who is unhappy with the way their computer is running.

    • B.

      A customer who is being disrespectful or profane.

    • C.

      A customer who refuses to listen to you or insists you are not going to help them.

    • D.

      A customer who has downloaded a virus on to their PC.

    • E.

      A customer who keeps getting disconnected from the support desk.

    Correct Answer(s)
    B. A customer who is being disrespectful or profane.
    C. A customer who refuses to listen to you or insists you are not going to help them.
    Explanation
    The involvement of a supervisor may be necessary when a customer is being disrespectful or profane, as this behavior may require intervention from a higher authority to address the situation appropriately. Additionally, a supervisor may need to be involved when a customer refuses to listen or insists that they will not be helped, as this may require a higher level of authority or expertise to handle the situation effectively.

    Rate this question:

  • 46. 

    Which of the following recovery console commands will allow you to view all installed services?

    • A.

      -ls

    • B.

      Listsvc

    • C.

      System root

    • D.

      Enable

    • E.

      Services

    Correct Answer
    B. Listsvc
    Explanation
    The correct answer is "listsvc". This command is used in the recovery console to display a list of all the installed services on the system. It allows the user to view the services and their status, providing a comprehensive overview of the services installed on the system.

    Rate this question:

  • 47. 

    Which of these battery types boasts long battery lives with no memory effect?

    • A.

      NI-Cd

    • B.

      NI-Mh

    • C.

      LI-ION

    • D.

      Cd - Ion

    Correct Answer
    C. LI-ION
    Explanation
    LI-ION batteries boast long battery lives with no memory effect. Unlike NI-Cd and NI-Mh batteries, LI-ION batteries do not suffer from memory effect, which is a decrease in battery capacity due to incomplete discharge and recharge cycles. LI-ION batteries can be charged at any time without affecting their overall capacity, making them more durable and long-lasting. Cd-Ion is not a recognized battery type, so it is not the correct answer.

    Rate this question:

  • 48. 

    Which of these Windows components will allow you to monitor security access items?

    • A.

      COM+

    • B.

      Event Viewer

    • C.

      Performance logs and alerts

    • D.

      System Information

    Correct Answer
    B. Event Viewer
    Explanation
    Event Viewer is the correct answer because it is a Windows component that allows users to monitor security access items. It provides a centralized location for viewing and managing event logs, which record important system events such as security breaches, login attempts, and access control changes. By using Event Viewer, administrators can track and analyze security-related events to ensure the security of their Windows systems.

    Rate this question:

  • 49. 

    Which of these IP addresses belongs to a Class C Subnet?

    • A.

      10.20.11.92

    • B.

      102.111.48.22

    • C.

      197.89.12.10

    • D.

      144.190.78.62

    Correct Answer
    C. 197.89.12.10
    Explanation
    The IP address 197.89.12.10 belongs to a Class C subnet because it falls within the range of 192.0.0.0 to 223.255.255.255. In a Class C subnet, the first octet ranges from 192 to 223, indicating that the network can have up to 254 hosts. The other IP addresses provided do not fall within this range and therefore do not belong to a Class C subnet.

    Rate this question:

  • 50. 

    Which of these integrated components is capable of storing an electric charge?

    • A.

      Integrated Circuit

    • B.

      Transistor

    • C.

      Resistor

    • D.

      Capacitor

    • E.

      An electric switch

    Correct Answer
    D. Capacitor
    Explanation
    A capacitor is an electronic component that is specifically designed to store an electric charge. It consists of two conductive plates separated by an insulating material, known as a dielectric. When a voltage is applied across the plates, one plate accumulates positive charge while the other accumulates negative charge. This separation of charges creates an electric field, allowing the capacitor to store energy in the form of an electric charge. Capacitors are commonly used in electronic circuits for various purposes, such as smoothing out voltage fluctuations, filtering signals, and storing energy for later use.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 22, 2008
    Quiz Created by
    Michael.labombar
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.