1.
One of your users needs to save large files does not want to fill up the local hard drive. What is the best option to offer the user in this case?
Correct Answer
C. Purchase removable media for the user.Â
Explanation
Removable media helps us to save data.
2.
In Windows XP Professional, the Typical network settings enables all except for one of the following choices. Select the option that is not enabled :
Correct Answer
B. Configuring a Static IP address
Explanation
The Typical network settings in Windows XP Professional enable all options except for configuring a static IP address. This means that when selecting the Typical network settings, the user will not be able to manually set a specific IP address for their network connection. Instead, the network settings will be automatically configured using DHCP (Dynamic Host Configuration Protocol) to obtain an IP address dynamically from a DHCP server.
3.
Which is not an operating system?
Correct Answer
C. MS-Word
Explanation
MS-Word is not an operating system because it is a word processing software developed by Microsoft. It is used for creating, editing, and formatting documents. Operating systems, on the other hand, are software that manage computer hardware and software resources, provide services for computer programs, and act as an intermediary between the user and the computer hardware. Examples of operating systems include DOS, Windows, and LINUX.
4.
You work as a desktop support technician at TecheXams.ws. The TecheXams.ws network consists of a single Active Directory domain named techeXams.ws. TecheXams.ws purchases a new client computer named TECHEXAMS-WS680. You have been instructed to perform an automated installation of Microsoft Windows 7 on TECHEXAMS-WS680 using the Microsoft Windows 7 DVD. What should you do?Â
Correct Answer
D. You should consider creating an answer file named autounattend.xml and copying it to a removable drive.
5.
What is this computer component?
Correct Answer
A. RAMÂ Â
Explanation
RAM stands for Random Access Memory, which is a computer component responsible for temporarily storing data that the computer is actively using. It provides quick access to data, allowing the CPU to retrieve and process information quickly. Unlike the hard disk, which stores data permanently, RAM is volatile and loses its contents when the computer is powered off. The motherboard is the main circuit board that connects all the components of a computer, and the CPU (Central Processing Unit) is the "brain" of the computer, responsible for executing instructions and performing calculations.
6.
Identify the two true statements about host names in Windows XP Professional
Correct Answer(s)
C. A host can have more than one name
E. The NETBIOS name of a host changes when the host name changes
Explanation
A host can have more than one name, meaning that a computer can be identified by multiple host names in Windows XP Professional. Additionally, the NETBIOS name of a host changes when the host name changes, indicating that when the host name is modified, the NETBIOS name associated with it also changes.
7.
A modem is best defined as...
Correct Answer
A. A device that allows you to connect your PC to to an internet service.
Explanation
A modem is a device that enables the connection between a computer and an internet service. It serves as a bridge, converting the digital signals from the computer into analog signals that can be transmitted over telephone lines or cable lines. This allows the computer to access the internet and communicate with other devices on the network.
8.
In Windows XP, which disk properties can you view with Disk Management? (check 3 Answers)
Correct Answer(s)
B. The used and available disk space Â
C. Compression that's been applied to the drive.
D. Whether the drive should be indexed. E.
Explanation
In Windows XP, Disk Management allows users to view three disk properties. Firstly, users can view the used and available disk space, which provides information about the amount of storage being utilized and the amount of storage that is still available. Secondly, users can view the compression that has been applied to the drive, which indicates whether the drive has been compressed to save disk space. Lastly, users can view whether the drive should be indexed, which determines whether the drive's contents should be included in the search index.
9.
This is a measurement of speed over a network.
Correct Answer
D. Megabits per second.
Explanation
The given options include units of data storage (Megabytes), units of frequency (Megahertz), and units of data transfer rate (Bits and Megabits per second). Since the question is asking for a measurement of speed over a network, the correct answer is Megabits per second. This unit represents the rate at which data can be transmitted or received over a network, indicating the speed of the network connection.
10.
You work as a desktop support technician at TecheXams.ws. The TecheXams.ws network consists of a single Active Directory domain named techeXams.ws. The TecheXams.ws network contains both desktop and laptop workstations. You are responsible for managing a desktop workstation named TECHEXAMS-WS620. TECHEXAMS-WS620 is configured to run Windows Vista. You install Windows 7 on a new partition on TECHEXAMS-WS620 but you want Windows Vista to be booted by default on TECHEXAMSWS620 and not Windows 7. What should you do?
Correct Answer
A. You should consider running Bcdedit.exe and specifying the /default parameter
Explanation
By running Bcdedit.exe and specifying the /default parameter, you can set the default operating system that will be booted on TECHEXAMS-WS620. In this case, you would specify Windows Vista as the default operating system, ensuring that it is booted by default instead of Windows 7.
11.
Which of the following is not an internet browser?
Correct Answer
B. Thunderbird
Explanation
Thunderbird is not an internet browser, it is an email client developed by Mozilla. It is used for managing email accounts and sending/receiving emails, but it does not have the capability to browse the internet like the other options listed (Opera, Safari, and Firefox) which are all popular web browsers.
12.
Identify three possible ways to use the Device Manager to troubleshoot a malfunctioning system. (Check 3 Answers)
Correct Answer(s)
A. The Device Manager can identify resource conflicts.
C. The Device Manager can identify devices that are not functioning
D. The Device Manager will remove identify and remove conflicting devices
Explanation
The Device Manager can identify resource conflicts by detecting if two or more devices are trying to use the same resources, such as the same IRQ or memory address. This can help troubleshoot issues that arise from resource conflicts.
The Device Manager can identify devices that are not functioning properly by displaying a yellow exclamation mark or a red X next to the device. This indicates that there is a problem with the device driver or the device itself.
The Device Manager can remove and identify conflicting devices by allowing the user to disable or uninstall devices that are causing conflicts. This can help resolve issues caused by incompatible or conflicting devices.
13.
You are the administrator for a computer that has several hard disks. For optimal performance on this computer, where should the paging file reside?
Correct Answer
D. The paging file should reside on a disk that does not contain the operating system.
Explanation
The paging file should reside on a disk that does not contain the operating system because it helps improve performance by reducing disk I/O conflicts. Placing the paging file on a separate disk allows for concurrent read and write operations, preventing the paging file from competing with the operating system and other system files for disk access. This helps to optimize the overall performance of the computer.
14.
Malware is best defined as...
Correct Answer
C. Software designed to infiltrate or damage a computer system without the owner's informed consent.
Explanation
Malware refers to software that is specifically created to infiltrate or harm a computer system without the knowledge or consent of the owner. This can include various types of malicious software such as viruses, worms, Trojans, ransomware, spyware, and adware. The purpose of malware is to exploit vulnerabilities in a computer system, steal sensitive information, disrupt normal operations, or gain unauthorized access. It is important to have effective security measures in place to detect and prevent malware infections.
15.
What does "www" stand for?
Correct Answer
C. World Wide Web
Explanation
The term "www" stands for "World Wide Web." This is the commonly used term to refer to the system of interconnected hypertext documents accessed through the internet. The World Wide Web allows users to navigate through websites and access information from around the world.
16.
The brain of the computer. This part does the calculation, moving and processing of information.
Correct Answer
A. CPU
Explanation
The CPU, or Central Processing Unit, is often referred to as the brain of the computer because it is responsible for performing all the calculations, moving and processing of information. It is the component that executes instructions, performs arithmetic and logical operations, and manages data flow between different parts of the computer system. Without the CPU, the computer would not be able to perform any tasks or process any data.
17.
Which one of the following best defines the term Operating System?
Correct Answer
D. All of the above.
Explanation
The term "Operating System" can be defined as all of the above options. It refers to the software that allows computer users to run applications with the hardware of a specific system, it is the master control program that manages a computer's internal functions and provides control to the computer's operations and file system, and it also manages the hardware and software interface of a computer. Therefore, all of these options accurately define the term Operating System.
18.
Download
Correct Answer
D. When data is received on your PC. This includes, but is not limited to, viewing webpages, receiving e-mail, watching videos, getting movies, getting music and email attachments.
Explanation
The correct answer explains that the term "download" refers to the process of receiving data on your PC. This can include various activities such as viewing webpages, receiving emails, watching videos, getting movies, getting music, and downloading email attachments. The answer does not mention the other options provided in the question, which are unrelated to the definition of downloading.
19.
You have updated a device driver for a computer running Windows XP Professional, but you now experience system problems. What should you do to correct the problem?
Correct Answer
C. Roll back the device driver you installed to the previous driver.
Explanation
To correct the system problems caused by the updated device driver, you should roll back the driver to the previous version. This will revert the driver back to its previous state and potentially resolve the issues that arose after the update. Restarting the computer may not necessarily fix the problem, removing and reinstalling the updated driver could potentially cause further complications, and using the Add Hardware Wizard may not be necessary if the driver rollback resolves the problem.
20.
The internet was invented by
Correct Answer
B. The US Department of Defense
Explanation
The correct answer is The US Department of Defense. The internet was originally developed by the US Department of Defense in the 1960s as a means of communication and information sharing between military organizations. It was initially called ARPANET and later evolved into the internet that we know today. Bill Gates, Steve Jobs, and Albert Einstein are not credited with inventing the internet.
21.
You believe that a memory module in a computer has gone bad. How can you test this using Windows XP Professional?
Correct Answer
A. Use the /maxmem:n switch in the boot.ini to indicate how much memory should be loaded. The computer will report discrepancies when it reboots.
Explanation
By using the /maxmem:n switch in the boot.ini file, the user can specify the maximum amount of memory that should be loaded during the computer's boot process. If a memory module is indeed faulty, the computer may encounter discrepancies or errors when it reboots. This method helps to isolate and identify any potential issues with the memory module.
22.
What information is needed to securely log on to a computer?
Correct Answer
C. Username and password
Explanation
To securely log on to a computer, the essential information needed is a username and password. These credentials act as a form of authentication, ensuring that only authorized individuals can access the computer. The username identifies the specific user, while the password serves as a secret code or passphrase that verifies the user's identity. By requiring both pieces of information, it adds an extra layer of security to protect sensitive data and prevent unauthorized access. The other options mentioned, such as a license key, IP-number and URL, or credit card number, are not typically used for computer logins and are unrelated to the authentication process.
23.
You work as a desktop support technician at TecheXams.ws. The TecheXams.ws network consists of a single Active Directory domain named techeXams.ws. The client computers on the TecheXams.ws network run a mix of Windows 2000 Professional with Service Pack 5 (SP5), Windows XP Professional with Service Pack 3 (SP3), Windows Vista Business and Windows Ultimate. You have received instructions to upgrade some of the client computers to Windows 7 Professional. What should you do?
Correct Answer
C. You should consider upgrading the Microsoft Windows Vista Business computers to Windows 7 Professional.
24.
You have several Windows XP Professional installations to perform. You wish to create an answer file. The easiest way to do this is to use which wizard?
Correct Answer
C. The Setup Manager Wizard Â
Explanation
The Setup Manager Wizard is the easiest way to create an answer file for performing multiple Windows XP Professional installations. This wizard provides a step-by-step interface that allows users to customize and automate the installation process by specifying various settings and configurations. It simplifies the process of creating an answer file by guiding users through the necessary steps and options.
25.
One MB is equal to...
Correct Answer
D. 1024KBÂ Â
Explanation
The correct answer is 1024KB because in the binary system, 1 kilobyte (KB) is equal to 1024 bytes. Therefore, one megabyte (MB) is equal to 1024 kilobytes, or 1024 times 1024 bytes, which is 1,048,576 bytes.
26.
Which statement is true about the NTFS file system?
Correct Answer
B. Once you have converted a FAT32 file system to NTFS, you may not convert it back to FAT32 without reformatting the volume Â
27.
You work as the desktop support technician at TecheXams.ws. The TecheXams.ws network consists of a single Active Directory domain named techeXams.ws. You need to perform a clean installation of Microsoft Windows 7 Professional on the workstations in the Research department. All workstations in the Research department have identical hardware as listed below: o 1.1.2 GHz Dual-Core processor. o 2.1024 MB of RAM. o 3.20 GB hard drive. o 4.DirectX 10 video display card. o 5.Integrated sound card. 6.10/100 integrated network adapter. You need to ensure that the workstations able to support Windows 7 and are able to support Windows XP mode. What should you do? (Each correct answer presents part of the solution. Choose two.
Correct Answer(s)
B. You should upgrade the RAM. Â
D. You should upgrade the hard driveÂ
Explanation
The workstations in the Research department need to support both Windows 7 and Windows XP mode. To ensure this, upgrading the RAM is necessary as Windows 7 requires a minimum of 1 GB of RAM and Windows XP mode requires an additional 512 MB of RAM. Upgrading the hard drive is also necessary as the current 20 GB hard drive may not have enough space to accommodate both operating systems and other software.
28.
You would like to look at the network configuration for a host on which you are working. What is the best tool to use?
Correct Answer
C. Ipconfig
Explanation
Ipconfig is the best tool to use for looking at the network configuration of a host. This command-line tool displays the IP address, subnet mask, default gateway, and other network configuration details of the host. It provides essential information about the network settings, allowing the user to troubleshoot network connectivity issues and verify the network configuration of the host they are working on.
29.
Which of the following programs is not an email client.
Correct Answer
C. Mozilla Firefox
Explanation
Mozilla Firefox is a web browser, not an email client. It is used to browse the internet and access websites, but it does not have built-in email functionality like the other options listed. Microsoft Outlook 2003, Windows Live Mail, and Outlook Express 6 are all email clients that allow users to send, receive, and manage their emails.
30.
Select the 3 graphics files from the list below.
Correct Answer(s)
B. Untitled.jpgÂ
C. Untitled.bmp
E. Untitled.tiff Â
Explanation
The correct answer is Untitled.jpg, Untitled.bmp, and Untitled.tiff because these three file extensions (.jpg, .bmp, and .tiff) are commonly used for graphics files. The other files listed (.nfo and .ogg) are not typically associated with graphics files.
31.
Several users have accounts on a single computer and they all use the same programs. How would you configure the Start Menu for all users of a particular workstation?
Correct Answer
E. Right click Start and click Open All Users. Create a folder and add programs or shortcuts
32.
Which one is not an output device?
Correct Answer
D. Keyboard
Explanation
The keyboard is an input device, not an output device. It is used to input data into a computer system by typing characters or commands. Output devices, on the other hand, are used to display or produce information from a computer system, such as printers, monitors, and modems.
33.
What is the shortcut for PASTE?
Correct Answer
B. Ctrl + V
Explanation
The shortcut for PASTE is Ctrl + V. This key combination is commonly used in computer applications to paste copied or cut text or objects into a new location. By pressing Ctrl + V, the content stored in the clipboard is inserted at the cursor's current position.
34.
An IP address is best defined as...
Correct Answer
A. An IP Address is a unique number consisting of 4 parts separated by dots (eg: 217.247.84.89) associated with every system connected to a network
Explanation
An IP address is a unique number consisting of 4 parts separated by dots, associated with every system connected to a network. It serves as an identifier for devices on a network and allows them to communicate with each other. The IP address is essential for routing internet traffic and ensuring that data packets are sent to the correct destination.
35.
Select the URL from the list below.
Correct Answer
B. Http://www.yahoo.com
Explanation
The correct answer is "http://www.yahoo.com" because it is the only option in the list that starts with "http://" which is the standard protocol for accessing websites on the internet. The other options are an email address, a local file path, and an IP address, none of which are valid URLs.
36.
You wish to install Windows XP Professional in an automated setup. What is the correct syntax for activating Windows XP Professional?
Correct Answer
B. [Unattend] AutoActivate=yes
Explanation
The correct syntax for activating Windows XP Professional in an automated setup is "[Unattend] AutoActivate=yes". This means that during the installation process, the unattended setup file will automatically activate Windows XP Professional without requiring any user input.
37.
You work as a desktop support technician at TecheXams.ws. The TecheXams.ws network consists of a single Active Directory domain named techeXams.ws. You are assigned two workstations named TECHEXAMS-WS625 and TECHEXAMS-WS680. TECHEXAMS-WS625 is configured to run Windows Vista and TECHEXAMS-WS680 is configured to run Windows 7. You receive an instruction to migrate the user files and profiles from TECHEXAMS-WS625 to TECHEXAMS-WS680. To accomplish this you decide to determine the amount space needed to accomplish the migration. What should you do?Â
Correct Answer
B. You should consider running Scanstate c:\store /nocompress /p on TECHEXAMS-WS625Â
Explanation
To determine the amount of space needed to migrate user files and profiles from TECHEXAMS-WS625 to TECHEXAMS-WS680, you should consider running Scanstate c:\store /nocompress /p on TECHEXAMS-WS625. Scanstate is a command-line tool used to capture user profiles, files, and settings during the migration process. By running Scanstate with the specified parameters, you can create a store that contains all the necessary data for the migration. The /nocompress parameter ensures that the data is not compressed, and the /p parameter estimates the space required for the migration.
38.
Ping
Correct Answer
B. A computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self test the Network Interface Card (NIC) of the computer.
Explanation
The answer is a computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self-test the Network Interface Card (NIC) of the computer. This is because the term "ping" is commonly used in computer networking to refer to the act of sending a network request to a specific IP address and waiting for a response. This helps to determine if the host is reachable and if the NIC is functioning properly.
39.
Which of the following three statements are true about compressed files? ( Check 3 Answers )
Correct Answer(s)
A. Compressing a folder does not automatically compress the files within it
B. Encrypted files cannot be compressed Â
C. To change the compression state of a file, the user must have write permissions for the file
Explanation
Compressing a folder does not automatically compress the files within it: This statement is true because compressing a folder only compresses the folder itself, not the individual files within it. Each file needs to be compressed separately.
Encrypted files cannot be compressed: This statement is true because encryption and compression are two different processes. Encryption is used to protect the data from unauthorized access, while compression reduces the file size. Compressing an encrypted file would not result in any significant reduction in size.
To change the compression state of a file, the user must have write permissions for the file: This statement is true because changing the compression state of a file involves modifying the file itself. Write permissions are required to make changes to a file, including compressing or decompressing it.
40.
Which of the following two statements about the Microsoft Management Console are true? ( Check any 2)
Correct Answer(s)
B. The Microsoft Management Console provides a standard way to create, save and open administrative tools.
E. Within the Microsoft Management Console are administrative tools, also called snap-ins
Explanation
The Microsoft Management Console provides a standard way to create, save and open administrative tools. Within the Microsoft Management Console are administrative tools, also called snap-ins. Extensions to the Microsoft Management Console are called plug-ins. Consoles can only be stored locally. The Microsoft Management Console provides management functions for computers running Windows XP Professional.
41.
What is this computer component?
Correct Answer
D. MotherboardÂ
Explanation
The correct answer is motherboard. The motherboard is a vital component of a computer that connects all the other components together, such as the CPU, RAM, hard drive, and peripherals. It provides the electrical connections and pathways for data transfer between these components, allowing them to communicate with each other and function as a unified system. Without a motherboard, the other components would not be able to work together effectively, making it an essential part of a computer.
42.
You work as a desktop support technician at TecheXams.ws. The TecheXams.ws network consists of a single Active Directory domain named techeXams.ws. All client computers on the TecheXams.ws network run Windows XP Professional with Service Pack 1 (SP1). You have been assigned a client computer named TECHEXAMS-WS270. You want to upgrade TECHEXAMS-WS270 to Windows 7 Professional without needing to install any of your applications. You verify that TECHEXAMS-WS270 meets the system requirements for Windows 7 by installing and running the Windows 7 Upgrade Advisor. What should you do next?
Correct Answer
D. You should consider running Sysprep.exe /oobe /generalize on all Windows 7 workstations.
43.
You work as the Desktop support technician at TecheXams.ws. The TecheXams.ws network consists of a single Active Directory domain named techeXams.ws. The TecheXams.ws management has instructed you to install Microsoft Windows 7 on all the client computers at TecheXams. com. You need to create a Windows 7 image that includes the Office 2007 Microsoft Installer Package (MSI) package for the installation. What should you do?
Correct Answer
C. You should consider installing the MSI package by using the Msiexec command with the /package switch.
Explanation
The /package switch is used with the Msiexec command to specify the location of the Windows Installer package. In this case, the Office 2007 MSI package needs to be installed, so the /package switch should be used to specify the location of the package. The other options mentioned in the question are not relevant to the task of installing the MSI package.
44.
Bandwidth
Correct Answer
B. A measurement of how much information can be carried in a given time period (usually a second) over a wired or wireless communications link.
Explanation
Bandwidth refers to the measurement of how much information can be carried in a given time period, typically a second, over a wired or wireless communications link. It is not specifically about the speed of data transfer from the server to the client or the storage capacity of a computer. This definition is commonly used in the context of internet connections to describe the amount of data that can be transmitted within a specific timeframe.
45.
What is the function of this device?
Correct Answer
C. It is used to store large amounts of data in a computer system, data is retained on this device even when the computer is turned off.
Explanation
The correct answer is explaining the function of a storage device in a computer system. It states that this device is used to store large amounts of data, and the data is retained even when the computer is turned off. This suggests that the device being referred to is a non-volatile storage device, such as a hard disk drive or solid-state drive, which allows for long-term storage of data even without power.