A+ exam cram 5th edition ch 3 questions Flashcards
- Which of the following IP addresses would a technician see if a
computer is connected to a multifunction network device and is
attempting to obtain an IP address automatically but is not
receiving an IP address from the DHCP server?
❍ A. 172.16.10.10
❍ B. 192.168.0.10
❍ C. 169.254.10.10
❍ D. 192.168.10.10
169.254.10.10
- Answer: C. If the computer fails to obtain an IP address from a DHCP server,
Windows will take over and apply an Automatic Private IP Address (APIPA). This
address will be on the 169.254.0.0 network. All of the other addresses could possibly
be obtained from a DHCP server. 172.16.10.10 is a Class B private IP. 192.168.0.10
and 192.168.10.10 are Class C private IP addresses
2. 80mm and 120mm are common sizes for what type of PC component? ❍ A. Case fans ❍ B. CPUs ❍ C. Heat sinks ❍ D. Memory modules
Case fans
- Answer: A. Case fans are measured in mm (millimeters). 80mm and especially
120mm are very common. They are used to exhaust heat out of the case. This aids
in keeping the CPU and other devices cool. CPUs commonly use a heat sink/fan
combination. However, the two are often connected together. Memory modules don’t
use fans, but they can be equipped (or purchased) with heat sinks of their own
3. What is the total number of devices that can be daisy-chained to an IEEE 1394 port? ❍ A. 127 ❍ B. 63 ❍ C. 15 ❍ D. 255
63
- Answer: B. An IEEE 1394 (FireWire) chain can have up to 63 devices. USB can handle
up to 127 devices, though both of these numbers are outside the realm of normalcy
for most individuals! 15 is the maximum amount of devices that can be on a SCSI
chain. Remember this doesn’t count the SCSI card. 255 is a commonly used number
when it comes to maximums but doesn’t apply to IEEE 1394
- What does a yellow exclamation point next to a device in the
Device Manager indicate?
❍ A. A driver is not properly installed for this device.
❍ B. The device is disabled.
❍ C. The driver is not digitally signed.
❍ D. The device driver needs to be upgraded.
A driver is not properly installed for this device
- Answer: A. If you see a yellow exclamation point in the Device Manager, this indicates
that the device does not have a proper driver. If the device is disabled, it will have
either a down arrow (for Windows 7/Vista) or a red x (Windows XP). If a driver was
not digitally signed, the device might show up in the Unknown devices category until
it is installed properly. If a device has a working driver, then upgrading it will be up to
you, but you won’t necessarily be notified of this.
5. Beep codes are generated by which of the following? ❍ A. CMOS ❍ B. RTC ❍ C. POST ❍ D. Windows
POST
- Answer: C. As the POST checks all the components of the computer, it may present
its findings on the screen or in the form of beep codes. The complementary metaloxide
semiconductor (CMOS) stores information such as time and date and BIOS
passwords. RTC stands for real-time clock; it is the device that keeps time on the
motherboard. Windows generates all kinds of error codes but not beep codes. The
beep codes come from the POST, which happens before Windows boots
- How should you apply spray cleaner to a monitor?
❍ A. Spray the cleaner directly on the monitor screen.
❍ B. Spray the cleaner on the top of the monitor and wipe
down.
❍ C. Spray evenly on the monitor.
❍ D. Spray the cleaner on a clean, lint-free cloth first
Spray the cleaner on a clean, lint-free cloth first
- Answer: D. Never spray any cleaner directly on a display. Spray on a lint-free cloth
first, and then wipe the display gently. Try not to get any liquid in the cracks at the
edge of the screen. A lot of companies sell products that are half isopropyl alcohol and
half water. You could also make this yourself. Again, remember to put the solution on
a lint-free cloth first.
7. Which bus slot provides the highest video performance? ❍ A. PCI ❍ B. SCSI ❍ C. AGP ❍ D. PCIe
PCIe
- Answer: D. PCI Express (PCIe) offers the highest video performance. A PCIe x16
version 3 card can transfer a maximum of 16 GB/s. Compare this to the closest
competitor listed: AGP, which can do 2,133 MB/s, about 1/8 of PCIe. SCSI is used
for hard drives and scanners among other things, but not for video. PCI is the predecessor
to PCIe but is rarely used for video anymore; it is limited to 133 or 266 MB/s
depending on the speed. Either way, it doesn’t hold a candle to PCIe.
8. Which of the following indicates that a printer is network-ready? ❍ A. An RJ11 jack ❍ B. A USB connector ❍ C. An RJ45 jack ❍ D. An SCSI connector
RJ45
- Answer: C. The RJ45 jack enables a connection to a twisted-pair (most likely Ethernet)
network. Printers with a built-in RJ45 connector are network ready. RJ11 ports are
used by modems and dial-up Internet connections. If a printer has this, then it is a
multifunction printer acting as a fax machine. USB is the standard port for a printer This allows it to connect to a PC or to a print server. SCSI connectors are not often
found on today’s printers; regardless, they would indicate a local connection, not a
network connection
9. You just turned off a printer to maintenance it. What should you be careful of when removing the fuser? ❍ A. The fuser being hot ❍ B. The fuser being wet ❍ C. The fuser being fragile ❍ D. The fuser releasing toner
The fuser being hot
- Answer: A. The fuser heats paper to around 400° Fahrenheit (204° Celsius). That’s like
an oven. If you need to replace the fuser, let the printer sit for 10 or 15 minutes after
shutting it down, and before maintenance. The fuser is not wet or fragile, and it does
not contain toner—that is contained by the cartridge
10. Where is the memory controller located in a Core 2 Duo system? ❍ A. On the CPU ❍ B. On memory ❍ C. Within the chipset ❍ D. Within the PCIe controller
within the chipset
- Answer: C. On Core 2 Duo, Quad, and Extreme systems, the memory controller is
located within the chipset and is known as the Memory Controller Hub (MCH) by Intel,
but it is also referred to as the northbridge. On AMD systems and newer Intel systems
such as the Core i5 or i7, the memory controller is located “on-die,” meaning within
11. Which of the following connectors is used for musical equipment? ❍ A. MIDI ❍ B. HDMI ❍ C. DVI ❍ D. DisplayPort
MIDI
- Answer: A. The Musical Instrument Digital Interface (MIDI) connector is used for
musical equipment such as keyboards, synthesizers, and sequencers. MIDI is used to
create a clocking signal that all devices can synchronize to. The other three connectors,
HDMI, DVI, and DisplayPort, are all video connectors
- Although not used as often as a Phillips screwdriver, this tool is
sometimes used to remove screws from the outside of a computer
case or from within a laptop.
❍ A. Monkey wrench
❍ B. Torx wrench
❍ C. Channel lock
❍ D. Pliers
Torx wrench
- Answer: B. The Torx wrench is a special tool used to remove screws from the outside
of a case; often, proprietary computer manufacturers will use these screws. It can also
be used to remove screws (albeit smaller ones) from a laptop. The standard is the size
T-10 Torx wrench. But you might also use a T-8 and even a T-6 on laptops.
- What is the main advantage of selecting a 64-bit operating system
over a 32-bit operating system?
❍ A. The ability to use software-based data execution
prevention (DEP)
❍ B. The ability to use unsigned drivers
❍ C. The ability to access more than 4 GB of RAM
❍ D. The ability to run multiple 16-bit programs in separate
memory spaces
The ability to access more than 4 GB of RAM
- Answer: C. If you want to access more than 4 GB of RAM, you will need a 64-bit operating
system. 32-bit OSes are limited to 4 GB of RAM, and in some cases 3.25 GB.
Many computers today, especially custom computers such as virtualization systems
and gaming computers, require more than 4 GB of RAM so a 64-bit operating system
is the only choice. Data Execution Prevention (DEP) is a security feature in today’s
operating systems; it stops a program from executing code in a forbidden area of
memory. Most of today’s 32-bit or 64-bit systems offer this. Unsigned drivers are
based on the operating system itself; whether that particular OS is 32-bit or 64-bit
will not be a factor. You must be an administrator to allow the use of unsigned drivers.
32-bit operating systems can run older 16-bit programs, but 64-bit operating systems
will have problems running 16-bit programs even in compatibility mode
14. Moving your CPU’s speed beyond its normal operating range is called \_\_\_\_\_\_\_\_\_\_\_\_\_. ❍ A. Overclocking ❍ B. Overdriving ❍ C. Overpowering ❍ D. Overspeeding
Overclocking
- Answer: A. Overclocking is the act of increasing your CPU’s operating speed beyond
its normal rated speed. The rest of the terms are not used in relation to this concept
15. Which port is typically known as a serial port? ❍ A. DVI ❍ B. COM1 ❍ C. LPT1 ❍ D. SCSI
COM1
- Answer: B. COM1 (communications port 1) is a serial port; it sends or receives
one bit at a time, up to 115,200 Kbps. A typical example is the 9-pin male DE9 port
(inaccurately referred to also as the DB9). DVI is a video port. LPT1 is an older parallel
printing port. SCSI is a parallel port used by hard drives and tape drives. The older
COM port is used by dial-up modems. It is also used to program devices such as
handheld terminals. You don’t see COM ports on PCs today, but you might still see
them as an add-on card in the field, used to access networks as an administrator failsafe
in case other Internet connectivity methods fail. In rural areas, people may still
use internal or external dial-up modems. The external modem is what connects to the
COM1 serial port. Though USB is also technically a “serial” port, most technicians and
professionals refer to the serial port as COM1 or COM2.
16. What is the most important piece of information needed to connect to a specific wireless network? ❍ A. Channel ❍ B. MAC address ❍ C. SSID ❍ D. Administrator password
SSID
- Answer: C. The SSID is the most important piece of information required to connect
to a wireless network; it is the name of the wireless network. The wireless channel
number isn’t necessarily needed; the wireless access point (WAP) might autonegotiate
the channel. Also, MAC address filtering is not enabled by default, so the
MAC address might not be needed. (In fact, this would be entered by the admin at the
wireless access point, not from the client computer.) The administrator password is
needed only if you wanted to make configuration changes to the wireless access point.
For example, if you wanted to implement MAC filtering, you would have to log in to the
WAP with an admin password to configure it.
17. Which password is used in the BIOS (CMOS) to prevent end users from accessing the BIOS contents? ❍ A. Supervisor ❍ B. User ❍ C. Administrator ❍ D. Local
Supervisor
- Answer: A. The supervisor (or system) password is used so that only the technician
can get into the BIOS (CMOS). The user password is used to password-protect whatever
operating system is running on the computer, but it does it from the firmware
level. An “administrator” password is something used in Windows or on a networking
device, and a local password is something used in software
- Why would the display on a laptop get dimmer when the power
supply from the AC outlet is disconnected?
❍ A. The laptop cannot use full brightness when on battery
power.
❍ B. Power management settings on the laptop.
❍ C. To operate properly, laptop displays require an
alternating current power source.
❍ D. Security settings on the laptop
Power management settings on the laptop
- Answer: B. The power management settings on the laptop can cause the display to
automatically dim when the AC adapter is unplugged. In fact, this is the default on
many laptops in order to conserve battery power. These can be configured within
Power Options in Windows. You can certainly set the display to full brightness when
on battery power—it just isn’t recommended. Laptops can operate properly when connected
to the AC power adapter or when using the battery only. The display brightness
of a laptop isn’t affected by any security settings.
19. Which tool should always be used when working on the inside of the computer? ❍ A. Cordless drill ❍ B. Antistatic strap ❍ C. Multimeter ❍ D. Screwdriver
Antistatic strap
- Answer: B. Always use an antistatic strap to avoid ESD (electrostatic discharge).
Power tools and battery-operated tools such as cordless drills should be avoided.
Although multimeters and screwdrivers are tools you might use, they might not
always be necessary, whereas the antistatic strap should always be worn.
- What are advantages of using the Dynamic Host Configuration
Protocol (DHCP)? (Select the two best answers.)
❍ A. IP addresses can be managed from a central location.
❍ B. The network speed can automatically adjust based on
the type of traffic being generated.
❍ C. The hosts file on the computer can be validated for
proper entries.
❍ D. Media access control addresses can be changed.
❍ E. Computers can automatically get new addressing
when moved to a different network segment
IP addresses can be managed from a central location
Computers can automatically get new addressing
when moved to a different network segment
- Answers: A and E. Advantages of using DHCP include: IP addresses can be managed
from a central location and computers can automatically get new addressing when
moved to a different network segment (perhaps one that uses a different DHCP server).
Quality of Service (QoS) adjusts the network speed based on the type of traffic
generated. DHCP has nothing to do with the Hosts.txt file; that file contains static
entries of hostname to IP address conversions. Media Access Control addresses are
usually not changed on a network adapter, although they can be masked. MAC filtering
maintains a list of MAC addresses that are allowed to access a network, but once
again, this is a different concept from DHCP.
21. On a laptop, which of the following would most likely be a pointing device? ❍ A. Serial mouse ❍ B. PS/2 mouse ❍ C. USB mouse ❍ D. Touchpad
Touchpad
- Answer: D. The touchpad is the most likely of the listed devices. Serial devices (and
the port in general) are found less and less often on laptops. (They are extinct on new
laptops.) PS/2 mice are also rare. Both of these have given way to the touchpad and
external USB mice.
22. Which of the following storage technologies is used by traditional hard disk drives? ❍ A. Magnetic ❍ B. Optical ❍ C. Impact ❍ D. Solid-state
Magnetic
- Answer: A. The traditional hard drive is still the magnetic disk. This is because it is
well known and has a low cost per MB of storage space. There are optical hard drives,
but they are rare; optical drives are commonly implemented as CD, DVD, or Blu-ray
drives. Impact refers to a type of printer, such as the dot matrix or the daisy wheel
printer. Solid-state hard drives are gaining in popularity because they have no moving
parts, are quiet, and work as fast as (if not faster than) traditional magnetic hard
drives. However, they are far more expensive than the traditional drive, which slows
their general acceptance.
23. On which type of computer is RAM the most important? ❍ A. Gaming PC ❍ B. Virtualization workstation ❍ C. AV workstation ❍ D. HTPC
Virtualization workstation
- Answer: B. RAM is more essential to the virtualization workstation than any of the
other types of custom PCs listed. Virtual operating systems (virtual machines or VMs)
require a lot of RAM to run, much more than any other application. Plus, a virtualization
workstation will often have more than one virtual machine running, increasing its
need for RAM even further. Gaming PCs biggest requirements are CPU and video card.
Audio/video workstations require specialized audio and video cards, fast hard drives,
and dual monitors. Home theater PCs (HTPCs) require an HDMI output, surround
sound, a small form factor, and possibly a TV tuner
24. A client brings in a printer that is giving a paper-feed error. What is the most likely cause? ❍ A. The separation tab ❍ B. The developing rollers ❍ C. The paper tray ❍ D. The pickup rollers
The pick up rollers
- Answer: D. Paper-feed errors are often caused by the pickup rollers, which are in
charge of feeding the paper into the printer. If a separation tab fails, it might cause
more than one sheet of paper to be entered into the printer. The developing rollers
transfer ink to the imaging drum. The paper tray simply holds the paper. It should
not cause paper-feed errors unless the constraining tabs are too tight
25. Which of the following is the default port for HTTPS? ❍ A. Port 25 ❍ B. Port 80 ❍ C. Port 143 ❍ D. Port 443
Port 443
- Answer: D. Port 443 is the default port for Hypertext Transfer Protocol Secure
(HTTPS). This is the protocol used during online banking sessions, or if you go to
checkout when shopping online. Port 25 is the default port for SMTP. Port 80 is HTTP.
Port 143 is the Internet Message Access Protocol (IMAP); it’s similar to POP3 but
offers offline operation, and multiple clients can access the same mailbox
- What is the maximum distance at which a Class 2 Bluetooth
device can receive signals from a Bluetooth access point?
❍ A. 100 meters
❍ B. 10 meters
❍ C. 5 meters
❍ D. 1 meter
10 meters
- Answer: B. Class 2 Bluetooth devices have a maximum range of approximately 10
meters. Class 2 devices are the most common (for example, Bluetooth headsets).
Class 1 has a 100-meter range, and Class 3’s range is approximately 1 meter. The
maximum length of a standard USB 2.0 cable is 5 meters
27. Which of the following form factors does a VGA connector comply with? ❍ A. 8P8C ❍ B. 15-pin D shell ❍ C. microATX ❍ D. RG-6
15-pin D shell
- Answer: B. The VGA connector uses a D shell (also referred to as D-sub) 15-pin
connector. It has three rows of five pins. The 8P8C is the technically correct name for
an RJ45 networking plug. microATX is a motherboard form factor commonly used in
smaller PCs and HTPCs. RG-6 is the connector used for cable TV and cable Internet
connections.
- You and a co-worker are running network cables above the drop
ceiling. The co-worker accidentally touches a live AC power line
and is thrown off the ladder and onto the ground. He is dazed and
can’t stand. He is no longer near the AC power line. What should
you do first?
❍ A. Cut the power at the breaker.
❍ B. Move the co-worker farther down the hall.
❍ C. Apply CPR.
❍ D. Call 911.
Call 911
- Answer: D. Because the immediate danger is gone, call 911 right away. Then apply
first aid and CPR as necessary. The next step would be to shut the power off at the
electrical panel or call the building supervisor to have the power shut off.
- A customer reports that an optical drive in a PC is no longer
responding. What question should you ask first?
❍ A. “What has changed since the optical drive worked
properly?”
❍ B. “Did you log in with your administrator account?”
❍ C. “What did you modify since the optical drive worked?”
❍ D. “Have you been to any inappropriate websites?”
“What has changed since the optical drive worked
properly?”
- Answer: A. You should first ask if anything has changed since the optical drive worked
properly. Don’t blame the user by asking what “you” modified; it implies that you think
the user caused the issue. Always ask if anything has changed first before any other
questions. Try not to accuse a user of accessing inappropriate websites because this
could be considered inflammatory and harassment. Think like a robot with the single
purpose of fixing the problem, but act like a professional and courteous human being!
30. Which device can store a maximum of 1.44 MB on a removable disk? ❍ A. Floppy drive ❍ B. CD-ROM ❍ C. ROM ❍ D. Compact Flash
. Floppy drive
- Answer: A. The floppy disk drive (FDD) stores a maximum of 1.44 MB on a removable
disk (1.38 MB of which is actual data). CD-ROM drives use removable discs; however,
the maximum they can store is much greater. Note that magnetic disks are spelled
with a k, while optical discs are spelled with a c. The acronym ROM usually refers to a
chip on a circuit board that is not removable. Compact Flash comes in varying sizes
(all greater than 1.44 MB) and is considered a card, not a disk.
31. What wireless networking standard operates at 5 GHz only? ❍ A. 802.11a ❍ B. 802.11b ❍ C. 802.11g ❍ D. 802.11n
802.11a
- Answer: A. 802.11a operates at 5 GHz only. 802.11b and g operate at 2.4 GHz.
802.11n operates at either 2.4 or 5 GHz. The IEEE 802.11 wireless standards arecollectively known as 802.11x. There is no actual 802.11x standard; it was not used in
order to avoid confusion. 802.11x is instead a variable that you will sometimes see
that refers to two or more 802.11 technologies
32. What is the PC equivalent of FireWire? ❍ A. IEEE 1284 ❍ B. USB ❍ C. IEEE 1394 ❍ D. ISA
IEEE 1394
- Answer: C. IEEE 1394 is the PC equivalent of FireWire. FireWire was originally developed
by Apple, and although the two names are often used interchangeably, the PC
standard is IEEE 1394. USB is the Universal Serial Bus, a similar standard but with a
different architecture and data transfer rate. IEEE 1284 is an older parallel PC standard
for printer cables and connections. ISA is the Industry Standard Architecture, a legacy
16-bit adapter card slot
33. Which type of RAM has a peak transfer of 12,800 MB/s? ❍ A. DDR3-800 ❍ B. DDR2-1600 ❍ C. DDR3-1600 ❍ D. DDR2-800
DDR3-1600
- Answer: C. DDR3-1600 has a peak transfer rate of 12,800 MB/s. It runs at an I/O bus
clock speed of 800 MHz and can send 1600 megatransfers per second (MT/s). It is
also known as PC3-12800. To figure out the data transfer rate of DDR3 from the name
“DDR3-1600”, simply multiply the 1600 by 8 (bytes) and solve for megabytes: 12,800
MB/s. To figure out the data transfer rate of DDR3 by the consumer name “PC3-
12800”, just look at the number within the name and add “MB/s” to the end. To figure
out the data transfer rate when given only the I/O bus clock speed (for example, 800
MHz), multiply the clock speed by 2 and then multiply that number by 8 and solve for
megabytes: 800 MHz×2×8 = 12,800 MB/s.
DDR3-800 has a peak transfer rate of 6,400 MB/s; it is also known as PC3-6400.
There is no DDR2-1600. The fastest DDR2 standard is DDR2-1066, which has a peak
transfer rate of 8,533 MB/s. DDR2-800 (like DDR3-800) has a peak transfer rate of
6,400 MB/s. It is commonly sold as PC2-6400
34. Which type of printer uses a print head, ribbon, and tractor feed? ❍ A. Laser ❍ B. Impact ❍ C. Inkjet ❍ D. Thermal
Impact
- Answer: B. The impact printer uses a print head, ribbon, and tractor feed. An example
of an impact printer is the dot matrix. Laser printers are much more complex and use
more parts. Inkjet printers use a print head but use an ink cartridge instead of a ribbon
and don’t use a tractor feed. Thermal printers use a print head and a special heating
element.
- What is a possible symptom of a failing CPU?
❍ A. CPU is beyond the recommended voltage range.
❍ B. Computer won’t boot.
❍ C. BIOS reports low temperatures within the case.
❍ D. Spyware is installed into the browser
CPU is beyond the recommended voltage range
- Answer: A. If the CPU is running beyond the recommended voltage range for extended
periods of time, it can be a sign of a failing CPU. It could also be caused by overclocking.
Check in the BIOS to see if the CPU is overclocked or not. If the computer
won’t boot at all, another problem might have occurred, or the CPU might have
already failed. Low case temperatures are a good thing (if they aren’t below freezing!),
and spyware is unrelated to this issue
36. Which of the following cable types is not affected by EMI but requires specialized tools to install? ❍ A. Cat 6 ❍ B. STP ❍ C. Fiber optic ❍ D. Coaxial
Fiber optic
- Answer: C. Fiber-optic cable is the only answer listed that is not affected by electromagnetic
interference (EMI). This is because it does not use copper wire or electricity,
but instead uses glass or plastic fibers and light. Any copper cable will be susceptible
to EMI to a certain degree. Regular UTP cable such as Cat 5e or Cat 6 will be very susceptible.
Coaxial slightly less, and shielded twisted-pair (STP) even less than that. STP
is difficult to install and must be grounded; because of these things, it is found less
commonly in networks. To truly protect from EMI, fiber-optic is the best way to go
- A computer you are working on has a lot of dust inside it. How
should you clean this?
❍ A. Disassemble the power supply and remove the dust.
❍ B. Use a vacuum to clean up the dust.
❍ C. Use a surface dust cleaning solution.
❍ D. Use compressed air to remove the dust
Use compressed air to remove the dust
- Answer: D. Compressed air is safe. However, you might want to do this outside and
vacuum up the left over residue. Never disassemble the power supply. It is called a
field replaceable unit (FRU) for good reason. Do not stick a vacuum cleaner inside a
computer; it could damage the components. Do not spray any kind of solutions inside
the computer; this will damage the components
- Setting an administrator password in the BIOS accomplishes
which of the following?
❍ A. Prevents a user from rearranging the boot order
❍ B. Prevents a user from reading e-mail
❍ C. Prevents a virus from infecting the MBR
❍ D. Prevents an attacker from opening the case
Prevents a user from rearranging the boot order
- Answer: A. Setting an admin password in the BIOS prevents a user from rearranging
the boot order. The idea behind this is to stop a person from attempting to boot off of
an optical disc or USB flash drive. As an administrator, you should change the BIOS
boot order to hard drive first. Then apply an administrative (also known as supervisory)
password. That’ll stop ‘em right in their tracks! The admin password does not
prevent any of the other listed answers. To prevent a user from reading e-mail, you
would have to remove e-mail applications (such as Outlook) and probably take away
the browser, too! (Doesn’t sound feasible.) To prevent a virus from infecting the MBR,
you could turn on boot sector scanning in the BIOS (if the motherboard supports it).
To prevent an attacker from opening the case, use a case lock. To find out if someone
attempted to get into the computer itself, turn on the chassis intrusion alert in the
BIOS.
39. Which function is performed by the external power supply of a laptop? ❍ A. Increases voltage ❍ B. Stores power ❍ C. Converts DC power to AC power ❍ D. Converts AC power to DC power
Converts AC power to DC power
- Answer: D. The external power supply of the laptop converts AC to DC for the system
to use and for charging the battery. It is known as the power adapter, and it needs to
run at a very specific voltage. In fact, different make and model power adapters will
usually not work with different laptops, even if the voltages are only slightly different.
The adapter does not store power; that is the responsibility of the laptop battery. It is
also accomplished by a UPS, though you probably wouldn’t lug one of those around
with your laptop while travelling.
40. Which type of cable has only two twisted pairs? ❍ A. UTP ❍ B. POTS line ❍ C. Fiber ❍ D. Coaxial
POTS line
- Answer: B. The plain-old telephone service (POTS) line has two twisted pairs of
copper wire, for a total of four wires. It is used for telephone landlines. Unshielded
twisted pair (UTP) has four pairs, eight wires total. Fiber-optic cable has a single glass
or plastic core that sends light. Coaxial has a single core of copper