Practical Applications 702 IT Technician

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rayandlisaj
R
Rayandlisaj
Community Contributor
Quizzes Created: 5 | Total Attempts: 2,400
Questions: 90 | Attempts: 153

SettingsSettingsSettings
Practical Applications 702 IT Technician - Quiz


Practice exam for CompTIA's 702


Questions and Answers
  • 1. 

    Spyware programs that might effect your privacy or make changes to your computer.  This describes which security alert level?

    • A.

      Severe

    • B.

      High

    • C.

      Medium

    • D.

      Low

    • E.

      Not Yet Classified

    Correct Answer
    C. Medium
    Explanation
    The given description states that the spyware programs might affect privacy or make changes to the computer. While this is a concern, it is not as severe as other security threats such as malware or viruses. Therefore, the appropriate security alert level for this description would be medium.

    Rate this question:

  • 2. 

      Which RAM type is in this image.

    • A.

      SODIMM

    • B.

      DIMM

    • C.

      RIMM

    • D.

      SIMM

    Correct Answer
    B. DIMM
    Explanation
    The correct answer is DIMM because the image shows a Dual Inline Memory Module (DIMM), which is a type of RAM commonly used in desktop computers. DIMMs have a 64-bit data path and are larger in size compared to other RAM types like SODIMM (used in laptops) and SIMM (used in older computers). RIMM is a type of RAM used in older Rambus-based systems, which is not visible in the image.

    Rate this question:

  • 3. 

    The volume is accessable and has no known problems.Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

    • A.

      Failed

    • B.

      Healthy

    • C.

      Healthy (at risk)

    • D.

      Initializing

    • E.

      Offline

    Correct Answer
    B. Healthy
    Explanation
    The given correct answer, "Healthy," best describes the state of the volume. This means that the volume is accessible and has no known problems. It indicates that the volume is functioning properly and is in a good state.

    Rate this question:

  • 4. 

    The _____  switch copies subdirectories even if they are empty.

    • A.

      /s

    • B.

      /d

    • C.

      /c

    • D.

      /e

    Correct Answer
    D. /e
    Explanation
    The "/e" switch in the given question is used to copy subdirectories even if they are empty. This means that when this switch is used, the command will copy all subdirectories, regardless of whether they have any files or not.

    Rate this question:

  • 5. 

    Which Secuity level does this describe?Users can perform management tasks, such as managing documents.

    • A.

      Read & execute

    • B.

      Read

    • C.

      Write

    • D.

      Special permissions

    Correct Answer
    D. Special permissions
    Explanation
    Special permissions is the correct answer because it allows users to perform management tasks, such as managing documents. Special permissions provide a more granular level of control over access to resources, allowing administrators to define specific actions that users can perform, such as read, write, execute, delete, etc. This level of security is often used when more specific control is required beyond the standard read, write, and execute permissions.

    Rate this question:

  • 6. 

    As far as processor specifications go, Clock speed, front side bus speed, addressable RAM and cache sizes are considered ____________  specifications.

    • A.

      Primary

    • B.

      Secondary

    • C.

      Bus width

    • D.

      Internal

    Correct Answer
    A. Primary
    Explanation
    Clock speed, front side bus speed, addressable RAM, and cache sizes are considered primary specifications because they directly affect the performance and capabilities of the processor. These specifications determine how fast the processor can execute instructions, how quickly it can communicate with other components, and how much data it can store and access. Therefore, they are essential factors in determining the overall performance and efficiency of the processor.

    Rate this question:

  • 7. 

    Which Secuity level does this describe?Users can create and modify files and folders.

    • A.

      Read & execute

    • B.

      Read

    • C.

      Write

    • D.

      Special permissions

    Correct Answer
    C. Write
    Explanation
    The security level that allows users to create and modify files and folders is "Write". This level grants the permission to make changes to existing files and folders as well as create new ones. Users with this level of security can add, edit, and delete content within the files and folders they have access to.

    Rate this question:

  • 8. 

    Which of the following dial up connections have a speed rating of up to 1.5 GB? (choose two)

    • A.

      Dial Up

    • B.

      DSL

    • C.

      Cable

    • D.

      Satelite

    • E.

      Cellular

    Correct Answer(s)
    B. DSL
    D. Satelite
    Explanation
    DSL and Satellite are the two dial-up connections that have a speed rating of up to 1.5 GB. DSL, which stands for Digital Subscriber Line, uses existing telephone lines to provide internet connectivity. Satellite internet, on the other hand, uses satellites in space to transmit and receive data. Both of these options offer higher speeds compared to traditional dial-up connections.

    Rate this question:

  • 9. 

    Which of these backup utilities backs up all files and clears the archive attributes?

    • A.

      Copy

    • B.

      Daily

    • C.

      Normal

    • D.

      Incremental

    • E.

      Differential

    Correct Answer
    C. Normal
    Explanation
    The "Normal" backup utility backs up all files and clears the archive attributes. This means that it will create a complete backup of all selected files and folders, and after the backup is done, it will reset the archive attribute on those files, indicating that they have been backed up. This ensures that in the next backup, only the files that have been modified since the last backup will be included, reducing the backup time and storage space required.

    Rate this question:

  • 10. 

    Especially maliciuos programs that will effect the privacy and security of your computer and can damage your system and should be removed immediatly.  This describes which security alert level?

    • A.

      Severe

    • B.

      High

    • C.

      Medium

    • D.

      Low

    • E.

      Not Yet Classified

    Correct Answer
    A. Severe
    Explanation
    The given description states that there are malicious programs that can harm the privacy, security, and functioning of a computer, and they should be removed immediately. This indicates a high level of risk and urgency, suggesting that the security alert level is severe.

    Rate this question:

  • 11. 

    Which of these backup utilities backs up all files that have been created or modified since the last normal or incremental back up does not clear the archive attribute?

    • A.

      Copy

    • B.

      Daily

    • C.

      Normal

    • D.

      Incremental

    • E.

      Differential

    Correct Answer
    E. Differential
    Explanation
    Differential backup is the correct answer because it backs up all files that have been created or modified since the last normal or incremental backup without clearing the archive attribute. This means that it only backs up the changes made since the last full backup, making it faster than a full backup but slower than an incremental backup.

    Rate this question:

  • 12. 

    These programs typically do no harm to your computer unless they were installed without your knowledge.  This describes which security alert level?

    • A.

      Severe

    • B.

      High

    • C.

      Medium

    • D.

      Low

    • E.

      Not Yet Classified

    Correct Answer
    E. Not Yet Classified
    Explanation
    The given statement suggests that the programs mentioned in the question do not cause harm to the computer unless they were installed without the user's knowledge. This indicates that these programs are not classified under any specific security alert level, as they do not pose a severe, high, medium, or low threat to the computer. Therefore, the correct answer is "Not Yet Classified."

    Rate this question:

  • 13. 

    Which Secuity level does this describe?Users can view the contents of files and folders.  They can also run programs located in the folder.

    • A.

      Read and execute

    • B.

      Read

    • C.

      Write

    • D.

      Administrator

    Correct Answer
    A. Read and execute
    Explanation
    The security level that describes the given scenario is "Read and execute." This level allows users to both view the contents of files and folders and run programs located within the folder. It grants the necessary permissions to read the files and execute the programs, but does not provide write or administrative privileges.

    Rate this question:

  • 14. 

    As far as processor specifications go, The width, or number of bits, that can pass one at a time over the processors internal bus and data bus, plus the address bus width which determines maximum addressable memory are considered ____________  specifications.

    • A.

      Primary

    • B.

      Secondary

    • C.

      Bus width

    • D.

      Internal

    Correct Answer
    C. Bus width
    Explanation
    The question is asking about the specifications related to the width of the processor's internal bus, data bus, and address bus. These specifications are referred to as "bus width" specifications. The bus width determines the number of bits that can pass through the bus at a time and also affects the maximum addressable memory. Therefore, "Bus width" is the correct answer.

    Rate this question:

  • 15. 

      Which RAM type is in this image.

    • A.

      SODIMM

    • B.

      DIMM

    • C.

      RIMM

    • D.

      SIMM

    Correct Answer
    A. SODIMM
    Explanation
    The correct answer is SODIMM. SODIMM stands for Small Outline Dual Inline Memory Module. It is a type of RAM module commonly used in laptops and small form factor computers. SODIMM modules are smaller in size compared to DIMM modules, making them suitable for compact devices. This image likely shows a SODIMM module, based on its size and form factor. DIMM, RIMM, and SIMM are different types of RAM modules, but they are not depicted in the image.

    Rate this question:

  • 16. 

    Which port address is responsible for sending email?

    • A.

      IMAP

    • B.

      SMTP

    • C.

      POP3

    • D.

      HTTPS

    Correct Answer
    B. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is responsible for sending email. It is a protocol used for transferring email messages from one server to another. SMTP works in conjunction with other protocols such as POP3 or IMAP, which are responsible for receiving email. However, SMTP specifically handles the sending of email, ensuring that it reaches the intended recipient's email server.

    Rate this question:

  • 17. 

    The volume is being initialized and will be shown as health when complete.Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

    • A.

      Healthy

    • B.

      Healthy (at risk)

    • C.

      Initializing

    • D.

      Offline

    • E.

      Unreadable

    Correct Answer
    C. Initializing
    Explanation
    The correct answer is "Initializing." This option best describes the state of a dynamic disk in Computer Management when the volume is being initialized and will be shown as healthy when the process is complete.

    Rate this question:

  • 18. 

    The ______  switch copies source files that have the archive attribite set and turns off the archive.

    • A.

      /a

    • B.

      /m

    • C.

      /s

    • D.

      /w

    Correct Answer
    B. /m
    Explanation
    The "/m" switch is used to copy source files that have the archive attribute set and turns off the archive.

    Rate this question:

  • 19. 

    At a minimum, which IPv4 address components must you configure in order to communicate on your local computer to communicate on your local subnet mask? (choose 2)

    • A.

      IP address

    • B.

      Default gateway

    • C.

      DNS server address

    • D.

      Subnet mask

    Correct Answer(s)
    A. IP address
    D. Subnet mask
    Explanation
    To communicate on a local subnet, you need to configure the IP address and the subnet mask. The IP address is necessary to identify your computer on the network, while the subnet mask determines the range of IP addresses that belong to the local subnet. The default gateway and DNS server address are not essential for local communication within the subnet. The default gateway is used to communicate with devices outside the local subnet, and the DNS server address is used to resolve domain names to IP addresses.

    Rate this question:

  • 20. 

    Which of these backup utilities backs up all files that have been created that day.

    • A.

      Copy

    • B.

      Daily

    • C.

      Normal

    • D.

      Incremental

    • E.

      Differential

    Correct Answer
    B. Daily
    Explanation
    The backup utility that backs up all files that have been created that day is the "Daily" backup. This type of backup is designed to copy all files that have been modified or created since the last backup was performed. It ensures that all changes made to files on a daily basis are backed up, providing a comprehensive and up-to-date backup of the data.

    Rate this question:

  • 21. 

    The following information: Connection specific DNS suffix IP address & subnet mask default gateway can be accessed using which command report?

    • A.

      Ping

    • B.

      Tracert

    • C.

      Ipconfig

    • D.

      Nslookup

    Correct Answer
    C. Ipconfig
    Explanation
    The correct answer is "ipconfig" because the command "ipconfig" is used to display the IP configuration of a computer, including the connection-specific DNS suffix, IP address, subnet mask, and default gateway. It is a command-line tool that provides detailed information about the network settings of the computer. The other options, such as "ping," "tracert," and "nslookup," are used for different purposes like testing network connectivity, tracing the route to a destination, and querying DNS servers respectively, but they do not provide the specific information mentioned in the question.

    Rate this question:

  • 22. 

      Which RAM type is in this image.

    • A.

      SODIMM

    • B.

      DIMM

    • C.

      SIMM

    • D.

      RIMM

    Correct Answer
    D. RIMM
    Explanation
    The image is not provided in the question, so it is not possible to determine the RAM type based on the image. Therefore, an explanation cannot be provided.

    Rate this question:

  • 23. 

    This software was typically installed with your knowledge and according to the licensing terms you agreed to, but still might collect information or change the configuration of your computer.  This describes which security alert level?

    • A.

      Severe

    • B.

      High

    • C.

      Medium

    • D.

      Low

    • E.

      Not Yet Determined

    Correct Answer
    D. Low
    Explanation
    This software being typically installed with the user's knowledge and according to the licensing terms implies that it is not a malicious or unauthorized program. However, it is mentioned that the software might collect information or change the configuration of the computer, which could be a potential security concern. Despite this, the fact that it is categorized as "Low" suggests that the overall security risk associated with this software is relatively minimal compared to the other alert levels.

    Rate this question:

  • 24. 

    What multimeter modes can you use to determine if a wire is whole or broken?

    • A.

      Ohmmeter

    • B.

      Capacimeter

    • C.

      Continuity

    • D.

      Component test

    • E.

      Temperature

    Correct Answer
    C. Continuity
    Explanation
    Continuity mode on a multimeter is used to determine if a wire is whole or broken. When the probes are connected to both ends of a wire, if there is continuity (a complete path for electrical current), the multimeter will emit a beep or display a low resistance value. If there is a break in the wire, there will be no continuity, and the multimeter will not emit a beep or display a high resistance value. Therefore, continuity mode is the appropriate mode to use for this purpose.

    Rate this question:

  • 25. 

    Which command would you use to verify name resolution (DNS) settings?

    • A.

      Ping

    • B.

      Tracert

    • C.

      Ipconfig

    • D.

      Nslookup

    Correct Answer
    D. Nslookup
    Explanation
    The nslookup command is used to verify name resolution (DNS) settings. It allows users to query DNS servers to obtain information about domain names, IP addresses, and other DNS records. By using nslookup, users can test and troubleshoot DNS configurations, check if a domain name is resolving correctly, and obtain details about DNS servers and their responses.

    Rate this question:

  • 26. 

    In _______,  modern processors overlap steps to speed up overall execution.  While one instruction is being executed, another is being decoded and a third is being fetched.

    • A.

      Out of order completion

    • B.

      Multiprocessing

    • C.

      Overclocking

    • D.

      Pipelining

    Correct Answer
    D. Pipelining
    Explanation
    Pipelining is a technique used in modern processors to improve overall execution speed. It allows for overlapping of different steps of instruction execution. While one instruction is being executed, another instruction is being decoded and a third instruction is being fetched. This parallel processing of instructions helps to reduce the overall execution time and increase the efficiency of the processor.

    Rate this question:

  • 27. 

    Which of a computers internal components generally uses the most power?

    • A.

      CPU

    • B.

      RAM

    • C.

      Hard drive

    • D.

      Power supply

    Correct Answer
    A. CPU
    Explanation
    The CPU (Central Processing Unit) generally uses the most power among a computer's internal components. This is because the CPU is responsible for executing instructions and performing calculations, which requires a significant amount of power. The CPU is the brain of the computer and is responsible for carrying out the majority of the processing tasks, making it the component that consumes the most power.

    Rate this question:

  • 28. 

    Which port address is resposible for receiving email?

    • A.

      IMAP

    • B.

      SMTP

    • C.

      POP3

    • D.

      HTTPS

    Correct Answer
    C. POP3
    Explanation
    POP3 stands for Post Office Protocol version 3, and it is responsible for receiving email. It is a widely used protocol that allows users to retrieve their email from a remote server to their local device. Unlike SMTP (Simple Mail Transfer Protocol) which is responsible for sending email, POP3 is specifically designed for receiving and downloading email messages. IMAP (Internet Message Access Protocol) is another protocol used for receiving email, but it is more advanced and allows users to manage their email directly on the server. HTTPS (Hypertext Transfer Protocol Secure) is a protocol used for secure communication over a computer network and is not specifically designed for email.

    Rate this question:

  • 29. 

    Which Secuity level does this describe?Users can view folder contents, and open files and folders.

    • A.

      Read & execute

    • B.

      Read

    • C.

      Write

    • D.

      Special permissions

    Correct Answer
    B. Read
    Explanation
    The security level that describes the given scenario is "Read". This level allows users to view the contents of a folder and open files and folders, but does not grant them permission to make any changes or modifications to the files or folders.

    Rate this question:

  • 30. 

    ____________ is the bus that determines how many bits of information the processor can work with at once.  If the internal bus is smaller than the data buss, data must be manipulated in parts.

    • A.

      Bus, address

    • B.

      Bus, data

    • C.

      Bus, internal

    • D.

      Front side bus speed

    Correct Answer
    C. Bus, internal
    Explanation
    The internal bus is the bus that determines how many bits of information the processor can work with at once. If the internal bus is smaller than the data bus, data must be manipulated in parts.

    Rate this question:

  • 31. 

    __________  is the decrease in signal strength along the length of a network wire.

    • A.

      Flashing

    • B.

      Attenuation

    • C.

      Baud

    • D.

      Alternating

    Correct Answer
    B. Attenuation
    Explanation
    Attenuation is the decrease in signal strength along the length of a network wire. As the signal travels through the wire, it encounters resistance and other factors that cause it to weaken. Attenuation can result in loss of data and degradation of the signal quality. It is an important consideration in network design and can be mitigated by using signal boosters, repeaters, or shorter cable lengths.

    Rate this question:

  • 32. 

    What would likely cause ghosting or shadows on a printed page

    • A.

      Low toner

    • B.

      Residual toner on the drum

    • C.

      Damp paper

    • D.

      Debris on the laser scanning mirror

    Correct Answer
    B. Residual toner on the drum
    Explanation
    Residual toner on the drum can cause ghosting or shadows on a printed page. When there is leftover toner on the drum, it can transfer onto the paper during the printing process. This results in faint or duplicate images appearing on the page, creating a ghosting effect. By cleaning the drum properly and ensuring there is no residual toner, the issue of ghosting or shadows can be resolved.

    Rate this question:

  • 33. 

      Which RAM type is in this image.

    • A.

      SODIMM

    • B.

      DIMM

    • C.

      RIMM

    • D.

      SIMM

    Correct Answer
    D. SIMM
    Explanation
    The image is not provided, so it is not possible to determine the RAM type based on the given information.

    Rate this question:

  • 34. 

    The speed at which the processor interacts with the rest of the system is know as what?

    • A.

      Bus, address

    • B.

      Bus, data

    • C.

      Bus, internal

    • D.

      Front side bus speed

    Correct Answer
    D. Front side bus speed
    Explanation
    The correct answer is "Front side bus speed." The front side bus speed refers to the speed at which the processor communicates with other components in the system, such as memory and input/output devices. It determines how quickly data can be transferred between the processor and these components, thus affecting overall system performance.

    Rate this question:

  • 35. 

    The bus (pathway) that connects the processor with the main memory.  The wider the ____________  the more memory can be accessed. (Data isn't transferred over this buss)

    • A.

      Bus, address

    • B.

      Bus, data

    • C.

      Bus, internal

    • D.

      Front side bus speed

    Correct Answer
    A. Bus, address
    Explanation
    The wider the bus, the more memory can be accessed because the bus is responsible for transferring data between the processor and the main memory. The "address" in this context refers to the specific location in the memory that the processor wants to access. Therefore, a wider bus allows for more memory addresses to be accessed, increasing the overall memory capacity that can be utilized.

    Rate this question:

  • 36. 

    You receive a general windows protection fault message, what does this indicate?

    • A.

      Bad memory location

    • B.

      Parity error

    • C.

      Virus or malware

    • D.

      Poorly written software

    Correct Answer
    D. Poorly written software
    Explanation
    A general Windows protection fault message typically indicates that there is an issue with the software running on the Windows system. This can be caused by poorly written software that is not compatible with the operating system or contains bugs that cause conflicts. It is not related to bad memory location, parity error, or virus/malware.

    Rate this question:

  • 37. 

    Spyware programs that might effect the privacy and security of your computer and damage your system shoud be removed immediatly.  Could make changes on your computer without your concent  This describes which security alert level?

    • A.

      Severe

    • B.

      High

    • C.

      Medium

    • D.

      Low

    • E.

      Not Yet Determined

    Correct Answer
    B. High
    Explanation
    The given statement suggests that spyware programs can have severe consequences for the privacy and security of a computer system. It mentions that these programs can make changes on the computer without the user's consent, indicating a high level of security alert. Therefore, the correct answer is "High."

    Rate this question:

  • 38. 

    Which pair of CPU manufacturers have the highest market share?

    • A.

      Intel and VIA

    • B.

      Intel and Motorola

    • C.

      Intel and IBM

    • D.

      Intel and AMD

    • E.

      Intel and SIS

    Correct Answer
    D. Intel and AMD
    Explanation
    Intel and AMD have the highest market share among CPU manufacturers. Intel is a well-known and dominant player in the CPU market, offering high-performance processors for various applications. AMD, on the other hand, has gained significant market share in recent years with its competitive and affordable processors. Together, Intel and AMD capture the majority of the CPU market, making them the pair with the highest market share.

    Rate this question:

  • 39. 

    Which of these backup utilities backs up all files that have been created or modified since the last normal or incremental back up, clears the archive attribute?

    • A.

      Copy

    • B.

      Daily

    • C.

      Normal

    • D.

      Incremental

    • E.

      Differential

    Correct Answer
    D. Incremental
    Explanation
    The correct answer is Incremental. Incremental backup utility backs up all files that have been created or modified since the last normal or incremental backup and clears the archive attribute. This means that only the files that have changed since the last backup are backed up, making it a more efficient option compared to full or differential backups.

    Rate this question:

  • 40. 

    When Windows detects the begining of a request to make a system configuraion change, what type of restore point is created?

    • A.

      System checkpoint

    • B.

      Manual restore point

    • C.

      Installation restore point

    • D.

      Automatic check point

    Correct Answer
    A. System checkpoint
    Explanation
    When Windows detects the beginning of a request to make a system configuration change, it creates a system checkpoint restore point. This type of restore point is automatically created by Windows before any major system changes, such as installing new software or making significant configuration modifications. System checkpoint restore points allow users to revert their system back to a previous state if any issues or errors occur as a result of the changes made.

    Rate this question:

  • 41. 

    The volume is accessable, but I/O errors have been detected on the disk.Of the Dycipher dynamic disk hardware states in Computer Management which does this best describe?

    • A.

      Failed

    • B.

      Healthy

    • C.

      Healthy (at risk)

    • D.

      Initializing

    • E.

      Offline

    Correct Answer
    C. Healthy (at risk)
    Explanation
    The given scenario suggests that the volume is accessible, but there are I/O errors on the disk. This indicates that the disk is still functioning, but there may be potential risks or issues with it. Therefore, the best description for this situation would be "Healthy (at risk)." This implies that the disk is currently in a working state, but there are potential problems that need to be addressed to maintain its health.

    Rate this question:

  • 42. 

    The number of bits of data that can be transferred to the CPU in a single operation is know as?

    • A.

      Bus, address

    • B.

      Bus, data

    • C.

      Bus, internal

    • D.

      Front side bus speed

    Correct Answer
    B. Bus, data
    Explanation
    The correct answer is "Bus, data." The number of bits of data that can be transferred to the CPU in a single operation is known as the "bus, data." The bus is a communication pathway that allows data to be transferred between different components of a computer system. In this case, the bus is specifically referring to the data bus, which is responsible for transferring data between the CPU and other components such as memory or input/output devices.

    Rate this question:

  • 43. 

    Which of these backup utilities backs up all files, but does not mark the files as backed up; does not clear the archive attribute.

    • A.

      Copy

    • B.

      Daily

    • C.

      Normal

    • D.

      Incremental

    • E.

      Differential

    Correct Answer
    A. Copy
    Explanation
    The backup utility "Copy" backs up all files without marking them as backed up or clearing the archive attribute. This means that the files will not be flagged as backed up and the archive attribute will remain unchanged after the backup process.

    Rate this question:

  • 44. 

    When adding Ram memory it is not necessary to fill up all the slots in a memory bank.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Whether there os 1, 2 or 4 slots in the bank they must all be filled if not with a memory chip than with a continuity module.

    Rate this question:

  • 45. 

    As far as processor specifications go, the internal and external voltages used by the chips, the number of transistors that make up the processor, and whether it includes an integrated FPU (floating point unit) is considered ____________  specifications.

    • A.

      Primary

    • B.

      Secondary

    • C.

      Bus width

    • D.

      Internal

    Correct Answer
    D. Internal
    Explanation
    The given question asks about the specifications that are considered when it comes to processor specifications. The correct answer is "Internal." This means that the internal voltage and external voltage used by the chips, the number of transistors that make up the processor, and whether it includes an integrated FPU are all part of the internal specifications of the processor. These specifications are important for understanding the performance and capabilities of the processor.

    Rate this question:

  • 46. 

    Which of the following display types can you use to display data in the performance monitor?(choose all that apply)

    • A.

      Line graph

    • B.

      Histogram

    • C.

      Pie chart

    • D.

      Pictogram

    Correct Answer(s)
    A. Line grapH
    B. Histogram
    Explanation
    The line graph and histogram display types can be used to display data in the performance monitor. A line graph is useful for showing the trend or changes in data over time, while a histogram is used to display the distribution of data into different categories or intervals. The pie chart and pictogram, on the other hand, are not typically used in the performance monitor for displaying data.

    Rate this question:

  • 47. 

    SODIMM DDR and DDR2 memory chips typically have how many pins? (Choose all that apply)

    • A.

      72

    • B.

      144

    • C.

      168

    • D.

      200

    • E.

      204

    Correct Answer(s)
    B. 144
    D. 200
    Explanation
    SODIMM DDR and DDR2 memory chips typically have 144 and 200 pins. SODIMM stands for Small Outline Dual Inline Memory Module, and it is a smaller form factor compared to regular DIMM modules. DDR and DDR2 are different generations of memory technology, with DDR2 being the newer one. The number of pins corresponds to the physical connection points on the memory module, and in this case, SODIMM DDR and DDR2 modules have 144 and 200 pins respectively.

    Rate this question:

  • 48. 

    When testing a print job from an aplication what is the first thing you check?

    • A.

      Printer driver

    • B.

      System tools

    • C.

      Printer cable

    • D.

      The application

    Correct Answer
    D. The application
    Explanation
    When testing a print job from an application, the first thing you check is the application itself. This is because the application is responsible for sending the print job to the printer. If there are any issues or errors within the application, it may prevent the print job from being sent or cause it to print incorrectly. Therefore, it is crucial to verify that the application is functioning properly before troubleshooting other components such as the printer driver, system tools, or printer cable.

    Rate this question:

  • 49. 

    A Type I PC card is how thick?

    • A.

      3.3mm

    • B.

      5mm

    • C.

      7.4mm

    • D.

      10.5mm

    Correct Answer
    A. 3.3mm
    Explanation
    A Type I PC card is 3.3mm thick. This indicates that it is relatively thin compared to other options.

    Rate this question:

  • 50. 

    Most components in the computer are turned off.  Power is supplied to the computers memory chips to preserve the information held there.  Most programms are stopped in this power saving mode.

    • A.

      Off

    • B.

      Standby

    • C.

      Sleep

    • D.

      Hibernation

    Correct Answer
    C. Sleep
    Explanation
    Sleep mode is a power-saving state in which most components of the computer are turned off, but power is still supplied to the computer's memory chips to preserve the information held there. In sleep mode, most programs are stopped, allowing the computer to quickly resume full power and operation when awakened. This mode is commonly used when the computer is not in use for a short period of time and allows for faster startup compared to hibernation mode.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 11, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 08, 2010
    Quiz Created by
    Rayandlisaj
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.