1.
Which type of ROM can be erased by UV light?
Correct Answer
C. EPROM
Explanation
EPROM stands for Erasable Programmable Read-Only Memory. It is a type of ROM that can be erased by exposing it to ultraviolet (UV) light. EPROM chips have a transparent window on the top that allows UV light to pass through. When the EPROM needs to be erased, the chip is taken out of the circuit and exposed to UV light for a specified amount of time. This erases the data stored in the EPROM, making it ready to be reprogrammed with new data.
2.
What socket does the CPU fit into? (1 or 3 words)
Correct Answer
ZIF
zero insertion force
Explanation
The CPU fits into a ZIF (Zero Insertion Force) socket. This type of socket allows for easy and secure installation of the CPU without applying excessive force. The CPU can be inserted or removed from the socket without any resistance or damage.
3.
What architecture uses a relatively small set of instructions which are designed to execute rapidly? (1 word)
Correct Answer
RISC
Explanation
RISC stands for Reduced Instruction Set Computer. It is an architecture that uses a relatively small set of instructions that are designed to execute rapidly. RISC processors typically have a simplified instruction set, which allows for faster execution of instructions. This architecture focuses on simplicity and efficiency, aiming to minimize the number of instructions needed to perform a task. By reducing the complexity of instructions, RISC processors can achieve faster processing speeds and improved performance.
4.
Which technique enhances the CPUs performance by executing multiple peices of code simultaneously on each pipeline?
Correct Answer
C. Hyperthreading
Explanation
Hyperthreading is a technique that enhances the CPU's performance by executing multiple pieces of code simultaneously on each pipeline. It allows the CPU to handle multiple threads or tasks at the same time, by creating virtual cores that share the resources of a physical core. This improves overall efficiency and can result in better performance, especially in situations where there are multiple threads or tasks running concurrently. CPU throttling, flashing the BIOS, and CISC are not related to the execution of multiple pieces of code simultaneously on each pipeline.
5.
Which circuit board holds SDRAM, DDR SDRAM and DDR2 SDRAM chips?
Correct Answer
D. DIMM
Explanation
DIMM stands for Dual In-line Memory Module, and it is the circuit board that holds SDRAM, DDR SDRAM, and DDR2 SDRAM chips. DIMM is a type of memory module commonly used in computers to provide additional RAM. It has a 64-bit data path and is available in different capacities. DIMM modules are inserted into the memory slots on the motherboard and provide faster data transfer rates compared to older memory modules like SIMM and DIP.
6.
What IEE standard is Firewire and how many devices can it support?
Correct Answer
B. 1394 and 63
Explanation
Firewire is a standard for high-speed data transfer and is also known as IEEE 1394. It can support up to 63 devices, allowing for multiple devices to be connected and communicate with each other simultaneously. The other option, IEEE 1284, is a standard for parallel ports used in printers and can support up to 127 devices. However, this is not the correct answer as the question specifically asks about Firewire.
7.
Computer components use ................. to request information from the CPU. The ............... travels along a wire on the motherboard to the CPU. When the CPU receives a .............., it determines how to fulfill this request. (1 or 2 words)
Correct Answer
IRQ
interrupt requests
interrupt request
IRQs
Explanation
Computer components use IRQ (Interrupt Request) to request information from the CPU. The interrupt request travels along a wire on the motherboard to the CPU. When the CPU receives an interrupt request, it determines how to fulfill this request.
8.
Which type of video connector has a 24 pin or 29 pin female connector and provides compressed digital output to a monitor?
Correct Answer
D. DVI
Explanation
DVI stands for Digital Visual Interface. It is a video connector that has a 24 pin or 29 pin female connector. DVI provides compressed digital output to a monitor, making it the correct answer for this question. HDMI, VGA, AAV, and RCA are all different types of video connectors, but they do not match the given description.
9.
How many conductors does a SATA cable have?
Correct Answer
7
seven
Explanation
A SATA cable has 7 conductors. Each conductor is responsible for carrying different types of signals such as data, power, and ground. These conductors ensure the proper functioning of the SATA cable and allow for the transfer of data between devices. Therefore, the correct answer is 7 or seven.
10.
What type of cache memory is external cache originally mounted on the motherboard near the CPU? (1 word)
Correct Answer
L2
Explanation
The correct answer for the question is L2. L2 cache, also known as secondary cache, is a type of cache memory that is originally mounted on the motherboard near the CPU. It is faster than the main memory (RAM) and is used to store frequently accessed data and instructions, reducing the time it takes for the CPU to access them. L2 cache is larger in size compared to L1 cache and provides a higher level of cache memory hierarchy.
11.
The operating system enables the user to interact with software and hardware. There are two types of user interfaces; which interface interacts with menus and icons? (1 or 3 words)
Correct Answer
GUI
graphical user interface
Explanation
The correct answer for this question is GUI, which stands for graphical user interface. The GUI allows the user to interact with software and hardware through menus and icons, providing a visual representation of the system's functions and options. It simplifies the user's experience by providing a more intuitive and user-friendly interface compared to command-line interfaces.
12.
This partition normally uses the remaining free space on a hard drive or takes the place of primary partition. There can be only one .................... .......................... per hard drive, and it can be subdivided into smaller sections called logical drives. (2 words)
Correct Answer
Extended partition
Explanation
An extended partition is a type of partition that is created when there is remaining free space on a hard drive or when it takes the place of a primary partition. Unlike primary partitions, there can only be one extended partition per hard drive. However, this extended partition can be subdivided into smaller sections called logical drives. Therefore, the correct answer to the question is "extended partition".
13.
What list provides a detailed inventory of hardware that has been tested and is known to work with the operating system?
Correct Answer
C. Hardware Compatibility List
Explanation
The Hardware Compatibility List is a comprehensive inventory of hardware that has been tested and proven to work with the operating system. It provides detailed information about the compatibility of various hardware components with the operating system, ensuring that users can choose compatible hardware for their system. The list helps users avoid compatibility issues and ensures a smooth and efficient functioning of the operating system with the hardware components.
14.
Which registry file contains information about the hardware and software in the computer system?
Correct Answer
B. HKEY_LOCAL_MACHINE
Explanation
HKEY_LOCAL_MACHINE is the correct answer because it is a registry file that contains information about the hardware and software in the computer system. This file stores configuration settings and preferences for all users on the computer, including system-wide settings, device drivers, and software installations. It is a crucial component of the Windows operating system and is used by various applications and services to access and modify system settings.
15.
NTFS can be converted back to FAT32 file system. (TRUE or FALSE)
Correct Answer
False
No
Explanation
NTFS and FAT32 are two different file systems used by Windows operating systems. While it is possible to convert a FAT32 file system to NTFS, it is not possible to convert NTFS back to FAT32 without reformatting the drive. Therefore, the statement that NTFS can be converted back to FAT32 is false. The answer "False" and "No" both indicate that the statement is incorrect.
16.
What is meant by a laptop device being hot-swappable?
Correct Answer
D. The laptop does not need to be powered off to install or remove the device
Explanation
A laptop device being hot-swappable means that it can be installed or removed from the laptop without having to power off the laptop. This allows for convenient and seamless installation or removal of the device, without interrupting the laptop's operation.
17.
What does ACPI stand for?
Correct Answer
Advanced configuration and power interface
Advanced configuration power interface
Explanation
ACPI stands for Advanced Configuration and Power Interface. It is a standard that defines a set of interfaces and protocols for the operating system to manage power consumption and configuration of hardware devices. It provides features such as power management, device configuration, and system control. The correct answer is "Advanced configuration and power interface" as it accurately represents the acronym and its purpose.
18.
Which items are hot-swappable on a laptop? (pick 2)
Correct Answer(s)
B. USB flash drive
D. Optical drive
Explanation
The two items that are hot-swappable on a laptop are the USB flash drive and the optical drive. Hot-swappable means that these devices can be connected or disconnected from the laptop while it is still running, without the need to restart the system. The hard drive, LCD screen, and RAM are not hot-swappable as they require the laptop to be powered off before they can be replaced or upgraded.
19.
The ............. .............. slot uses an open standard interface to connect to peripherals using the CardBus standard. (2 words)
Correct Answer(s)
PC card
Explanation
The PC card slot uses an open standard interface to connect to peripherals using the CardBus standard. The PC card slot is a hardware feature found in laptops and allows for the insertion of PC cards, which are credit card-sized devices that can be used to add functionality to the computer. These PC cards can include peripherals such as network adapters, sound cards, or memory expansion cards. The PC card slot uses the CardBus standard, which is an open standard interface that allows for high-speed data transfer between the PC card and the computer.
20.
What are the pin configurations for the PC ExpressCard? (pick 2)
Correct Answer(s)
A. 34-pin
D. 54-pin
Explanation
The PC ExpressCard has two pin configurations, which are 34-pin and 54-pin. These pin configurations refer to the number of pins or connectors on the ExpressCard. The 34-pin configuration is commonly used for ExpressCards that provide USB or FireWire functionality, while the 54-pin configuration is used for ExpressCards that offer additional features such as eSATA or PCI Express.
21.
In Windows XP, the ACPI power management mode must be enabled in BIOS to allow the OS to configure all the power management states. (TRUE or FALSE)
Correct Answer(s)
True
Yes
Explanation
In Windows XP, the ACPI power management mode needs to be enabled in BIOS for the operating system to configure all the power management states. This means that without enabling ACPI in BIOS, the OS will not be able to fully control and manage power settings and states on the computer. Therefore, the statement is true.
22.
What type of memory is used in laptops?
Correct Answer
C. SODIMM
Explanation
SODIMM stands for Small Outline Dual In-Line Memory Module. It is a type of memory module that is specifically designed for use in laptops and other small form factor computers. SODIMMs are smaller in size compared to regular DIMMs, making them suitable for compact devices like laptops. They are used to provide additional RAM (Random Access Memory) to the laptop, allowing it to run multiple programs and perform tasks more efficiently. Therefore, SODIMM is the correct answer for the type of memory used in laptops.
23.
Laptops processors use CPU .................................. to modify the clock speed to reduce power consumption and heat. (1 word)
Correct Answer
throttling
Explanation
Laptop processors use CPU throttling to modify the clock speed in order to reduce power consumption and heat. Throttling is a technique that allows the processor to dynamically adjust its clock speed based on the workload. By reducing the clock speed, the processor consumes less power and generates less heat, which helps in preventing overheating and extending battery life. Throttling is a common feature in modern laptops that helps in balancing performance and energy efficiency.
24.
Which type of cell phone standard uses the standard name GPRS (General Packet Radio Service)?
Correct Answer
B. 2.5G
Explanation
GPRS (General Packet Radio Service) is a mobile data standard that was introduced as an enhancement to the original 2G (second generation) cell phone standard. It provided faster data transfer rates compared to traditional 2G networks, allowing for basic internet browsing and email capabilities on mobile devices. Therefore, the correct answer is 2.5G.
25.
What would you use to clean a laptop screen?
Correct Answer
B. Isopropyl alcohol and water
Explanation
Isopropyl alcohol and water would be the best option to clean a laptop screen. This solution is effective in removing dirt, fingerprints, and smudges without causing damage to the screen. Trichloroethane solvent is not commonly used for cleaning laptop screens and can be harmful to the screen. Window cleaner and ammonia-based solvents may contain chemicals that can damage the screen.
26.
Documents and applications are saved to a temporary file on the hard drive, and it takes longer to power on. What type of power management is this? (1 word)
Correct Answer
hibernate
hibernation
hibernating
Explanation
The correct answer is hibernate, hibernation, hibernating. This type of power management is known as hibernation. When a computer is put into hibernation mode, all the documents and applications are saved to a temporary file on the hard drive. This allows the computer to power off completely, conserving energy. When the computer is powered on again, it takes longer to start up as it needs to restore the saved state from the temporary file.
27.
What is the easiest way to extend the life of a laptop and keep it in optimal working order?
Correct Answer
A. Clean the laptop regularly
Explanation
Regularly cleaning the laptop helps to remove dust, dirt, and debris from the device, preventing them from clogging the vents and causing overheating. This, in turn, helps to maintain the optimal working order of the laptop and extends its lifespan. By keeping the laptop clean, users can ensure that the internal components are not compromised by excessive heat, which can lead to hardware failure. Additionally, cleaning the laptop regularly can also improve its performance and prevent issues such as sluggishness or freezing.
28.
............ is the type of display technology used in laptops. (1or 3 words)
Correct Answer
LCD
liquid crystal display
Explanation
LCD stands for liquid crystal display, which is a type of display technology commonly used in laptops. LCD screens are made up of a layer of liquid crystals that can be manipulated to allow or block light, creating the images and colors that we see on the screen. This technology is known for its thinness, energy efficiency, and ability to produce high-quality images. Therefore, both LCD and liquid crystal display are correct answers for the type of display technology used in laptops.
29.
A user obtains a new laptop and reports that it does not fit into the existing docking station. What would be the most likely solution?
Correct Answer
C. Docking stations are proprietary. Verify that the user has a compatible model
Explanation
The correct answer is "Docking stations are proprietary. Verify that the user has a compatible model." This means that docking stations are not universal and are designed to work with specific models or brands of laptops. To solve the issue, it is important to check if the user's laptop is compatible with the docking station they are trying to use. If it is not compatible, alternative solutions such as finding a compatible docking station or using a different method for connecting the laptop to peripherals may need to be explored.
30.
How can you toggle between a connected desktop monitor and the laptop?
Correct Answer
B. Use the function key
Explanation
To toggle between a connected desktop monitor and a laptop, you can use the function key. The function key, often labeled as "Fn" on the keyboard, is designed to perform special functions when pressed in combination with other keys. On many laptops, there is a specific function key combination, such as Fn + F4 or Fn + F8, that allows you to switch between different display modes, including toggling between the laptop screen and an external monitor. By pressing the appropriate function key combination, you can easily switch the display output between the two screens.
31.
What print technology do laser printers use?
Correct Answer
B. ElectropHotograpHic
Explanation
Laser printers use electrophotographic print technology. This technology involves a laser beam that scans the surface of a drum or a photosensitive belt, creating an electrostatic image. The drum or belt is then coated with toner, which is attracted to the charged areas on the surface. Finally, the toner is transferred onto the paper and fused using heat to create the printed image. This process allows for high-quality and precise printing, making electrophotographic technology ideal for laser printers.
32.
The average length of time that a printer will work without failing is called the ................. (1 or 4 words)
Correct Answer
MTBF
mean time between failure
mean time between failures
Explanation
The correct answer for the given question is "MTBF" which stands for "mean time between failure". This term refers to the average length of time that a printer or any other system operates without experiencing a failure. It is a measure used to estimate the reliability and durability of a device, indicating how long it is expected to function before encountering a failure.
33.
In the laser print process, what is the phase called when the photosensitive drum is scanned with the laser beam?
Correct Answer
D. Writing
Explanation
The phase called "Writing" refers to the process in laser printing where the photosensitive drum is scanned with the laser beam. During this phase, the laser beam selectively charges the drum's surface to create an electrostatic image of the content to be printed. This image will later be developed and transferred onto the paper during subsequent stages of the printing process.
34.
A user has contacted the helpdesk and stated that their scanner is not scanning. They are using a SCSI connected scanner. What would you advise the user to do?
Correct Answer
B. Make sure the scanner is started before the computer
Explanation
The correct answer advises the user to make sure the scanner is started before the computer. This is because when using a SCSI connected scanner, it is important to ensure that the scanner is powered on and ready before the computer is turned on. This allows the computer to properly detect and communicate with the scanner. Starting the scanner before the computer can help resolve any issues related to the scanner not scanning.
35.
Some scanners can create text documents using ..................... software. (1 or 3 words)
Correct Answer
OCR
optical character recognition
Explanation
Some scanners have the capability to convert scanned documents into editable text documents using OCR (optical character recognition) software. OCR technology recognizes the text in the scanned image and converts it into machine-readable text, allowing users to edit, search, and manipulate the text as needed. This technology is particularly useful when dealing with printed documents that need to be digitized or converted into editable formats.
36.
A user complains that their system receives hundreds or thousands of junk e-mails daily. What could be the problem and how would you solve it?
Correct Answer
B. This may be a denial of service attack. At the e-mail server, filter out e-mail from the sender
Explanation
The correct answer suggests that the user's system is experiencing a denial of service attack, which is causing the influx of junk emails. To solve the problem, the recommendation is to filter out emails from the sender at the email server. By implementing this filtering mechanism, the user will be able to block the incoming junk emails and prevent them from overwhelming their system.
37.
.................. is a method of gaining access to resources on devices by pretending to be a trusted computer. (1 word)
Correct Answer
Spoofing
Explanation
Spoofing is a technique used to gain unauthorized access to resources on devices by impersonating a trusted computer. This involves creating a false identity or falsifying information to deceive the target system into granting access. Spoofing can occur in various forms, such as IP spoofing, email spoofing, or website spoofing. It is often employed by attackers to trick users or systems into disclosing sensitive information or performing unintended actions.
38.
A ................. .................... , like a worm, does not need to be attached to other software to infect a host. (2 words)
Correct Answer
trojan horse
Explanation
A trojan horse, like a worm, does not need to be attached to other software to infect a host. A trojan horse is a type of malicious software that appears to be legitimate but actually contains harmful code. It can enter a system disguised as a harmless file or program and once executed, it can perform various malicious activities without needing to attach itself to other software. This makes it similar to a worm, which is also a standalone malicious program capable of self-replication and spreading without the need for a host file.
39.
With ........... ...................... the user can control the type of data sent to a computer by selecting which ports will be open and which will be secure. (2 words)
Correct Answer
port protection
Explanation
Port protection refers to a security measure that allows the user to have control over the type of data being sent to a computer. By selecting which ports will be open and which will be secure, the user can effectively manage the flow of data and prevent unauthorized access or potential security threats. This feature ensures that only designated ports are accessible and helps safeguard the computer from potential vulnerabilities.
40.
A technician is attempting to secure a wireless network. Which 2 options should be performed to secure access to the network? (pick 2)
Correct Answer(s)
A. Change the default administrator passwork for all access points
D. Use MAC filtering
Explanation
To secure access to the wireless network, the technician should change the default administrator password for all access points. This ensures that unauthorized individuals cannot easily gain access to the network settings and make unauthorized changes. Additionally, using MAC filtering is recommended, as it allows the network to only accept connections from devices with specific MAC addresses. This adds an extra layer of security by restricting access to only trusted devices. By implementing these two measures, the technician can enhance the security of the wireless network.
41.
E-mail and text communications have a set of personal and business rules called ................. (1 word)
Correct Answer(s)
netiquette
Explanation
Netiquette refers to the set of personal and business rules that govern e-mail and text communications. It outlines proper behavior and guidelines for online communication, such as using appropriate language, avoiding spamming or flaming, and respecting others' privacy. Netiquette is essential for maintaining respectful and effective communication in the digital world.
42.
Which type of customer is the only type you should politely interrupt?
Correct Answer
C. Talkative
Explanation
The only type of customer that should be politely interrupted is a talkative customer. This is because talkative customers tend to dominate the conversation and may not allow the customer service representative to provide the necessary assistance or gather important information. By politely interrupting, the representative can steer the conversation back on track and ensure that all necessary information is obtained to address the customer's needs effectively.
43.
Information or data that is subject to ethical customs includes the following items?
Correct Answer
E. All of the above
Explanation
The correct answer is "All of the above". This is because all the listed items, including emails, records or data on the computer, telephone lists, and hard copies of files, can contain sensitive or personal information that is subject to ethical customs. It is important to handle and protect these items in accordance with ethical guidelines to ensure privacy and confidentiality.
44.
A .......................... is a contract that defines expectations between an organisation and the vendor to provide an agreed upon level of support. (1 or 3 words)
Correct Answer
SLA
Service level agreement
Service level agreements
SLAs
Explanation
A Service Level Agreement (SLA) is a contract that defines expectations between an organization and a vendor to provide an agreed upon level of support. It outlines the specific services to be provided, the quality standards that must be met, and the metrics that will be used to measure performance. The SLA ensures that both parties have a clear understanding of their responsibilities and helps to establish accountability for meeting the agreed upon service levels.
45.
You can make changes to the system software or hardware configuration without the customer's permission if they are unavailable and you are able to fix the problem. (TRUE or FALSE)
Correct Answer
false
no
Explanation
Making changes to system software or hardware configuration without the customer's permission is not ethical or recommended. It is important to respect the customer's ownership and privacy rights. Therefore, the statement is false.
46.
......................... ........................... is a regular and systematic inspection, cleaning and replacement of worn parts, materials and systems by ensuring that they are in good working order. (2 words)
Correct Answer
preventative maintenance
Explanation
Preventative maintenance refers to the regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems to ensure that they are in good working order. This practice aims to prevent any potential issues or breakdowns by addressing them before they become major problems. By conducting preventative maintenance, organizations can increase the lifespan of their equipment, reduce the risk of unexpected failures, and improve overall efficiency and productivity.
47.
Which common tasks are carried out during preventative maintenance? (pick 3)
Correct Answer(s)
A. Check and secure loose cables
C. Clean the mouse and keyboard
D. Update drivers
Explanation
During preventative maintenance, three common tasks that are carried out include checking and securing loose cables, cleaning the mouse and keyboard, and updating drivers. Checking and securing loose cables ensures proper connectivity and prevents any potential issues caused by loose connections. Cleaning the mouse and keyboard helps to remove dirt, dust, and debris, ensuring smooth and efficient operation. Updating drivers ensures that the hardware devices on the system are running with the latest software, improving performance and compatibility.
48.
What would you include on a software maintenance schedule? (pick 3)
Correct Answer(s)
B. Review software updates
C. Review security patches
E. Defragment the hard drive
Explanation
A software maintenance schedule should include reviewing software updates to ensure that the software is up to date with the latest features and bug fixes. Reviewing security patches is also important to address any vulnerabilities and protect the system from potential threats. Additionally, defragmenting the hard drive helps to optimize the system's performance by organizing fragmented data. Therefore, including these three tasks on a software maintenance schedule is essential for keeping the software running smoothly and securely.
49.
When system, user, or software errors occurs on a computer, the ............... ................. is updated with the information about the errors. (2 words)
Correct Answer(s)
event viewer
Explanation
When errors occur on a computer, the event viewer is updated with information about these errors. The event viewer is a built-in Windows tool that logs and displays system, user, and software events, including errors. It provides a detailed record of events that occur on the computer, allowing users and administrators to analyze and troubleshoot issues effectively.
50.
Where would you check on your computer to see if all your devices are working correctly? (2 words)
Correct Answer(s)
device manager
in device manager
the device manager
Explanation
The correct answer is "device manager". The device manager is a tool in the computer's operating system that allows users to view and manage all the hardware devices connected to their computer. It provides information about the status and functionality of each device, including any errors or issues that may be present. By checking the device manager, users can determine if all their devices are working correctly and troubleshoot any problems that may arise.