1.
If you have a quad-core processor, how many physical processors do you have?
Correct Answer
A. 1
Explanation
You can have multiple cores per physical processor.
2.
Select all the answers that are true about Hard Drives.
Correct Answer(s)
A. Solid State Hard Drives have no moving parts
B. SATA Hard Drives are cheaper per GB then Solid State Drives
C. Solid State Drives can find files faster
Explanation
SSD has no moving parts and costs more per GB than SATA drives. Since SSD has no moving parts, they can find files faster but since SATA drives have moving parts, so they are NOT shock resistant.
3.
What is the most important factor in RAM?
Correct Answer
B. How fast it is able to talk to the rest of the computer
Explanation
Speed is the number 1 factor. The faster the RAM, the fast the computer.
4.
The purpose of the power supply is to convert A/C power to DC power.
Correct Answer
A. True
Explanation
All computers run off DC power
5.
If you wanted to play a Blue Ray, DVD or CD, which player should you buy?
Correct Answer
C. Blue Ray Player
Explanation
Blue Ray players are backward compatible
6.
Select which application(s) would benefit from a non-integrated video card?
Correct Answer(s)
A. Gaming
B. Auto-CAD
C. pHotoshop
Explanation
Office does not use high end graphics or physics
7.
How many times faster is USB 3.0 over USB 2.0?
Correct Answer
C. 10 times
Explanation
USB 3.0 transmits 600 MB per sec compared to 2.0 at 60 MB per sec.
8.
What piece of hardware do you need to connect your computer to a network?
Correct Answer(s)
B. NIC
D. Wireless NIC
Explanation
Some form of a NIC card. Wireless or wired.
9.
What version(s) of Windows 7 can you add to a domain?
Correct Answer(s)
B. Windows 7 Professional
C. Windows 7 Ultimate
Explanation
Home is the only version you cannot add to a domain.
10.
How much RAM does Windows 7 32 Bit edition support?
Correct Answer
B. 4 GB
Explanation
4 GB. If you want more RAM, you need to go to 64 bit which can hold up to 198 GB.
11.
Can you transfer a Windows 7 OEM license to another computer?
Correct Answer
B. False
Explanation
OEM is licensed to one computer only.
12.
What version of Apple OSX started to support Active Directory integration?
Correct Answer
A. 10.4 (Tiger)
Explanation
10.4 was that start.
13.
When you buy open source software, you are buying only support not the software.
Correct Answer
A. True
Explanation
You cannot buy Open Source because the point of Open Source is that it is free and you can do what you want with it. But you can't sell it.
14.
Which video connector gives you the highest quality display?
Correct Answer
C. HDMI
Explanation
HDMI is the best but most monitors only support DVI.
15.
What is the purpose of having memory inside Processors, Hard Drives, and Video Cards?
Correct Answer
C. Having local memory in the device allows for faster processing of current tasks
Explanation
It makes it so the piece of hardware does not have to wait for the motherboard's memory to respond.
16.
You turn on your computer and your computer says that no OS is found. What does this usually mean?
Correct Answer
D. All of the above
Explanation
This usually means that there are multiple possible reasons for the computer not finding the operating system. It could be due to a dead hard drive where the BIOS cannot locate the boot partition. Additionally, having a floppy disk in the A drive or a bootable CD in the CD drive can also cause the computer to not find the operating system. Therefore, the correct answer is "All of the above".
17.
You go to print and you don’t see any of your printers. What could be the cause that all of your printers disappeared?
Correct Answer
B. The Print Spooler Service is stopped
Explanation
The Print Spooler Service is responsible for managing the printing process on a computer. If it is stopped, it means that the service is not running, which can cause all printers to disappear. This could be due to a software issue, a conflict with another program, or a manual stoppage of the service. To resolve the issue, the Print Spooler Service needs to be restarted or set to automatic start so that the printers can be recognized and used again.
18.
You should never need to touch the registry?
Correct Answer
A. True
Explanation
The statement "You should never need to touch the registry" is true. The registry is a crucial part of the Windows operating system that stores important settings and configurations for various software and hardware installed on the computer. Making changes to the registry without proper knowledge and understanding can lead to system instability and potential damage. Therefore, it is generally advised for users to avoid touching the registry unless they have a specific and valid reason, and they are confident in their ability to make the necessary changes safely.
19.
What is stored in your user profile?
Correct Answer(s)
A. My Documents
B. Desktop
Explanation
The user profile stores personal files and settings specific to an individual user. This can include documents, files, and folders stored in the "My Documents" and "Desktop" locations. These are typically accessible only by the user associated with the profile. The other options mentioned, "Programs" and "Drivers," are not typically stored in the user profile but rather in system directories or specific program folders.
20.
What is the shortcut for Windows Explorer?
Correct Answer
C. Windows-e
Explanation
The shortcut for Windows Explorer is Windows-e. This shortcut opens up the File Explorer window, allowing users to easily navigate through their files and folders on their Windows computer.
21.
If you installed a program on your D partition and you wanted to change that partition's drive letter to E, what do you think would happen?
Correct Answer
B. The program would stop working since the drive letter changed
Explanation
If you installed a program on your D partition and you wanted to change that partition's drive letter to E, the program would stop working since the drive letter changed. This is because the program's file paths and references are tied to the original drive letter (D), and changing it to E would result in the program not being able to locate its necessary files and resources.
22.
What is true about File Shares?
Correct Answer(s)
A. Windows XP can only have 10 users connect to a sinlge file share
B. You right click a folder to setup a file share
C. To access a file share the path is \\servername\sharename
D. You can assign permissions to limit user access
Explanation
This answer correctly lists four true statements about File Shares. Firstly, it states that Windows XP can only have 10 users connect to a single file share. Secondly, it mentions that you can right click a folder to set up a file share. Thirdly, it states that the path to access a file share is "\\servername\sharename". Lastly, it correctly states that you can assign permissions to limit user access to a file share.
23.
The reason we setup a local user on a workstation when we setup Universal Send to scan to the folder is because if the user that uses that workstation changes their password, the Universal Send address book entry will break. By creating a local user ensures that scanning will continue to work.
Correct Answer
A. True
Explanation
Setting up a local user on a workstation when setting up Universal Send to scan to a folder is necessary because if the user who uses that workstation changes their password, the Universal Send address book entry will break. By creating a local user, the scanning functionality will remain unaffected and continue to work properly.
24.
Which ways are you able to install print drivers?
Correct Answer(s)
A. Setup EXE's
B. INF
C. Print Server Shares
Explanation
You can install print drivers using setup EXE's, INF files, and Print Server Shares. Setup EXE's are executable files that can be run to install the print drivers. INF files are information files that contain instructions for installing the drivers. Print Server Shares are shared folders on a print server that contain the necessary drivers for installation on client computers.
25.
What is the purpose of Task Manager?
Correct Answer(s)
A. Stop a non responding application
B. Check which process is taking up all of your resources
C. See CPU utilization
Explanation
The purpose of Task Manager is to perform multiple functions. Firstly, it allows users to stop a non-responding application, which can help improve system performance and prevent any further issues. Additionally, Task Manager enables users to check which process is utilizing the majority of system resources, allowing them to identify and address any potential bottlenecks or performance issues. Lastly, Task Manager provides information on CPU utilization, giving users insight into how much of their CPU's capacity is being utilized at any given time.
26.
To keep your computer in good condition, what can you do?
Correct Answer(s)
A. Run a disk clean up
B. Run a disk Defragmentation
C. Have an Anti-Virus installed
D. Have a Spyware software scanner installed
Explanation
To keep your computer in good condition, there are several things you can do. Running a disk clean up helps to remove unnecessary files and free up space on your hard drive. Running a disk defragmentation organizes the files on your hard drive, making it faster and more efficient. Having an anti-virus installed helps protect your computer from viruses and malware that can cause harm. Having a spyware software scanner installed helps detect and remove any spyware or adware that may be installed on your computer without your knowledge.
27.
Which items are true regarding Temp Internet Files and cookies?
Correct Answer(s)
A. They are used to speed up webpages that you have visited before
B. They stay on your computer and can fill up your hard drive unless you delete them
C. Cookies are used to remember settings that you selected like shopping carts etc.
Explanation
Temp Internet Files and cookies are used to enhance the browsing experience. Temp Internet Files store webpage data to speed up loading times for websites that have been visited before. However, if not cleared regularly, these files can accumulate and take up a significant amount of storage space on the hard drive. Cookies, on the other hand, are small text files that websites store on a user's computer to remember preferences and settings, such as login information or items in a shopping cart.
28.
Shortcuts: Check all that apply
What is the shortcut to copy text? Ctrl - ?
What is the shortcut to paste text? Ctrl - ?
What is the shortcut to cut text? Ctrl - ?
What is the shortcut to print? Ctrl - ?
Correct Answer(s)
A. C
C. X
D. P
E. V
Explanation
The correct answers for the shortcuts are as follows:
- "c" is the shortcut to copy text
- "x" is the shortcut to cut text
- "p" is the shortcut to paste text
- "v" is not a shortcut for any of the given actions, so it is not a correct answer.
29.
What is a MAC address?
Correct Answer
B. It is the unique identifier of a NIC
Explanation
A MAC address, also known as a Media Access Control address, is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It is used to identify devices on a network at the hardware level. Each NIC has a unique MAC address, allowing network devices to communicate with each other by recognizing and addressing the correct device. The MAC address is not related to an iPad's serial number or the internet's data routing mechanism.
30.
Choose which answers describe a WAN and a LAN?
Correct Answer(s)
A. A WAN is the data connections between offices.
B. A LAN is very fast and typically encompasses a building
C. A WAN is usually slower than a LAN
Explanation
A WAN, or Wide Area Network, refers to the data connections between offices, indicating that it connects multiple locations over a larger geographical area. On the other hand, a LAN, or Local Area Network, typically encompasses a building and is known for its fast speed within a limited area. The statement that a WAN is usually slower than a LAN is accurate because WANs cover larger distances and often involve connections through public networks, which can result in slower transmission speeds compared to the high-speed connections within a LAN.
31.
What hardware typically is required to get out to the internet?
Correct Answer(s)
A. Network Card
C. Router
Explanation
A network card is required to establish a connection between the computer and the network, allowing data to be transmitted and received. A router is necessary to connect multiple devices to the internet and route the data packets between the devices and the internet service provider. Together, the network card and router enable the computer to access the internet and communicate with other devices on the network.
32.
What protocol does the internet use?
Correct Answer
C. TCP/IP
Explanation
The correct answer is TCP/IP. TCP/IP is the protocol that the internet uses. It stands for Transmission Control Protocol/Internet Protocol and is a set of rules that allows devices to communicate with each other over the internet. TCP/IP is responsible for breaking down data into packets, routing them to their destination, and reassembling them on the receiving end. It is the foundation of internet communication and enables devices from different manufacturers and operating systems to connect and exchange information seamlessly.
33.
What is the sole purpose of the Subnet Mask?
Correct Answer
C. To identify which part of the IP Address is the network and the node
Explanation
The subnet mask is used to identify the network and the node portions of an IP address. It helps in dividing the IP address into network and host addresses, allowing devices on the same network to communicate with each other. The subnet mask determines the number of bits used for the network and host addresses, enabling routers to correctly route data packets between networks. It does not encrypt data over the network or hand out IP addresses.
34.
If your IP address is 10.2.1.200 SM 255.255.0.0 and your destination is www.google.com (74.125.224.113), how would your data be routed?
Correct Answer
B. Since google.com is not on the same LAN as your computer, the data would be sent to router (Default Gateway) so it can routed to the Google servers.
Explanation
The correct answer is that since google.com is not on the same LAN as the computer, the data would be sent to the router (Default Gateway) so that it can be routed to the Google servers. This is because the destination IP address is outside of the local network, so it needs to be sent to the router for further routing to reach the Google servers.
35.
If your IP Address is 10.1.2.45 and SM 255.255.0.0 which part is the "network" and which part is the "node"?
Correct Answer
B. 10.1 Network 2.45 Node
Explanation
The IP address is divided into two parts: the network portion and the host portion. In this case, the network portion is "10.1" and the host portion is "2.45". The network portion identifies the network to which the device belongs, while the host portion identifies the specific device within that network. Therefore, "10.1" is the network and "2.45" is the node.
36.
Why would a network admin want to subnet a network?
Correct Answer
A. By subnetting a network it allows a network to have other networks within it.
Explanation
Subnetting a network allows for better organization and management of network resources. By dividing a large network into smaller subnets, network administrators can improve network performance, increase security, and efficiently allocate IP addresses. Each subnet can be treated as a separate network, allowing for easier troubleshooting and isolation of network issues. It is not true that there can only be one subnet per switch; a switch can support multiple subnets depending on its capabilities and configuration.
37.
Is there an unlimited amount of IP Addresses?
Correct Answer
B. False
Explanation
False. There is not an unlimited amount of IP addresses. IP addresses are assigned to devices connected to the internet, and there is a limited supply of available addresses. The current version of IP addresses, IPv4, has a finite number of possible addresses, which has led to the development of IPv6 to accommodate the increasing number of devices connecting to the internet.
38.
What is the command to find your IP Address?
Correct Answer
B. IPCONFIG
Explanation
The command to find your IP Address is IPCONFIG.
39.
What does DHCP stand for?
Correct Answer
C. Dynamic Host Configuration Protocol
Explanation
DHCP stands for Dynamic Host Configuration Protocol. This protocol is used to automatically assign IP addresses and other network configuration settings to devices on a network. It allows for the dynamic allocation of IP addresses, which means that devices can obtain a new IP address each time they connect to the network. DHCP simplifies network administration by eliminating the need for manual IP address configuration.
40.
What does DHCP hand out?
Correct Answer
E. All of the above
Explanation
DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses to devices on a network. In addition to IP addresses, DHCP can also hand out other network configuration information such as DNS servers, subnet masks, and default gateways. Therefore, the correct answer is "All of the above" as DHCP can provide all of these network settings to devices on a network.
41.
If you want to make sure that a printer or computer always gets the same IP address, what do you do?
Correct Answer(s)
A. Give the device a static IP Address
C. Reserve the MAC address in the DHCP server
Explanation
To ensure that a printer or computer always gets the same IP address, two options can be used. Firstly, giving the device a static IP address means manually assigning a specific IP address to the device, which will remain constant over time. Secondly, reserving the MAC address in the DHCP server involves configuring the server to always assign the same IP address to the device with a specific MAC address. Both methods ensure that the device will consistently have the same IP address, providing stability and ease of access.
42.
What does DNS stand for?
Correct Answer
A. Domain Name Service
Explanation
DNS stands for Domain Name Service. It is a system that translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.168.1.1) so that computers can communicate with each other over the internet. DNS is essential for browsing the web, sending emails, and accessing various online services. It acts as a directory that helps users navigate the internet by associating user-friendly domain names with the corresponding IP addresses of websites or servers.
43.
If you want to resolve the name www.google.com, what is being used to find the website?
Correct Answer
B. DNS
Explanation
When resolving the name www.google.com, DNS (Domain Name System) is being used to find the website. DNS is a system that translates domain names into IP addresses, allowing users to access websites using easily recognizable names instead of numerical IP addresses. It functions as a directory that matches domain names with their corresponding IP addresses, enabling users to navigate the internet more conveniently. DHCP (Dynamic Host Configuration Protocol) is a network management protocol that assigns IP addresses to devices on a network, and Chuck Norris is not related to the process of resolving website names.
44.
Which is the strongest wireless Encryption listed?
Correct Answer
C. WPA2
Explanation
WPA2 is the strongest wireless encryption listed because it is the most advanced and secure encryption protocol available for wireless networks. It provides stronger encryption algorithms and security features compared to WEP and WPA. WPA2 uses the AES (Advanced Encryption Standard) algorithm, which is highly resistant to attacks and provides robust protection for wireless communications. It is recommended to use WPA2 encryption to ensure the highest level of security for wireless networks.
45.
What are the benefits of a Firewall?
Correct Answer(s)
A. Allows for VPN access
B. Prevents the internet from accessing your LAN
C. Can securely allow the internet to access some of your servers
Explanation
A firewall provides several benefits. Firstly, it allows for VPN access, which enables secure remote access to a private network. Secondly, it prevents the internet from accessing your LAN, protecting your network from unauthorized access and potential threats. Finally, a firewall can securely allow the internet to access some of your servers, ensuring that only authorized traffic is allowed through and enhancing the security of your network.
46.
What is the benifit of a VPN?
Correct Answer
B. A VPN allows you to be on the network as if you are sitting at your desk
Explanation
A VPN allows you to be on the network as if you are sitting at your desk. This means that you can access all the resources and files on your office network, even if you are physically away from the office. It provides a secure and encrypted connection, allowing you to work remotely and access sensitive information without compromising its security. This benefit of VPN is particularly useful for remote workers, travelers, and individuals who need to access their work network from outside the office.
47.
Which client would benifit from a VPN the most?
Correct Answer
B. A client that has laptops and has a mobile sales team
Explanation
A client that has laptops and has a mobile sales team would benefit from a VPN the most. Since the client's sales team is constantly on the move, connecting to different networks, a VPN would provide a secure and encrypted connection for their laptops, ensuring the safety of their sensitive data and communications. It would also allow the sales team to access the client's internal network and resources remotely, improving their productivity and efficiency while maintaining a high level of security.
48.
What is wireless guest services?
Correct Answer
A. Allows users to access the internet only via wireless
Explanation
Wireless guest services refer to a system that allows users to access the internet exclusively through a wireless connection. This means that users do not have the option to connect to the internet using a wired LAN or WAN connection. The purpose of this service is to provide convenient and secure internet access for guests or visitors, while also ensuring that they do not have access to the local network or wide area network.
49.
If you want flexibility, lower power consumption, and higher processing efficiency, which processor configuration would you recommend?
Correct Answer
B. 1 quad core processor
Explanation
A quad core processor would be recommended for flexibility, lower power consumption, and higher processing efficiency. This is because a quad core processor has four independent cores, allowing it to handle multiple tasks simultaneously. It also consumes less power compared to having four separate single core processors. Additionally, a quad core processor can provide higher processing efficiency as it can distribute the workload among its cores more effectively.
50.
What hardware resources are needed for a server to function?
Correct Answer(s)
A. RAM
B. CPU
C. Storage
Explanation
A server requires RAM, CPU, and storage resources to function properly. RAM (Random Access Memory) is essential for storing and accessing data quickly, allowing the server to run multiple processes simultaneously. The CPU (Central Processing Unit) is responsible for executing instructions and performing calculations, making it crucial for the server's processing power. Storage is necessary for storing the server's operating system, applications, and data. Without these hardware resources, the server would not be able to handle user requests, process data, or store information effectively.