1.
What is a computer made up of?
Correct Answer(s)
A. Hardware
C. Software
Explanation
A computer is made up of hardware and software. Hardware refers to the physical components of a computer such as the motherboard and case. These components are tangible and can be seen and touched. Software, on the other hand, refers to the programs and instructions that tell the hardware what to do. It is intangible and cannot be physically touched. Both hardware and software are essential for a computer to function properly.
2.
The P1 power connector has .......... pins that connect to the motherboard
Correct Answer(s)
20/24
20 - 24
Explanation
The P1 power connector has 20/24 pins that connect to the motherboard. This means that the connector can be either a 20-pin or a 24-pin connector, depending on the motherboard. The extra 4 pins in the 24-pin connector provide additional power for newer motherboards and components, while the 20-pin connector is used for older motherboards.
3.
What does the Northbridge deal with?
Correct Answer(s)
A. GrapHics
B. RAM
C. CPU
Explanation
The Northbridge is responsible for handling the communication between the CPU, RAM, and graphics card in a computer system. It acts as a bridge connecting these components and facilitating their interaction. Therefore, the correct answer is Graphics, RAM, and CPU.
4.
What does RISC stand for?
Correct Answer
C. Reduced Instruction Set Computer
Explanation
RISC stands for Reduced Instruction Set Computer. This type of computer architecture is characterized by a simplified set of instructions, which allows for faster execution and more efficient use of hardware resources. RISC processors typically have a smaller number of instructions, each of which performs a simple operation, making them ideal for applications that require high performance and low power consumption.
5.
How many devices can one USB port support?
Correct Answer
D. 127
Explanation
A USB port can support up to 127 devices. This is because USB devices use a system called "USB addressing" where each device is assigned a unique address. The USB protocol allows for a maximum of 127 addresses, so any additional devices beyond this limit would not be recognized by the USB port. Therefore, the correct answer is 127.
6.
What is the anagram on how to use a fire extingusher?
Correct Answer
C. PASS
Explanation
The anagram "PASS" can be rearranged to form the phrase "P-A-S-S," which stands for the four steps in using a fire extinguisher: Pull the pin, Aim at the base of the fire, Squeeze the handle, and Sweep from side to side.
7.
........ is when the power line voltage drops below 80% of the normal voltage level.
Correct Answer
brownout
Explanation
A brownout occurs when the power line voltage drops below 80% of the normal voltage level. This can happen due to various reasons such as high demand on the power grid, faulty electrical equipment, or inadequate power supply. Brownouts can cause dimming of lights, reduced performance of electrical appliances, and potential damage to sensitive electronic devices. It is important to address brownouts promptly to prevent further electrical issues and ensure the smooth functioning of electrical systems.
8.
What are the three types of power protection devices?
Correct Answer(s)
A. Surge Suppressor
B. UPS
C. SPS
Explanation
The three types of power protection devices mentioned in the answer are surge suppressor, UPS (uninterruptible power supply), and SPS (standby power supply). A surge suppressor is used to protect electronic devices from voltage spikes or surges. UPS provides backup power in case of a power outage, allowing devices to continue running without interruption. SPS is a type of power supply that switches to battery power during a power outage, providing temporary power until the main power source is restored.
9.
What does CMOS stand for?
Correct Answer
A. Complementary Metal Oxide Semiconductor
Explanation
The correct answer is "Complementary Metal Oxide Semiconductor." CMOS refers to a type of semiconductor technology used in the manufacturing of integrated circuits. It is a combination of metal oxide semiconductor (MOS) and complementary, indicating the use of both N-type and P-type transistors. CMOS technology is widely used in various electronic devices and computer systems due to its low power consumption and high noise immunity.
10.
Laser printers use ............ printing technology
Correct Answer
electrophotographic
Electrophotographic
Explanation
Laser printers use electrophotographic printing technology. This technology involves a complex process where an electrostatic image is formed on a photosensitive drum or belt by selectively charging areas with a laser beam. The charged areas attract toner particles, which are then transferred to paper and fused using heat and pressure. This method allows for high-quality and fast printing, making laser printers popular in various settings such as offices and homes.
11.
Which of the list below are stages in the laser printing 6 step process?
Correct Answer(s)
A. Developing
D. Conditioning
Explanation
The laser printing process involves several stages, and two of them are mentioned in the list: developing and conditioning. Developing refers to the step where the image is formed on the photosensitive drum, while conditioning involves preparing the drum for the next printing cycle. Although the other two options, transforming and firing, may be stages in other printing processes, they are not specifically mentioned in the context of laser printing.
12.
What is the IEEE standard for Parallel?
Correct Answer
D. 1284
Explanation
IEEE 1284 is the correct answer because it is the standard for parallel ports. This standard specifies the electrical and physical interface between a device and a printer, allowing for high-speed parallel communication. It defines the necessary protocols and signaling methods for data transfer, ensuring compatibility between devices. The other options, 1394, 802.11, and 802.3, are standards for other types of communication, such as FireWire, Wi-Fi, and Ethernet, respectively, and are not related to parallel communication.
13.
When a scanner scans text it uses ............... to turn bitmap images into editable words?
Correct Answer
Optical Character Recognition
OCR
Explanation
When a scanner scans text, it uses Optical Character Recognition (OCR) to turn bitmap images into editable words. OCR technology analyzes the scanned image and identifies the patterns and shapes of characters, converting them into machine-readable text. This allows the scanned text to be edited, searched, and stored digitally, making it easier to work with and manipulate. OCR is widely used in various industries, such as document management, data entry, and digital archives.
14.
What is the 4th set in the trouble shooting process?
Correct Answer
D. Gather data from the Computer
Explanation
The 4th set in the troubleshooting process is to gather data from the computer. This step involves collecting information about the computer's hardware, software, and any error messages or symptoms that may be occurring. By gathering data from the computer, technicians can better understand the problem and identify potential solutions. This step is crucial in diagnosing and resolving technical issues effectively.
15.
What type of interface does Windows use?
Correct Answer
B. GUI
Explanation
Windows uses a GUI (Graphical User Interface) as its interface. GUI allows users to interact with the computer through visual elements like icons, windows, and menus, making it easier to navigate and operate the system. This is in contrast to a CLI (Command Line Interface), which relies on text-based commands. GUI provides a more user-friendly and intuitive experience, especially for those who are not familiar with command-based operations.
16.
How many different modes of an operating system are there?
Correct Answer
E. 4
Explanation
There are four different modes of an operating system.
17.
Novell NetWare is a type of ...........
Correct Answer
Network Operaating System
NOS
Explanation
Novell NetWare is classified as a Network Operating System (NOS). NOS refers to the software that manages and coordinates network resources, allowing multiple computers to communicate and share data efficiently. NetWare, developed by Novell, was a popular NOS in the 1980s and 1990s. It provided features such as file and print services, directory services, and security mechanisms. NetWare allowed organizations to establish and maintain local area networks (LANs) effectively. Therefore, the correct answer is Network Operating System (NOS).
18.
Which file system does Windows XP favour?
Correct Answer
D. NTFS
Explanation
Windows XP favors the NTFS file system because it offers better security, reliability, and performance compared to the FAT file systems. NTFS supports file and folder permissions, encryption, and compression, which are important for protecting sensitive data. It also has a more efficient way of organizing and accessing files, reducing fragmentation and improving overall system performance. Additionally, NTFS supports larger file sizes and partitions, making it suitable for modern storage needs.
19.
What is the boot loader in Windows XP?
Correct Answer
C. NTLDR
Explanation
NTLDR stands for "New Technology Loader" and it is the boot loader used in Windows XP operating system. The boot loader is responsible for loading the operating system into the computer's memory during the boot process. It is located in the system partition and is executed by the computer's BIOS. NTLDR is essential for the proper functioning of Windows XP as it loads the necessary files and settings required to start the operating system.
20.
Where in the registry would you find information relating to hardware on the computer?
Correct Answer
E. HKEY_LOCAL_MACHINE
Explanation
The correct answer is HKEY_LOCAL_MACHINE. In the Windows registry, HKEY_LOCAL_MACHINE is a top-level key that stores information about the hardware and software configuration of the computer. It contains subkeys and values that provide details about the installed hardware devices, drivers, and system settings. This information is crucial for the operating system to properly recognize and interact with the hardware components of the computer.
21.
......... is a utility that is used to manipulate the programs that startup with Windows
Correct Answer
msconfig
Explanation
Msconfig is a utility that allows users to manage and manipulate the programs that automatically start up with Windows. It provides a simple interface where users can enable or disable startup items, control services, and modify boot settings. By using msconfig, users can optimize their system's startup process, improve performance, and troubleshoot any issues related to startup programs.
22.
What is the MOD regulations on Display settings?
Correct Answer
D. 1024 x 768, 75Hz
Explanation
The MOD regulations on Display settings specify that the resolution should be set to 1024 x 768 and the refresh rate should be set to 75Hz. This means that the display should have a resolution of 1024 pixels horizontally and 768 pixels vertically, and the screen should refresh 75 times per second. This regulation ensures a clear and smooth display for the user.
23.
Laptop CPU's use CPU Throttling to reduce........
Correct Answer(s)
A. Heat
B. Power Consumption
Explanation
Laptop CPU's use CPU throttling to reduce heat and power consumption. When a laptop CPU is under heavy load, it generates a lot of heat, which can cause overheating and damage to the system. CPU throttling helps to regulate the CPU's performance by reducing its clock speed and voltage, thereby reducing heat production. Additionally, by throttling the CPU, power consumption is also reduced, which helps to conserve battery life. Therefore, CPU throttling is an effective technique to manage heat and power consumption in laptop CPU's.
24.
Mobile Phones use .......... for security.
Correct Answer(s)
Wireless Transport Layer Security
Explanation
Mobile phones use Wireless Transport Layer Security (WTLS) for security. WTLS is a security protocol designed specifically for wireless communication. It provides encryption, authentication, and data integrity for data transmitted over wireless networks. WTLS is based on the Transport Layer Security (TLS) protocol, which is commonly used for securing internet communication. By using WTLS, mobile phones can ensure that the data transmitted over wireless networks is protected from unauthorized access and tampering.
25.
What are the two types of Laptop or portable battery?
Correct Answer(s)
A. Li-ion
B. Li-poly
Explanation
The two types of laptop or portable battery are Li-ion and Li-poly. Li-ion stands for Lithium-ion, which is a rechargeable battery technology commonly used in laptops and other portable electronic devices. Li-poly stands for Lithium-polymer, which is another type of rechargeable battery that offers higher energy density and flexibility in shape and size compared to Li-ion batteries. Both Li-ion and Li-poly batteries are commonly used in laptops due to their high energy density, long lifespan, and lightweight design.
26.
What does SODIMM satnd for?
Correct Answer
B. Small Outline Dual In-Line Memory Module
Explanation
SODIMM stands for Small Outline Dual In-Line Memory Module. This is a type of memory module used in computers and other electronic devices. The "Small Outline" refers to the physical size of the module, which is smaller than the traditional DIMM modules. "Dual In-Line" refers to the arrangement of the electrical contacts on the module. SODIMMs are commonly used in laptops and other portable devices where space is limited.
27.
Bps, Kbps and Mbps are all measurements of ...........
Correct Answer
bandwidth
Bandwidth
Explanation
bps, Kbps, and Mbps are all measurements of bandwidth. Bandwidth refers to the maximum amount of data that can be transmitted over a network or communication channel in a given amount of time. bps stands for bits per second, Kbps stands for kilobits per second, and Mbps stands for megabits per second. These measurements are used to quantify the speed or capacity of a network connection, indicating how much data can be transmitted in one second.
28.
Simplex, Half Duplex, Full Duplex are all modes of ............
Correct Answer
Transmission
transmission
Explanation
Simplex, Half Duplex, and Full Duplex are all modes of transmission. In the simplex mode, data can only be transmitted in one direction. In the half duplex mode, data can be transmitted in both directions, but not simultaneously. In the full duplex mode, data can be transmitted in both directions simultaneously. These modes are commonly used in various communication systems, such as telecommunication networks and computer networks, to determine the flow and direction of data transmission.
29.
How many classes of IP address are there?
Correct Answer
D. 5
Explanation
There are five classes of IP addresses: A, B, C, D, and E. Each class has a different range of IP addresses and is used for different purposes. Class A addresses are used for large networks, Class B addresses are used for medium-sized networks, Class C addresses are used for small networks, Class D addresses are used for multicast groups, and Class E addresses are reserved for future use.
30.
IP address, Subnet Mask, Default Gateway and DNS server are all automatically assigned by..........
Correct Answer
DHCP
Dynamic Host Configuration Protocol
Explanation
The correct answer is DHCP, Dynamic Host Configuration Protocol. DHCP is a network protocol that automatically assigns IP addresses, subnet masks, default gateways, and DNS servers to devices on a network. It simplifies the process of network configuration by eliminating the need for manual assignment of these parameters. DHCP ensures that devices can seamlessly connect to a network and communicate with other devices without the need for manual configuration.
31.
How is a LAN administered?
Correct Answer
B. Locally
Explanation
A LAN (Local Area Network) is administered locally, meaning that the management and control of the network is done within the local area where it is located. This typically involves tasks such as configuring network settings, managing user access and permissions, troubleshooting network issues, and maintaining network security. Local administration allows for more immediate control and customization of the network to suit the specific needs of the organization or individuals using it.
32.
What port is DNS on?
Correct Answer
C. 53
Explanation
The correct answer is 53. DNS (Domain Name System) is a protocol used to translate domain names into IP addresses. It operates on port 53, allowing DNS servers to communicate with each other and resolve domain names to their corresponding IP addresses. Ports 80, 21, and 88 are associated with other protocols such as HTTP, FTP, and Kerberos, respectively, but they are not used for DNS communication. Therefore, the correct port for DNS is 53.
33.
......... is a attack that randomly opens TCP ports.
Correct Answer
Syn flood
Explanation
A Syn flood is an attack where the attacker sends a large number of TCP SYN requests to a target server, but does not complete the handshake process by sending the final ACK packet. This causes the server to keep the connection half-open, consuming server resources and eventually leading to a denial of service. As the attack is random and aims to overwhelm the server with incomplete connections, it is an effective method to disrupt network services.