1.
Name 2 components on a motherboard
Correct Answer(s)
A. Northbridge
C. Southbridge
Explanation
The correct answer is Northbridge and Southbridge. These are two components commonly found on a motherboard. The Northbridge is responsible for managing communication between the CPU, RAM, and high-speed graphics card, while the Southbridge handles communication between the CPU and other peripheral devices such as USB ports, audio devices, and hard drives. Both components play crucial roles in facilitating data transfer and ensuring the proper functioning of the motherboard.
2.
The CPU is installed on the motherboard using a socket.
Correct Answer(s)
ZIF
Zero Insert Force
Zero Insertion Force
Explanation
The CPU is installed on the motherboard using a socket called ZIF, which stands for Zero Insertion Force. This means that no force is required to insert or remove the CPU from the socket, as it can be easily inserted or removed without applying any pressure. This type of socket is commonly used in modern computer systems to ensure easy and safe installation of the CPU.
3.
Give 3 different types of ROM
Correct Answer(s)
A. EEPROM
C. PROM
D. EPROM
Explanation
The given answer is correct. EEPROM (Electrically Erasable Programmable Read-Only Memory) is a type of ROM that can be erased and reprogrammed using electrical signals. PROM (Programmable Read-Only Memory) is a type of ROM that can be programmed once using a special device called a PROM programmer. EPROM (Erasable Programmable Read-Only Memory) is a type of ROM that can be erased and reprogrammed using ultraviolet light. These three types of ROM provide different levels of programmability and erasability, making them suitable for various applications.
4.
Which memory slot would you use for DRAM?
Correct Answer
B. RIMM
Explanation
RIMM stands for Rambus Inline Memory Module, which is a type of memory slot specifically designed for DRAM (Dynamic Random Access Memory) modules. Therefore, RIMM would be the correct memory slot to use for DRAM.
5.
An example of cache is
Correct Answer
L1
L2
L3
Explanation
The given answer L1, L2, L3 represents different levels of cache. In a computer system, cache is a small and fast memory that stores frequently accessed data or instructions, closer to the processor for faster access. L1 cache is the primary cache and is located closest to the processor. L2 cache is the secondary cache, located between the L1 cache and main memory. L3 cache is the tertiary cache, which is larger in size and slower in speed compared to L1 and L2 caches. Therefore, the given answer correctly lists the different levels of cache in ascending order.
6.
Which of the following is NOT an adapter card?
Correct Answer
B. NEC Card
Explanation
The correct answer is NEC Card because NEC Card does not refer to any specific type of adapter card commonly found in computers. Graphics Card, Sound Card, and Modem Card are all examples of adapter cards that are used to enhance the functionality of a computer system.
7.
Pick 2 types of expansion slot
Correct Answer(s)
A. PeripHeral Component Interconnect
C. Advanced GrapHics Port
Explanation
The correct answer is Peripheral Component Interconnect and Advanced Graphics Port. These two types of expansion slots are commonly used in computer systems to connect additional hardware devices. The Peripheral Component Interconnect (PCI) slot is a standard expansion slot that allows for the connection of various peripherals such as network cards, sound cards, and graphics cards. The Advanced Graphics Port (AGP) is a specialized expansion slot specifically designed for high-performance graphics cards, providing faster data transfer rates and improved graphics performance.
8.
Hard drives are types of media
Correct Answer(s)
magnetic
Explanation
Hard drives are a type of magnetic media because they use magnetic fields to store and retrieve data. The data is encoded onto the magnetic surface of the hard drive's platters, which are coated with a magnetic material. The read/write head of the hard drive uses magnetic fields to read and write data by manipulating the magnetic charges on the surface of the platters. This allows for high-capacity storage and fast data access.
9.
A hard drives capacity is measured in ?
Correct Answer(s)
Gb
Mb
Gigabytes
Megabytes
Explanation
The correct answer is Gb, Mb, Gigabytes, Megabytes. Hard drive capacity is typically measured in Gigabytes (GB) or Megabytes (MB), which are units of digital information storage. Gigabytes are larger units and represent billions of bytes, while Megabytes represent millions of bytes. Both units are commonly used to quantify the amount of data that can be stored on a hard drive. Therefore, the correct answer includes both GB and MB, as well as the full spellings of Gigabytes and Megabytes.
10.
Choose 2 types of floppy drive
Correct Answer(s)
A. 5.25inch
D. 3.5inch
Explanation
The correct answer is 5.25inch and 3.5inch. These are the two types of floppy drives commonly used in computers. The 5.25inch floppy drive was one of the earliest types of floppy drives and was commonly used in the 1980s and early 1990s. It had a larger physical size and lower storage capacity compared to later floppy drive types. The 3.5inch floppy drive became popular in the mid-1980s and was widely used until the early 2000s. It had a smaller physical size and higher storage capacity compared to the 5.25inch floppy drive.
11.
Give two types of Network ports
Correct Answer(s)
A. RJ45
C. RJ11
Explanation
The correct answer is RJ45 and RJ11. RJ45 is a type of network port commonly used for Ethernet connections, while RJ11 is used for telephone connections. Both ports have different physical characteristics and are designed for specific purposes. RJ45 ports are larger and have 8 pins, while RJ11 ports are smaller and have 6 pins. RJ45 ports are used to connect devices like computers, routers, and switches to a network, while RJ11 ports are used for connecting telephones and fax machines to a telephone line.
12.
It can take up to 3000V of ESD before a person can feel it however less than can damage computer components.
Correct Answer(s)
30
30V
Explanation
ESD stands for Electrostatic Discharge, which refers to the sudden flow of electricity between two objects with different charges. In this case, it is stated that it can take up to 3000V of ESD before a person can feel it. This means that a person would not physically feel the electrostatic discharge until it reaches a voltage of 3000V. However, it is also mentioned that less than 30V can damage computer components. This implies that even a lower voltage of 30V or less can cause harm to computer components, highlighting the sensitivity of electronic devices to ESD.
13.
Which of the following are software tools?
Correct Answer
E. All of the above
Explanation
All of the options listed (System File Checker, Disk Management, Disk Cleanup, and Scandisk) are software tools. System File Checker is a Windows utility that scans for and restores corrupted system files. Disk Management is a tool in Windows that allows users to manage their hard drives and partitions. Disk Cleanup is a utility that removes unnecessary files from a computer's hard drive. Scandisk is a disk utility program used to check and repair errors on a hard drive. Therefore, all of the options mentioned are software tools.
14.
A printer has a print speed between 8-200ppm.
Correct Answer
Laser
Explanation
The correct answer is Laser because laser printers generally have a wide range of print speeds, typically ranging from 8 to 200 pages per minute (ppm). Laser printers use a laser beam to create an electrostatic image on a drum, which is then transferred onto paper to produce high-quality prints at a relatively fast speed. Therefore, the given statement aligns with the capabilities of a laser printer.
15.
Piezoelectric technology is used in printers.
Correct Answer
Inkjet
Explanation
Piezoelectric technology is used in inkjet printers. This technology involves the use of a piezoelectric material that can change shape when an electric current is applied to it. In inkjet printers, this material is used to create tiny droplets of ink that are then sprayed onto the paper to create the printed image. The piezoelectric material acts as a valve, controlling the flow of ink and allowing for precise and accurate printing. This technology is commonly used in inkjet printers due to its ability to produce high-quality prints with fine details and vibrant colors.
16.
What is the 3rd trouble shooting process?
Correct Answer
A. Try quick solutions first
Explanation
The correct answer is "Try quick solutions first". This is because when troubleshooting a problem, it is often helpful to start with simple and quick solutions before moving on to more complex ones. By trying quick solutions first, you can potentially resolve the issue without having to spend too much time or effort on it. This approach allows you to eliminate any obvious or common causes of the problem before diving deeper into gathering data or information from the customer.
17.
Operating systems use?
Correct Answer(s)
A. Multi Threading
B. Multi User
C. Multi Processing
Explanation
Operating systems use multi threading, multi user, and multi processing. Multi threading allows multiple threads to run concurrently within a single process, improving efficiency and responsiveness. Multi user enables multiple users to access the system simultaneously, each with their own individual accounts and privileges. Multi processing involves the use of multiple processors or cores to execute multiple tasks simultaneously, enhancing performance and scalability. Therefore, all of the above options are correct as operating systems utilize these features to optimize resource utilization and provide a seamless user experience.
18.
is an example of an open souced O/S.
Correct Answer(s)
UNIX
LINUX
UBUNTU
Explanation
UNIX, Linux, and Ubuntu are all examples of open-sourced operating systems. Open-source refers to software that is freely available and can be modified and distributed by anyone. These operating systems have their source code accessible to the public, allowing users to customize and enhance them according to their needs. They foster collaboration and community-driven development, resulting in stable and secure systems. UNIX, Linux, and Ubuntu are widely used in various domains, including servers, embedded systems, and personal computers, due to their flexibility, reliability, and extensive software ecosystem.
19.
Two types of user interface are and .
Correct Answer(s)
GUI CLI
CLI GUI
20.
What is the 5th troubleshooting process?
Correct Answer
C. Evaluate the problem and implement the solution
Explanation
The 5th troubleshooting process is to evaluate the problem and implement the solution. This step involves analyzing the gathered information, identifying the root cause of the problem, and devising a suitable solution to resolve it. It is an important step in the troubleshooting process as it allows for the identification and implementation of the most effective solution to fix the issue at hand.
21.
Laptops capabilities can be expanded by the use of a .
Correct Answer
docking station
Explanation
Laptops capabilities can be expanded by the use of a docking station. A docking station is a device that allows a laptop to connect to multiple peripherals such as monitors, keyboards, mice, and other devices. It provides additional ports and connections that are not typically available on a laptop, allowing for increased functionality and productivity. By connecting to a docking station, a laptop can effectively become a desktop computer, with the ability to use multiple displays, connect to a wired network, and easily connect and disconnect from various devices.
22.
Ports found on a docking station
Correct Answer(s)
A. USB
B. Parallel
C. DVI
E. RJ45
Explanation
The given answer lists the ports typically found on a docking station, which are USB, Parallel, DVI, and RJ45. USB ports are commonly used for connecting various devices such as keyboards, mice, and external storage. Parallel ports are used for connecting printers and other parallel devices. DVI ports are used for connecting monitors or display devices. RJ45 ports are used for connecting network cables for internet or network connectivity. The inclusion of "Fleshlight" in the options seems to be a mistake or irrelevant as it is not a standard port found on docking stations.
23.
Laptops components are harder to replace as they are .
Correct Answer(s)
proprietry
Explanation
The correct answer is "proprietary." Laptops components are harder to replace because they are proprietary. Proprietary components are designed specifically for a particular device or brand, making them difficult to find and replace with generic or third-party alternatives. This can result in higher costs and limited availability of replacement parts for laptops.
24.
A network is or more computers connected.
Correct Answer(s)
2
two
Explanation
A network is a system where two or more computers are connected.
25.
What are the advantages of a network?
Correct Answer(s)
A. Fewer peripHerals
B. Low cost liscening
C. Increased communication capabilities
Explanation
The advantages of a network include fewer peripherals, low-cost licensing, and increased communication capabilities. Having fewer peripherals means that devices can be shared among multiple users, reducing the need for individual devices for each user. Low-cost licensing refers to the ability to use software and applications across multiple devices without incurring additional expenses. Increased communication capabilities enable efficient sharing of information and resources among network users. However, the presence of "pink computers" and the statement "hard to maintain" are not valid advantages of a network.
26.
Examples of wireless LAN are...
Correct Answer(s)
A. MAN
B. CAN
C. PAN
Explanation
The given answer is correct because MAN (Metropolitan Area Network), CAN (Campus Area Network), and PAN (Personal Area Network) are all examples of wireless LANs. A MAN covers a larger geographic area like a city, while a CAN covers a smaller area like a university campus. A PAN is the smallest network, typically covering a few meters and used for personal devices like smartphones and tablets. Therefore, all three options fit the criteria of being examples of wireless LANs.
27.
DHCP stands for .
Correct Answer(s)
Dynamic Host Configuration Protocol
Explanation
DHCP stands for Dynamic Host Configuration Protocol. DHCP is a network management protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network. It allows devices to join a network and obtain an IP address without manual configuration. DHCP simplifies network administration and eliminates the need for manual IP address assignment, reducing the chances of conflicts and errors.
28.
192.168.2.3 is an example of a IP address.
Correct Answer(s)
Class C
Explanation
192.168.2.3 is an example of a Class C IP address. Class C IP addresses are typically used for small to medium-sized networks. The first octet of a Class C IP address ranges from 192 to 223, indicating that the network portion of the address is defined by the first three octets, while the last octet is used for host addresses. Class C networks can support up to 254 hosts per network.
29.
Types of data transmission include
Correct Answer(s)
A. Simplex
C. Duplex
D. Half - Duplex
Explanation
The given answer lists the types of data transmission correctly. Simplex, Duplex, and Half-Duplex are all valid types of data transmission. Simplex refers to one-way communication where data can only be transmitted in one direction. Duplex allows for two-way communication where data can be transmitted simultaneously in both directions. Half-Duplex allows for two-way communication but only in one direction at a time. The last option, "exchange of bodily fluids," is not a type of data transmission and is unrelated to the topic.
30.
Token passing is a type of topology.
Correct Answer(s)
logical
Explanation
Token passing is a type of topology refers to a network configuration where a token, or a special control packet, is passed sequentially from one node to another in a predetermined order. This ensures that only the node in possession of the token has the right to transmit data. This type of topology is commonly used in ring networks, where each node is connected to two neighboring nodes, forming a logical ring structure. The token passing method helps in regulating data transmission and preventing collisions in the network.
31.
What is the 6th troubleshooting process?
Correct Answer
B. Close with the customer
Explanation
The 6th troubleshooting process is to close with the customer. This means that after evaluating the problem and implementing the solution, the technician should ensure that the customer is satisfied with the resolution and that all their concerns have been addressed. This step is important for providing excellent customer service and ensuring that the customer's needs have been met.
32.
What is the strongest layer in security?
Correct Answer
local security policy
Explanation
The local security policy is considered the strongest layer in security because it allows administrators to configure and enforce security settings on a local computer or domain. It provides granular control over various security aspects such as user rights, password policies, auditing, and security options. By configuring the local security policy, administrators can ensure that the system is protected against unauthorized access, data breaches, and other security threats.
33.
To destroy a you must attack it viciously with a hammer.
Correct Answer
hard drive
Explanation
To destroy a hard drive, you must attack it viciously with a hammer. This means that physically damaging the hard drive by hitting it with a hammer is the most effective way to render it unusable or destroy the data stored on it.
34.
The Duke is ...
Correct Answer(s)
A. Awesome
B. Godlike
C. Cherubic
D. Infinitley Wise
E. Simply the Best
Explanation
The given answer options describe the Duke in extremely positive terms, suggesting that he possesses qualities that are beyond ordinary. These adjectives such as "awesome," "godlike," "cherubic," "infinitely wise," and "simply the best" emphasize the Duke's exceptional nature and highlight his superiority. The answer options aim to convey the Duke's greatness and excellence.
35.
Do you think you have passed?
Correct Answer(s)
B. No
C. Maybe