1.
Which of the following is not a hive in the Windows Registry?
Correct Answer
B. HKEY_RESOURCES
Explanation
The Windows Registry is a hierarchical database that stores configuration settings and options for the operating system and installed applications. It is organized into different hives, each representing a different aspect of the system. The hives listed in the options are all valid hives in the Windows Registry, except for HKEY_RESOURCES. HKEY_RESOURCES is not a valid hive in the Windows Registry.
2.
Select two power options for a laptop
Correct Answer(s)
B. Battery
C. AC power
Explanation
The correct answer is Battery and AC power. These are the two power options commonly used for laptops. The battery allows the laptop to be used without being plugged into an electrical outlet, providing portability. AC power refers to using a power adapter to connect the laptop to a wall outlet, ensuring a constant power supply and charging the battery if needed.
3.
Where would you find the Degauze utility for a monitor?
Correct Answer
A. On the monitor
Explanation
The Degauze utility for a monitor can be found on the monitor itself. Degauzing is a process that helps to eliminate any magnetic interference on the screen, which can cause distortion or discoloration. The monitor is equipped with a degauze button or option that allows the user to perform this function. It is typically located on the front or side of the monitor, making it easily accessible for the user. Therefore, the correct answer is "On the monitor."
4.
How many bits are there in a Rambus memory module?
Correct Answer
C. 32 bits
Explanation
A Rambus memory module typically consists of 32 bits. This means that it can process and store 32 bits of data at a time.
5.
What is the speed for IEEE 802.11g?
Correct Answer
D. 54Mbps
Explanation
The correct answer is 54Mbps. The speed for IEEE 802.11g is 54Mbps. This is the maximum theoretical data rate that can be achieved on this wireless network standard. Mbps stands for megabits per second, which is a measure of data transfer speed.
6.
Printer, files, and e-mail can all be categorized as_____________?
Correct Answer
D. Resources
Explanation
Printer, files, and e-mail can all be categorized as resources. In an office setting, these items are considered valuable assets that are used to carry out various tasks and functions. A printer is a resource used for printing documents, files are resources used for storing and organizing information, and e-mail is a resource used for communication and exchanging messages. Therefore, these items can all be classified under the category of resources.
7.
Which technology uses a physical characteristic to establish identity?
Correct Answer
C. Biometrics
Explanation
Biometrics is the correct answer because it refers to the technology that uses physical characteristics, such as fingerprints, facial features, or iris patterns, to establish and verify an individual's identity. This technology is widely used in various applications, including access control systems, authentication processes, and identification purposes, as it provides a highly accurate and reliable method of identification based on unique physical traits.
8.
Which topology uses a cetralized device to connect a network?
Correct Answer
B. Star
Explanation
The correct answer is Star. In a star topology, all devices in the network are connected to a central device, such as a switch or a hub. This central device acts as a point of connection for all the other devices, allowing them to communicate with each other. This topology is commonly used in Ethernet networks, as it provides a centralized and efficient way of managing network traffic.
9.
How would you descibe an older fax machine?
Correct Answer
C. Thermal printer
Explanation
An older fax machine can be described as a thermal printer because it uses heat to transfer ink onto paper. Thermal printers work by heating special thermal paper, which contains a coating that turns black when heated. The heat generated by the fax machine's printhead selectively heats the paper, creating the desired text or image. This method is commonly used in older fax machines, where the thermal paper is fed through the machine and heated to produce the printed output.
10.
Which is faster?
Correct Answer
B. Firewire
Explanation
Firewire is faster than USB1 and IR. Firewire, also known as IEEE 1394, is a high-speed interface primarily used for connecting devices such as computers, digital cameras, and external hard drives. It has a maximum transfer rate of up to 800 Mbps, which is significantly faster than the maximum transfer rate of USB1 (12 Mbps) and IR (4 Mbps). Therefore, Firewire is the fastest option among the given choices.
11.
Define a class B Subnet Mask
Correct Answer
D. 255.255.0.0
Explanation
The given answer, 255.255.0.0, is the correct class B subnet mask. In IPv4 addressing, subnet masks are used to divide an IP address into a network address and a host address. Class B addresses have the first two octets reserved for the network address, and the remaining two octets for the host address. The subnet mask 255.255.0.0 has the first two octets set to all ones, indicating the network address, and the last two octets set to all zeros, indicating the host address. This subnet mask allows for a large number of hosts within the network.
12.
How wide is a AGP bus
Correct Answer
A. 64 bits
Explanation
The AGP bus is 64 bits wide. This means that it can transfer 64 bits of data in parallel between the graphics card and the system memory. A wider bus allows for faster data transfer and can improve the overall performance of the graphics system.
13.
What does checksum mean?
Correct Answer
B. Cmos battery low
Explanation
The correct answer is "Cmos battery low." This refers to the status of the CMOS (Complementary Metal-Oxide-Semiconductor) battery, which is responsible for powering the CMOS memory chip in a computer. When the CMOS battery is low, it indicates that the battery is running out of power and needs to be replaced. This can result in issues with the computer's BIOS settings, such as date and time resetting or the computer not booting up properly.
14.
Which 2 of the following are today's best choices for Graphics cards?
Correct Answer(s)
C. PCIe
D. AGP
Explanation
PCIe and AGP are today's best choices for graphics cards because they offer faster data transfer rates and better performance compared to older interface standards like ISA and MCA. PCIe (Peripheral Component Interconnect Express) is the most widely used and fastest interface for graphics cards, providing high bandwidth and scalability. AGP (Accelerated Graphics Port) was popular in the past and still supports older systems, offering better performance than PCI. ISA (Industry Standard Architecture) and MCA (Micro Channel Architecture) are outdated and not suitable for modern graphics cards.
15.
WPAN is also known as_____?
Correct Answer
B. Bluethooth
Explanation
WPAN stands for Wireless Personal Area Network. It is a short-range wireless communication technology that allows devices to connect and communicate with each other within a limited range. One of the most popular WPAN technologies is Bluetooth, which is used for connecting devices such as smartphones, tablets, and laptops to peripherals like headphones, speakers, and keyboards. Therefore, the correct answer is Bluetooth.
16.
A Piconet is limited to how many devices?
Correct Answer
D. 8
Explanation
A Piconet is a network formed by Bluetooth devices, where one device acts as the master and the others as slaves. The master can connect to up to 7 slave devices, resulting in a total of 8 devices in the Piconet. Therefore, the correct answer is 8.
17.
What color is a PS/2 mouse port
Correct Answer
B. Green
Explanation
The PS/2 mouse port is typically colored green. This color is used to differentiate it from other ports on a computer, such as the purple keyboard port. The green color coding helps users easily identify and connect their PS/2 mouse to the correct port on their computer.
18.
Laptops are__________ more expensive than Desktops
Correct Answer
D. 80%
Explanation
Laptops are generally more expensive than desktops by around 80%. This means that, on average, the price of laptops is 80% higher than that of desktops. This can be attributed to several factors such as the portability and compactness of laptops, which require more advanced technology and engineering, as well as the higher demand for laptops in the market. Additionally, the cost of manufacturing and producing laptops may also contribute to their higher price compared to desktops.
19.
In which step of the laser printing process does a uniform -600VDC charge get applied to the EP drum?
Correct Answer
B. Charging
Explanation
In the laser printing process, the step where a uniform -600VDC charge is applied to the EP drum is called charging. This step prepares the drum to receive the image that will be printed. By applying a negative charge to the drum, it creates an electrostatic field that attracts the positively charged toner particles during the next step, writing. This ensures that the toner is accurately transferred onto the drum to form the desired image.
20.
Select all the elements that can damage your laser printer
Correct Answer(s)
A. Heat
B. Light
C. Ozone
D. Ammonia
Explanation
Heat, light, ozone, and ammonia can all damage a laser printer. Heat can cause the internal components to overheat and malfunction. Excessive exposure to light can cause the toner to fade and affect the print quality. Ozone, which is produced by some electrical equipment, can corrode the printer's sensitive parts. Ammonia, commonly found in cleaning products, can react with the printer's components and cause damage. Therefore, it is important to keep laser printers away from these elements to ensure their longevity and proper functioning.
21.
Which account do hackers often target on a database application?
Correct Answer
B. Database local account
Explanation
Hackers often target the database local account on a database application because this account typically has access to the underlying database and its sensitive data. By gaining access to the database local account, hackers can potentially retrieve, manipulate, or delete valuable data stored within the database. This account is often a prime target as it holds significant privileges and can be exploited to compromise the entire database system.
22.
Which of the following is not a type of printer?
Correct Answer
C. Scanjet
Explanation
The given options are all types of printers except for "Scanjet." Bubble-jet, dot-matrix, and laser printers are all common types of printers used for various purposes. However, "Scanjet" is not a type of printer; it is a brand name for scanners produced by Hewlett-Packard (HP). Scanners are devices used to convert physical documents or images into digital format, not to print documents.
23.
Which wireless protocol is an improvement on WEP?
Correct Answer
B. WPA
Explanation
WPA (Wi-Fi Protected Access) is an improvement on WEP (Wired Equivalent Privacy). WEP was the initial encryption protocol used for securing wireless networks, but it had several vulnerabilities that made it easy to crack. WPA was developed to address these weaknesses and provide stronger security for wireless networks. It introduced stronger encryption algorithms and implemented a more robust authentication process, making it a more secure option compared to WEP.
24.
Floppy drive power connecter use_________ connectors
Correct Answer
D. Berg
Explanation
The correct answer is Berg. Floppy drive power connectors use Berg connectors.
25.
How would you define a NIC
Correct Answer
B. RJ45
Explanation
RJ45 is a type of connector commonly used for Ethernet networking. It has 8 pins and is designed to connect network devices such as computers, routers, and switches. The "RJ" stands for Registered Jack, indicating that it is a standardized interface. The "45" refers to the number of the wiring pattern used in the connector. RJ45 connectors are used for wired Ethernet connections and are widely used in both residential and commercial networks.
26.
USB2 operates at________ Mbps
Correct Answer
C. 480
Explanation
USB2 operates at a speed of 480 Mbps. This is the correct answer because USB2, also known as USB 2.0, is a widely used version of the USB standard that supports data transfer rates of up to 480 Mbps. This high-speed capability allows for faster file transfers and improved performance when using USB devices such as external hard drives, flash drives, and cameras.
27.
Which is more expensive?
Correct Answer
B. Water cooling
Explanation
Water cooling is more expensive compared to air cooling and Peltier cooling. This is because water cooling systems require additional components such as a water block, radiator, pump, and tubing, which can increase the overall cost. Additionally, water cooling systems often require more maintenance and installation expertise, adding to the expenses. On the other hand, air cooling is the most affordable option as it only requires a heat sink and fan, while Peltier cooling, which uses thermoelectric modules, can be more expensive due to the specialized technology involved.
28.
Which motherboard design style is most popular?
Correct Answer
A. ATX
Explanation
ATX is the most popular motherboard design style. It is widely used in desktop computers due to its larger size and compatibility with various components. ATX motherboards offer more expansion slots, better cooling options, and improved power delivery. They also support multiple graphics cards and have standardized dimensions, making it easier to find compatible cases. ATX motherboards have become the industry standard, offering a balance between performance, flexibility, and compatibility.
29.
What type of expansion slot is almost always used for high speed, 3D grapics video cards?
Correct Answer
B. AGP
Explanation
AGP (Accelerated Graphics Port) is almost always used for high-speed, 3D graphics video cards. AGP provides a direct connection between the graphics card and the computer's memory, allowing for faster data transfer and improved performance. USB, ISA, and PCI are not typically used for high-speed graphics cards, making AGP the correct choice.
30.
How thich is a Type I card
Correct Answer
C. 3.3mm
Explanation
A Type I card is 3.3mm thick.
31.
How do you access the Task managwer in Windows XP?
Correct Answer
B. Ctrl+Alt+Del
Explanation
To access the Task Manager in Windows XP, you need to press Ctrl+Alt+Del. This key combination brings up a menu where you can choose to open the Task Manager. The Task Manager allows you to view and manage running processes, monitor system performance, and end unresponsive applications.
32.
Which is not a OSI model Layer?
Correct Answer
A. Network-link Layer
Explanation
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. The Network-link Layer is not a valid layer in the OSI model.
33.
Where would you find the MAC address
Correct Answer
D. Data-link Layer
Explanation
The MAC address, also known as the Media Access Control address, is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It is used to identify devices on a local network. The Data-link Layer is responsible for the transmission of data between nodes on the same network segment. This layer is where the MAC address is found, as it is used to address and deliver data packets within the local network.
34.
Which topology is the easiest to modify?
Correct Answer
D. Star
Explanation
The star topology is the easiest to modify because each device is connected directly to a central hub or switch. This means that adding or removing devices can be done without disrupting the entire network. In a star topology, if one device fails, it does not affect the rest of the network, making troubleshooting and maintenance easier. Additionally, the star topology allows for easy scalability as new devices can be added to the network simply by connecting them to the central hub.
35.
How fast is a AGP bus? choose 2
Correct Answer(s)
C. 66MHz
D. 133MHz
Explanation
The AGP bus can operate at two different speeds, 66MHz and 133MHz. These speeds determine the rate at which data can be transferred between the graphics card and the computer's memory. The higher the speed, the faster the data transfer rate. Therefore, the correct answers are 66MHz and 133MHz.
36.
What comes after the Charging step in a Laser printer
Correct Answer
C. Writing
Explanation
After the charging step in a laser printer, the next step is writing. In this step, a laser beam is used to create a static charge pattern on the drum or photoconductor. The laser selectively removes the positive charge from areas that will correspond to the printed image, while leaving the rest of the drum positively charged. This creates an electrostatic image of the page to be printed. The writing step is followed by the developing step, where toner particles are attracted to the charged areas on the drum to form the image.
37.
Which are the two Chipsets found on computers?
Correct Answer(s)
A. Northbridge
C. Southbridge
Explanation
The correct answer is Northbridge and Southbridge. These two chipsets are commonly found on computers. The Northbridge handles the faster components of the computer, such as the processor, memory, and graphics card. The Southbridge, on the other hand, handles the slower components, including the hard drive, USB ports, and audio devices. Together, these chipsets work together to ensure smooth communication and data transfer between the various components of the computer.
38.
Which Raid requires a minimum of three drives?
Correct Answer
C. RAID 5
Explanation
RAID 5 requires a minimum of three drives because it uses striping with distributed parity. In this configuration, data is divided into blocks and written across multiple drives, with parity information distributed across all drives. The parity information allows for data recovery in case of a drive failure. With three drives, one drive can fail while the data can still be reconstructed using the parity information. RAID 1, on the other hand, is a mirroring configuration that requires a minimum of two drives, while RAID 0 is a striping configuration that does not provide any redundancy and can work with just one drive.
39.
Type III cards are normally used for_________
Correct Answer
C. Hard drives
Explanation
Type III cards are normally used for hard drives because they are larger in size compared to Type I and Type II cards. Type III cards provide more space and are designed to accommodate larger storage devices like hard drives. Modems, memory cards, and sound cards are typically smaller in size and can fit into Type I or Type II cards. Therefore, Type III cards are the most suitable option for hard drives.
40.
How many pinns does a Dot-matrix printer have? select 2
Correct Answer(s)
B. 9
C. 24
Explanation
Dot-matrix printers have multiple pins that strike against an ink ribbon to create printed characters. The number of pins determines the quality and clarity of the printed output. A higher number of pins results in a higher print resolution. Therefore, a Dot-matrix printer typically has either 9 or 24 pins. These options provide different levels of print quality, with 24-pin printers offering better resolution and sharper text and graphics compared to 9-pin printers.