1.
What is the first question a computer technician should ask a user that is having issues with a software application after receiving a help desk request by phone or email?
Correct Answer
B. May I please have your name and pHone number?
Explanation
The first question a computer technician should ask a user that is having issues with a software application after receiving a help desk request by phone or email is "May I please have your name and phone number?" This is because it is important for the technician to have the user's contact information in order to provide assistance and follow up if needed. Rebooting the computer and asking about the computer's brand are troubleshooting steps that may come later in the conversation, but gathering the user's information is the first priority.
2.
If you're diagnosing an issue with a printing issue, what is the first step in diagnosing the problem?
Correct Answer
C. Ask the user if the printer is turned on.
Explanation
The first step in diagnosing a printing issue is to ask the user if the printer is turned on. This is because if the printer is not turned on, it will not be able to perform any printing tasks. By confirming if the printer is turned on, it helps to identify if the issue is simply a matter of power supply.
3.
A client calls and exclaims they have forgotten their password. What is your first action to resolve the issue?
Correct Answer
C. Positively identify the user's identity.
Explanation
The first action to resolve the issue of a client forgetting their password is to positively identify the user's identity. This is important in order to ensure that the person requesting the password reset is indeed the legitimate user and not someone trying to gain unauthorized access to the system. By verifying the user's identity, the support staff can proceed with the appropriate steps to reset the password and provide access to the client.
4.
Based on the previous question, "a client calls and exclaims they have forgotten their password." What is your second action to resolve the issue?
Correct Answer
D. Determine if the user is logging into a local machine, domain or web application
Explanation
The second action to resolve the issue of a client forgetting their password is to determine if the user is logging into a local machine, domain, or web application. This step is important in order to understand the specific context and system that the user is trying to access. It will help in providing the appropriate instructions or assistance to reset the password and regain access to the system.
5.
Based on the previous question, "a client calls and exclaims they have forgotten their password." What is your third action to resolve the issue?
Correct Answer
A. Remotely login to the system and reset the users password
Explanation
The third action to resolve the issue is to remotely login to the system and reset the user's password. This is the most efficient and convenient way to assist the client in regaining access to their account. By remotely logging in, the support personnel can quickly reset the password without the need to physically visit the site or rely on the user's ability to accurately identify their identity. This action ensures a prompt resolution to the problem and minimizes any inconvenience caused to the client.
6.
70% of all system issues can be resolved remotely!
Correct Answer
A. True
Explanation
70% of all system issues can be resolved remotely. This means that a majority of problems that occur in a system can be fixed without the need for physical intervention or on-site support. This is beneficial as it saves time, resources, and costs associated with dispatching technicians to the location. Remote resolution also allows for faster response times and minimizes downtime, ensuring efficient problem-solving. Therefore, the statement "True" indicates that a significant portion of system issues can indeed be resolved remotely.
7.
Which of the following is not an internet browser?
Correct Answer
D. Thunderbird
Explanation
Thunderbird is not an internet browser. It is actually an email client developed by Mozilla, which allows users to send, receive, and manage their email accounts. While Safari, Firefox, and Opera are all popular internet browsers used to access and navigate the internet, Thunderbird is specifically designed for email communication rather than browsing websites.
8.
Bandwidth
Correct Answer
B. A measurement of how much information can be carried in a given time period (usually a second) over a wired or wireless communications link.
Explanation
Bandwidth refers to the measurement of how much information can be carried in a given time period, typically a second, over a wired or wireless communications link. It represents the capacity or speed at which data can be transferred from the server to the client. This term is commonly used to describe the capacity of an internet connection, indicating the amount of data that can be transmitted within a specific timeframe.
9.
Download
Correct Answer
D. When data is received on your PC. This includes, but is not limited to, viewing webpages, receiving e-mail, watching videos, getting movies, getting music and email attachments.
Explanation
The correct answer explains that a download refers to the process of receiving data on your PC. This can include various activities such as viewing webpages, receiving emails, watching videos, downloading movies or music, and receiving email attachments. The answer does not provide any additional information or context about downloads.
10.
Ping
Correct Answer
B. A computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self test the Network Interface Card (NIC) of the computer.
Explanation
The answer is a computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self-test the Network Interface Card (NIC) of the computer. This is because the term "Ping" is commonly used in computer networking to refer to the act of sending a small packet of data from one computer to another and measuring the time it takes for the packet to be sent and received. This helps in determining the connectivity and latency between the two devices. Additionally, the mention of testing the NIC further reinforces the network testing aspect of "Ping".
11.
What is the function of this device?
Correct Answer
C. It is used to store large amounts of data in a computer system, data is retained on this device even when the computer is turned off.
Explanation
The correct answer is that the device is used to store large amounts of data in a computer system, and the data is retained on this device even when the computer is turned off. This suggests that the device being referred to is a secondary storage device, such as a hard disk drive or solid-state drive, which is used to store data for long-term use. Unlike temporary storage devices like RAM, the data stored on this device is not lost when the computer is powered off.
12.
This is a measurement of speed over a network.
Correct Answer
D. Megabits per second.
Explanation
Megabits per second is the correct answer because it is a common unit used to measure the speed of data transfer over a network. Megabits per second (Mbps) refers to the amount of data that can be transmitted in one second, with one megabit equal to one million bits. This unit is commonly used to describe internet connection speeds and is a standard measurement in the field of networking.
13.
What is this computer component?
Correct Answer
C. Chassis
Explanation
The correct answer is "Chassis". A chassis is the physical frame or enclosure that holds and protects the internal components of a computer. It provides structural support and houses components such as the motherboard, hard drive, and CPU.
14.
What is this device?
Correct Answer
A. Wireless Router
Explanation
A wireless router is a device that allows multiple devices to connect to the internet wirelessly. It acts as a central hub for the network, transmitting data between the internet and the connected devices. Unlike a modem, which only connects to the internet, a wireless router also provides a local network for devices to communicate with each other. A video card is a component in a computer that processes and renders images and videos. A motherboard is the main circuit board of a computer, connecting all the components together.
15.
What is this computer component?
Correct Answer
B. CPU
Explanation
The correct answer is CPU. The CPU, or Central Processing Unit, is a computer component responsible for executing instructions and performing calculations. It is often referred to as the "brain" of the computer, as it carries out the majority of the processing tasks. RAM, Hard Disk, and Motherboard are also computer components, but they serve different functions. RAM is responsible for temporarily storing data that the CPU needs to access quickly, while the Hard Disk stores data for long-term storage. The Motherboard is the main circuit board that connects all the components of the computer together.
16.
Which is not an operating system?
Correct Answer
C. MS-Word
Explanation
MS-Word is not an operating system. It is a word processing software developed by Microsoft. Operating systems are software that manage computer hardware and software resources and provide common services for computer programs. DOS, Windows, and LINUX are examples of operating systems.
17.
The brain of the computer. This part does the calculation, moving and processing of information.
Correct Answer
A. CPU
Explanation
The CPU, or Central Processing Unit, is often referred to as the brain of the computer because it is responsible for executing instructions, performing calculations, and processing data. It carries out all the necessary tasks to run programs and operate the computer system. The CPU is the component that performs the actual processing of information, making it a vital part of the computer's functionality.
18.
What is this computer component?
Correct Answer
D. Network Interface Card
Explanation
A network interface card (NIC) is a computer component that allows a computer to connect to a network. It provides the necessary hardware and software to establish a network connection, enabling the computer to send and receive data over the network. NICs are commonly used in desktop computers, laptops, and servers to connect to local area networks (LANs) or the internet. They typically have an Ethernet port or a wireless adapter, depending on the type of network connection required.
19.
What does "www" stand for?
Correct Answer
C. World Wide Web
Explanation
The correct answer is "World Wide Web." The term "www" stands for World Wide Web, which is a system of interconnected documents and other resources, linked by hyperlinks and URLs. It is a global information space where users can access and share information through websites and webpages.
20.
What is the shortcut for PASTE?
Correct Answer
B. Ctrl + V
Explanation
The shortcut for PASTE is Ctrl + V. This combination of keys is commonly used to paste copied or cut content into a document or program. It is a widely recognized shortcut across various operating systems and software applications.
21.
A modem is best defined as...
Correct Answer
A. A device that allows you to connect your PC to to an internet service.
Explanation
A modem is a device that enables you to establish a connection between your computer and an internet service provider. It acts as a bridge between your computer and the internet, allowing you to send and receive data over the internet. By connecting your PC to the modem, you can access various online services, browse the web, and communicate with others through email, chat, or video calls.
22.
Which of the following programs is not an email client.
Correct Answer
C. Mozilla Firefox
Explanation
Mozilla Firefox is not an email client. It is a web browser developed by Mozilla Foundation. While Microsoft Outlook 2003, Windows Live Mail, and Outlook Express 6 are email clients used for managing and sending emails, Mozilla Firefox is primarily used for browsing websites and accessing online content.
23.
Select the URL from the list below.
Correct Answer
B. Http://www.yahoo.com
ExplanationThe correct answer is http://www.yahoo.com because it is the only option that is a valid URL. The other options are an email address (
[email protected]), a file path (D:\downloads\standard), and an IP address (192.168.0.1), which are not URLs.
24.
Select the 3 graphics files from the list below.
Correct Answer(s)
B. Untitled.jpg
C. Untitled.bmp
E. Untitled.tiff
Explanation
The correct answer is to select the graphics files from the list. The files with the extensions .jpg, .bmp, and .tiff are commonly used for storing images and graphics. Therefore, selecting untitled.jpg, untitled.bmp, and untitled.tiff would be the appropriate choice as they are the graphics files from the given list.
25.
Which operating system was the successor to Windows 98?
Correct Answer
C. Windows ME
Explanation
Windows ME, which stands for Windows Millennium Edition, was the successor to Windows 98. Windows ME was released in 2000 and was designed for home users, with improvements in multimedia and internet capabilities. It introduced features such as System Restore, Windows Movie Maker, and Windows Media Player 7. Although Windows ME was not as successful as its predecessor, it played a significant role in the evolution of the Windows operating system.
26.
One MB is equal to...
Correct Answer
D. 1024KB
Explanation
One MB is equal to 1024KB. In computer systems, memory is often measured in bytes, with kilobytes (KB) and megabytes (MB) being common units. The prefix "kilo" represents 1000, so 1 kilobyte is equal to 1000 bytes. However, in binary systems, memory is often measured in powers of 2, so 1 kilobyte is considered to be 1024 bytes. Therefore, 1 megabyte is equal to 1024 kilobytes, or 1024KB.
27.
Which one is not an output device?
Correct Answer
D. Keyboard
Explanation
An output device is a device that displays or presents information to the user. In this question, the options given are Printer, Monitor, Modem, and Keyboard. Printer and Monitor are both examples of output devices as they produce visual or printed output. Modem, on the other hand, is a communication device used to connect to the internet and is not primarily used for outputting information. However, the Keyboard is an input device as it is used to input data or commands into a computer rather than displaying or presenting information. Therefore, the correct answer is Keyboard.
28.
Which one of the following best defines the term Operating System?
Correct Answer
D. All of the above.
Explanation
The term Operating System refers to the software that allows computer users to run applications with the hardware of a specific system. It is also the master control program that manages a computer's internal functions and provides a means of control to the computer's operations and file system. Additionally, it is the software that manages the hardware and software interface of a computer. Therefore, all of the given options accurately define the term Operating System.
29.
Malware is best defined as...
Correct Answer
C. Software designed to infiltrate or damage a computer system without the owner's informed consent.
Explanation
Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. This can include viruses, worms, Trojans, ransomware, adware, and other malicious programs. Its purpose is to gain unauthorized access to sensitive information, disrupt computer operations, or cause harm to the system or its users. It is important to have security measures in place to protect against malware, such as using antivirus software, regularly updating software, and being cautious when downloading or clicking on suspicious links.
30.
An IP address is best defined as...
Correct Answer
A. An IP Address is a unique number consisting of 4 parts separated by dots (eg: 217.247.84.89) asociated with every system connected to a network
Explanation
An IP address is a unique numerical identifier assigned to each device connected to a network. It consists of four parts separated by dots, such as 217.247.84.89. This address allows devices to communicate with each other on the internet. It is not related to the location of internet packets or the address of an internet provider. Therefore, the correct answer is that an IP address is a unique number associated with every system connected to a network.
31.
The internet was invented by
Correct Answer
B. The US Department of Defense
Explanation
The correct answer is the US Department of Defense. The internet was initially developed by the US Department of Defense in the 1960s as a means of communication and information sharing between different military organizations. It was called ARPANET and later evolved into the internet that we know today. Bill Gates, Steve Jobs, and Albert Einstein are not directly associated with the invention of the internet.
32.
what is a network repeater?
Correct Answer
B. A network repeater is a device used to expand the boundaries of a wired or wireless (WiFi) local area network (LAN).
Explanation
A network repeater is a device that is used to extend the range of a wired or wireless local area network (LAN). It receives the network signal and amplifies it before transmitting it again, effectively increasing the coverage area of the network. This allows devices that are located far from the main network source to connect and communicate with the network. By repeating and boosting the signal, a network repeater helps to improve the overall network performance and connectivity.
33.
how many layers are there in the OSI model
Correct Answer
D. 7
Explanation
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role in the process of transmitting data across a network. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Therefore, the correct answer is 7.
34.
which are layers in the OSI model
Correct Answer
A. Application layer , presentation layer and pHysical layer
Explanation
The correct answer is application layer, presentation layer, and physical layer. These three layers are part of the OSI model, which is a conceptual framework that standardizes the functions of a communication system. The application layer is responsible for providing services to the user, such as email or file transfer. The presentation layer ensures that data is properly formatted and encrypted. The physical layer deals with the actual transmission of data through physical media, such as cables or wireless signals.
35.
The presentation layer is which layer?
Correct Answer
B. 6
Explanation
The correct answer is 6. In the OSI model, the presentation layer is the sixth layer. This layer is responsible for the formatting and presentation of data to be transmitted between the application layer and the session layer. It ensures that data is properly encoded and formatted so that it can be understood by the receiving system. The presentation layer also handles encryption and decryption of data for secure communication.
36.
what is the function of a Gateway?
Correct Answer
A. Is enabling connection to other networks
Explanation
A gateway is a networking device that enables connection to other networks. It acts as an entry and exit point for data packets between different networks. It helps in directing traffic by routing data packets to their intended destination. It also performs protocol conversions and ensures compatibility between different networks. By enabling connection to other networks, a gateway allows devices on one network to communicate with devices on another network, facilitating data transfer and communication between different networks.
37.
What does WAP stand for
Correct Answer
B. Wireless access point
Explanation
WAP stands for "wireless access point." A wireless access point is a device that allows wireless devices to connect to a wired network. It acts as a bridge between wireless devices and the network, providing wireless connectivity to devices such as laptops, smartphones, and tablets.
38.
What does a network bridge do?
Correct Answer
A. Connects multiple network segments at the data link layer (layer 2) of the OSI model
Explanation
A network bridge is a device or software that connects multiple network segments at the data link layer (layer 2) of the OSI model. It allows different network segments to communicate with each other by forwarding data packets between them. By doing so, it effectively extends the network and enables devices on different segments to communicate as if they were on the same network. This helps to improve network performance, increase network capacity, and enhance network flexibility.
39.
What does ISDN stand for?
Correct Answer
B. Intergrated services digital network
Explanation
ISDN stands for Integrated Services Digital Network. It is a telecommunications network that enables the transmission of voice, data, video, and other network services over traditional copper telephone lines. ISDN provides faster and more reliable connections compared to analog systems, allowing for simultaneous voice and data transmission. It has been widely used for internet access, video conferencing, and other communication services.
40.
What are the four types of networks?
Correct Answer
A. Bus Ring Star Mesh
Explanation
The correct answer is Bus Ring Star Mesh. These are the four types of network topologies commonly used in computer networking. A bus network consists of a single cable that connects all devices in a linear fashion. A ring network forms a closed loop where each device is connected to two other devices. A star network has a central hub or switch that connects all devices. And a mesh network has multiple connections between devices, creating a redundant and fault-tolerant network.
41.
What are router, modem and Wap types of ?
Correct Answer
D. Interconnecting devices
Explanation
The given answer, "interconnecting devices," is a suitable explanation for the question. It implies that a router, modem, and WAP are all types of devices that facilitate the connection and communication between different networks or devices. These interconnecting devices play a crucial role in establishing and maintaining network connections, allowing data to be transmitted and received efficiently.
42.
The two built-in user accounts that are created on a Windows Server 2008 computer are the Administrator account and the __________ account.
Correct Answer
D. Guest
Explanation
On a Windows Server 2008 computer, the two built-in user accounts are the Administrator account and the Guest account. The Guest account is a limited account that allows temporary access to the system for users who do not have a regular user account. It has restricted permissions and is typically used for temporary or occasional users who need to access the system without full privileges.
43.
__________ groups are a collection of user accounts that are local to one specific workstation or member server.
Correct Answer
B. Local
Explanation
Local groups are a collection of user accounts that are specific to one particular workstation or member server. These groups are used to manage access and permissions on that specific machine. They are not distributed across a network or domain, but rather limited to the local environment. Local groups are typically used to grant or deny access to resources on a single machine, making them an important tool for managing security and user accounts within a specific workstation or server.
44.
What special identity group is used as a reduced-privilege account to allow applications to run on a server without requiring administrative access?
Correct Answer
C. Network Service
Explanation
The special identity group used as a reduced-privilege account to allow applications to run on a server without requiring administrative access is "Network Service." This account is specifically designed for running services and processes in a secure manner, with limited permissions to ensure the safety and integrity of the server. It provides the necessary access for network-related tasks while minimizing the risk of unauthorized access or system damage.
45.
What is a credit card–sized or token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise?
Correct Answer
D. Smart card
Explanation
A smart card is a credit card-sized or token-style device that is used with a PIN to enable logon to the enterprise. It is a secure method of authentication that stores and processes data on an embedded microchip. The smart card provides an extra layer of security by requiring both the physical card and the correct PIN to gain access, making it difficult for unauthorized users to impersonate someone else.
46.
What command-line tool can be used with a standard user account to reduce the risks associated with the Administrator account?
Correct Answer
A. Runas
Explanation
The command-line tool "runas" can be used with a standard user account to reduce the risks associated with the Administrator account. This tool allows a user to run specific commands with different user credentials, such as running administrative tasks without actually logging in as the Administrator. By using "runas", the standard user can perform necessary administrative tasks while minimizing the exposure and potential risks associated with the more powerful Administrator account.
47.
What policies can be used to ensure that users always have the latest versions of applications?
Correct Answer
B. Software installation
Explanation
Software installation is the correct answer because it allows users to always have the latest versions of applications. By regularly updating and installing software on users' devices, organizations can ensure that users have access to the most up-to-date features and security patches. This can be done through various methods such as automatic updates, centralized software deployment, or using software distribution tools.
48.
What Microsoft Management Console (MMC) snap-in is used to create and modify Group Policies and their settings?
Correct Answer
D. Group Policy Management Console
Explanation
The Group Policy Management Console is the correct answer because it is the MMC snap-in used to create and modify Group Policies and their settings. This tool allows administrators to manage Group Policy objects (GPOs) across an Active Directory domain. It provides a centralized interface for configuring and deploying Group Policies, making it easier to manage and control the security and configuration settings for multiple users and computers in a network environment.
49.
Which of the following is not a type of GPO?
Correct Answer
B. Advanced GPO
Explanation
The answer is "advanced GPO" because it is not a recognized type of Group Policy Object (GPO). GPOs are used in Windows operating systems to manage various settings and configurations for groups of computers or users. The recognized types of GPOs are local GPO, domain GPO, and starter GPO. However, "advanced GPO" is not a commonly used or recognized term in the context of GPOs.
50.
What term refers to tracking events that take place on the local computer?
Correct Answer
D. Auditing
Explanation
The term "auditing" refers to tracking events that take place on the local computer. Auditing involves monitoring and recording activities such as file access, logins, system changes, and other events to ensure compliance, security, and accountability. It helps to identify any unauthorized or suspicious activities, detect potential security breaches, and maintain the integrity of the system.