1.
How many pins in a Floppy disk drive (FDD) connector
Correct Answer
C. 34
Explanation
A floppy disk drive (FDD) connector typically has 34 pins. This connector is used to connect the floppy disk drive to the motherboard or controller card in a computer system. The 34 pins on the connector are responsible for transmitting data, power, and control signals between the FDD and the computer.
2.
What should you use to clean an LCD screen.
Correct Answer
D. Mild cleaning solution and water
Explanation
To clean an LCD screen, it is recommended to use a mild cleaning solution and water. Isopropyl alcohol may damage the screen, while a handheld vacuum cleaner and compressed air may not effectively remove smudges and fingerprints. Using a mild cleaning solution and water is the safest and most effective method to clean an LCD screen without causing any damage.
3.
Fire wire uses the IEEE............standard.
Correct Answer
1394
1394a
Explanation
Firewire, also known as IEEE 1394, is a standard used for high-speed data transfer between devices such as computers, digital cameras, and external hard drives. The 1394a version of the standard introduced improvements and updates to the original 1394 standard. Therefore, both 1394 and 1394a are correct answers as they refer to the same standard.
4.
The minimum level of electrostatic discharge that a person can normally feel is 5 volts
Correct Answer
B. False
Explanation
3000 volts
5.
A connector is used to connect the motherboard
Correct Answer
20 pin
20-pin
24 pin
Explanation
A connector is used to connect the motherboard, and the options given are 20 pin, 20-pin, and 24 pin. These options refer to the types of power connectors used to connect the motherboard to the power supply. The correct answer is all of the above, as different motherboards may require different types of power connectors depending on their specifications. Some older motherboards may use a 20-pin connector, while newer ones may use a 24-pin connector. The option "20-pin" and "20 pin" are likely referring to the same type of connector, just written differently.
6.
A shows icons of all files, folders, and applications on the computer. A pointing device, such as a mouse, is used to navigate a desktop.
Correct Answer
GUI
Explanation
A GUI (Graphical User Interface) is a visual interface that displays icons of all files, folders, and applications on the computer. It allows users to navigate and interact with the computer system using a pointing device, such as a mouse. The GUI provides a user-friendly and intuitive way to access and manage files and applications on the computer.
7.
The key/s you would use in order to start windows XP in safe mode are
Correct Answer
C. F8
Explanation
To start Windows XP in safe mode, you would use the F8 key. Safe mode is a troubleshooting mode that starts Windows with a limited set of drivers and services, allowing you to diagnose and fix any issues that may be preventing normal startup. By pressing F8 during the boot process, you can access the Advanced Boot Options menu, where you can select Safe Mode and start Windows in this special mode. This can be helpful in troubleshooting software conflicts, removing malware, or resolving other system issues.
8.
What type of memory is used in laptops
Correct Answer
A. SODIMM
Explanation
SODIMM stands for Small Outline Dual Inline Memory Module. It is a type of memory module that is used in laptops and other small form factor computers. SODIMMs are smaller in size compared to regular DIMMs and are specifically designed to fit in the limited space available in laptops. They are used to provide additional memory to the system, allowing it to run more efficiently and handle multiple tasks simultaneously.
9.
The most significant feature of a laptop is its .
Correct Answer
compact size
size
Explanation
The most significant feature of a laptop is its compact size. This refers to the small and portable nature of laptops, allowing users to easily carry them around and use them on the go. The compact size of laptops makes them convenient for travel and allows for easy storage when not in use. Additionally, the size of a laptop also determines its portability and ease of use, making it a crucial aspect of its overall functionality.
10.
Name two advantages of an impact printer.
Correct Answer(s)
A. Has carbon copy printing capability
D. Uses inexpensive consumables
Explanation
The two advantages of an impact printer are its ability to have carbon copy printing capability and its use of inexpensive consumables. With carbon copy printing, the printer can create multiple copies of the same document simultaneously, which is useful for creating duplicates or keeping records. Additionally, the use of inexpensive consumables means that the printer is cost-effective to operate, as the consumables required for printing, such as ink ribbons, are affordable and easily replaceable.
11.
A printers speed is measured in .
Correct Answer(s)
pages per minute
PPM
Explanation
A printer's speed is typically measured in pages per minute (PPM). This refers to the number of pages that the printer can print in one minute. PPM is a commonly used unit of measurement for printer speed in the industry.
12.
Which type of printer melts ink and spays it through a nozzle.
Correct Answer
B. Solid ink
Explanation
Solid ink printers melt solid ink sticks and spray the liquefied ink through a nozzle onto the paper. This type of printer uses a heating element to melt the ink, which then passes through the nozzle and onto the paper in a controlled manner. Solid ink technology offers vibrant colors and is known for its high-quality print output. It is commonly used in professional printing applications where color accuracy and print durability are important factors.
13.
Which method of data transfer allows information to be sent and received at the same time
Correct Answer
A. Full duplex
Explanation
Full duplex is the correct answer because it refers to a method of data transfer where information can be sent and received simultaneously. In full duplex communication, both parties can transmit and receive data at the same time, allowing for faster and more efficient data transfer compared to other methods such as half duplex or simplex.
14.
The quality of printing is measured in .
Correct Answer
dpi
dots per inch
Explanation
The quality of printing is measured in dpi, which stands for dots per inch. DPI refers to the number of dots that can be placed within a one-inch space. A higher DPI means more dots and therefore a greater level of detail and clarity in the printed image. This measurement is commonly used in the printing industry to determine the resolution and sharpness of printed materials.
15.
How many pairs of wires are used in an RJ-45 connector
Correct Answer
D. 5
Explanation
An RJ-45 connector typically uses 8 wires, but only 4 of them are used for Ethernet connections. These 4 wires are paired together, resulting in a total of 2 pairs of wires. However, the question asks for the number of pairs of wires used in an RJ-45 connector, not just the number of wires. Therefore, the correct answer is 5, as there are 5 pairs of wires in an RJ-45 connector (10 individual wires in total).
16.
The topology connects all devices to eachother.
Correct Answer
Network
17.
What is the most basic encrytion used in todays wireless neywork
Correct Answer
C. WEP
Explanation
WEP (Wired Equivalent Privacy) is the most basic encryption used in today's wireless networks. It was introduced as a security protocol for Wi-Fi networks but has been widely criticized for its vulnerabilities. Despite its flaws, it is still used in some older devices or networks that have not been updated. WEP uses a shared key authentication and RC4 encryption algorithm, but it is easily cracked by attackers, making it an insecure choice for protecting wireless networks.
18.
What is the recommended method of wireless encryption
Correct Answer
B. WPA
Explanation
WPA (Wi-Fi Protected Access) is the recommended method of wireless encryption. It provides stronger security compared to WEP (Wired Equivalent Privacy) encryption, which is vulnerable to attacks. SSL (Secure Sockets Layer) is a protocol used for securing web communications, but it is not specifically designed for wireless encryption. PAP (Password Authentication Protocol) is an authentication method, not an encryption method, and it is considered less secure than WPA. Therefore, WPA is the correct answer as it offers better security for wireless networks.