1.
Ram, temporary storage comes in many different forms name 2 from the list given?
Correct Answer(s)
A. DDR
B. SDRAM
Explanation
The question asks for two forms of temporary storage from the given list. The correct answer is DDR and SDRAM, which are both types of RAM (Random Access Memory) commonly used in computers.
2.
When should you not wear a protective wrist strap???
Correct Answer
C. When working on a power supply
Explanation
When working on a power supply, it is important not to wear a protective wrist strap. This is because power supplies can carry high voltages, and wearing a wrist strap could potentially create a path for the electrical current to flow through the body, resulting in electric shock or injury. Therefore, it is necessary to remove the wrist strap when working on a power supply to ensure safety.
3.
Safety tools within the pc are..............., ....................., .............................
Correct Answer
4.
Name 2 different printer??
Correct Answer(s)
A. Inkjet
B. Laserjet
Explanation
The correct answer is Inkjet and Laserjet because these are two different types of printers commonly used in the market. Inkjet printers use liquid ink sprayed onto the paper to create images, while Laserjet printers use a laser beam to transfer toner onto the paper. Both printers have their own advantages and disadvantages, making them suitable for different printing needs.
5.
Writing is which step in the 6 step process??
Correct Answer
C. 3
Explanation
The correct answer is 3. In a 6 step process, writing is the third step. This suggests that there are two steps that come before writing and three steps that come after it. Without further context, it is not possible to determine what the specific steps are or what the process is about.
6.
What research tools are available for technicians for the list below??
Correct Answer(s)
A. Technical Websites
E. Search engines
Explanation
The available research tools for technicians are technical websites and search engines. Technical websites provide specific information and resources related to their field of expertise, making them valuable sources for technicians. Search engines, on the other hand, allow technicians to search for information and resources across the internet, providing a wide range of sources and data. The other options mentioned, such as "News of the world," "Girlfriends Mum," and "Fountain of knowledge," are not research tools specifically designed for technicians and may not provide relevant or reliable information for their work.
7.
SLA stands for..............................................?
Correct Answer(s)
Service level agreement
service level agreement
Explanation
SLA stands for Service Level Agreement. A Service Level Agreement is a contract between a service provider and a customer that outlines the level of service that will be provided. It defines the metrics, responsibilities, and expectations of both parties. SLAs are commonly used in the IT industry to ensure that services are delivered at an agreed-upon level of quality.
8.
A Desktop Operating system is...............................??
Correct Answer
B. Single user
Explanation
A desktop operating system is designed to be used by a single user at a time. It provides a user-friendly interface and allows the user to perform various tasks such as running applications, managing files, and accessing the internet. Unlike server operating systems which are designed to support multiple users simultaneously, a desktop operating system focuses on providing a personalized and individualized experience for a single user.
9.
Manipulating OS files can be accessed through....................??
Correct Answer
C. MSconfig
Explanation
MSconfig is a system configuration utility in Windows operating systems that allows users to manipulate OS files. It provides a user-friendly interface to manage startup programs, services, and other system settings. Through MSconfig, users can enable or disable specific files or programs, making it a suitable option for manipulating OS files. The other options mentioned in the question, such as NT Kernel, Multiple Users, Bios, and Dancing queen, are not directly related to manipulating OS files.
10.
NTFS can be converted to FAT32 and vice versa.... (true or false)
Correct Answer
Explanation
True. NTFS (New Technology File System) and FAT32 (File Allocation Table 32-bit) are both file systems used by Windows operating systems. It is possible to convert a partition or disk from NTFS to FAT32 or vice versa using various tools or built-in Windows utilities. However, it is important to note that the conversion process may result in data loss, and there are limitations and restrictions involved in converting between these file systems.
11.
CPU's within a Laptop are......................??
Correct Answer
B. ACPI
Explanation
ACPI stands for Advanced Configuration and Power Interface. It is a standard that allows the operating system to control the power management of the computer's hardware. Specifically, ACPI enables the operating system to manage the CPU's power states, such as sleep mode and hibernation, as well as other hardware components. Therefore, the correct answer is ACPI.
12.
CPU's for a laptop are............................??
Correct Answer
B. Compact
Explanation
The given question asks about the type of CPUs for a laptop. The correct answer, "Compact," implies that the CPUs used in laptops are designed to be small and space-saving. This is because laptops have limited space compared to desktop computers, so compact CPUs are necessary to fit within the laptop's smaller form factor.
13.
Name 2 different types of network??
Correct Answer(s)
A. Wan
C. WLAN
Explanation
The question asks for two different types of networks. The options provided are Wan, BOB, WLAN, WELPO, and BCGTI. Out of these options, Wan and WLAN are the correct answers. Wan stands for Wide Area Network, which is a network that covers a large geographical area, typically connecting multiple smaller networks. WLAN stands for Wireless Local Area Network, which is a wireless network that allows devices to connect and communicate within a limited area, such as a home or office.
14.
Peer to peer networks have........................??
Correct Answer
D. No central point of control
Explanation
Peer to peer networks do not rely on a central point of control to manage and coordinate the communication between devices. Instead, each device in the network acts as both a client and a server, allowing for direct communication and file sharing between peers. This decentralized approach provides greater flexibility, scalability, and resilience to the network, as there is no single point of failure.
15.
Protocols are.......................??
Correct Answer
B. A set of rules or standards
Explanation
Protocols refer to a set of rules or standards that govern the way in which devices communicate with each other in a network. These rules define the format, timing, sequencing, and error control of data transmission. By following these protocols, devices can ensure that data is transmitted accurately and efficiently. Therefore, the correct answer for this question is "A set of rules or standards."
16.
Wireless Ethernet has certain protocols, 802.15.1 is for what connection??
Correct Answer
E. Bluetooth
Explanation
The correct answer is Bluetooth. Bluetooth is a wireless technology that allows devices to connect and communicate with each other over short distances. It is commonly used for connecting devices such as smartphones, tablets, and headphones to other devices like speakers, computers, and car stereos. The given question is asking about the protocol 802.15.1, which is the technical specification for Bluetooth connections. Therefore, the correct answer is Bluetooth.
17.
Worms can ......................??
Correct Answer
B. Self replicate
Explanation
Worms have the ability to self-replicate, meaning they can produce offspring without the need for mating with another individual. This process allows worms to increase their population rapidly and colonize new areas. Self-replication is a common characteristic of many types of worms, including earthworms and parasitic worms. By reproducing asexually, worms can ensure the survival of their species even in challenging environments.
18.
Java script works with which application??
Correct Answer
A. HTML addresses
Explanation
JavaScript works with HTML addresses. JavaScript is a programming language that is used to add interactivity and dynamic features to web pages. It can be embedded directly into HTML code and is executed by web browsers. JavaScript allows developers to manipulate HTML elements, handle user interactions, and perform various operations on web pages. Therefore, the correct answer is HTML addresses.
19.
Spoofing uses what to gain access...............??
Correct Answer
A. Pretend to be helpful for information
Explanation
Spoofing is a technique used by malicious actors to gain unauthorized access to systems or information. In this context, "pretending to be helpful for information" refers to a type of spoofing known as social engineering. Social engineering involves manipulating individuals into divulging sensitive information or granting access to secure systems by pretending to be a trusted source or providing assistance. This can include tactics such as phishing emails or phone calls, where the attacker poses as a legitimate entity in order to deceive the target into revealing confidential data.