1.
What provides the illuminattion for LCD monitors?
Correct Answer
C. Backlights
Explanation
Backlights provide the illumination for LCD monitors. LCD panels themselves do not emit light, so they require a separate light source to display images. Backlights are typically placed behind the LCD panel and provide uniform illumination across the screen, allowing the liquid crystals in the panel to manipulate the light and create the images that we see. Inverters are used to control the brightness of the backlights, while lamps are a type of backlight technology.
2.
What is the function of the RAMDAC?
Correct Answer
B. To convert digital signals into analog signals
Explanation
The function of the RAMDAC is to convert digital signals into analog signals. This is an important process in computer graphics as it allows digital images and data stored in the computer's memory to be displayed on analog monitors or other display devices that require analog signals. By converting the digital signals into analog signals, the RAMDAC enables the computer to communicate with and display information on devices that are not compatible with digital signals.
3.
Which of these is the most recent type of video card expansion slot to be introduced?
Correct Answer
C. PCIe
Explanation
PCIe, also known as PCI Express, is the most recent type of video card expansion slot to be introduced. It was developed to replace the older AGP and PCI slots. PCIe offers higher bandwidth and faster data transfer speeds, allowing for better performance and more advanced graphics capabilities. It has become the standard for modern video card connections and is widely used in current computer systems.
4.
Where can you go to update the driver for your video card?
Correct Answer
B. Find your display adapter under Device Manager, double-click to open its properties dialog box, and then click the Driver tab
Explanation
To update the driver for your video card, you should find your display adapter under Device Manager. Double-click on it to open its properties dialog box, and then click on the Driver tab. This will allow you to update the driver for your video card.
5.
What Microsoft API supports 3-D graphics?
Correct Answer
A. DirectX.I
Explanation
DirectX is a Microsoft API that supports 3-D graphics. It provides a set of tools and functions for developers to create and manipulate 3-D graphics in applications and games. DirectX.I is a version of DirectX specifically designed for 3-D graphics rendering. It offers advanced features and optimizations for high-performance graphics rendering on Windows platforms. OpenGL is another API that supports 3-D graphics, but it is not developed by Microsoft. Active Desktop and Glide are not related to 3-D graphics rendering.
6.
How would you adjust your screen settings>
Correct Answer
D. Go to Start > Control Panel and double-click the Display / Personalization applet icon
Explanation
To adjust screen settings, you would go to Start > Control Panel and double-click the Display / Personalization applet icon. This will open the Display settings where you can make changes to the screen resolution, color calibration, and other display options.
7.
What is the name for the number of characteristics of a particular sound captured when sampling?
Correct Answer
A. Bit depth
Explanation
Bit depth refers to the number of bits used to represent the amplitude of a sound wave during sampling. It determines the dynamic range and precision of the captured sound. A higher bit depth allows for a greater range of amplitudes to be represented, resulting in a more accurate and detailed representation of the original sound. Therefore, bit depth is the correct answer for the given question.
8.
Which of the following terms most accurately describes a speaker setup with two satelite speakers and a subwoofer?
Correct Answer
B. 2.1
Explanation
A speaker setup with two satellite speakers and a subwoofer is most accurately described as 2.1. The "2" refers to the number of satellite speakers, while the "1" refers to the number of subwoofers. This configuration is commonly used for multimedia systems or computer speakers, where the satellite speakers handle the mid and high frequencies, while the subwoofer is responsible for producing the low frequencies, providing a more balanced and immersive audio experience.
9.
Jane's sound card is suddenly not making any sound. She suspects that the volume is turned down. She checks the speaker volume and sees that it is turned up. What should she check next?
Correct Answer
C. The Volume control panel
Explanation
Jane should check the Volume control panel next because it is responsible for controlling the sound output on her computer. Even though she has already checked the speaker volume and confirmed that it is turned up, there may be additional settings in the Volume control panel that are causing the sound issue. By checking the Volume control panel, Jane can ensure that all the necessary settings are properly configured to enable sound output.
10.
How should you remove a modular drive?
Correct Answer
A. Use the Hardware Removal Tool in the System tray
Explanation
To remove a modular drive, it is recommended to use the Hardware Removal Tool in the System tray. This tool ensures that the drive is safely ejected and all necessary processes are completed before removal. Simply removing the drive without using the tool may result in data loss or damage to the drive. Shutting down, removing the drive, and powering back on is not the recommended method as it may lead to improper removal and potential system errors. Using Device Manager to uninstall the device is also not the correct approach as it is meant for uninstalling software components, not physical drives.
11.
Which buses do ExpressCards use?
Correct Answer
B. Hi-Speed USB and PCI Express
Explanation
ExpressCards are a type of expansion slot used in laptops to add functionality. They are designed to support high-speed data transfer and can be used for various purposes such as adding USB ports, network connectivity, or external graphics. Hi-Speed USB and PCI Express are the correct answers because these are the two bus types that ExpressCards use to communicate with the laptop's motherboard and enable the added functionality.
12.
Which of the following devices enables you to add common PC ports to a portable computer?
Correct Answer
A. Port replicator
Explanation
A port replicator is a device that allows you to add common PC ports to a portable computer. It essentially replicates the ports found on a desktop computer and provides them in a compact form that can be easily connected to a laptop or other portable device. This enables users to expand the connectivity options of their portable computer and connect peripherals such as monitors, keyboards, mice, and external storage devices. A port duplicator, port modulator, and port simulator are not devices commonly used for adding PC ports to a portable computer.
13.
Whic of the following APM power levels writes information from RAM to the hard drive and then copies the data back to RAM when the computer is activated again?
Correct Answer
D. Hibernation
Explanation
Hibernation is the correct answer because it is a power level that writes information from RAM to the hard drive and then copies the data back to RAM when the computer is activated again. This feature allows the computer to save its current state and power off, conserving energy while still allowing for a quick startup and the restoration of all open programs and documents.
14.
Which battery technology is susceptible to heat and memory issues?
Correct Answer
B. Ni-Cd
Explanation
Ni-Cd batteries are susceptible to heat and memory issues. When exposed to high temperatures, Ni-Cd batteries can experience thermal runaway, leading to overheating and potential damage. Additionally, Ni-Cd batteries are prone to memory effect, which reduces their overall capacity over time if not fully discharged before recharging. This memory effect can result in decreased battery performance and shortened lifespan.
15.
Maria's laptop's fan is making a high-pitched whine and doesn't seem to be spinning well. What's a fix for this issue?
Correct Answer
C. Replace the fan
Explanation
The correct answer is to replace the fan. If the laptop's fan is making a high-pitched whine and not spinning well, it is likely that the fan is faulty or damaged. Moving the computer to a warmer room or putting it on a soft surface will not fix the issue with the fan. Taking the computer to a repair shop might be an option, but the most effective solution would be to replace the fan altogether.
16.
What unique identifier is assigned to every NIC?
Correct Answer
B. MAC address
Explanation
A unique identifier assigned to every NIC is a MAC address. This address is a hardware address that is assigned to the network interface card (NIC) of a device. It is used to uniquely identify the device on a network. Unlike an IP address, which can change, the MAC address is permanent and cannot be easily altered. The MAC address is used for communication at the data link layer of the network protocol stack.
17.
Everything worked fine on your 100BaseT star bus topology network yesterday, but today, no on can connect to the server. The server seems to be in good running order. Which of the following is the most likely problem?
Correct Answer
A. A switch is malfunctioning
Explanation
A switch is malfunctioning. If everything was working fine on the network yesterday but no one can connect to the server today, it suggests that there might be an issue with the switch. The switch is responsible for connecting devices on a network and if it malfunctions, it can cause connectivity problems for all the devices connected to it. Therefore, a malfunctioning switch is the most likely problem in this scenario.
18.
What sort of cabling do most fiber networks use?
Correct Answer
A. 62./125 multimode
Explanation
Most fiber networks use 62.5/125 multimode cabling. This type of cabling consists of a core with a diameter of 62.5 microns and a cladding with a diameter of 125 microns. It is commonly used for short-distance applications and supports lower data rates compared to single-mode fiber.
19.
Which encryption method used on wireless networks is the most secure?
Correct Answer
D. WPA2
Explanation
WPA2 is the most secure encryption method used on wireless networks. WEP (Wired Equivalent Privacy) is an outdated and easily crackable encryption method, while Wi-Fi and WINS (Windows Internet Name Service) are not encryption methods at all. WPA2 (Wi-Fi Protected Access 2) is currently the strongest encryption protocol available for wireless networks, providing strong security measures such as AES encryption and authentication protocols to protect data transmission.
20.
Which wireless networking standard uses the MIMO (multiple in / multiple out)?
Correct Answer
B. 802.11n
Explanation
802.11n is the correct answer because it is a wireless networking standard that uses MIMO (multiple in / multiple out) technology. MIMO allows for multiple antennas to transmit and receive data simultaneously, resulting in improved signal strength, increased data throughput, and better overall performance compared to previous standards such as 802.11b and 802.11g. The other options, 802.11, 802.11b, and 802.11g, do not specifically mention MIMO technology.
21.
To enable two devices to communicate wirelessley in ad hoc mode, what configuration is required?
Correct Answer
B. Both devices need to have the same SSID
Explanation
For two devices to communicate wirelessly in ad hoc mode, they need to have the same SSID (Service Set Identifier). The SSID is a unique identifier that allows devices to connect to the same wireless network. By having the same SSID, the devices can recognize and communicate with each other, forming a direct connection without the need for a central access point or router. This allows for a direct peer-to-peer connection between the devices, enabling wireless communication.
22.
Which network type enables you to log into a single machine and then access machines across the network without logging into each of them?
Correct Answer
B. Domain-based
Explanation
A domain-based network enables users to log into a single machine and then access other machines across the network without having to log into each one individually. In a domain-based network, all user accounts and security policies are managed centrally by a domain controller. This allows for centralized authentication and authorization, making it easier for users to access resources on different machines without the need for multiple logins.
23.
How to you change the TCP/IP settings for a Local Area Connection NIC in Windows XP?
Correct Answer
B. Right-click My Network Places and select Properties to open the Network Connections dialog box. Select the Local Area Connection you wish to change.
Explanation
To change the TCP/IP settings for a Local Area Connection NIC in Windows XP, you need to right-click My Network Places and select Properties. This will open the Network Connections dialog box, where you can select the specific Local Area Connection that you want to change. This option allows you to access and modify the TCP/IP settings for that particular network connection.
24.
What tool enables you to access shared resources in a Windows-based network?
Correct Answer
C. My Network Places / Network
Explanation
My Network Places / Network is the correct answer because it is a tool in Windows that allows users to access shared resources on a network. It provides a graphical interface where users can browse and connect to shared folders, printers, and other network resources. This tool is commonly used in Windows-based networks to access files and resources that are shared by other computers on the network.
25.
Which of the following offers a fast connection for an external modem?
Correct Answer
D. USB
Explanation
USB offers a fast connection for an external modem. USB (Universal Serial Bus) is a widely used interface for connecting devices to a computer. It provides high-speed data transfer rates, making it suitable for connecting peripherals such as modems. CNR (Communication and Networking Riser) is a slot on the motherboard for audio and network cards, not specifically designed for modems. PCI (Peripheral Component Interconnect) is a bus for connecting internal hardware components, not external modems. Serial Port is a slower connection compared to USB and is not typically used for modems anymore.
26.
A new client lives in a rural area, outside the connectivity radius of the local cable company and definitely more than 20,000 feet away from the nearest switching center for the phone company. Which Internet option offers him the best performance?
Correct Answer
D. Satelite
Explanation
In this scenario, where the client lives in a rural area and is far away from the nearest switching center, the best internet option for them would be satellite internet. Satellite internet does not require physical infrastructure like cables or phone lines, making it accessible even in remote areas. It provides a reliable and high-speed internet connection by transmitting data through satellites in space. Therefore, satellite internet would offer the best performance for the client in this situation.
27.
What server handles incoming e-mail messages?
Correct Answer
C. POP3
Explanation
POP3 (Post Office Protocol version 3) is a protocol that is used by email clients to retrieve emails from a mail server. It is specifically designed for handling incoming email messages. SMTP (Simple Mail Transfer Protocol) is used for sending email messages, NNTP (Network News Transfer Protocol) is used for accessing newsgroups, and Outlook Express is an email client software. Therefore, POP3 is the correct answer for the server that handles incoming email messages.
28.
Which of the following is a good example of social engineering?
Correct Answer
C. Infiltration
Explanation
Infiltration is a good example of social engineering because it involves gaining unauthorized access to a system or network by manipulating individuals through psychological manipulation or deception. Social engineers typically exploit human vulnerabilities, such as trust or fear, to trick people into divulging sensitive information or granting access to restricted areas. Infiltration can be done through methods like impersonation, phishing, or tailgating, and it is a common tactic used by hackers to gain unauthorized access to systems and networks.
29.
Cindy replaces her aging Pentium 4 computer with a new, dual-core Core 2 Duo machine. What should she do with it?
Correct Answer
C. Donate it to charity, but only after using something like Window Washer to wipe the hard drive and remove data remnants
Explanation
Cindy should donate her old computer to charity, but before doing so, she should use a software like Window Washer to wipe the hard drive and remove any remaining data remnants. This is important to protect her personal information and ensure that no sensitive data can be accessed by anyone else who may use the computer in the future. Simply reformatting the hard drive may not completely erase the data, so using a specialized tool like Window Washer is recommended for secure data removal.
30.
George came back from his break to discover that he'd left his computer still logged in and his e-mail running on the Desktop in plain site. What should he do when he takes his next break?
Correct Answer
A. Press WINDOWS LOGO KEY + L on the keyboard to lock the computer
Explanation
George should press the WINDOWS LOGO KEY + L on the keyboard to lock the computer. This will ensure that his computer is secure and no one can access his e-mail or any other personal information while he is on break.
31.
In Windows 2000, what permissions apply to the Everyone group by default?
Correct Answer
C. Full Control
Explanation
By default, in Windows 2000, the Everyone group is granted Full Control permissions. This means that all users, regardless of their specific group membership, have the ability to perform any action on the resource, including reading, writing, modifying, and deleting files or folders. This level of access provides the highest level of control and can potentially pose a security risk if not properly managed.
32.
What kind of malware changes its signature to avoid detection?
Correct Answer
A. PolymorpH
Explanation
Polymorph is a type of malware that changes its signature to avoid detection. Unlike other types of malware that have a fixed signature, polymorph malware constantly modifies its code and appearance, making it difficult for antivirus programs to recognize and detect. By changing its signature, polymorph malware can evade detection and continue to infect systems without being detected by traditional security measures. This allows the malware to remain undetected and potentially cause significant damage to the targeted system.
33.
What tool in Windows XP SP2 and later protects an internal network from unauthorized access from the Internet?
Correct Answer
D. Windows Firewall
Explanation
Windows Firewall is a tool in Windows XP SP2 and later versions that protects an internal network from unauthorized access from the Internet. It acts as a barrier between the internal network and the Internet, monitoring and controlling incoming and outgoing network traffic based on predefined security rules. It helps prevent unauthorized access to the network by blocking potentially harmful or suspicious connections, thus enhancing the overall security of the internal network.
34.
You ae solving a problem on Kate's computer which requires you to reboot several times. Upon each reboot, the logon screen appears and prompts you for a username and password before you can continue working. Kate has gone to another office to continue her work on another computer. How do you proceed?
Correct Answer
D. Have Kate temporarily change her password for you to use as you work, then have her change it back when you're through.
35.
After replacing a keyboard a user has spilled coffee on for the fifth time, what should you say to the user?
Correct Answer
A. I can't guarantee the new keyboard will work if it gets dirty.
Explanation
The correct answer suggests that the user should be aware that the new keyboard may not function properly if it becomes dirty. This implies that the user should take precautions to keep the keyboard clean and avoid spilling coffee on it in the future.
36.
Once you figure out what can be causing a computer to malfunction, what's your next step?
Correct Answer
C. Test your theory by checking for power and connectivity
Explanation
The next step after identifying the potential cause of a computer malfunction is to test the theory by checking for power and connectivity. This involves verifying if the computer is receiving adequate power supply and if all the necessary cables and connections are properly connected. By doing so, it helps to rule out any issues related to power failure or loose connections, which are common culprits for computer malfunctions. This step is crucial in the troubleshooting process as it allows for a systematic approach to narrow down the cause of the problem and potentially resolve it.