CISCO IT Essentials Chapter 1-10

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tom.larner
T
Tom.larner
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,418
Questions: 23 | Attempts: 4,418

SettingsSettingsSettings
CISCO IT Essentials Chapter 1-10 - Quiz

Really Really Hard


Questions and Answers
  • 1. 

    Which of these is a type of ROM?

    • A.

      DIMM

    • B.

      DDR2

    • C.

      EROM

    • D.

      EPROM

    Correct Answer
    D. EPROM
    Explanation
    EPROM stands for Erasable Programmable Read-Only Memory. It is a type of ROM that can be electrically erased and reprogrammed. Unlike other types of ROM, EPROM allows for the modification of its contents by exposing it to ultraviolet light, which erases the existing data. EPROM is commonly used in devices where the firmware or software needs to be updated or modified without replacing the entire memory chip.

    Rate this question:

  • 2. 

    Which of these is a 32 bit expansion slot?

    • A.

      ISA

    • B.

      AGP

    • C.

      CIA

    • D.

      FBI

    Correct Answer
    B. AGP
    Explanation
    AGP is the correct answer because it stands for Accelerated Graphics Port, which is a high-speed expansion slot found on older motherboards. It is specifically designed for graphics cards and provides faster data transfer rates compared to other expansion slots like ISA. ISA, CIA, and FBI are not expansion slots, but rather acronyms for other organizations or technologies.

    Rate this question:

  • 3. 

    The Small Computer System Interface (SCSI) Can Connect How Many Devices

    • A.

      5

    • B.

      10

    • C.

      15

    • D.

      20

    • E.

      7

    Correct Answer
    C. 15
    Explanation
    The Small Computer System Interface (SCSI) can connect up to 15 devices. SCSI is a set of standards that allows multiple peripheral devices to be connected to a computer. It uses a daisy-chain configuration, where each device is connected to the previous one in a linear chain. The SCSI host adapter, which is connected to the computer, acts as the initiator and controls the communication with the devices. The maximum number of devices that can be connected depends on the SCSI standard being used and the capabilities of the host adapter. In this case, the correct answer is 15.

    Rate this question:

  • 4. 

    How Many Pins Has An HDMI Cable Have

    • A.

      19

    • B.

      20

    • C.

      21

    • D.

      17

    • E.

      32

    Correct Answer
    A. 19
    Explanation
    An HDMI cable has 19 pins. These pins are used to transmit audio and video signals between devices such as televisions, computers, and gaming consoles. Each pin serves a specific purpose, such as carrying audio data, video data, or control signals. The 19-pin configuration allows for high-quality audio and video transmission, making HDMI cables a popular choice for connecting various devices.

    Rate this question:

  • 5. 

    The display standard XGA is 1024x768, what aspect ratio is this?

    • A.

      16:10

    • B.

      11:6

    • C.

      4:3

    • D.

      16:9

    • E.

      25:16

    Correct Answer
    C. 4:3
    Explanation
    The aspect ratio of the display standard XGA (1024x768) is 4:3. This means that the width of the display is 4 units and the height is 3 units. Aspect ratio is a measure of the proportional relationship between the width and height of a display or image. In this case, the width is 1.33 times the height, indicating a more square-shaped display rather than a widescreen format.

    Rate this question:

  • 6. 

    Which fire extinguisher class is for electrical equipment?

    • A.

      D

    • B.

      B

    • C.

      A

    • D.

      C

    • E.

      Z

    Correct Answer
    D. C
    Explanation
    Class C fire extinguishers are specifically designed for electrical fires. These fires involve energized electrical equipment such as appliances, wiring, circuit breakers, and outlets. Class C extinguishers contain non-conductive extinguishing agents that do not conduct electricity, allowing them to safely extinguish electrical fires without the risk of electric shock. Therefore, the correct answer is C.

    Rate this question:

  • 7. 

    Which of these is a sudden increase in voltage that lasts for a short period and exceeds 100% of the normal line voltage

    • A.

      Power Surge

    • B.

      Brownout

    • C.

      Blackout

    • D.

      Whiteout

    • E.

      Spike

    Correct Answer
    E. Spike
    Explanation
    A spike is a sudden increase in voltage that lasts for a short period and exceeds 100% of the normal line voltage. This can be caused by various factors such as lightning strikes, power grid issues, or equipment malfunctions. Spikes can be damaging to electrical devices as they can overload and cause them to fail. It is important to have surge protectors in place to prevent damage from spikes and ensure the safety of electrical equipment.

    Rate this question:

  • 8. 

    Which of these should a printer not be plugged in to?

    • A.

      UPS

    • B.

      SPS

    • C.

      MSDS

    • D.

      USB

    Correct Answer
    A. UPS
    Explanation
    A printer should not be plugged into a UPS (Uninterruptible Power Supply) because UPS devices are designed to provide backup power during electrical outages or fluctuations. Plugging a printer into a UPS can cause compatibility issues, as printers usually require a higher power draw than what a UPS is designed to handle. It is recommended to directly plug the printer into a power outlet or a surge protector for proper functioning.

    Rate this question:

  • 9. 

    How is the CPU placed on the motherboard

    • A.

      TIF

    • B.

      GIF

    • C.

      ZIF

    • D.

      WIF

    • E.

      TCW

    Correct Answer
    C. ZIF
    Explanation
    The CPU is placed on the motherboard using a ZIF (Zero Insertion Force) socket. This type of socket allows for easy installation and removal of the CPU without applying any force or pressure. The ZIF socket has a lever mechanism that secures the CPU in place when closed, ensuring proper alignment and contact with the motherboard's pins. This design helps to prevent damage to the CPU and motherboard during installation or removal.

    Rate this question:

  • 10. 

    Which of these are interfaces for a computer?

    • A.

      GLI

    • B.

      GUI

    • C.

      MI5

    • D.

      CLI

    • E.

      George

    Correct Answer(s)
    B. GUI
    D. CLI
    Explanation
    GUI (Graphical User Interface) and CLI (Command Line Interface) are both interfaces for a computer. GUI allows users to interact with the computer using graphical elements such as buttons and icons, while CLI allows users to interact with the computer by typing commands into a text-based interface. MI5 is a British intelligence agency and George is a name, so they are not interfaces for a computer.

    Rate this question:

  • 11. 

    What partition size can NTFS support upto?

    • A.

      16 Terrabytes

    • B.

      16 Exabytes

    • C.

      80 Gigabytes

    • D.

      12 Daniels

    • E.

      1/2 a George

    Correct Answer
    B. 16 Exabytes
    Explanation
    NTFS (New Technology File System) is a file system used by Windows operating systems. It is designed to support large storage capacities and file sizes. The correct answer is 16 Exabytes, which means that NTFS can support partition sizes up to 16 Exabytes. This is an extremely large storage capacity, making NTFS suitable for modern storage requirements and ensuring compatibility with large-scale data storage systems.

    Rate this question:

  • 12. 

    What is the first action in the boot sequence?

    • A.

      BIOS

    • B.

      POST

    • C.

      NTLDR

    • D.

      MBR

    • E.

      Ntoskrnl.exe

    Correct Answer
    B. POST
    Explanation
    The first action in the boot sequence is the Power-On Self Test (POST). This is a series of diagnostic tests performed by the computer's firmware (BIOS) to check if the hardware components are functioning properly. The POST ensures that the essential hardware, such as the processor, memory, and storage, are operational before the operating system is loaded. Once the POST is completed successfully, the computer proceeds to the next stage of the boot sequence.

    Rate this question:

  • 13. 

    Which of these is a graphics file?

    • A.

      .doc

    • B.

      .ppt

    • C.

      .zip

    • D.

      .gif

    • E.

      .gig

    Correct Answer
    D. .gif
    Explanation
    A .gif file is a graphics file format commonly used for images on the internet. It supports both animated and static images and uses lossless compression, which means that the image quality is not compromised. In contrast, .doc and .ppt are file formats for documents and presentations respectively, .zip is a compressed file format, and .gig is not a recognized graphics file format. Therefore, the correct answer is .gif.

    Rate this question:

  • 14. 

    What should be done before installing a new program?

    • A.

      Run away

    • B.

      Go for jog

    • C.

      Back up

    • D.

      Reverse

    • E.

      Remember your settings

    Correct Answer
    C. Back up
    Explanation
    Before installing a new program, it is important to back up your data. This ensures that in case anything goes wrong during the installation process or if the new program causes any issues, you will have a copy of your important files and settings saved elsewhere. Backing up helps to prevent data loss and allows you to restore your system to its previous state if needed.

    Rate this question:

  • 15. 

    What do laptop processors use to modify the clock speed

    • A.

      Time Check

    • B.

      Power Management

    • C.

      CPU Throttling

    • D.

      CPU Racing

    • E.

      CPU Acceleration

    Correct Answer
    C. CPU Throttling
    Explanation
    Laptop processors use CPU throttling to modify the clock speed. CPU throttling is a technique used to reduce the power consumption and heat generated by the processor. It dynamically adjusts the clock speed of the processor based on the workload and temperature, slowing it down when not much processing power is needed and speeding it up when more power is required. This helps in conserving battery life and preventing overheating of the laptop.

    Rate this question:

  • 16. 

    Which part of the laser printing process involves an image being placed on to the drum?

    • A.

      Developing

    • B.

      Reading

    • C.

      Writing

    • D.

      Transferring

    • E.

      Conditioning

    Correct Answer
    C. Writing
    Explanation
    The part of the laser printing process that involves an image being placed onto the drum is the writing stage. In this stage, the laser beam scans the drum and creates a static charge pattern that represents the image to be printed. This static charge pattern attracts the toner particles, which will later be transferred onto the paper to create the final printed image.

    Rate this question:

  • 17. 

    What is it called when multiple LAN's are connected together?

    • A.

      LAN

    • B.

      WAN

    • C.

      ELA

    • D.

      SPF

    • E.

      CIA

    Correct Answer
    B. WAN
    Explanation
    When multiple LANs (Local Area Networks) are connected together, it is called a WAN (Wide Area Network). A WAN is a network that spans a large geographical area, such as multiple buildings, cities, or even countries. It allows for the interconnection of LANs and enables data sharing and communication between different locations. Unlike LANs, which are typically limited to a single location, WANs provide a broader network infrastructure to facilitate connectivity over long distances.

    Rate this question:

  • 18. 

    When data flows in both directions at the same time this is called?

    • A.

      Simplex

    • B.

      George

    • C.

      Half Duplex

    • D.

      Full Duplex

    Correct Answer
    D. Full Duplex
    Explanation
    Full Duplex refers to a communication system where data can flow simultaneously in both directions. In this mode, data can be transmitted and received at the same time, allowing for faster and more efficient communication. This is in contrast to Half Duplex, where data can only flow in one direction at a time. Simplex refers to a communication system where data can only flow in one direction, and George is not relevant to the question.

    Rate this question:

  • 19. 

    Which of these has a maximum length of 500m?

    • A.

      Thicknet

    • B.

      Thinnet

    • C.

      Mediumnet

    • D.

      Smallnet

    • E.

      Fatnet

    Correct Answer
    A. Thicknet
    Explanation
    Thicknet, also known as 10BASE5, has a maximum length of 500m. It is a type of coaxial cable that was commonly used in Ethernet networks in the past. Thicknet cables are thicker and more durable compared to other types of coaxial cables, allowing for longer distances of transmission. This makes it suitable for larger network setups where the devices are spread out over a larger area.

    Rate this question:

  • 20. 

    What is the physical topology of a token ring network

    • A.

      Mesh

    • B.

      Star

    • C.

      Double Ring

    • D.

      Bus

    • E.

      Taxi

    Correct Answer
    B. Star
    Explanation
    A token ring network has a physical topology of a star. In a star topology, all devices are connected to a central hub or switch, forming a star-like structure. In a token ring network, devices are connected to a central hub or MAU (Multistation Access Unit) using a ring or loop configuration. Each device in the network has a token that is passed around the ring, allowing them to transmit data when they have the token. The star topology provides a centralized and efficient network management, as well as easy troubleshooting and scalability.

    Rate this question:

  • 21. 

    Which IEEE standard has a bandwidth of 54Mbps and 2.4GHz Frequency and a range of 91m

    • A.

      IEEE 802.11a

    • B.

      IEEE 802.11b

    • C.

      IEEE 802.11c

    • D.

      IEEE 802.11g

    • E.

      IEEE 802.11n

    Correct Answer
    D. IEEE 802.11g
    Explanation
    IEEE 802.11g is the correct answer because it has a bandwidth of 54Mbps and operates at a frequency of 2.4GHz. It also has a range of 91m, which makes it suitable for use in smaller spaces or homes. IEEE 802.11a operates at a higher frequency and has a shorter range, IEEE 802.11b has a slower bandwidth, IEEE 802.11c is not a valid standard, and IEEE 802.11n has a higher bandwidth and range compared to the given specifications.

    Rate this question:

  • 22. 

    What is the first parrt of the OSI Model and the Fourth?

    • A.

      Presentation

    • B.

      Transport

    • C.

      Network

    • D.

      Physical

    • E.

      Data Link

    Correct Answer(s)
    B. Transport
    D. pHysical
    Explanation
    The first part of the OSI Model is the Physical layer, which is responsible for transmitting raw bits over a communication channel. It deals with the physical aspects of the network, such as cables, connectors, and electrical signals. The fourth part of the OSI Model is the Transport layer, which ensures reliable and efficient delivery of data between network devices. It handles tasks like segmentation, flow control, and error recovery.

    Rate this question:

  • 23. 

    What is used to select ports which will be open and which will be secure?

    • A.

      SSID Password

    • B.

      Password Protection

    • C.

      Data Encryption

    • D.

      Port Protection

    Correct Answer
    D. Port Protection
    Explanation
    Port protection is used to select ports which will be open and which will be secure. This means that certain ports can be designated as open, allowing communication to pass through them, while other ports can be secured, preventing unauthorized access. Port protection helps in controlling network traffic and ensuring the security of the network by selectively allowing or blocking access to specific ports.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 10, 2009
    Quiz Created by
    Tom.larner
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.