ttyh

¡Supera tus tareas y exámenes ahora con Quizwiz!

A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?

2 primary, 1 active, 1 extended, 3 logical

A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?

Chkdsk

A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?

Choose Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.

The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

DHCP

Which step is critical in selecting and installing multiple cooling fans for a PC case?

Make sure they provide the same amount of air flow

Which file is used to detect and build information about the hardware devices installed on a Windows XP laptop during the boot process?

NTDETECT.COM

A technician uses the shrink volume feature of the disk management utility and splits the partition. What must the technician do next in order to make the partition useable?

Partition the unallocated space

A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?

SSH

After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?

Set the file permissions to Read and Execute.

A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)

The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing and inkjet printers are less expensive as an initial purchase than laser printers

Which statement is true about DDR2 and DDR3 RAM modules?

They use different types of DIMM slots on the motherboard.

After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. Which additional action should the administrator take to resolve this problem?

Verify that the MAC address for the laptop is in the MAC address filter table.

Which open standards-based wireless security mode supports the highest level of security?

WPA2

A customer needs additional storage space on an older computer. What will the technician look at in the computer to determine if an additional hard drive can be added?

an available PATA/SATA connection

What does %USERPROFILE% represent in the pathC:Users%USERPROFILE%AppDataLocalTemp?

an environment variable that is set by the operating system

What are four layers in the TCP/IP reference model?

application, transport, internet, network access

A user reports that some printing jobs are not being printed. The technician checks and notices that the jobs are stuck in the printing queue. What action should the technician take to solve the problem?

cancel the job that displays the error that is preventing the other jobs from being printed

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

check for the latest OS patches and updates

A technician is servicing a laser printer. Which two printer parts should the technician avoid touching because they retain large amounts of voltage even when disconnected from a power source?

corona wire and conditioning roller

An audit reveals company files that are stored in the personal server space of a former employee have been modified after the employee left the company. What should be done to prevent further unauthorized access to these files, while still allowing the company to use them?

disable the account of the former employee

Which feature of a mobile device touchscreen will allow a user to zoom in displayed items such as maps and photographs?

double touch

How is DSL able to carry telephone and data signals at the same time?

each signal uses a different frequency

To avoid electromagnetic interference, which type of equipment should a technician route copper network cables away from?

electric motors

Which motherboard feature controls the amount of data that a CPU transfers at one time?

front side bus

What laptop component converts DC power to AC so that the display can illuminate?

inverter

Which feature is characteristic of the ntbackup command?

it can be executed from a batch file

Which three attributes of NTFS make it a better file system than FAT32? (Choose three.)

journaling, encrytion at the file and folder level, and file and folder permission options

What best describes the security threat of spoofing?

making data appear to come from a source that is not the actual source

Which power criterion will affect the number of internal drives that are installed in a computer?

power supply wattage

A technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this?

set up the virtual machines using a native hypervisor.

A user updates a device driver and reboots the system. When the user successfully logs in after the reboot, the OS displays a blue screen and crashes. The user presses the F8 key on reboot and tries to log in using the Last Known Good Configuration but gets the same result. Why will the Last Known Good Configuration not work?

the Last Known Good Configuration is overwritten with the current one on successful login.

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

the computer has an invalid default gateway address

Why do laptop computers use CPU throttling techniques?

to reduce the heat that the CPU may generate

In what circumstance would plenum-rated twisted-pair computer network cabling be required?

when the cable run must be installed inside a ceiling

What is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point?

wireless clients must then have the SSID manually configured to connect to the wireless network.


Conjuntos de estudio relacionados

PARA 131 - Reading Comprehension: Informative Texts: Informative Text Elements / Page 1

View Set

Fundamentals of management Final exam

View Set

CSCE 222 Midterm 1 (Quiz 1-5 questions)

View Set

George W. Bush and the War on Terror

View Set

CH 23: Conditions Occurring After Delivery

View Set

AP Biology: Carbon & The Molecular Diversity of Life

View Set

Unification of Italy about 1860-1871

View Set