1.
The Intel chipset system uses the ___________ device to control the transfer data into and out of the SATA ports.
Correct Answer
C. ICH
Explanation
The correct answer is ICH. ICH stands for Input/Output Controller Hub and it is a part of the Intel chipset system. The ICH device is responsible for controlling the transfer of data into and out of the SATA ports. It acts as a bridge between the CPU and the SATA ports, facilitating the communication between the two and ensuring smooth data transfer.
2.
________________ are rated by the maximum power (in watts) that they can provide. It is important to keep in mind that the ________________ must produce at least enough energy to operate all the components of the system at the same time. During the initial startup of the computer, many components require additional power to get going.
Correct Answer
Power supplies, power supply
Explanation
Power supplies are rated by the maximum power (in watts) that they can provide. It is important to keep in mind that the power supply must produce at least enough energy to operate all the components of the system at the same time. During the initial startup of the computer, many components require additional power to get going.
3.
It is important to know that ___________________________ itself does not cause electrical damage. The damage occurs when these extremely high voltages are discharged in an uncontrolled manner, typically through a semiconductor such as an integrated circuit.
Correct Answer
static electricity
Static Electricity
Explanation
Static electricity itself does not cause electrical damage. The damage occurs when these extremely high voltages are discharged in an uncontrolled manner, typically through a semiconductor such as an integrated circuit. Static electricity refers to the buildup of electric charges on the surface of objects. It can be generated by friction, contact, or separation of materials. While static electricity can cause discomfort or minor shocks, it is the uncontrolled discharge of this built-up charge that can potentially damage electronic components.
4.
The _____________________ is the first Intel desktop CPU to put two CPU's in the same package, called dual-core.
Correct Answer
Pentium D
Explanation
The Pentium D is the correct answer because it was the first Intel desktop CPU to feature two CPU's in the same package, which is known as dual-core. This means that the Pentium D processor had two separate processing units within a single chip, allowing for improved multitasking and overall performance compared to single-core processors.
5.
The _______________ is the prime heat source within a PC.
Correct Answer
CPU
Explanation
The CPU, or Central Processing Unit, is the main component responsible for executing instructions and performing calculations in a computer. It is often referred to as the "brain" of the computer and generates a significant amount of heat during operation. The CPU is equipped with multiple cores and a high clock speed, allowing it to handle complex tasks efficiently. Due to its high power consumption and heat generation, proper cooling mechanisms such as fans or liquid cooling systems are necessary to prevent overheating and ensure the CPU operates optimally.
6.
_____________________________ or ____________________, is a newer type od SDRAM. As its name implies, it transfers data at double the speed of regular SDRAM.
Correct Answer
Double Data Rate SDRAM, DDR SDRAM
Explanation
Double Data Rate SDRAM, also known as DDR SDRAM, is a newer type of SDRAM that transfers data at double the speed of regular SDRAM. This means that it can provide faster and more efficient data transfer, resulting in improved performance for computer systems. DDR SDRAM has become widely used in modern computing devices due to its enhanced speed and reliability compared to traditional SDRAM.
7.
_____________________ are designed to be used in notebook or laptop computers. They are physically smaller than standard DIMMS, but electrically similar, and are available in EDO and SDRAM types.
Correct Answer
SO-DIMMs
Explanation
SO-DIMMs, or Small Outline Dual In-Line Memory Modules, are specifically designed for use in notebook or laptop computers. They are physically smaller than standard DIMMs but have similar electrical characteristics. SO-DIMMs are available in both EDO (Extended Data Output) and SDRAM (Synchronous Dynamic Random Access Memory) types, making them compatible with a wide range of computer systems.
8.
A time - tested way to increase system performance is to __________________________. However, when upgrading memory there are several precautions that must be observed to insure a smooth upgrade.
Correct Answer
increase memory capacity
Increase memory capacity
Explanation
Increasing the memory capacity of a system is a proven method to enhance its performance. By adding more memory, the system can handle larger amounts of data and run multiple applications simultaneously without slowing down. However, when upgrading memory, it is crucial to follow certain precautions to ensure a seamless upgrade process. This may include checking compatibility with the existing hardware, ensuring proper installation techniques, and verifying the system's ability to support the increased memory capacity.
9.
The biggest technical difference between Windows and MS-DOS is the _______________. The _______________ is a database that keeps track of hardware and software configuration and setup information.
Correct Answer
Registry
registry
Explanation
The biggest technical difference between Windows and MS-DOS is the Registry. The Registry is a database that keeps track of hardware and software configuration and setup information.
10.
On older Windows 9x systems, you might see login screens where you can optionally enter a _______________ and ____________ - the key being optional. WIth Windows NT, 2000, XP, and Vista, the ________________ and _____________ are required.
Correct Answer
username, password
Username, Password
Explanation
On older Windows 9x systems, the login screens may have an option to enter a username and password, but it is not mandatory. However, with Windows NT, 2000, XP, and Vista, both the username and password are required to be entered in order to log in.
11.
The objects in the COntents window are viewed in one of several formats. You can use the View menu bar or the View icon on the tool bar to change the view (Icon, Tile, List, Details, and the Thumbnail). The _________view is the default but is difficult to use if you are concerned with file sizes, the dates they were modified, or if you have a list of files that could be sorted for easier viewing. We recommend switching to the _____________view.
Correct Answer
tile, detailed
Tile, Detailed
Explanation
The Tile view is the default but is difficult to use if you are concerned with file sizes, the dates they were modified, or if you have a list of files that could be sorted for easier viewing. We recommend switching to the Detailed view.
12.
A __________________________ was one reason the "ILOVEYOU" VIRUS (WORM) WAS SO DAMAGING TO MILLIONS OF wINDOWS USERS.
Correct Answer
hidden file extension
Explanation
The hidden file extension was one reason the "ILOVEYOU" virus (worm) was so damaging to millions of Windows users. By disguising itself as a harmless text file, the virus tricked users into thinking it was safe to open. However, the file extension was actually .vbs (Visual Basic Script), which allowed the virus to execute its malicious code and spread rapidly throughout the system, causing significant damage to files and networks.
13.
______________________ is generally used to describe any memory that does not lose data when the power is removed. Its opposite is _______________, which lose data when power is removed. ____________ is the physical memory package, usually a large IC on the motherboard.
Correct Answer
ROM, RAM, ROM
Explanation
ROM is generally used to describe any memory that does not lose data when the power is removed. Its opposite, RAM, loses data when power is removed. ROM is the physical memory package, usually a large IC on the motherboard.
14.
The _______________________ contains information that points to the location of the operating system. In DOS and WIndows 95/98 that file was __________________. In Windows NT/2000/XP that file is _______________. In earlier operating systems the key files were ____________ and __________________. In Windows NT, 2000, and XP, _________________ is the key file.
Correct Answer
system partition, IO.SYS, NTLDR, IO.SYS, COMMAND.COM, NTLDR
Explanation
The system partition contains information that points to the location of the operating system. In DOS and Windows 95/98, that file was IO.SYS. In Windows NT/2000/XP, that file is NTLDR. In earlier operating systems, the key files were IO.SYS and COMMAND.COM. In Windows NT, 2000, and XP, NTLDR is the key file.
15.
_______________________ is one of the most important responsibilities of the system administrator. ______________ and _________________ bacups are the most effective way of preventing data loss.
Correct Answer
Backing up vital data, Frequent, regular
Explanation
Backing up vital data is one of the most important responsibilities of the system administrator. It ensures that important data is protected and can be restored in case of any unexpected events such as hardware failures, software errors, or data corruption. Performing frequent and regular backups is the most effective way of preventing data loss as it ensures that the latest version of the data is always available for restoration. This helps in minimizing the impact of any potential data loss incidents and ensures business continuity.
16.
Microsoft recommends that you only used _______________ drivers, which also come with a special Windows logo stating they are designed for Windows.
Correct Answer
signed
Explanation
Microsoft recommends that users only use signed drivers. Signed drivers have undergone a verification process by Microsoft and come with a special Windows logo indicating that they are designed specifically for Windows. These drivers are considered to be more reliable and secure compared to unsigned drivers, as they have been tested and approved by Microsoft.
17.
The __________________________ process eliminates most of the device drivers on the Internet that load malware along with running a device.
Correct Answer
digital signature
Explanation
The digital signature process is a method used to verify the authenticity and integrity of digital data. In the context of the given question, the digital signature process can be used to eliminate device drivers on the Internet that may contain malware. By using digital signatures, users can ensure that the device drivers they download and install are from trusted sources and have not been tampered with. This helps to protect their devices from malware that may be loaded along with the device drivers.
18.
Most experienced system administrators will ____________________________, which effectively closes a potential security hole. An amazing number of people use the default administrator account with their first name as password...and the hackers know this.
Correct Answer
change the Administrator account name
change the name of the Administrator account
Explanation
The correct answer is to change the Administrator account name or change the name of the Administrator account. This is because using the default administrator account with a common password (such as the user's first name) is a common practice among many users. Hackers are aware of this and can exploit it to gain unauthorized access to the system. By changing the name of the Administrator account, it becomes harder for hackers to guess the username and therefore adds an additional layer of security to the system.
19.
The ___________________ and _________________ are an attempt to verify that you are the authentic intended user, and not an imposter. The process of verifying that the person typing is the actual authorized user is called ____________________.
Correct Answer
login, password, authentication
Explanation
The login and password are used as a means to verify the identity of the user and ensure that they are the intended user and not an imposter. This process of verifying the user's identity is called authentication.
20.
______________________ is most often defined as the act of playing a ruse to entice you to give up personal information.
Correct Answer
Phishing
Explanation
Phishing is most often defined as the act of playing a ruse to entice you to give up personal information. Phishing scams typically involve sending fraudulent emails or messages that appear to be from reputable sources, such as banks or online services, in order to trick individuals into revealing sensitive information like passwords or credit card details. These scams often employ tactics like creating a sense of urgency or using convincing fake websites to deceive victims. It is important to be cautious and verify the authenticity of any requests for personal information to protect oneself from falling victim to phishing attacks.
21.
One final approach takes a bit of work upfront but it works very quickly. You can make a copy of your entire system partition and put it on CD or another hard drive. This copy is called _______________, and is an exact duplicate of your drive.
Correct Answer
disk image
Disk Image
Explanation
A disk image is a copy of the entire system partition that is stored on a CD or another hard drive. It is an exact duplicate of the original drive, including all files, folders, and settings. This approach requires some initial effort to create the disk image, but it allows for quick restoration of the system in case of any issues or failures.
22.
What are the 6 diagnostic questions to ask when something goes wrong with your pc?
Correct Answer
What is the symptom exactly?, Has it ever worked before?, When did the trouble start?, What has changed?, When does the problem happen?, What have you done to correct it?
Explanation
The 6 diagnostic questions to ask when something goes wrong with your PC are: What is the symptom exactly?, Has it ever worked before?, When did the trouble start?, What has changed?, When does the problem happen?, What have you done to correct it? These questions help to identify the specific issue, understand the history of the problem, determine possible causes or changes that may have led to the issue, and assess any attempts made to resolve it. By asking these questions, one can gather relevant information and troubleshoot effectively.
23.
The goal of the hard drive is to ____________, ________________________________________________. This is accomplished by utilizing motion in two directions.
Correct Answer
achieve fast, random access to data stored on a flat surface
Explanation
The goal of a hard drive is to achieve fast, random access to data stored on a flat surface. This is accomplished by utilizing motion in two directions. By quickly moving the read/write head across the surface of the disk, the hard drive can access data in different locations without having to physically move the disk itself. The motion in two directions allows for efficient and quick retrieval of data, making it possible to access and retrieve information from different parts of the disk in a random order.
24.
As we learned, __________________________ are composed of one or more disks or platters on which data is stored. The physical geometry on these platters if often referred to as the _________________________ of a hard drive. It is the _______________________ of data that determines the maximum storage capacity of the drive.
Correct Answer
hard disk, logical geometry, logical arrangement
Explanation
A hard disk is composed of one or more disks or platters on which data is stored. The physical geometry on these platters is often referred to as the logical geometry of a hard drive. It is the logical arrangement of data that determines the maximum storage capacity of the drive.
25.
It (_________________________________) generally uses a 40 pin, 80 conductor cable.
Correct Answer
IDE drive interface
IDE Drive Interface
Explanation
The correct answer is IDE drive interface. IDE stands for Integrated Drive Electronics, which is a standard interface used for connecting storage devices such as hard drives and CD/DVD drives to a computer. It typically uses a 40 pin, 80 conductor cable for data transfer. The term "IDE Drive Interface" is essentially repeating the same information, so it is not a separate explanation.
26.
With ___________________ drives, You connect a single drive to a port on the motherboard, and that's it.
Correct Answer
SATA
Explanation
With SATA drives, you connect a single drive to a port on the motherboard, and that's it. SATA (Serial Advanced Technology Attachment) is a type of interface used to connect storage devices, such as hard drives and solid-state drives, to the motherboard of a computer. It is a simple and straightforward method of connecting a drive, as it only requires plugging in a single cable to the SATA port on the motherboard. SATA drives have become the standard for most modern computers due to their ease of use and faster data transfer speeds compared to older interfaces like IDE.
27.
When installing an IDE hard drive, the __________________ configure the drive. Unlike a floppy, the cable plays no role in the drive's configuration.
Correct Answer
master/slave jumpers
Explanation
When installing an IDE hard drive, the master/slave jumpers configure the drive. These jumpers determine whether the drive will be recognized as the master or slave drive in the IDE chain. The master drive is typically connected to the end of the IDE cable and is responsible for controlling the data transfer, while the slave drive is connected to the middle of the cable and follows the commands of the master drive. The cable itself does not have any role in the drive's configuration, as it simply serves as a medium for data transmission.
28.
Most commonly, you use the tools on the _____________________ to partition the drive when you first install Windows.
Correct Answer
Windows installation CDs
Windows Installation CDs
Explanation
When installing Windows, the tools on the Windows installation CDs are commonly used to partition the drive. These tools allow users to divide the hard drive into separate sections, known as partitions, which can be used to organize and manage data more efficiently. By using the Windows installation CDs, users can easily access these partitioning tools and set up the desired partitions during the installation process.
29.
The latest technology for storing data belongs to the ______________________________. Most of us are familiar with the CD-ROMs and DVD ROMs that we use for playing audio, video, or installing software. The advantages of these drives are that they can store large amounts of data, are inexpensive to produce, and are unaffected by environmental influences.
Correct Answer
family of optical drives
Explanation
The correct answer is the "family of optical drives". Optical drives, such as CD-ROMs and DVD-ROMs, are a type of storage technology that uses lasers to read and write data on optical discs. They have the advantage of being able to store large amounts of data, being cost-effective to produce, and being resistant to environmental factors.
30.
In optical diskes (CD, DVDs) the disk is made up of 3 different parts. The _________________, the __________________, is molded from a master disk.
Correct Answer
bottom part, polycarbonate layer
Explanation
The correct answer is the bottom part, polycarbonate layer. In optical disks such as CDs and DVDs, the disk is composed of three different parts. The bottom part refers to the lower section of the disk, while the polycarbonate layer is a material that is molded from a master disk. This layer is responsible for protecting the data stored on the disk and is transparent to allow the laser beam to read the data.
31.
To retrieve the date stored on a CD-ROM disk, the CD-ROM player ___________________________________ - the clear (polycarbonate) side of the disk.
Correct Answer
shines a laser beam on the track surface from beneath the disk
Explanation
To retrieve the date stored on a CD-ROM disk, the CD-ROM player shines a laser beam on the track surface from beneath the disk. This is because the data on a CD-ROM is stored in tiny pits and lands on the track surface of the disk. The laser beam reflects off these pits and lands differently, allowing the player to read the digital information encoded on the disk. Shining the laser beam from beneath the disk ensures that it interacts with the track surface and accurately reads the data stored on it.
32.
When purchasing or specifying an optical drive, 2 values need to be considered. The first is the ______________. The standard for the _____________________ is _________________kBps.
Correct Answer
transfer rate, transfer rate, 150
Explanation
When purchasing or specifying an optical drive, the first value that needs to be considered is the transfer rate. The transfer rate refers to the speed at which data can be read from or written to the optical drive. The standard for the transfer rate is 150 kilobytes per second (kBps). This means that the optical drive can transfer data at a rate of 150 kilobytes per second.
33.
DVD capacity table: DVD Type = Max Capacity; Single-layer, single-sided = _______________GB; Single-layer, double sided = _____________GB; Dual-layer, single sided = ______________________ GB; Double layer, double sided = ___________GB.
Correct Answer
4.7, 9.4, 8.5, 17
Explanation
The answer 4.7, 9.4, 8.5, 17 represents the maximum capacity in gigabytes (GB) for each type of DVD mentioned in the table. The single-layer, single-sided DVD has a capacity of 4.7 GB, the single-layer, double-sided DVD has a capacity of 9.4 GB, the dual-layer, single-sided DVD has a capacity of 8.5 GB, and the double-layer, double-sided DVD has a capacity of 17 GB.
34.
Installing an optical drive is similar to installing a ___________________.
Correct Answer
hard drive
Explanation
Installing an optical drive is similar to installing a hard drive because both require physically connecting the drive to the computer's motherboard using cables, securing it in the appropriate drive bay, and configuring the computer's BIOS to recognize the new drive. Additionally, both types of drives store and retrieve data, although they use different methods - optical drives use lasers to read and write data on optical discs, while hard drives use magnetic storage to store data on spinning platters.
35.
Certain types of optical disk damage can be reversed through a process called ________________________.
Correct Answer
resurfacing
Explanation
Resurfacing is a process that can reverse certain types of optical disk damage. It involves removing a thin layer from the surface of the disk, which can eliminate scratches, smudges, or other imperfections that may be causing the disk to malfunction. This process restores the disk's readability and functionality, making it usable again.
36.
______________________ are used to connect devices to the motherboard and therefore allow the flow of data between that device and other devices in the computer.
Correct Answer
Expansion Buses
Expansion buses
Explanation
Expansion buses are used to connect devices to the motherboard and allow the flow of data between that device and other devices in the computer. These buses provide a pathway for communication and data transfer, enabling devices such as graphics cards, sound cards, and network adapters to be connected and interact with the rest of the computer system. Without expansion buses, devices would not be able to communicate with each other or with the motherboard, limiting the functionality and expandability of the computer.
37.
_____________________ uses a serial data transfer method rather than parallel.
Correct Answer
PCIe
Explanation
PCIe (Peripheral Component Interconnect Express) uses a serial data transfer method rather than parallel. This means that data is transmitted one bit at a time, sequentially, instead of multiple bits simultaneously. This allows for faster and more efficient data transfer, as it eliminates the need for synchronization between multiple parallel data channels. PCIe also provides higher bandwidth and scalability compared to parallel interfaces, making it the preferred choice for connecting devices such as graphics cards, network cards, and storage devices to a computer's motherboard.
38.
The problem is how does the CPU know when a device needs attention? It works the same way a student gets the attention of the instructor. Each device will "raise its hand" and wait for the CPU to respond. Each device will use the raising its hand version known as, a _____________________.
Correct Answer
hardware interrupt
Explanation
Each device in a computer system uses a hardware interrupt to get the attention of the CPU. Similar to a student raising their hand to get the attention of an instructor, the device "raises its hand" by sending a signal to the CPU. This signal is known as a hardware interrupt, which prompts the CPU to stop its current task and handle the request from the device. By using hardware interrupts, the CPU can efficiently manage multiple devices and respond to their needs in a timely manner.
39.
_________________________ expansion cards only need to be physically installed and the computer turned on. Windows will find the card and guide you through the set-up including driver installation. ______________________ also does a good job of identifying and allowing changes to these settings, and helping you verify that the device is installed properly. To see what Windows has found, go to _______________ and ____________________. From the menu select __________________ and then _____________________, and click the ___________________ button.
Correct Answer
Plug-and-Play, Windows Device Manager, Desktop, right click My Computer, Properties, Hardware, Device Manager
Explanation
When installing expansion cards, the process is simplified by using the Plug-and-Play feature. Once the card is physically installed and the computer is turned on, Windows will automatically detect and configure the card. Windows Device Manager is a tool that helps manage and troubleshoot hardware devices on a Windows computer. To access it, you can right-click on the "My Computer" icon on the desktop, go to Properties, then navigate to the Hardware tab and click on Device Manager. This allows you to see the devices that Windows has detected and make any necessary changes or verify proper installation.
40.
A ___________________ works having an electron gun at the long narrow end which is heated and emits a stream of high-speed electrons in the direction of the large end of the tube.
Correct Answer
CRT
Explanation
A CRT (Cathode Ray Tube) works by using an electron gun at one end of the tube that is heated and emits a stream of high-speed electrons. These electrons are then directed towards the larger end of the tube, where they hit a phosphor-coated screen, creating the images that we see on a CRT display.
41.
______________ displays are known for their sharp image quality, low power usage, light weight, and thin profile.
Correct Answer
LCD
Explanation
LCD displays, or Liquid Crystal Displays, are known for their sharp image quality due to their ability to produce high-resolution images. They also have low power usage compared to other display technologies, making them energy-efficient. LCD displays are lightweight and have a thin profile, making them suitable for portable devices such as laptops, tablets, and smartphones.
42.
Because of the level of complexity and the millions of microscopic transistors that need to be printed onto the LCD substrate, LCDs are fairly expensive and difficult to manufacture. In a standard 1,024 x 768 color laptop screen, there are more than __________________ transistors. If a single transistor doesn't operate properly, the associated pixel loses its sub-pixel color.
Correct Answer
2 million
Explanation
LCD screens are expensive and difficult to manufacture due to their complexity and the large number of microscopic transistors that need to be printed onto the LCD substrate. In a standard 1,024 x 768 color laptop screen, there are more than 2 million transistors. If even a single transistor fails to operate properly, the corresponding pixel loses its sub-pixel color.
43.
Unlike CRTs, LCDs have comparatively narrow viewing angles - often in the range of ________________ degrees horizontal, and ________________ degrees vertical.
Correct Answer
125-160, 55-70
Explanation
LCDs have narrower viewing angles compared to CRTs. This means that the optimal viewing experience for LCD screens is limited to a specific range of angles. The given answer suggests that LCDs typically have a horizontal viewing angle between 125-160 degrees and a vertical viewing angle between 55-70 degrees. This indicates that the screen can be viewed clearly within these specific angles, but the quality may degrade or become distorted if viewed from outside this range.
44.
_____________________ consume more than half of all power used by a computer system (typically ___________ watts). To deal with this, VESA has created specifications for ___________________ (DPMS). These standards define the signals that a computer can send to a monitor during idle times.
Correct Answer
Monitors, 80-100, DisplayPower-Management Signaling
Explanation
Monitors consume more than half of all power used by a computer system, typically ranging from 80 to 100 watts. To address this issue, VESA has established specifications for DisplayPower-Management Signaling (DPMS). These standards define the signals that a computer can send to a monitor during idle times, allowing for power-saving measures to be implemented and reducing energy consumption.
45.
Microsoft and Intel jointly developed the ______________________ (APM) specification. These specifications define the _____________________ between the hardware and the operating system. In order for a computer to provide power management it must comply with both of these standards, DPMS for monitors, APM on the computer side.
Correct Answer
Advanced Power Management, Bios-level interface
Explanation
Microsoft and Intel collaborated to create the Advanced Power Management (APM) specification. This specification outlines the standards for power management between the hardware and the operating system. To enable power management on a computer, it must adhere to both the DPMS standard for monitors and the APM standard on the computer side. The APM specification provides a bios-level interface for managing power settings and optimizing energy usage.
46.
__________________________ (SVGA) is today's video standard. The standard covers every resolution and color depth up to _____________ x _____________ with ______________________ colors. When a specification requires "standard VGA" it means _____________ x ______________ with ___________ colors.
Correct Answer
Super Video Graphics Array, 1280,1024,16,777,216, 800, 600, 256
Explanation
SVGA (Super Video Graphics Array) is today's video standard. The standard covers every resolution and color depth up to 1280 x 1024 with 16,777,216 colors. When a specification requires "standard VGA" it means 800 x 600 with 256 colors.
47.
There is one problem you are likely to encounter some day, but it has nothing to do with a hardware problem. Often an application, or even Windows itself, will have trouble with the software driver that controls the video card. The driver could have been _________________, or a ____________________ as expected. This can show up as _______________, _______________________, _________________________, or ___________________. In most cases these problems can be fixed by ___________________________. Driver updates are often available from the Manufacturer's website, as well as video BIOS updates and the instructions to install them.
Correct Answer
corrupted, new application won't work, bad colors, completely unreadable displays, scrambled graphics on buttons, any of a number of odd problems, updating the video driver to a newer version
Explanation
Sometimes, an application or Windows itself may have trouble with the software driver that controls the video card. This can happen if the driver becomes corrupted or if a new application doesn't work properly with the driver. The issues caused by this can include bad colors, completely unreadable displays, scrambled graphics on buttons, or any number of odd problems. In most cases, these problems can be fixed by updating the video driver to a newer version. Driver updates, as well as video BIOS updates and installation instructions, are often available from the manufacturer's website.
48.
The best source of information to check before obtaining memory is the _____________________ that comes with the computer or motherboard. This source will generally list the type of memory required, how many modules are possible, and how to install them on the motherboard.
Correct Answer
documentation
Explanation
The best source of information to check before obtaining memory is the documentation that comes with the computer or motherboard. This documentation typically includes all the necessary information about the type of memory required, the number of modules that can be installed, and instructions on how to install them on the motherboard. Therefore, referring to the documentation is crucial to ensure compatibility and proper installation of memory.
49.
__________________________ is a major task and requires complete disassembly, reassembly and setup of the entire computer and all of its devices. That's just the hardware. You'll also need to reinstall the operating system and all your applications too.
Correct Answer
Installing a new motherboard
Explanation
Installing a new motherboard is a major task because it involves disassembling the entire computer and its devices, then reassembling and setting them up again. This includes not only the hardware components but also reinstalling the operating system and all applications. It is a complex process that requires careful handling and knowledge of computer hardware and software.
50.
Beyond the remote workstation sits the __________________ network. As its name implies, this network is a collection of similar computers with a common connection. This is the type of network created when several computers in an office are interconnected.
Correct Answer
peer-to-peer
Explanation
The correct answer is peer-to-peer. In a peer-to-peer network, computers are interconnected and share resources without the need for a central server. This type of network is commonly found in small offices or homes where computers are connected directly to each other. Each computer in the network can act as both a client and a server, allowing users to share files, printers, and other resources easily.