1.
What term is used when described characteristics of a computer case
Correct Answer
C. Form factor
Explanation
Form factor is the term used to describe the physical characteristics and dimensions of a computer case. It refers to the size, shape, and layout of the case, including the arrangement of components such as motherboard, power supply, and storage devices. Different form factors, such as ATX, microATX, and mini-ITX, have specific specifications and standards that determine the compatibility and functionality of the case with other computer components. Therefore, the correct answer is form factor.
2.
AT and ATX are form factors used to describe . . . . . (1 word)
Correct Answer
motherboard
Explanation
AT and ATX are form factors used to describe the physical dimensions, layout, and power supply requirements of a motherboard. These form factors determine the size and shape of the motherboard, as well as the placement of components such as the CPU, RAM slots, and expansion slots. The AT form factor was commonly used in older computer systems, while the ATX form factor is now the standard for modern motherboards. It specifies the placement of connectors, power supply, and cooling solutions, allowing for easier installation and better airflow within the computer case.
3.
Defrag, disk clean up and system restore are all examples of
Correct Answer
C. System tools
Explanation
The given answer, "system tools," is correct because defrag, disk clean up, and system restore are all functions or utilities that are used to manage and optimize the performance of a computer system. These tools are typically included in the operating system and are used for tasks such as organizing and optimizing the storage of files, removing unnecessary files and temporary data, and restoring the system to a previous state in case of issues or errors.
4.
What does ESD stand for
Correct Answer
C. Electrostatic discharge
Explanation
ESD stands for electrostatic discharge. Electrostatic discharge refers to the sudden flow of electricity between two electrically charged objects caused by a difference in potential. This discharge can occur when there is a buildup of static electricity on a person or object and then comes into contact with a conductor. ESD can cause damage to electronic devices and components, which is why precautions such as grounding and the use of antistatic materials are necessary in industries where sensitive electronics are handled.
5.
The first step of the trouble shooting process is to . . . . . . . . . . . . . . . . . . . to log onto the computer in case the job requires for a level two technician (5 words)
Correct Answer
gather data from the customer
Explanation
The first step of the troubleshooting process is to gather data from the customer. This is important because it helps the technician understand the specific issue and gather relevant information that can assist in resolving the problem. By collecting data from the customer, the technician can gain insights into the symptoms, potential causes, and any previous troubleshooting steps taken. This information is crucial for determining the appropriate next steps and ensuring an efficient and effective troubleshooting process.
6.
Internet searches, other techncians and newsgroups are all methods of gathering data for which step of the trouble shooting process
Correct Answer
E. Step 5 - evaluate the problem and implement the solution
Explanation
Internet searches, other technicians, and newsgroups are all methods of gathering additional data and information to evaluate the problem and implement the solution. These sources can provide valuable insights, suggestions, and solutions that can help in the troubleshooting process. Therefore, they are relevant to step 5 - evaluate the problem and implement the solution.
7.
The interface for an operating system that allows a user to ineteract with menus and icons is known as a . . . . . . . . (1 word or 3 words)
Correct Answer
GUI
gui
graphical user interface
Explanation
The correct answer for this question is GUI, which stands for Graphical User Interface. This term refers to the interface of an operating system that allows users to interact with menus and icons. It provides a visual and intuitive way for users to navigate and interact with the system, making it easier to perform tasks and access various functionalities.
8.
NOS stands for
Correct Answer
B. Network operating system
Explanation
NOS stands for Network Operating System. This term refers to an operating system that is designed to manage and coordinate network resources and provide services to other computers or devices connected to the network. It allows multiple computers to communicate and share resources such as files, printers, and internet connections. Examples of NOS include Windows Server, Linux, and Novell NetWare.
9.
The RAM used in a laptop is known as
Correct Answer
A. SODIMM
Explanation
SODIMM stands for Small Outline Dual Inline Memory Module. It is a type of RAM module specifically designed for laptops and other small form factor computers. SODIMM modules are smaller in size compared to regular DIMM modules used in desktop computers. They have a smaller number of pins and are physically compatible with the memory slots found in laptops. Therefore, SODIMM is the correct answer for the type of RAM used in a laptop.
10.
Dot matrix and daisy wheel are both types of what printer
Correct Answer
A. Impact
Explanation
Dot matrix and daisy wheel printers are both types of impact printers. Impact printers use a mechanical mechanism to create characters on paper by striking an inked ribbon against the paper. Dot matrix printers use a matrix of pins to strike against the ribbon, while daisy wheel printers use a wheel with characters on its spokes. Both types of printers are capable of producing high-quality text and graphics, but they are slower and noisier compared to laser and inkjet printers.
11.
. . . . . printers use special paper that must be kept at room tempreture or it will turn black (1 word)
Correct Answer
thermal
Explanation
Thermal printers use special paper that reacts to heat, causing it to turn black. This type of paper is sensitive to temperature and needs to be kept at room temperature to prevent premature discoloration.
12.
What network topology allows for the best protection if one of the computers fails
Correct Answer
A. Mesh
Explanation
A mesh network topology allows for the best protection if one of the computers fails because it provides multiple paths for data to travel. In a mesh network, each computer is connected to every other computer, creating a redundant network. If one computer fails, the data can still be routed through other paths, ensuring that the network remains operational. This redundancy and fault tolerance make the mesh topology ideal for protecting against single points of failure.
13.
What can be used to test connections between computers
Correct Answer
A. Ping
Explanation
Ping is a network utility used to test the connectivity between computers on a network. It sends a small packet of data from one computer to another and measures the time it takes for the packet to reach its destination and return. By receiving a response from the destination computer, it confirms that the connection is active and working properly. Therefore, ping is commonly used to troubleshoot network issues and verify if computers can communicate with each other. ICMP, HTTP, and FTP are protocols used for different purposes and not specifically designed for testing network connections.
14.
Topology is used to connect a computer to the internet (TRUE or FALSE)
Correct Answer
FALSE
Explanation
Topology refers to the physical or logical arrangement of devices in a network. It does not directly connect a computer to the internet. To connect a computer to the internet, other components such as a modem, router, and internet service provider are required. Therefore, the statement is false.
15.
What software is commonly used on helpdesk to store customer data and store the information from completed calls for future users
Correct Answer
A. Sunrise
Explanation
Sunrise is not a commonly used software on helpdesk to store customer data and information from completed calls. This answer is incorrect.
16.
What type of questions must you ask a talkitive customer
Correct Answer
B. Close-ended
Explanation
Close-ended questions are the appropriate type of questions to ask a talkative customer because they require short and specific answers. These questions limit the customer's response to a simple "yes" or "no" or a brief statement, which helps in controlling the conversation and preventing the customer from going off-topic or providing excessive information. This type of questioning is useful when dealing with talkative individuals as it allows for efficient communication and keeps the conversation focused.
17.
How would you clean the fan in a computer
Correct Answer
A. Compressed air
Explanation
To clean the fan in a computer, compressed air is the best option. This is because compressed air can effectively remove dust and debris from the fan without causing any damage. It can reach into small crevices and blow away the dirt, ensuring that the fan operates smoothly and efficiently. Using a soft lint-free cloth or damp tissue may not be as effective in removing all the dust, and using a mop and bucket is not suitable for cleaning delicate computer components.
18.
What motion must you use when cleaning a disk
Correct Answer
A. From the inside of the disk out
Explanation
To clean a disk effectively, you should use a motion from the inside of the disk outwards. This means starting at the center of the disk and moving towards the outer edge. This motion helps to remove dust, dirt, and smudges in a controlled manner, preventing any potential damage to the disk. Cleaning in a circular motion or using a dishwasher or spit can potentially harm the disk's surface and should be avoided.
19.
What does DDoS stand for
Correct Answer
A. Distributed denial of service
Explanation
DDoS stands for distributed denial of service. This refers to a type of cyber attack where multiple compromised computers are used to flood a target system or network with an overwhelming amount of traffic, causing it to become unavailable to legitimate users. The intention of a DDoS attack is to disrupt the target's operations and make their services inaccessible.
20.
What is the term used for an infected computer used to take down a server
Correct Answer
D. Zombie
Explanation
The term used for an infected computer used to take down a server is "zombie." This refers to a computer that has been compromised by malware and is under the control of a hacker, who can then use it to launch coordinated attacks on other systems. These attacks can overwhelm a server's resources, causing it to crash or become unavailable to legitimate users.