Assessment Test Flashcards

1
Q

What is the name of the power connector that is larger than the connector used for floppy diskette drives and that is commonly used with PATA drives?AT system connector, Berg, Molex, ATX system connector,

A

C. The standard peripheral power connector, or Molex connector, is commonly used on larger drives because it allows more current to fow to the drive than does the Berg connector, which is used with foppy diskette drives. For more information, see Chapter 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your laptop has 2GB of installed memory and uses shared video memory. If the video card is using 512MB, how much is left for the rest of the system?2GB, 1.5GB, 512MB, Cannot determine,

A

B. If the laptop is using shared video memory, then the system memory is shared with the video card. If the video card is using 512MB (half a gigabyte), then there is 1.5GB left for the system. See Chapter 9 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When lifting heavy equipment, what is the proper technique?Get the heaviest part closest to your body and lift with your legs., Get the heaviest part closest to your body and lift with your back., Get the lightest part closest to your body and lift with your legs., Get the lightest part closest to your body and lift with your back.,

A

A. When lifting heavy equipment, center the weight as close to your body as possible. Then, keep your back straight and lift with your legs. See Chapter 11 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following involves applying a strong magnetic field to initialize the media before tossing it away?Fraying, Fracking, Degaussing, Spreading,

A

C. Degaussing involves applying a strong magnetic field to initialize the media (this is also referred to as disk wiping). This process helps ensure that information doesn’t fall into the wrong hands. For more information, see Chapter 17.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which applet in Windows Vista is the primary interface for configuring synchronization of offline files?Synchronization wizard, Action Center, Merge, Sync Center,
A

D. The sync center in Windows Vista is the primary interface for configuring synchronization. For more information, see Chapter 15.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the data throughput provided by one ISDN bearer channel?16Kbps, 56Kbps, 64Kbps, 128Kbps,

A

C. An ISDN B (bearer) channel provides 64Kbps data throughput. A home-based BRI ISDN provides two B channels. See Chapter 8 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not a common monitor technology?CRT, Plasma, OLED, Super PMOLED,

A

D. Although there is a Super AMOLED display, employing active-matrix technology, there is not a corresponding passive-matrix version. The other technologies exist and are discussed in further detail in Chapter 4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the component called that stores the material that ends up printed to the page in a laser printer?Toner cartridge, Ink cartridge, Laser module, Laser cartridge,

A

A. Laser printers use toner, which they melt to the page in the image of the text and graphics being printed. A toner cartridge holds the fne toner dust until it is used in the printing process. See Chapter 10 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With dynamic storage, which of the following partition types are possible?Complex, bridged, or mirrored, Simple, spanned, or striped, Simple, complex, or interleaved, Spanned, interleaved, or striped,

A

B. Windows7, Vista, and XP support both basic and dynamic storage. Basic can have a primary and an extended partition, while dynamic can be simple, spanned, or striped. For more information, see Chapter 13.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _________ is the measurement of the number of pixels an LCD monitor can display without the image appearing distorted.Native resolution, Contrast ratio, Pixelation, Base frequency,

A

A. The native resolution refers to how many pixels an LCD screen can display (across and down) without distortion. The native resolution is based on the placement of the actual transistors that create the image by twisting the liquid crystals. The contrast ratio is the measurement between the darkest color and the lightest color that an LCD screen can display. For more information, see Chapter 4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following standards is also known as CardBus?PCMCIA 1.0, PCMCIA 2.0, PCMCIA 5.0, ExpressCard,

A

C. PCMCIA 5.0 is also known as CardBus. See Chapter 9 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are popular mobile-device operating systems? (Choose all that apply.)Android, Windows 7, Ubuntu, iOS,

A

A, D. Google’s Android and Apple’s iOS are two of the most popular operating systems for mobile devices on the market. The other two are not. Although some mobile operating systems are based on Linux or UNIX, Ubuntu is a Linux distribution not used for mobile devices. For more information, see Chapter 18.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

W hich of the following is not considered a system component that can be found inside a computer?CPU, RAM, PCIe graphics adapter, Motherboard,

A

C. System components are essential for the basic functionality of a computer system. Many of the landmarks found on the motherboard can be considered system components, even expansion slots to a degree. What you plug into those slots, however, must be considered peripheral to the basic operation of the system. For more information, see Chapter 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

After SATA was introduced, what was the retroactive term used for the original ATA specification?EIDE, IDE, PATA, SCSI,

A

C. IDE (ATA-1) and EIDE (ATA-2 and later) were specifc nicknames for the ATA series of standards. Although ATA is technically accurate, it refers to legacy IDE standards as
well as newer SATA standards. Instead of using the term ATA to be synonymous with IDE and EIDE, as had been done in the past, the term PATA was coined, referring to the parallel nature of IDE communications. The term PATA differentiates the IDE and EIDE form of ATA from Serial ATA. SCSI is a related yet completely different type of technology. For
more information, see Chapter 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your laser printer has recently starting printing vertical white lines on documents it prints. What is the most likely cause of the problem?The print driver is faulty., The fuser is not heating properly., There is toner on the transfer corona wire., There is a scratch on the EP drum.,

A

C. White streaks on printouts are most likely caused by toner on the transfer corona wire. Vertical black lines are caused by a scratch or a groove in the EP drum. If the fuser was not
heating properly, toner would not bond to the paper and you would have smearing. Faulty print drivers will cause garbage to print or there will be no printing at all. See Chapter 20
for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following topologies allows for network expansion with the least amount of disruption for the current network users?Star, Bus, Ring, Mesh,

A

A. The star topology is the easiest to modify. A physical star topology branches each network device off a central device called a hub or a switch, making it easy to add a new workstation. See Chapter 6 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What term refers to copying data between a mobile device and a computer system to mirror such things as contacts, programs, pictures, and music?Calibration, Remote wipe, Pairing, Synchronization,

A

D. Synchronizing a mobile device with a computer system allows you to mirror personal data between the devices, regardless of which one contains the most current data. Calibration refers to matching the device’s and user’s perceptions of where the user is touching the screen. Remote wipes allow you to remove personal data from a lost or stolen device. Pairing is what must be done in Bluetooth for two Bluetooth devices to connect and communicate. For more information, see Chapter 18.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which term is synonymous with MAC filtering?Disabling Autorun, Shredding, Port disabling, Network Lock,

A

D. On a number of wireless devices, the term Network Lock is used in place of MAC filtering, and the two are synonymous. For more information, see Chapter 17.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are installing a new graphics adapter in a Windows 7 system. Which of the following expansion slots are designed for high-speed, 3D graphics adapters? (Choose all that apply.)USB, AGP, PCI, ISA, PCIe

A

B, E. Although technically PCI and ISA could be used for graphics adapters, AGP was specifcally designed for the use of high-speed, 3D graphic video cards. PCIe offers better performance than AGP for graphics adapters. For more information, see Chapter 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What Windows operating system tool can be used to block access from the network (be it internal or the Internet)?Windows Firewall, Windows Defender, Advanced Security, Device Manager,

A

A. WindowsFirewall (StartaControl PanelaWindowsFirewall) is used to block access from the network (be it internal or the Internet). For more information, see Chapter 15.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following are components that can commonly be found on a motherboard? (Choose all that apply.)Slots, Fan connectors, Gyroscope, Scanner, HDD

A

A, B. Motherboards commonly have RAM slots and expansion slots. Older motherboards even had CPU slots. Modern motherboards have connectors for powering cooling fans.
Gyroscopes are most commonly found in mobile devices. Scanners are external devices. Although there might be one or more types of HDD interfaces built into the motherboard,
the HDD itself is not. For more information, see Chapter 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is a copy of your system configuration at a given point in time?Restore point, MBR, Registry, BOOT.INI,

A

A. A restore point is a copy of your system configuration at a given point in time. It’s like a backup of your configuration but not necessarily your data. For more information, see
Chapter 12.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which feature is designed to keep Windows current by automatically downloading updates such as patches and security fixes and installing these fixes automatically?Security Center, Action Center, Windows Update, Windows Anytime,

A

C. Windowsincludes WindowsUpdate, a feature designed to keep Windowscurrent by
automatically downloading updates such as patches and security fxes and installing these
fxes automatically. For more information, see Chapter 12.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following can provide electrical power over Ethernet cabling?PoE, QoS, DoS, WoL,

A

A. Power over Ethernet (PoE) is a handy technology to supply both power and an Ethernet connection. The purpose of Power over Ethernet (PoE) is pretty much described in its name: Electrical power is transmitted over twisted-pair Ethernet cable (along with data). For more information, see Chapter 14.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

T he output of a dot-matrix printer is typically measured in what?CPM, CPS, PPM, PPS,

A

B. The output of impact printers such as dot-matrix printers is measured in characters per second (CPS). Many bubble-jet and laser printers are measured in terms of pages per minute
(PPM). See Chapter 10 for more information.

26
Q

On which port does FTP run by default?21, 25, 63, 89,

A

A. FTP listens on port 21. See Chapter 7 for more information.

27
Q

Encrypting File System (EFS) is available in which editions of Windows 7? (Choose all that apply.)Professional, Home Premium, Enterprise, Ultimate, Business

A

A, C, D. EFS is available in the Professional, Enterprise, and Ultimate editions of Windows7 allowing for encryption/decryption on fles stored in NTFS volumes. For more information, see Chapter 14.

28
Q

What can be used at the check-in desk of a doctor’s office to prevent patients from viewing confidential information?An antiglare filter, A privacy filter, An LED display, A thin client,

A

B. Privacy flters are used to limit the viewing angle for a monitor. With such flters, the screen image becomes indiscernible when viewed at just a few degrees from center. For more information, see Chapter 4.

29
Q

With which type of duplexing do communications travel in both directions but in only one direction at any given time?Full, Half, Auto, Mechanical,

A

B. With half duplex, communications travel in both directions but in only one direction at any given time. For more information, see Chapter 14.

30
Q

Which cable standard is used for Ethernet 10Base2 installations?RG-6, RG-8, RG-58AU, RJ-45,

A

C. 10Base2 is also known as thinnet, and it uses coaxial cable. The correct cable standard is RG-58AU. RG-6 is for cable television and satellite modems, and RG-8 is for thicknet, or 10Base5. RJ-45 is a connector for twisted pair cabling. See Chapter 6 for more information.

31
Q

Which LCD component is responsible for providing brightness?Backlight, Inverter, Screen, Backdrop,

A

A. The backlight provides light to the LCD screen. The inverter provides power to the
backlight, and the screen displays the picture. See Chapter 9 for more information

32
Q

Which of the following computer components can retain a lethal electrical charge even after the device is unplugged? (Choose all that apply.)Monitor, Processor, Power supply, RAM,

A

. A, C. Monitors and power supplies can retain signifcant electrical charges even after
they’re unplugged. Don’t open the back of a monitor or the power supply unless you are
specifcally trained to do so. See Chapter 11 for more information.

33
Q

You are working with a system that is assigned IP information configuration information from a central server. You wish to manually refresh the IP information on the system. Which of the following commands would you use?IPCONFIG /REFRESH, IPCONFIG /ALL, IPCONFIG /RENEW, WINIPCFG /ALL,

A

C. The IPCONFIG command can be used with WindowsXP (and others) to see the networking confguration values at the command line. It is one of the most commonly used command-line utilities that can be used in troubleshooting and network confgurations. To renew IP confguration information, the IPCONFIG /renew command is used to force the DHCP server to renew the IP information assigned to the system. See Chapter 20 for more information.

34
Q

Which of the following is a chip that is integrated into PATA drives, as opposed to being mounted on a daughter card?Controller, CPU, Host adapter, IDE,

A

A. A controller chip is responsible for encoding data to be stored on the disk platters as well as performing geometry translation for the BIOS. Translation is necessary because the true number of sectors per track of the hard disk drive system usually exceeds what is supported by the BIOS. For more information, see Chapter 2.

35
Q

. Which of the following could be described as a small, deviously ingenious program that replicates itself to other computers, generally causing those computers to behave abnormally? (Choose the best answer.)Rogue, Redirector, Virus, Pop-up,

A

C. A computer virus is a small, deviously ingenious program that replicates itself to other computers, generally causing those computers to behave abnormally. Generally speaking, a virus’s main function is to reproduce. For more information, see Chapter 17

36
Q

Your system has issues with locking up intermittently. Because it is running Windows XP, what diagnostic tool can you use that does not exist in Windows Vista or Windows 7?SFC, Dr. Watson, NTLDR, MSCONFIG,

A

B. WindowsXP includes a special utility known as Dr. Watson. This utility intercepts all error conditions and, instead of presenting the user with a cryptic Windowserror, displays
a slew of information that can be used to troubleshoot the problem. For more information, see Chapter 19.

37
Q

Which of the following is a virtual machine manager—the software that allows the virtual machines to exist?Comptroler, Shell, Kernel, Hypervisor,

A

D. The hypervisor is a virtual machine manager—the software that allows the virtual
machines to exist. For more information, see Chapter 12.

38
Q

Which of the following protocols can be used in close range to transfer data between a mobile device and a computer system or to allow media to stream from the mobile device to an audio system?SMTP, Bluetooth, POP3, IMAP4,

A

B. Bluetooth allows you to pair a mobile device to a computer or to a device such as an automotive sound system or headset. Data can be transferred between devices and media can be streamed from the mobile device. For more information, see Chapter 18.

39
Q

Which of the following Control Panel applets is unique to Windows Vista?Tablet PC Settings, Network Setup Wizard, Printers and Faxes, Action Center,

A

A. The Tablet PC Settings applet (StartaControl PanelaTablet PC Settings) in WindowsVista can be used, as the name implies, to configure the device on which the operating system is installed to function as a true tablet. For more information, see Chapter 15.

40
Q

Which of the following is a security mechanism used by HTTPS to encrypt web traffic between a web client and server?IPSec, SSL, L2TP, PPPoE,

A
B. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport 
Layer Security (TLS). See Chapter 7 for more information.
41
Q

Which of the following connectors is used for a parallel printer port?DE9, DA15, DB25, DE25,

A

C. Parallel printer ports use a D-subminiature connector known as a DB25. The DE9 port is used for the RS-232 serial port. The DA15 is used for AUI and game/joystick ports. The
DE25 is not a common port. For more information, see Chapter 3.

42
Q

Which of the following are modular ports used in data communications? (Choose all that apply.)RG-6, RJ-45, RJ-11, DB25, RG-11

A

B, C. RJ-11 ports are used in analog telephony and allow modems attached to computer serial ports to transmit modulated digital information across the public switched telephone network (PSTN). RJ-45 ports are used by various network interface controller (NIC) cards for attachment to networks such as Ethernet. RG-6 and RG-11 coaxial connectors and DB25 connectors are not modular. For more information, see Chapter 3.

43
Q

One laser printer in your office keeps getting frequent paper jams. What is the most likely cause of the problem?Worn paper feed rollers, Faulty stepper motor, Faulty fuser assembly, The EP drum not advancing properly,

A

A. The most likely cause of those listed is a worn paper feed roller. Stepper motors control
the back-and-forth motion of a print head in a bubble-jet printer. If the fuser assembly were
faulty, the images would smear. See Chapter 20 for more information

44
Q

Which MSINFO32 option is available only with Windows XP?/PCH, /COMPUTER, /NFO, /REPORT,

A

A. The /pch option is available only in WindowsXP and is used to display the history view. For more information, see Chapter 13.

45
Q

Roughly how much time spent communicating should be devoted to listening?23 percent, 40 percent, 50 percent, 80 percent,

A

C. Roughly half the time spent communicating should be devoted to listening. See Chapter
11 for more information.

46
Q

W hich of the following is a requirement for virtualization workstations?Enhanced video, Enhanced audio, Maximum RAM and CPU cores, RAID array,

A

C. Virtualization workstations require more RAM than standard systems and need to be equipped with as many multicore processors as possible. Video and audio are not resources
that need to be enhanced for such workstations. Although a RAID array is a wise addition whenever servers with valuable information are involved, a virtualization workstation does
not require one. For more information, see Chapter 5.

47
Q

What is the function of the laser in a laser printer?It heats up the toner so it adheres to the page., It charges the paper so it will attract toner, It creates an image of the page on the drum., It cleans the drum before a page is printed.,

A

C. The laser creates an image on the photosensitive drum that is then transferred to the paper by the transfer corona. The fuser heats up the toner so it adheres to the page. The transfer corona charges the page, and the eraser lamp cleans the drum before a page is printed. A rubber blade is also used to physically remove toner from the drum. See Chapter
10 for more information.

48
Q

Which Control Panel applet allows you to administer, as well as deploy, component services and configure behavior like security?SFC, Data Sources, Component Services, DDR,

A

C. Component Services allows you to administer, as well as deploy, component services and confgure behavior like security. For more information, see Chapter 15.

49
Q

Which of the following are programs that enter a system or network under the guise of another program? (Choose the best answer.)Worms, Trojans, Rootkits, Spyware,

A

B. Trojans are programs that enter a system or network under the guise of another program. While rootkits may do this, it is not their primary feature and thus not the best
answer for this question. For more information, see Chapter 17

50
Q

Which of the following would not be considered a standard permission in Windows using NTFS?Full Control, Modify, Allow, Write,

A

C. Standard permissions are collections of special permissions, including Full Control,
Modify, Read & Execute, Read, and Write. For more information, see Chapter 12.

51
Q

Which layer of the OSI model has the important role of providing error checking?Session layer, Presentation layer, Application layer, Transport layer,

A

D. A key role of the Transport layer is to provide error checking. The Transport layer also provides functions such as reliable end-to-end communications, segmentation and reassembly of larger messages, and combination of smaller messages into a single larger message. See Chapter 6 for more information.

52
Q

Which of the following is a standard computer that can access resources locally as well as from servers but requires no specialized enhancements?Gaming PC, Home server, Thin client, Thick client,

A

D. A thick client is any computer system with a standard con
figuration. The gaming PC has enhancements over thick clients to their CPU, video, audio, and cooling. The home
server PC must have specialized capabilities and services along with a faster NIC than the thick client and a RAID array. The thin client is a lesser device in comparison to the thick client, but that cost-saving feature is its enhancement. These less expensive computers can
connect over the network to servers for their operating system images and applications. For more information, see Chapter 5.

53
Q

W hich of the following is a company that provides direct access to the Internet for home and business computer users?ASP, ISP, DNS, DNP,

A

B. An Internet service provider (ISP) provides direct access to the Internet. See Chapter 8
for more information.

54
Q

Which of the following protocols can be used by a client to retrieve email from a server?DNS, FTP, SMTP, IMAP,

A

D. The IMAP and POP3 protocols can be used to retrieve email from mail servers. See Chapter 7 for more information.

55
Q

In Windows, the Account Lockout Counter in an Account Lockout policy keeps track of the number of invalid attempts before lockout occurs. The default is 0 (meaning the feature is turned off), but it can be set from 1 to what?9999, 999, 99, 24,

A

B. It can be set from 1 to 999. For more information, see Chapter 15.

56
Q

You have been told to use Task Manager to change the priority of a process to Below Normal. This equates to a base priority of what?2, 4, 6, 8,

A

C. For applications that don’t need to drop all the way down to Low, this equates to a base
priority of 6. For more information, see Chapter 13.

57
Q

W hich of the following are 4G technologies? (Choose all that apply.)LTE, GSM, CDMA, WiMax,

A

A, D. WiMax and LTE are the two current 4G cellular technologies. GSM and CDMA are 3G technologies. See Chapter 8 for more information.

58
Q

You have just added a new network to your Windows Vista laptop and it is asking you to specify a type of location. With which location types is network discovery on by default? (Choose all that apply.)Home, Work, Public, Private, HomeGroup

A

A, B. The three location types in WindowsVista for a network are Home, Work, and Public. If you choose one of the first two, network discovery is on by default, allowing you to
see other computers and other computers to see you. For more information, see Chapter 14.

59
Q

Which of the following is not considered a system component that can be found inside a computer?CPU, RAM, PCIe graphics adapter, Motherboard,

A

C. System components are essential for the basic functionality of a computer system. Many
of the landmarks found on the motherboard can be considered system components, even
expansion slots to a degree. What you plug into those slots, however, must be considered
peripheral to the basic operation of the system. For more information, see Chapter 1.

60
Q

Which of the following is not a requirement for a home server PC?TV tuner, Print and file sharing services, Gigabit NIC, RAID array,

A

A. A TV tuner card is a requirement for a home theater PC but not for a home server. The
other options are among those features that are required. For more information, see Chapter 5.