1.
77. which of the following power sources are used to power a laptop?
Correct Answer(s)
B. AC power
C. Battery
Explanation
AC power and battery are the correct answers because laptops can be powered either by plugging them into an electrical outlet using AC power or by using the laptop's built-in battery. Solar panels and docking stations are not typically used as primary power sources for laptops.
2.
Mark works as a network administrator for netTech inc the network has 150 windows 2000 pro client computers and four win 2000 servers. all the client computers are able to connect to the internet. mark is concerned about malware infecting the client computers through the internet. what will mark do to protect the client computers from malware? wach correct answer represents a complete solution. choose two
Correct Answer(s)
A. Educate users of the client computers about the problems arisin due to malware
B. Educate users of the client computers to avoid malware
Explanation
Mark should educate the users of the client computers about the problems arising due to malware and how to avoid it. By providing awareness and knowledge about malware, users can become more cautious and take necessary precautions while browsing the internet. This will help in preventing malware from infecting the client computers and ensure their protection.
3.
You have a customer who wants to install windows XP pro on her computer what is the minimum amount of RAM she should use for this to work?
Correct Answer
B. 64 megabytes
Explanation
The minimum amount of RAM required to install Windows XP Pro is 64 megabytes. This means that the customer's computer should have at least 64 megabytes of RAM in order for the operating system to function properly.
4.
You are selecting RAM for a new PC you are very concerned about making sure errors are handled. which of the following types of RAM should you select?
Correct Answer
C. ECC RAM
Explanation
To ensure errors are handled efficiently, it is important to select ECC RAM (Error Correcting Code RAM). ECC RAM has an additional memory chip that checks for and corrects errors that may occur during data storage or transmission. This type of RAM is commonly used in critical systems such as servers, workstations, and data centers, where data integrity is crucial. ECC RAM provides an extra layer of protection against potential errors, making it the ideal choice for someone concerned about error handling in their new PC.
5.
What is the maximum data transmission speed of IEEE 802.11b wireless networks?
Correct Answer
D. 11 mbps
Explanation
The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard was introduced in 1999 and operates in the 2.4 GHz frequency range. It was one of the earliest Wi-Fi standards and provided a significant improvement over its predecessor, IEEE 802.11a, in terms of compatibility and cost-effectiveness. However, compared to more modern Wi-Fi standards such as 802.11ac or 802.11ax, the data transmission speed of 11 Mbps is relatively slow.
6.
Which of the following types of parental controls is used to limit acces to the internet contents?
Correct Answer
A. Content filter control
Explanation
Content filter control is a type of parental control that is used to limit access to internet contents. It allows parents to block or filter specific websites, apps, or types of content that they deem inappropriate or unsuitable for their children. This control helps in creating a safe and age-appropriate online environment for children by restricting their access to potentially harmful or explicit content on the internet.
7.
Andrew has a personal computer. one morning he starts his computer and finds the following error message "cmos checksum failure" what are the most likely causes of this error? each correct answer represents a complete solution choose 2
Correct Answer(s)
B. The CMOS battery has failed
C. The CMOS chip has failed
Explanation
The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings on Andrew's computer. The most likely causes of this error are the failure of the CMOS battery and the failure of the CMOS chip. The CMOS battery is responsible for maintaining the CMOS settings when the computer is powered off, and if it fails, the settings may be lost or corrupted. Similarly, if the CMOS chip itself fails, it can result in the checksum failure error.
8.
What are the benefits of using Universal Serial Bus 2.0 (USB) over legacy communication ports such as RS-232 and parellel ports? each correct answer represents a complete solution choose all that apply
Correct Answer(s)
A. Easy configuration of hardware devices
B. Expansion
D. Speed
Explanation
The benefits of using Universal Serial Bus 2.0 (USB) over legacy communication ports such as RS-232 and parallel ports include easy configuration of hardware devices, expansion, and speed. USB allows for plug-and-play functionality, making it easier to connect and configure hardware devices without the need for manual configuration. It also supports the connection of multiple devices through hubs, allowing for easy expansion of the system. Additionally, USB 2.0 offers faster data transfer speeds compared to legacy ports, enabling quicker communication between devices.
9.
Which of the following sleep modes is also known as hibernation in windows operating systems?
Correct Answer
C. S4
Explanation
S4 is the correct answer because it refers to the sleep mode known as hibernation in Windows operating systems. In this mode, the computer saves all the open documents and running programs to the hard drive and then shuts down completely. When the computer is turned back on, it restores the previous state, allowing the user to resume their work from where they left off. This sleep mode is particularly useful for conserving energy while still being able to quickly resume work.
10.
Which of the following can occur if the power cable runs along with the the computer network cable?
Correct Answer
A. EMI
Explanation
If the power cable runs along with the computer network cable, it can cause electromagnetic interference (EMI). EMI is the disturbance caused by electromagnetic radiation from an external source, such as the power cable, that affects the performance of the network cable. This interference can lead to signal degradation, data loss, and communication errors in the network.
11.
which of the following are types of social engineering attacks?
each correct answer represents a complete solution choose two
Correct Answer(s)
A. An unauthorized person gains entrance to the building where the company is database server resides and accesses the server by pretending to be an employee
C. An unauthorized person call the user pretends to be a system administrator in order to get the person's password
Explanation
The given correct answer states that two types of social engineering attacks are:
1) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee. This is an example of a physical social engineering attack, where the attacker manipulates their physical presence to gain unauthorized access.
2) An unauthorized person calls the user and pretends to be a system administrator in order to get the person's password. This is an example of a phishing attack, where the attacker manipulates the user through impersonation to obtain sensitive information.
12.
Your customer uses windows XP machine has become unstable due to some unknown cause you want to put the computer into a working state again what is the best way to do this?
Correct Answer
C. Use the Windows cover a console with the Windows recovery CD to put the system back in a working state
Explanation
The best way to put the Windows XP machine back into a working state is to use the Windows recovery CD and access the Windows recovery console. This console allows the user to perform various repair and troubleshooting tasks to fix any issues causing instability in the system. Reinstalling Windows or uninstalling new software may not address the root cause of the problem, whereas using the recovery console provides a more comprehensive solution.
13.
Which of the following terms are first to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality viability or convenience?
Correct Answer
B. Shareware
Explanation
Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, viability, or convenience. This means that users can try the software before deciding to purchase it, but there may be limitations or restrictions in place.
14.
Which of the following buses has a maximum data transfer rate of 2400 in MBPS?
Correct Answer
B. ESATA
Explanation
eSATA has a maximum data transfer rate of 2400 MBPS. FireWire 800 has a maximum data transfer rate of 800 MBPS, USB 1.1 has a maximum data transfer rate of 12 MBPS, and USB 2.0 has a maximum data transfer rate of 480 MBPS. Therefore, eSATA is the correct answer as it has the highest data transfer rate among the given options.
15.
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?
Correct Answer
D. Anycast
Explanation
Anycast is the correct answer because it refers to a single IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that has that address assigned. This allows for efficient routing and load balancing, as multiple interfaces can share the same anycast address and handle incoming traffic.
16.
Which of the following can be installed in the AGP slot?
Correct Answer
A. Video card
Explanation
The AGP slot is specifically designed for installing a video card. It is not compatible with RAM, microprocessors, or modem cards. Therefore, the correct answer is a video card.
17.
At one voltage does a USB host supply power to a USB bus?
Correct Answer
B. 5 Volts
Explanation
A USB host typically supplies power to a USB bus at a voltage of 5 Volts. This voltage is standardized and is used to power various USB devices such as keyboards, mice, and external hard drives. The 5V power supply is sufficient for most USB devices and ensures compatibility and safety. Higher voltages like 15 Volts or 50 Volts are not commonly used for USB power supply as they may cause damage to the connected devices.
18.
Which of the following enables third-party developers to create capabilities to extend an application?
Correct Answer
A. Plug in
Explanation
A plug-in is a software component that allows third-party developers to add new features or functionalities to an existing application. By creating plug-ins, developers can extend the capabilities of the application without modifying its core code. This enables customization and flexibility, as different users can choose which plug-ins to install based on their specific needs.
19.
Which of the following statements about multi-or authentication is true?
Correct Answer
C. It involves two or more methods as part of the authentication process
Explanation
The statement "it involves two or more methods as part of the authentication process" is true. Multi-factor authentication (MFA) is a security measure that requires users to provide two or more different types of authentication factors to verify their identity. These factors can include something the user knows (such as a password), something the user has (such as a fingerprint or smart card), or something the user is (such as biometric data). By requiring multiple factors, MFA adds an extra layer of security and makes it more difficult for unauthorized individuals to access sensitive information or systems.
20.
What is the difference between the USB 2.0 and IEEE 1394 bus standards?
Correct Answer
C. IEEE 1394 is slower than USB 2.0
Explanation
The given answer states that IEEE 1394 is slower than USB 2.0. This is the correct answer because USB 2.0 has a higher data transfer rate compared to IEEE 1394. USB 2.0 has a maximum transfer rate of 480 Mbps, while IEEE 1394, also known as FireWire, has a maximum transfer rate of 400 Mbps. Therefore, USB 2.0 is faster than IEEE 1394.
21.
Which of the following devices provides input by analyzing printed text handwriting or an object?
Correct Answer
B. Image scanner
Explanation
An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents into digital images, which can then be edited, stored, or transmitted electronically. This makes it a useful tool for tasks such as document archiving, data entry, and image editing. Unlike a webcam, which captures live video footage, an image scanner focuses specifically on capturing and digitizing physical documents or objects. Therefore, an image scanner is the correct answer to the question.
22.
Which of the following substances are restricted under restriction of hazardous substances (RoHS)?
Each correct answer represents a complete solution choose all that apply.
Correct Answer(s)
A. Mercury (HG)
B. Lead (pb)
D. Cadmium (Cd)
Explanation
Mercury (HG), lead (pb), and cadmium (Cd) are restricted under the Restriction of Hazardous Substances (RoHS). These substances are known to be hazardous to human health and the environment. The RoHS directive aims to limit the use of these substances in electrical and electronic equipment to reduce their negative impact. Iron (Fe) is not restricted under RoHS as it is not considered a hazardous substance in this context.