1.
In which of the following sizes are the Express Card modules available? Choose two.
Correct Answer(s)
A. 54 mm Wide
D. 34 mm Wide
Explanation
Express Card modules are available in two sizes: 54 mm wide and 34 mm wide. These sizes refer to the width of the modules. Therefore, the correct answer is 54 mm Wide and 34 mm Wide.
2.
Which of the following statements about the DVI-I connector are true? Choose two
Correct Answer(s)
A. It contains 4 more more pins than the DVI-D connector
C. It is used for both digital and analog signal connections
Explanation
The DVI-I connector is capable of supporting both digital and analog signal connections, making the statement "It is used for both digital and analog signal connections" true. Additionally, the DVI-I connector has 4 or more pins than the DVI-D connector, making the statement "It contains 4 more or more pins than the DVI-D connector" true.
3.
Your client currently has Win98 and wishes to upgrade to WinXP. What is the most efficient way to accomplish this goal?
Correct Answer
A. Buy and install the WinXp Upgrade
Explanation
The most efficient way to upgrade from Win98 to WinXP is to buy and install the WinXP Upgrade. This option allows the client to directly upgrade their operating system without the need for any intermediate steps or installations. It is a straightforward and streamlined process that saves time and effort compared to other options such as installing a full copy of WinXP or upgrading first to Win2000 and then to WinXP.
4.
Which of the following is the most common laptop battery found today?
Correct Answer
B. Lithium Ion
Explanation
Lithium Ion batteries are the most common type of laptop battery found today. These batteries offer a high energy density, longer lifespan, and lighter weight compared to other types of batteries. They also have a low self-discharge rate, allowing them to hold their charge for longer periods of time. Additionally, Lithium Ion batteries do not suffer from the memory effect, which means they do not need to be fully discharged before recharging. These advantages make Lithium Ion batteries the preferred choice for laptops and other portable electronic devices.
5.
Which of the following refers to a location away from the computer center where document copies and backup media are kept?
Correct Answer
A. Off-site storage
Explanation
Off-site storage refers to a location away from the computer center where document copies and backup media are kept. This is done to ensure that in case of any disaster or damage to the computer center, the important data and backups are safe and can be accessed from an alternate location. By storing the documents and backup media off-site, organizations can minimize the risk of losing critical information and ensure business continuity.
6.
Which of the following statements is true about modem?
Correct Answer
B. It converts digital signals into analog signals and vice versa
Explanation
A modem is a device that allows computers to connect to the internet. It works by converting digital signals from the computer into analog signals that can be transmitted over telephone lines or cable lines. On the receiving end, the modem converts the analog signals back into digital signals that the computer can understand. This allows for the transmission of data between computers and the internet. Therefore, the statement "It converts digital signals into analog signals and vice versa" is true.
7.
Which of the following devices contains no moving parts and stores data in a digital format?
Correct Answer
A. Solid-state drives
Explanation
Solid-state drives (SSDs) contain no moving parts and store data in a digital format. Unlike traditional hard disk drives (HDDs) that use spinning disks to read and write data, SSDs use flash memory technology to store data electronically. This makes SSDs faster, more reliable, and less prone to physical damage or failure. Cartridge tape drives, floppy disk drives, and hard disk drives all have moving parts and do not store data in a purely digital format. Therefore, SSDs are the only option in the given list that fits the description.
8.
Which of the follopwing statements about the G3 state of a computer are true? Choose two
Correct Answer(s)
B. A complete power loss occurs in this state such as power cord unplugged from a computer
C. A computer can be disassembled in this state
Explanation
In the G3 state of a computer, a complete power loss occurs, such as when the power cord is unplugged from the computer. Additionally, a computer can be disassembled in this state.
9.
Which of the following display standards provides four times more pixels than an 800 x 600 display?
Correct Answer
D. UXGA
Explanation
UXGA stands for Ultra eXtended Graphics Array, which is a display standard that provides four times more pixels than an 800 x 600 display. This means that UXGA has a resolution of 1600 x 1200 pixels, which is four times the number of pixels found in an 800 x 600 display. Therefore, UXGA is the correct answer.
10.
Which of the following statements is true about a brownout?
Correct Answer
A. It is the situation of voltage drop in power supply
Explanation
A brownout refers to a situation of voltage drop in the power supply. This means that the voltage level provided by the power source temporarily decreases, which can cause a reduction in the performance of electrical devices. Unlike a blackout where the power is completely cut off, a brownout still allows some level of power supply but at a lower voltage than normal. This can lead to dimming lights, slower device operation, and potential damage to sensitive electronics.
11.
Which of the following protocols handles the reliable delivery of data?
Correct Answer
A. TCP
Explanation
TCP (Transmission Control Protocol) is the correct answer because it is specifically designed to provide reliable delivery of data over a network. It ensures that data packets are delivered in the correct order, without errors, and with acknowledgment from the receiving end. TCP uses various mechanisms like sequencing, acknowledgment, and retransmission to guarantee reliable delivery, making it suitable for applications that require error-free and ordered data transmission, such as web browsing, file transfer, and email. In contrast, UDP (User Datagram Protocol) does not provide reliable delivery and is more suitable for applications where speed and efficiency are prioritized over reliability. ARP (Address Resolution Protocol) and IPX (Internetwork Packet Exchange) are network protocols that handle different functions and do not specifically deal with reliable data delivery.
12.
Your office uses Windows Vista. This morning, a patch was applied automatically. Suddenly, the users who have scanners attached to their computers complain that they cannot access the scanners. When you check their Device manager, you notice there is no excalmation point next to the scanner. What should you do now?
Correct Answer
C. Manually unistall and reinstall the device driver
Explanation
The absence of an exclamation point next to the scanner in Device Manager indicates that there is no issue with the driver itself. Therefore, reinstalling Vista or finding a compatible scanner would not solve the problem. Since the issue occurred after a patch was applied, it is likely that the patch caused a conflict with the scanner driver. Manually uninstalling and reinstalling the device driver would refresh the driver and potentially resolve the issue. Rolling back the patch could also be a valid solution, but it is not mentioned in the given options.
13.
You have a wireless printer that is connected to your WinXP laptop via infrared, and it prints properly. However, when you relocate the wireless infrared printer, you find that your laptop is not able to send print jobs to the printer. What is the most likely cause of the issue?
Correct Answer
C. Printer is located at the distance of more than three feet from the laptop
Explanation
The most likely cause of the issue is that the printer is located at a distance of more than three feet from the laptop. Infrared technology typically has a limited range, and if the printer is too far away, the laptop may not be able to establish a connection with it.
14.
What iof the following is the most common method used by attackers to identify wireless networks?
Correct Answer
D. War driving
Explanation
War driving is the most common method used by attackers to identify wireless networks. War driving involves driving around with a device that can detect and map out wireless networks in the vicinity. Attackers can then use this information to gain unauthorized access to the network or launch further attacks. This method is popular because it allows attackers to easily identify vulnerable networks and exploit them for their own purposes.
15.
In which of the following conditions does BIOS need to be updated?
Correct Answer(s)
A. If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS.
C. If the BIOS does not support new devices
Explanation
BIOS (Basic Input/Output System) needs to be updated in two specific conditions. Firstly, when users want to use new hardware features or options that are supported by the motherboard but not supported by the computer BIOS. This update ensures compatibility and functionality with the new hardware. Secondly, if the computer BIOS does not support new devices, updating the BIOS becomes necessary to enable support for these devices. In both cases, updating the BIOS allows users to take advantage of new hardware features and ensures compatibility with new devices.
16.
Which of the following is the clock speed of the Accelerated Graphics Port (AGP) 8X expansion slot?
Correct Answer
C. 533 MHz
Explanation
The clock speed of the Accelerated Graphics Port (AGP) 8X expansion slot is 533 MHz. This means that data can be transferred at a rate of 533 million cycles per second between the graphics card and the computer's memory. A higher clock speed allows for faster data transfer and better performance in graphics-intensive applications.
17.
Which of the following stores user preferences related to a Web Site?
Correct Answer
A. Cookie
Explanation
A cookie is a small piece of data that is stored on a user's computer by a website. It is used to store user preferences related to a website, such as login information, language preference, and personalized settings. Cookies allow websites to remember user preferences and provide a personalized browsing experience. They are commonly used for tracking user behavior and providing targeted advertising.
18.
Which of the following software can also be used as a basic security measure?
Correct Answer
C. Screensaver
Explanation
A screensaver can be used as a basic security measure because it can help protect sensitive information by automatically activating after a period of inactivity on a computer. When a screensaver is activated, it can require a password to unlock the computer, preventing unauthorized access. This can be especially useful in public or shared environments where multiple users have access to the same computer. Additionally, screensavers can also be set to display a message or warning to deter potential unauthorized users.
19.
Which of the following aims to restrict certain dangerous substances comnmonly used in electronics and electronic equipment?
Correct Answer
A. RoHS directive
Explanation
The RoHS directive aims to restrict certain dangerous substances commonly used in electronics and electronic equipment. It stands for Restriction of Hazardous Substances and is a European Union directive that restricts the use of substances such as lead, mercury, cadmium, and others in electrical and electronic products. The directive was implemented to protect human health and the environment by reducing the hazardous waste generated from electronic devices. It requires manufacturers to ensure their products comply with the specified limits of these substances before they can be sold in the EU market.
20.
Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computers, he has authorized can get on his Wi-Fi. What is the most appropriate security measure you can recommend?
Correct Answer
C. MAC Filtering
Explanation
MAC Filtering is the most appropriate security measure to recommend in this scenario. MAC Filtering allows the customer to create a list of authorized devices by specifying their unique MAC addresses. Only devices with MAC addresses on the list will be able to connect to the Wi-Fi network, providing an extra layer of security and ensuring that only authorized computers can access the network. This measure helps to prevent unauthorized access and protect the customer's Wi-Fi network from potential security breaches.
21.
Which of the following are most likelyc auses of a virus attack?
Correct Answer(s)
A. Installing an application from an unreliable source
B. Downloading a file from an unknown Website
C. Installing a .DLL file from an unreliable source
D. Using a floppy, compact disk, or a pen drive form an unreliable source
Explanation
The given answer includes all the possible causes of a virus attack. Installing an application from an unreliable source can introduce malicious software onto a system. Downloading a file from an unknown website can also result in downloading a virus or malware. Installing a .DLL file from an unreliable source can lead to the execution of malicious code. Using a floppy disk, compact disk, or a pen drive from an unreliable source can transfer viruses or malware onto a computer system.