CISCO IT Essentials Review

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rhysfrankcom7
R
Rhysfrankcom7
Community Contributor
Quizzes Created: 1 | Total Attempts: 546
Questions: 22 | Attempts: 546

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

Recap on chapters 1 - 10 of the cisco chapters.


Questions and Answers
  • 1. 

    What are the two types of user interfaces? (2 answers)

    • A.

      Graphical User Interface

    • B.

      Design Line Interface

    • C.

      Command Line Interface

    • D.

      Picture Line Interface

    Correct Answer(s)
    A. GrapHical User Interface
    C. Command Line Interface
    Explanation
    The two types of user interfaces are graphical user interface (GUI) and command line interface (CLI). A GUI allows users to interact with a computer system through visual elements such as icons, menus, and buttons, making it more user-friendly and intuitive. On the other hand, a CLI requires users to type commands and navigate through a text-based interface, which is more suitable for advanced users or specific tasks that require precise control. Both GUI and CLI have their own advantages and disadvantages, and they are commonly used in different contexts based on user preferences and system requirements.

    Rate this question:

  • 2. 

    Windows XP uses only Graphical User Interface. (True/False)

    Correct Answer(s)
    False
    no
    false
    l
    Explanation
    The statement "Windows XP uses only Graphical User Interface" is false. Windows XP actually supports both a graphical user interface (GUI) and a command-line interface (CLI). The GUI allows users to interact with the operating system using visual elements such as icons, windows, and menus. However, Windows XP also provides a CLI called the Command Prompt, where users can execute commands by typing them in text format. Therefore, Windows XP offers both GUI and CLI options for interacting with the operating system.

    Rate this question:

  • 3. 

    Where would the user go to view the status of the devices installed to the operating system?

    • A.

      Task Manager

    • B.

      Device Manager

    • C.

      Event Viewer

    • D.

      Performance Settings

    • E.

      System Utilities

    Correct Answer
    B. Device Manager
    Explanation
    The user would go to the Device Manager to view the status of the devices installed to the operating system. Device Manager is a Windows tool that allows users to view and manage the hardware devices connected to their computer. It provides information about the status, drivers, and properties of each device, allowing users to troubleshoot and update drivers if needed.

    Rate this question:

  • 4. 

    A ................ ........... is used to support internal components and provides an enclosure for added protection.

    Correct Answer
    computer case
    Computer Case
    Explanation
    A computer case is used to support internal components and provides an enclosure for added protection. It is designed to hold and protect the various hardware components of a computer, such as the motherboard, CPU, and storage devices. The case also helps to regulate the temperature inside the computer by providing proper airflow and cooling options. Additionally, it provides a convenient and organized space for cable management and expansion slots for adding extra components. Overall, the computer case plays a crucial role in housing and safeguarding the internal components of a computer.

    Rate this question:

  • 5. 

    What power connector connects to the optical drives?

    • A.

      Molex

    • B.

      Berg

    • C.

      Four pin auxillary

    • D.

      20/24 pin connector

    Correct Answer
    A. Molex
    Explanation
    The Molex power connector is the correct answer because it is commonly used to connect optical drives. It provides the necessary power to the drive for it to function properly. The Berg connector is typically used for floppy drives, the four pin auxiliary connector is used for additional power to the motherboard or graphics card, and the 20/24 pin connector is used to provide power to the motherboard.

    Rate this question:

  • 6. 

    The CPU is installed to the motherboard by using .........................

    Correct Answer
    ZIF
    Zero Insertion Force
    zero insertion force
    Zero insertion force
    Explanation
    The CPU is installed to the motherboard by using Zero Insertion Force (ZIF). This means that the CPU can be easily inserted into the socket on the motherboard without applying any force. The ZIF socket has a lever that can be lifted to open the socket, allowing the CPU to be placed in it. Once the CPU is correctly aligned, the lever is lowered, securing the CPU in place. This method of installation minimizes the risk of damaging the CPU or the motherboard during installation.

    Rate this question:

  • 7. 

    A .......... combines laptop and mobile phone capabilities into one.

    Correct Answer
    Explanation
    A device that combines laptop and mobile phone capabilities into one is commonly known as a "smartphone".

    Rate this question:

  • 8. 

    Documents and applications are saved in RAM, allowing the computer to power on quickly. This is an example of what state.

    Correct Answer
    Standby
    stand by
  • 9. 

    A newer type of PC Card is called the ....................

    • A.

      ExpressCard

    • B.

      PC Card Disk

    • C.

      PC CardBus

    • D.

      PCMCIA Card

    Correct Answer
    A. ExpressCard
    Explanation
    The correct answer is ExpressCard. ExpressCard is a newer type of PC Card that provides a faster and more efficient connection to a computer. It offers higher data transfer speeds and is smaller in size compared to the older PC Card formats such as PC Card Disk, PC CardBus, and PCMCIA Card.

    Rate this question:

  • 10. 

    Two examples of printer ports are..... (2 answers)

    • A.

      USB

    • B.

      SICS

    • C.

      Parallel

    • D.

      Wired

    • E.

      Copper

    Correct Answer(s)
    A. USB
    C. Parallel
    Explanation
    The correct answer is USB and Parallel. These are two examples of printer ports commonly used to connect printers to computers. USB ports are widely used for connecting printers due to their versatility and compatibility with various devices. Parallel ports, on the other hand, are older and less commonly used nowadays but were popular in the past for connecting printers.

    Rate this question:

  • 11. 

    Two different types of networks include.... (2 answers)

    • A.

      FAN

    • B.

      LAN

    • C.

      WLAN

    • D.

      NAW

    • E.

      ANL

    Correct Answer(s)
    B. LAN
    C. WLAN
    Explanation
    The correct answer is LAN and WLAN. LAN stands for Local Area Network, which is a network that connects devices within a limited area, such as a home, office, or building. WLAN stands for Wireless Local Area Network, which is a type of LAN that uses wireless technology to connect devices. Both LAN and WLAN are types of networks that allow devices to communicate and share resources within a specific area.

    Rate this question:

  • 12. 

    Two ways of connecting networks together can be........... (2 answers)

    • A.

      Thinnet

    • B.

      No net

    • C.

      Thicknet

    • D.

      Fish net

    • E.

      RG 77

    Correct Answer(s)
    A. Thinnet
    C. Thicknet
    Explanation
    Thinnet and Thicknet are two types of coaxial cables that were commonly used in computer networking. Thinnet refers to the 10BASE2 Ethernet standard, which uses a thin coaxial cable with a maximum length of 185 meters. Thicknet, on the other hand, refers to the 10BASE5 Ethernet standard, which uses a thicker coaxial cable with a maximum length of 500 meters. These cables were used to physically connect computers and devices in a network, allowing them to communicate and share resources.

    Rate this question:

  • 13. 

    A .......................................... is used to provide network access to wireless devices such as laptops and PDA's. The ............................ uses radio waves to communicate with radios in computers, PDA's and other ................................

    Correct Answer(s)
    Wireless access points
    wireless access points
    Explanation
    Wireless access points are used to provide network access to wireless devices such as laptops and PDAs. They use radio waves to communicate with radios in computers, PDAs, and other devices. Therefore, the answer "Wireless access points" is correct as it accurately describes the technology and its usage.

    Rate this question:

  • 14. 

    What are the two types of threats to computer security? (2 answers)

    • A.

      Data

    • B.

      Physical

    • C.

      George

    • D.

      Software damage

    • E.

      Fraud

    Correct Answer(s)
    A. Data
    B. pHysical
    Explanation
    The two types of threats to computer security are data threats and physical threats. Data threats refer to any unauthorized access, alteration, or destruction of data, which can include hacking, malware, or data breaches. Physical threats, on the other hand, involve any physical damage or theft of computer hardware or equipment, such as theft, natural disasters, or accidents.

    Rate this question:

  • 15. 

    ...................... is a method of gaining access to resources on devices by pretending to be a trusted computer.

    Correct Answer(s)
    Spoofing
    spoofing
    Explanation
    Spoofing is a method where an attacker pretends to be a trusted computer or device in order to gain access to resources. By impersonating a trusted entity, the attacker can deceive systems and gain unauthorized access to sensitive information or perform malicious activities. Spoofing can occur in various forms such as IP spoofing, email spoofing, or caller ID spoofing. It is a common technique used in cyberattacks to trick users or systems into believing that the attacker is a legitimate entity.

    Rate this question:

  • 16. 

    If you are dealing with stress,what will help you to relax? (2 answers)

    • A.

      Massage your temples

    • B.

      Go for a smoke

    • C.

      Take some stimmulants like coffeee or carbonated drinks

    • D.

      Listen to soothing sounds

    Correct Answer(s)
    A. Massage your temples
    D. Listen to soothing sounds
    Explanation
    Massaging your temples can help relax the muscles in your head and reduce tension. This can provide a sense of relief and help alleviate stress. Listening to soothing sounds can also have a calming effect on the mind and body. It can help distract from stressful thoughts and promote relaxation.

    Rate this question:

  • 17. 

    Which registry file contains information about the hardware and software in the computer system?

    • A.

      HKEY_CLASSES_ROOT

    • B.

      HKEY_CURRENT_USER

    • C.

      HKEY_LOCAL_MACHINE

    • D.

      HKEY_USERS

    Correct Answer
    C. HKEY_LOCAL_MACHINE
    Explanation
    The registry file HKEY_LOCAL_MACHINE contains information about the hardware and software in the computer system. It stores settings and configurations for the computer's hardware devices, operating system, and installed software. This includes information about drivers, system services, and system-wide settings. The HKEY_LOCAL_MACHINE hive is accessible to all users on the computer and is an important component of the Windows operating system.

    Rate this question:

  • 18. 

    Which file system is recommended for Windows XP for large file support and enhanced security ?

    • A.

      DirectX

    • B.

      DOS

    • C.

      FAT32

    • D.

      HPFS

    • E.

      NTFS

    Correct Answer
    E. NTFS
    Explanation
    NTFS (New Technology File System) is the recommended file system for Windows XP for large file support and enhanced security. NTFS supports file sizes up to 16 terabytes and provides advanced security features such as file and folder permissions, encryption, and auditing. It also offers better reliability and fault tolerance compared to other file systems like FAT32. NTFS is the default file system for Windows XP and is widely used in modern Windows operating systems.

    Rate this question:

  • 19. 

    Which of the following features make laptops a good alternative to desktop computers? (2 answers)

    • A.

      Compact Design

    • B.

      Lower Costs

    • C.

      Enhanced Capabilities

    • D.

      Portability

    Correct Answer(s)
    A. Compact Design
    D. Portability
    Explanation
    Laptops are a good alternative to desktop computers because of their compact design and portability. The compact design allows them to be easily carried and used in various locations, making them convenient for users who are constantly on the go. Additionally, laptops are generally less expensive than desktop computers, making them a more affordable option for many individuals.

    Rate this question:

  • 20. 

    What is the suggested maximum number of PC's in a peer to peer network?

    • A.

      10

    • B.

      25

    • C.

      50

    • D.

      77

    • E.

      700

    Correct Answer
    A. 10
    Explanation
    In a peer to peer network, each computer (PC) is connected directly to other computers without the need for a central server. This type of network is typically used in small-scale environments. The suggested maximum number of PCs in a peer to peer network is 10. This is because as the number of PCs increases, the network can become slower and less efficient due to the increased traffic and resource sharing. Therefore, it is recommended to keep the number of PCs limited to ensure optimal performance and ease of management in a peer to peer network.

    Rate this question:

  • 21. 

    Which dotted decimal number is used to distinguish the network portion of the IP address from the host portion?

    • A.

      Default Gateway

    • B.

      MAC Address

    • C.

      Physical Address

    • D.

      Subnet Mask

    Correct Answer
    D. Subnet Mask
    Explanation
    The subnet mask is used to distinguish the network portion of the IP address from the host portion. It is a 32-bit number that accompanies an IP address and divides it into network and host portions. The subnet mask contains a series of binary 1s followed by binary 0s, where the 1s represent the network portion and the 0s represent the host portion. By comparing the IP address and subnet mask, a device can determine which part of the address belongs to the network and which part belongs to the host.

    Rate this question:

  • 22. 

    How is the speed of a laser printer measured?

    • A.

      Dots per minute

    • B.

      Pages per minute

    • C.

      Pixels per second

    • D.

      Pages per second

    • E.

      Pages per year

    Correct Answer
    B. Pages per minute
    Explanation
    The speed of a laser printer is measured in pages per minute because it indicates the number of pages that can be printed in one minute. This measurement is commonly used to compare the printing speed of different printers, allowing users to determine which printer can produce output more quickly.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 10, 2009
    Quiz Created by
    Rhysfrankcom7
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.