C393 Pre-Assessment

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following voltages are carried by floppy drive power connectors? Each correct answer represents a complete solution. Choose all that apply.

A +5VDC B +12VDC C +10VDC D -8VDC Answer is A and B A floppy drive power connector has four wires. The red wire carries +5VDC and the yellow wire carries +12VDC. The other two black wires are ground wires. Floppy drive connectors are used to supply power to floppy drives and other small form factor devices. A floppy drive connector is also known as a Berg connector.

How many devices are allowed to be networked together on a single FireWire 400?

A 15 B 63 C 127 D 7 Answer B is correct. FireWire 400 carries data over a maximum cable length of 4.5 meters with a maximum of 63 devices connected to each interface on the computer.

Which of the following is the default port used by SMTP (Simple Mail Transfer Protocol)?

A 25 B 20 C 21 D 80 Answer A is correct. TCP port 25 is the default port used by the SMTP. Answers C and B are incorrect because by default, the FTP server uses TCP port 21 for session control and TCP port 20 for data transfer. Answer D is incorrect because TCP port 80 is the default port used by HTTP (Hypertext Transfer Protocol).

What transfer rate is supported by the 144-pin SODIMM?

A 32 bit B 64 bit C 8 bit D 16 bit Answer B is correct. The 144-pin SODIMM has a transfer rate of 64-bits. It was introduced for laptops. SODIMMs come in smaller packages, consume lesser power, but are more expensive than DIMMs.

What is the maximum cable length that FireWire 400 supports?

A 4.5 meters B 2 meters C 8 Meters D 2.5 meters Answer A is correct. FireWire 400 carries data over a maximum cable length of 4.5 meters with a maximum of 63 devices connected to each interface on the computer and has a maximum data throughput of 400 Mbps in half duplex.

You believe that your laser printer has a power issue. Using a multimeter, what reading should you get from pin 5?

A 5V B +5V C -24V D +24V Answer A is correct. Using the multimeter, you should find the following voltages: •Pin 1 : +5v •Pin 5 : -5v •Pin 9 : +24v

Which of the following memory modules support 32-bit wide memory bus? Each correct answer represents a complete solution. Choose two.

A 72-pin SODIMM B 200-pin SODIMM C168-pin DIMM D72-pin SIMM Answers D and A are correct. The memory modules that support 32-bit wide memory bus are: •72-pin SIMM •72-pin SODIMM Answers B and C are incorrect. The 200-pin SODIMM and 168-pin DIMM support 64-bit wide memory bus.

Minsuh wants to install two video cards on a computer for high quality video graphic games. Which of the following does she need for this task?

A A motherboard with two AGP slots B A motherboard with two PCIe x2 slots C A motherboard with two PCIe x1 slots D A motherboard with two PCIe x16 slots Answer D is correct. Minsuh needs a motherboard with two PCIe x16 slots to install two video cards on a computer for high quality video graphic games. The two cards will divide the rendering work of the screen. PCIe x16 slots are able to process high quality video graphics of high-end video graphic games. An x16 slot has a bandwidth of 4GB/s. Answers C and B are incorrect. PCIe x1 or x2 slots are used for adapters such as sound cards that use less bandwidth. Answer A is incorrect. Motherboards do not have more than one AGP slot. Moreover, high-speed PCIe graphic cards will give better performance than AGP.

Which of the following is an example of a computer system featuring a custom configuration?

A A standard thick client used for A/V editing B An enterprise server with 100 concurrent client sessions C A laptop with a BD-RE burner D A computer with a fast processor and high-end graphics adapter used for gaming Answer D is correct. Gaming PCs require high-end CPUs, graphics adapters, sound cards, and cooling. This is considered a custom configuration. The other configurations are not examples of custom configurations and standard systems doing extraordinary work (the A/V editor) or their normal job.

Of the following voltage pairings, which one accurately represents the input and output, respectively, of power supplies and AC adapters?

A AC in, AC out B DC in, DC out C AC in, DC out D DC in, AC out Answer C is correct. Power supplies and AC adapters use standard wall outlets for an input of AC voltage, which they convert to the DC voltages required by the components they supply power to.

What is a virtualization workstation?

A An operating system running in RAM on a thin client that has no hard drive B A centralized workstation that manages the virtual machines of an enterprise running on other devices C A workstation running within a virtual machine D A workstation that runs virtual machines Answer D is correct. A virtualization workstation is a host system and operating system that runs one or more guest operating systems in virtual machines.

Which of the following is not a valid action for securing a wired SOHO network?

A Assigning a static IP address B Enabling MAC filtering C Disabling the unused port D Placing access points at a centralized location Answer D is correct. The question clearly asks about valid actions for securing a wired SOHO network. Access points are part of wireless SOHO networks. Placement of antenna or access point is extremely critical, in wireless networks, to ensure that proper wireless signals are available to legitimate users on the network. Answer B is incorrect. Enabling MAC filtering ensures that only those clients can access network resources that are allowed by you (or the MAC address allowed by you). Otherwise, their access is denied. Answer A is incorrect. Assigning static IP addresses for clients will enhance security, as no DHCP will be available for illegitimate computers to join the network by using dynamic IP addressing. Hackers take advantage of dynamic IP addressing by getting access to the network by joining the network through it. Answer C is incorrect. Disabling unused ports will enhance security of your SOHO network. Attackers generally use known open ports to attack a network. Disabling unused ports will block their easy entry to the network.

Which of the following communication technologies is designed for use with peripheral devices such as keyboards, mice, and wireless headsets?

A Bluetooth B Ethernet C Cellular D Infrared Answer A is correct. Bluetooth was made to work as a wireless personal area network (WPAN). As such, it's perfect for computer peripherals such as keyboards, mice, and wireless headsets. The first Bluetooth device on the market was an Ericsson headset and cell phone adapter, which arrived on the scene in 2000.

Which of the following devices connects two segments of the same local area network (LAN) but keeps traffic separate on the two segments?

A Bridge B HUB C Switch D Modem Answer A is correct. A bridge connects two segments of the same LAN but keeps traffic separate on the two segments. A bridge is an interconnectivity device that connects two local area networks (LANs) or two segments of the same LAN using the same communication protocols, and provides address filtering between them. It operates at the data link layer of the OSI model. Answer D is incorrect. A modulator-demodulator (modem) is a device that enables a computer to transmit information over standard telephone lines. Answer C is incorrect. A switch is a network connectivity device that brings media segments together in a central location. It reads the destination's MAC address or hardware address from each incoming data packet and forwards the data packet to its destination. Answer B is incorrect. A hub is a device used to link computers in a network. It connects computers that have a common architecture, such as Ethernet, ARCNET, FDDI, or Token Ring.

Which of the following disks allows you to save and erase data on it multiple times?

A CD-RW B SD card C CD-R D CD-ROM Answer A is correct. A compact disc-rewritable (CD-RW) is a rewritable optical disc. It was introduced in 1997, and was well-known as "CD-Writable" during development. CD-RW discs need more sensitive laser optics. CD-RW discs need to be blanked before reuse. Different blanking methods can be used. Answer B is incorrect. Secure Digital (SD) card is a non-volatile memory card format used in portable devices such as mobile phones, digital cameras, and handheld computers for data storage. Answer D is incorrect. Compact disc read-only medium (CD-ROM) is a pre-pressed compact disc that holds data accessible to, however not writable by, a computer for data storage and music playback. Answer C is incorrect. A compact disc-recordable (CD-R) is a variant of the CD. CD-R is a Write Once Read Many (WORM) optical medium, although the complete disk does not have to be fully written in the same session. CD-R preserves a high level of compatibility with the standard CD readers.

Which of the following is not considered a system component that can be found inside a computer?

A CPU B RAM C PCIe Graphic adapter D Motherboard Answer C is correct. System components are essential for the basic functionality of a computer system. Many of the landmarks found on the motherboard can be considered system components, even expansion slots to a degree. What you plug into those slots, however, must be considered peripheral to the basic operation of the system

Which of the following is a typical backlight technology?

A CRT B CCFL C PDP D TFT Answer B is correct. The laptop display uses a cold cathode fluorescent lamp (CCFL) as its backlight. As its name implies, it is a fluorescent light, and it is generally about 8 inches long and slimmer than a pencil.

Of all network cabling options, ___________________ offers the longest possible segment length.

A Coaxial B Unshielded twisted-pair C Shielded twisted-pair D Fiber-optic Answer D is correct. Fiber-optic cable provides transmission speeds from 100Mbps to 10Gbps and a maximum distance of several miles. Because it uses pulses of light instead of electric voltages to transmit data, it is immune to electrical interference and to wiretapping.

The _________ is the measurement of the difference between the darkest color and the lightest color an LCD screen can display.

A Contrast ratio B Native resolution C Ambient brightness D Luminescence Answer A is correct. The contrast ratio is the measurement between the darkest color and the lightest color that an LCD screen can display. The native resolution refers to how many pixels an LCD screen can display (across and down) without distor

You have just set up a network that will use the TCP/IP protocol, and you want client computers to be able to search for and communicate with other computers by using hostnames. Which type of server will help with this?

A DNS B DHCP C Hostname server D Domain controller Answer A is correct. A Domain Name Service (DNS) server resolves hostnames to IP addresses. A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network. A domain controller may provide login authentication, but it does not provide IP configuration information. There is no hostname server.

You're responsible for assigning equipment in your company. An employee has requested a docking station. Which of the following would not be a valid reason for the employee to request a docking station?

A Need to easily plug the laptop into a large monitor B Need for more USB ports on a laptop C Need for connecting a PS2 keyboard to a laptop D Need to connect multiple printers to a desktop computer Answer D is correct. A docking station is used for laptops, not desktop computers. It is a hardware device that contains slots for expansion cards and storage devices, and ports for peripheral devices such as printers and monitors. It allows laptops to connect to printers, storage devices, and other devices that are not usually available with laptops. It also includes a network interface card that connects a laptop to the network and enables users to use a full-size keyboard when they are not traveling.

You've been asked to design a SOHO network on a work place. The other offices in the building also have wireless networks. While setting up a wireless network for the SOHO, what will be your initial step?

A Determine the operating system for client computers. B Run a wireless site survey. C Request neighboring offices to provide their wireless channel D Install a wireless router at the central location of your office Answer B is correct. While setting up a wireless network, run a wireless site survey as your first step to determine the WAP placement. There are two methods for determining a correct WAP placement —an informal site survey and a formal site survey. •In an informal site survey, you temporarily set up your WAPs at the locations you're considering for permanent placement. Then, you use a wireless client to test the signal strength of connections within the range that WAP will service, preferably testing right from actual client desk locations. If the connection signals are strong where you need them to be, you go back and permanently mount and install the WAPs. If not, you move the WAPs and retest. •In a formal site survey, you use field-strength measuring equipment. You install a test antenna in the estimated WAP locations and then use the field-strength measuring equipment to determine the exact strength of a test signal at various points within the range the WAP will service. You move the test antenna to obtain the best possible signal for the wireless coverage area. Once you've determined the exact locations for your WAPs, you can permanently mount and install them.

Minsuh prints a document by using a laser printer. She finds that the printed paper has a series of black spots at regular intervals. What is the most likely cause of the issue?

A Dirty fuser roller B Wrinkled paper C Low heating of the fuser roller D Incorrect paper loading Answer A is correct. A dirty fuser roller can be the cause of a series of black spots on the printed paper at regular intervals. To resolve the issue, Minsuh will have to clean the fuser roller. Answer C is incorrect. Low heating of the fuser roller causes the toner to spread on the paper. Answers D and B are incorrect. Incorrect paper loading or a wrinkled paper will result in a paper jam inside the printer.

James wants to listen music and do hands-free phone conversations. Which of the following mobile accessories should be suitable for him?

A Docking station B Speaker C Data cable D Headset Answer D is correct. James should use headsets, as it is used for hands-free phone conversations and listening music. It can either plug into the speaker/headphone jack or be wireless. Answer B is incorrect because speakers allow to share music with friends, or listen without needing to stuff something into ear. It generally use the speaker/headphone jack, but Bluetooth speakers exist as well. Answer A is incorrect because docking stations provides a simplified way of "plugging-in" an electronic device such as a laptop computer to common peripherals. It is not use for listening music and phone conversations. Answer C is incorrect because a data cable can be used for transferring music and sounds rather than doing phone conversations and listening music.

Which of the following Internet connection types use transceivers, rather than modems, for providing Internet services?

A Fiber B DSL C Dial-up D Cable Answer D is correct. Cable internet or cable modems are devices that provide high-speed Internet access using cable television networks. They connect to the cable television line that's already installed or available in most homes. These devices are actually transceivers (transmitter/receivers), rather than modems, but are commonly known as cable modems. With a cable modem, digital data is converted to analog signals and placed on the cable at the same time as the incoming television signal. Incoming analog data signals are converted to digital for the computer by the modem. The data frequencies differ from the television signal frequencies, and the two signals don't interfere with one another on the cable. Depending on the individual configuration, a cable modem can transmit data at speeds from 500 Kbps up to 5 Mbps

Which of the following statements about FireWire is true? Each correct answer represents a complete solution. Choose two.

A FireWire 400 devices use 4-pin or 6-pin connectors. B FireWire 400 devices use 9-pin connectors at both ends of the cable. C FireWire 800 devices use 9-pin connectors at both ends of the cable. D FireWire 800 devices use 4-pin or 6-pin connectors. Answers C and A are correct. FireWire 800 devices use 9-pin connectors at both ends of the cable. With appropriate adapter cables, FireWire 400 devices can be connected to FireWire 800 ports, and vice versa. A FireWire 800 device will operate at full speed only when it is connected to a FireWire 800 port. FireWire 400 devices use 4-pin or 6-pin connectors. The 4-pin connector is used at the device end of the cable, while the 6-pin connector will connect to the computer. The FireWire 400 port supports maximum data transfers up to 400 Mbps.

Which of the following statements are true of the thin client? Each correct answer represents a complete solution. Choose all that apply.

A Flash memory is the critical component of the thin client terminal. B It is fed and controlled by the server. C It depends on its server in order to fulfill its traditional computational role requirement. D It is a large, high-powered local device. Answers A, B, and C are correct. A thin client can be defined as a tiny, low-powered local device that is fed and controlled by the server. It is a computer program that depends on its server in order to fulfill its traditional computational role requirement. It is a passive device with low-maintenance requirement that is easy to install and operate. Flash memory is the critical component of the thin client terminal with the help of which it can perform many functions.

While configuring your firewall, you inadvertently block port 443. Which of the following will be unavailable?

A HTTPS B HTTP C SSL D Telnet Answer A is correct. Hypertext Transfer Protocol Secure is a combination of HTTP with Secure Sockets Layer (SSL) to make for a secure connection. It uses port 443 by default, and the beginning of the site address becomes https://.

The basis weight of paper is based on how many standard size sheets?

A One ream B One-half of a ream C Five reams D Two reams Answer A is correct. The basis weight of paper is based upon 500 sheets (one ream) of standard size paper.

You work as network administrator for Tech Perfect Inc. The company has a TCP/IP-based network. The network is configured with the bus topology as shown in the figure below: BUS network You're asked to move four workstations to another department. You cut the cable from the center. What will be your next step?

A Install a 50 ohm terminator on the open end of the cable that will be shifted to the other department. B No need to do anything else. Just move one half to the other department. C Install 50 ohm terminators at both the open ends where the cable has been cut. D Install a 50 ohm terminator on the open end of the cable that will not be shifted to the other department. Answer C is correct. To run both networks successfully, you need to put 50 ohm terminators at both the open ends. A bus topology is a type of physical network design where all computers in the network are connected through a single coaxial cable known as bus. Answers B, A, and D are incorrect because a bus topology used in a network requires 50 ohm terminators at both the open ends.

Andrew works as a computer technician. He finds that his computer's inbuilt IDE controller on the motherboard has failed. He does not want to change the motherboard. What will he do to resolve the issue? Each correct answer represents a complete solution. Choose two.

A Install an add-on IDE controller card on the free expansion slot on the motherboard. B Disable the inbuilt IDE controller on the motherboard by using BIOS. C Update to a newer version of the motherboard driver. D Install a new hard disk drive. Answers B and A are correct. To resolve the issue, Andrew will have to disable the failed inbuilt IDE controller by using BIOS, and then install an add-on IDE controller card on the free expansion slot on the motherboard. Answers D and C are incorrect. The question states that the problem is due to a faulty IDE controller. Therefore, installing a new hard disk drive or updating to a newer version of the motherboard driver will not help in resolving the issue.

Which of the following statements is true of a modem?

A It amplifies digital signals. B It converts AC current to DC current and vice versa. C It converts digital signals into analog signals and vice versa. D It reduces the noise in analog signal. Answer C is correct. A modem (modulator-demodulator) is a device used by computers to communicate over long distances through PSTN (public switched telephone network). When a computer sends data, it uses digital signals. A modem converts these digital signals into analog signals and vice versa, and transmits the data over PSTN. At the receiving end, a modem converts the analog signals back to digital signals and delivers to the receiving computer.

Which of the following statements about High-Definition Multimedia Interface (HDMI) are true? Each correct answer represents a complete solution. Choose two.

A It is capable of delivering the highest quality digital video and multi-channel digital audio on a single cable. B It has two types of connectors: Type A and Type B. C It is an interface primarily used to connect hard disk and CD drives in a computer. D It is a new I/O bus technology that has more bandwidth than PCI and AGP slots. Answers B and A are correct. HDMI is capable of delivering the highest quality digital video and multi-channel digital audio on a single cable. It has two types of connectors: Type A and Type B. Answer C is incorrect. Integrated Digital Electronics (IDE) is an interface primarily used to connect hard disk and CD drives in a computer. Answer D is incorrect. PCI Express (PCIe), also known as 3rd Generation I/O (3GIO), is a type of computer bus. It is a new I/O bus technology that has more bandwidth than PCI and AGP slots.

You use your laptop both at office and at your home. You need a few devices such as a mouse, a scanner, and a printer at office to connect them to your laptop. You don't want to attach or detach each item from your laptop every time you move your laptop out of your office desk. Which of the following devices may help you in such a situation? Each correct answer represents a complete solution. Choose two.

A Laptop cable lock B Docking station C Port replicator D Crimper Answers C and B are correct. According to the question, you do not want to detach devices every time you move your laptop out of your desk. In such situations, a port replicator or a docking station can be very handy. Answers D and A are incorrect. These devices are used for attaching a connector to a cable and for security purposes, respectively.

Which impact printer has a print head that contains a row of pins triggered in patterns that form letters and numbers as the print head moves across the paper?

A Laser printer B Daisy-wheel printer C dot matric printer D bubble Jet printer Answer C is correct. The dot-matrix impact printer's print head contains a row of pins that are triggered in patterns that form letters and numbers as the print head moves across the paper.

Which of the following network topologies gives a combination of the best features of each topology used?

A Mesh B Star C Ring D Hybrid Explanation: Answer D is correct. The hybrid network gives a combination of the best features of each topology used. It may be more expensive than some types of network topologies, but it takes the best features of all of the other topologies and exploits them.

You want to make payment at the site of a merchant who uses NFC. Which NFC operating mode should you use?

A NFC reader/writer mode B NFC card emulation mode C NFC peer-to-peer mode D NFC tag Answer B is correct. You should use NFC card emulation mode to make payment. This mode enables NFC enabled devices to act like smart cards, allowing users to perform transactions such as payment or ticketing. Answer A is incorrect because NFC reader/writer mode allows the device to read information stored in an NFC tag on a label or poster which consists of data. Answer D is incorrect because an NFC tag consists of NFC data or information which can be read using NFC reader/writer mode. Answer C is incorrect because NFC peer-to-peer mode allows for ad hoc data transfer between two NFC enabled devices.

You work as network administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

A Nbtstat -S B Netstat -n C Nbtstat -n D Netstat -s Answer is C The nbtstat -n displays the list of local NetBIOS names. The nbtstat is a Windows utility used to check the state of current NetBIOS over TCP/IP connections, update the NetBIOS name cache, and determine the registered names and scope IDs.

If a CPU is overheating, which of the following might be the cause?

A The CPU has crept out of its socket. B The power supply has stopped working. C The heat sink is clogged with dust. D There is grease between the CPU and heat sink. Answer C is correct. The heat sink must be kept clear of dust so that the CPU fan can push air through the heat sink and dissipate the heat collected from the surface of the CPU. Thermal compound (or thermal grease) is often quite necessary between the CPU and heat sink to facilitate the transfer of heat to the heat sink.

What is the name of the document that many companies develop to specify how clients and support personnel are to interact, what to expect from each other, and what are acceptable timeframes for the resolution of issues?

A Operational-level agreement B Underpinning contract C Service report D Service-level agreement Answer D is correct. A service-level agreement (SLA) is used to specify how clients and support personnel are to interact, what to expect from each other, and timeframes for the resolution of issues. Answer A is incorrect. An operational-level agreement describes the responsibilities of each internal support group toward other support groups, including the process and timeframe for delivery of their services. Answer C is incorrect. A service report is provided at the agreed interval defined in the service-level agreement. The service reports are used to compare the agreed service levels with the actual service levels measured. Answer B is incorrect. An underpinning contract is a contract between an IT service provider and a third party. The third party provides services used in the delivery of a service to a customer. An underpinning contract specifies the targets and responsibilities that are needed to meet agreed service-level targets in an SLA.

Which of the following slots on a motherboard are best for a video card? Each correct answer represents a complete solution. Choose two.

A PCI B AGP C PCIe D EISA Answers B and C are correct. AGP and PCIe are the best slots for a video card. PCI Express (PCIe), also known as 3rd Generation I/O (3GIO), is a type of computer bus. It is a new I/O bus technology that has more bandwidth than PCI and AGP slots. It uses two low-voltage differential pairs, at 2.5Gb/s in each direction. It is designed to replace PCI and AGP expansion slots. The bus is available in several different bus widths: x1, x2, x4, x8, x12, x16, and x32. PCIe is able to transfer data in both directions at a time. PCIe hardware will work on operating systems that support PCI. AGP is a high speed 32-bit bus designed for high performance graphics and video support. It allows a video card to have direct access to a computer's RAM, which enables fast video performance. AGP provides a bandwidth of up to 2,133 MB/second. Answer D is incorrect. The Extended Industry Standard Architecture (EISA) is a 32-bit PC expansion bus designed as a superset of a 16-bit ISA bus. The EISA bus is designed to increase the speed and expand the data width of the legacy expansion bus while still supporting older ISA cards. EISA slots are obsolete now. Answer A is incorrect. PCIe and AGP slots are better than the PCI slot for a video card, as they provide greater transfer speeds.

What type of expansion slot is preferred today for high-performance graphics adapters?

A PCI B PCIe C AGP D ISA Answer B is correct. Although technically all slots listed could be used for video adapters, PCIe excels when compared to the other options and offers technologies such as SLI, which only make PCIe's advantage more noticeable.

You are installing a new graphics adapter in a Windows 7 system. Which of the following expansion slots are designed for high-speed, 3D graphics adapters? Each correct answer represents a complete solution. Choose two.

A PCIe B ISA C PCI D AGP E USB Answers D and A are correct. Technically PCI and ISA could be used for graphics adapters, AGP was specifically designed for the use of high-speed, 3D graphic video cards. PCIe offers better performance than AGP for graphics adapters.

Which of the following encryption methods use symmetric algorithms? Each correct answer represents a complete solution. Choose all that apply.

A PGP B WEP C CCMP D TKIP Answers B, C, and D are correct. Here are the encryption methods that use symmetric algorithms: •WEP (Wired Equivalent Privacy): A security protocol for wireless local area networks (WLANs). It provides security, equivalent to wired networks, for wireless networks. It is used to encrypt data on a wireless network by using a fixed secret key. •CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol): An IEEE 802.11i encryption protocol created to replace both TKIP and WEP. CCMP is a mandatory part of the WPA2 standard, an optional part of the WPA standard, and a required option for Robust Security Network (RSN) Compliant networks. CCMP is used in the ITU-T home and business networking standard. •TKIP (Temporal Key Integrity Protocol): An encryption protocol defined in the IEEE 802.11i standard for wireless LANs. It is designed to provide more secure encryption than the disreputably weak WEP. Answer A is incorrect. PGP is a public-key encryption program that is based on asymmetric communications. It uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients.

Which of the following utilities provides information as per the format given below? 1 150 ms 130 ms ald1rr1-a.sancharne;.in [61.0.97.41] 2.......

A Ping B NEtstat C Nbtstat D Tracert Tracert

Which of the following is not an advantage of the daisy-wheel printer?

A Print quality comparable to a typewriter B Speed C Can print multipart forms D Relatively inexpensive Answer B is correct. The daisy-wheel printer is much slower when compared to the dot-matrix printer, and therefore speed is a disadvantage.

Which of the following tools is used to join connectors to its cables?

A Punch Down B Toner probe C Multimeter D Crimper Answer D is correct. A wire crimper looks like a pair of pliers. It is used to connect different types of connectors to the cable. Different types of wire crimpers are used depending upon the type of connector and cable used. To attach the connector, the cable and connector are inserted into the crimper and its handles are pressed. This connects the connector to the cable. Answer A is incorrect. A punch down tool is used to connect the network cable to the patch panel. Answer B is incorrect. A toner probe is a collection of the tone generator and the probe. The toner generator generates signals at one end and probe can search the tone at the other end. Answer C is incorrect. A multimeter, also known as a volt/ohm meter or VOM, is an electronic measuring instrument that combines several measurement functions in one unit.

You work as network administrator for Tech Perfect Inc. The company has a TCP/IP-based network. The network is configured on the ring topology. What will happen if a cable break occurs?

A The nodes adjacent to the break will not be able to communicate with the other nodes. B The performance of the network will deteriorate. C The whole network will collapse. D The nodes adjacent to the break will not be able to communicate with each other. Answer C is correct. As a ring topology has the least fault tolerance, if a cable break occurs then the entire network will collapse. It is a type of physical network design where all computers in the network are connected in a closed loop. Each computer or device in a ring topology network acts as a repeater.

You work as network administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You're configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance. A fault-tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfill the requirement?

A RAID 1 B RAID 0 C RAID 5 D RAID 4 E RAID 3 Answer B is correct. RAID 0, also known as stripe set, stores data in stripes on two or more physical disks. Stripe set does not provide fault tolerance, but offers better performance as compared to mirror set (RAID 1) and stripe set with parity (RAID 5). Stripe set uses a minimum of two and a maximum of thirty-two hard disk drives. Answer A is incorrect. RAID 1, also known as mirrored set, is a fault tolerant disk subsystem that duplicates data on two different physical disk drives. It uses two partitions on different disk drives connected to the same disk controller. Both the partitions must be of the same size. Mirrored set is the only fault tolerant method used for system and boot partition. Among the RAID levels, RAID 1 has the poorest performance. Answers E and D are incorrect. Windows NT does not support RAID 3 and RAID 4. Answer C is incorrect. RAID 5, also known as stripe set with parity, is a fault-tolerant disk subsystem with data and parity information striped intermittently across three or more physical disks. Stripe set with parity uses a minimum of three and a maximum of thirty-two hard disk drives. If a portion of a physical disk fails, you can recreate data on the failed portion from the parity information. It has better performance than a mirror set.

Which of the following drives is most likely to survive in case they are dropped to floor from some height?

A SATA B SCSI C SSD D PATA Answer C is correct. A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data. SSDs are distinguished from traditional hard disk drives (HDDs), which are electromechanical devices containing spinning disks and movable read/write heads. SSDs, in contrast, use microchips, and contain no moving parts. Compared to traditional HDDs, SSDs are typically less susceptible to physical shock, quieter, and have lower access time and latency. SSDs use the same interface as hard disk drives, thus easily replacing them in most applications. In case of a fall, the SSDs are most likely to survive.

Which of the following is a 6-pin mini-DIN connector used for connecting some keyboards and mice to a PC compatible computer system?

A SCSI B PS/2 C IDE/ATA D USB Answer is B PS/2 is a 6-pin mini-DIN connector used for connecting some keyboards and mice to a PC compatible computer system. Answers C, D, and A are incorrect. IDE/ATA (Integrated Drive Electronics), USB (Universal Serial Bus), and SCSI (Small Computer System Interface) are various hard disk interfacing technologies. These interfaces are used for connecting the hard disk to the computer.

Which of the following interfaces offers the highest data rate?

A SPP B FireWire C IEEE 1284 D USB 1.1 Answer B is correct. FireWire 800 has a maximum data throughput of 800 Mbps and works in full duplex. FireWire 400 has a maximum data throughput of 400 Mbps in half duplex.

Which of the following types of fiber-optic cable is generally used in WANs and powered by laser light?

A Single-mode fiber B Duplex-mode fiber C Dual-mode fiber D Multimode fiber Answer A is correct. Single-mode fiber (SMF) cable is generally used in WANs and powered by laser light. It is commonly used as backbone cabling. Light travels through single-mode fiber-optic cable using only a single mode, meaning that it travels straight down the fiber and does not bounce off the cable walls. It can transmit up to 10Gbps for up to 40 kilometers (25.85 miles), depending on the standard used. Answer D is incorrect. Multimode fiber-optic cables are generally used in LANs and powered by LEDs. Answers C and B are incorrect. There is no such type of fiber-optic cable as dual-mode fiber or duplex-mode fiber.

Which is a minimal sort of client that depends heavily on another server to fulfill its computational roles?

A Smart Client B Thin Client C Hybrid Client D Thick CLient Answer B is correct. A thin client is a minimal sort of client, as it uses the resources of the host computer to fulfill its computational roles. A thin client only presents processed data provided by an application server, which performs the bulk of any required data processing. Answer D is incorrect. A thick client performs the bulk of any data processing operations itself, and does not necessarily rely on the server. Answer A is incorrect. A smart client is a term describing a computer application environment which delivers applications over a web Hypertext Transfer Protocol (HTTP) connection. Answer C is incorrect. A hybrid client is a mixture of thick and thin client models. Similar to a thick client, it processes locally, but relies on the server for storing persistent data.

Which of the following parts of the computer is built into the motherboard?

A Sound card B Mouse C Joystick D CD-ROM drive Answer A is correct. Sound cards are built into the motherboard. A sound card enables the computer to output sound to audio devices, as well as accept input from a microphone. Most modern computers have sound cards built into the motherboard, though it is common for a user to install a separate sound card as an upgrade. Answer D is incorrect. CD-ROM is a device used for reading data from a CD. This device is not built into the motherboard. Answer B is incorrect. A mouse is a pointing device that detects two dimensional motion relative to its supporting surface. This device is not built into the motherboard. Answer C is incorrect. A Joystick is a device mostly used in gaming. It consists of a handheld stick that pivots around one end, to detect angles in two or three dimensions.

Which of the following allows you to perform the most complete restart of the computer without removing power?

A Start > Hibernate B Start > Restart C Power Button D Reset Button Answer D is correct. The reset button causes the computer to return to nearly the same point it is in when you power it on, but without the need for power cycling. Using Restart in the Start menu does not reboot as deeply as the reset button. Hibernation is a power state that completely removes power after saving the contents of RAM to the hard drive; pressing the power button is required to resume the session in the same manner as starting the computer after a complete shutdown. The power button cannot be used as a method of restarting the system.

What type of pointing device features a ball and buttons on the top and a flat, steady surface on the bottom?

A Tackball B touchpad C mouse D trackpad Answer A is correct. A trackball is a sort of stationary mouse that has the ball for movement detection on the top of the device along with the keys. The ball is actuated by the thumb or fingers, not by moving the device along a flat surface or mouse pad. Trackballs are ideal where desk space is limited. There is no such thing as a trackpad.

You work as network administrator for McRoberts Inc. The company has a Windows-based network. You install a printer on your Windows XP Professional computer. You want to share the printer on the network. After sharing the printer on the network, you test it and find that the output appears as garbage. Users on the network also complain of the same issue. What is the most likely cause?

A The printer is not shared. B The printer driver is improperly configured. C The power cable of the printer is defective. D The print spooler is wrongly configured. Answer B is correct. Garbage printing occurs due to a wrongly configured printer driver. To resolve the issue, you will have to run the Add Printer Driver wizard to install the correct printer driver on your computer. You will have to instruct other users to disconnect the printer and reconnect to the shared printer. This step will update their old drivers with the new one. Answer D is incorrect because improper spooler settings will not result in garbage printing. Answer C is incorrect because if the power cable of the printer is defective, the printer will not function at all. Answer A is incorrect because the question clearly states that the printer is shared.

Which of the following statements are not true of the IPv4 protocol? Each correct answer represents a complete solution. Choose all that apply.

A The size of a subnet in IPv4 is 264 addresses. B IPv4 specifies a new packet format, designed to minimize packet-header processing. C IPv4 has a header that consists of 10 fixed header fields, two addresses, and options. D The IPv4 header uses 128-bit addresses. Answers B, D, and A are correct. These are the characteristics of IPv6 and not of IPv4. The size of a subnet in IPv6 is 264 addresses (64-bit subnet mask), the square of the size of the entire IPv4 Internet. IPv6 specifies a new packet format, designed to minimize packet-header processing. Answer C is incorrect. IPv4 has a header that consists of 10 fixed header fields, two addresses, and options.

Minsuh works on her computer that has a sound card installed. She finds that she is unable to hear any sound when playing a sound file. Which of the following cannot be a likely reason for this?

A The speaker cable is plugged into an incorrect connection slot. B The sound card is set to a 75 MHz bus speed. C There is no power on the speaker. D The speaker cable is not plugged into the slot. Answer B is correct. The bus speed for sound cards cannot be set manually. Therefore, the sound card being set to a 75 MHz bus speed cannot be a likely reason for the issue. Answers C, A, and D are incorrect. If there is no power on the speaker attached to the sound card, no sound will be heard when a sound file is executed. Similarly, no sound will be heard if the speaker cable is either not plugged or plugged into an incorrect connection slot.

Which of the following is true of computers configured with APIPA?

A They will be able to communicate with other APIPA-configured computers on their local network. B They will not be able to communicate with any computer on their local network. C They will be able to communicate with any computer on their local network. D They will not be able to communicate with other APIPA-configured computers on their local network. Answer A is correct. Computers configured with APIPA will have an IP address in the 169.254.0.0 range with a subnet mask of 255.255.0.0. They will be able to communicate with other computers on the local network that have the same network address.

Which of the following components charges the EP drum of a laser printer?

A Toner B Fuser C Primary Corona Wire D Toner cartridge

Which commands can you use to test network connectivity between your workstation and the server? Each correct answer represents a complete solution. Choose two.

A Tracert B Ipconfig C Nslookup D Ping Answers A and D are correct. The tracert and ping commands can verify connectivity between two computers. The tracert utility is used to trace the path taken by TCP/IP packets to a remote computer. It traces and reports each router or gateway crossed by a TCP/IP packet on its way to the remote host. The tracert utility can be used with the target computer's name or IP address. It is used to detect and resolve network connection problems. The ping command-line utility is used to test the connectivity with a host on a TCP/IP-based network. This is achieved by sending out a series of packets to a specified destination host. On receiving the packets, the destination host responds with a series of replies. These replies can be used to determine whether or not the network is working properly. Answer B is incorrect. The ipconfig command-line utility displays the current TCP/IP configuration, such as the IP address, subnet mask, default gateway, and so on of a networked computer. Answer C is incorrect. nslookup is a tool for diagnosing and troubleshooting Domain Name System (DNS) problems. It performs its function by sending queries to the DNS server and obtaining detailed responses at the command prompt.

Which of the following technologies support hot-swapping? Each correct answer represents a complete solution. Choose all that apply.

A USB B Serial ATA C PATA D IEEE 1394 Answers D, A, and B are correct. Hot-swappable components are those components that you can add or remove without turning the computer off. Technologies that support hot-swapping include: •PCMCIA •USB •IEEE 1394 (commonly referred to as the brand name FireWire) •Fibre Channel (used for enterprise storage) •Serial ATA (SATA) Answer C is incorrect. PATA does not support hot-swapping.

Sofia uses a laptop in her office. She purchases an external monitor to attach it with her laptop. Which of the following is the best way to toggle display between the laptop screen and external screen or to show both at the same time?

A Using Control Panel B Using a KVM switch C Using Task Manager D Using the function keys Answer C is correct. The primary corona wire is a component that charges the EP drum of a laser printer. Answer B is incorrect. The fuser in a laser printer uses two rollers to heat toner particles and melt them on the paper. Answers D and A are incorrect. The toner cartridge and toner do not charge the EP drum of a printer. The toner cartridge contains toner, which is a black substance that is sensitive to electric charges. It is used as ink for printers.

You need to equip a user buying a home theater PC with the ability to watch live TV as well as streaming content. Which of the following components common in HTPCs should you recommend?

A Video Capture Card B DVR C TV Tuner D Gigabit NIC Answer C is correct. The TV tuner card allows the decoding and demodulation (choosing of channels) of a television signal, allowing the user to tune to the channel of interest. Answer A is incorrect. A video capture card allows the recording of one or more live TV streams but not the ability to decode the signal. Answer B is incorrect. DVRs are not part of an HTPC but rather a competing device. The HTPC obviates the need for the DVR unless special decoding only offered by the DVR is required for certain channels, in which case the DVR can be placed ahead of the HTPC. Answer D is incorrect. Gigabit NICs don't enhance the home-theater experience

Which of the following is designed to work with existing wireless products using software or firmware upgrades and provides security solutions through TKIP and 802.1X/EAP protocols?

A WPA B WEP C SSH2 D 802.1X Answer A is correct. WPA is designed to work with existing wireless products using software or firmware upgrades and provides security solutions through TKIP and 802.1X/EAP protocols. It is an improvement over WEP. It improves data encryption through the TKIP and provides user authentication through the EAP. Answer B is incorrect. Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE 802.11 wireless networks. Wireless networks broadcast messages using radio and are thus more susceptible to eavesdropping than wired networks. WEP was intended to provide confidentiality comparable to that of a traditional wired network. Answers C and D are incorrect. These are not the correct choices for this question.

Your customer wants to make sure that only computers he has authorized can get on his Wi-Fi. What is the most appropriate security measure you can recommend?

A WPA encryption B WEP encryption C Firewall D MAC filtering Answer D is correct. MAC filtering only allows computers that have their MAC address listed with the router to connect. MAC address filtering is a security method that enables a device to allow only certain MAC addresses to access a network. It can be configured on a wireless access point (WAP) to allow only certain system MAC addresses to communicate with the rest of the network. Answers B and A are incorrect. Any encryption will be based on password authentication, not on filtering specific computers. Only MAC filtering will do that. Answer C is incorrect. Firewall will not prevent people or computers from connecting to your Wi-Fi. It will block certain, unwanted connections.

You want to transfer data from one device to another within the operational range of about 10 meters. Which of the following wireless connection methods will you use? Each correct answer represents a complete solution. Choose all that apply.

A WiFi B Near Field COmmunication C Bluetooth D Infrared Answers C and A are correct. You can use Bluetooth as well as Wi-Fi to transfer a data from one device to another within the operational range of about 10 meters. Bluetooth is used for connecting mobile accessories to a device, like headsets, full-size keyboards, and mice. The maximum range for Bluetooth based wireless connection is 30 meters. Wi-Fi can also be used, as it can extend well upto 100m. It is a local area wireless technology that allows electronic devices to connect to the network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Answer D is incorrect. Infrared is a short-distance, line-of-sight, point-to-point communication method used to transfer small amounts of data from one device to another. The maximum functional distance of IR in mobile devices is about 1 meter. Answer B is incorrect. Near field communication (NFC) uses radio frequency (RF) signals, and establish communication between two electronic devices by bringing them within 10 cm of each other.

Which of the following is not a consideration when upgrading power supplies?

A You might find that your case has a non-removable power supply. B You might find that your power rating is not adequate on the new power supply. C You might find that you do not have enough of the appropriate connectors coming from the power supply for the devices you have installed. D You might find that you do not have a matching motherboard connector on your new power supply. Answer A is correct. Personal computers do not have permanently installed power supplies. Like other electrical and electronic components, power supplies can and do fail on a regular basis. Permanently mounting a power supply to a chassis would be a disservice to the consumer. You should consider the cumulative power needs of your installed components, and you might have to obtain adapters and splitters if you do not have enough or you have the wrong types of connectors coming from the power supply.

Which stage of a laser printer process melts the toner onto the paper?

A fusing B transferring C exposing D charging Answer A is correct. The drum is first charged to prepare for the writing stage, which charges the print pattern onto the drum. After toner is applied to the drum, the toner is transferred to paper. At this point the toner is melted and fused to the paper by using heat.

Which of the following commands is used to renew the IP information from the DHCP server?

A ifconfig /release B ifconfig /retreat C ipconfig /all D ipconfig /renew Answer D is correct. The ipconfig command is perhaps the most used utility in troubleshooting and network configuration. The ipconfig /renew command will send a query to the DHCP server asking it to resend and renew all DHCP information. For a more detailed look at the ipconfig command, type ipconfig /? at the command prompt.

To connect to a network printer or shared drive from the command prompt, which command should you use?

A ipconfig B net use C netstat D Nslookup Answer B is correct. The net use command allows you to connect to shared resources such as shared drives and printers on the network.

Which of the following are the technologies found on touchscreens? Each correct answer represents a complete solution. Choose all that apply.

A resistive B MIDI C NFC D Capacitive Answers D and A are correct. The technologies found on touchscreens are resistive and capacitive. Capacitive interface is generally smoother to the touch than resistive interface, and the pad of the finger or a special stylus that mimics this soft part of the fingertip can control it. It takes advantage of the conductivity of the object to detect location of touch. Resistive interface usually has to be controlled by the fingernail or a plastic or metal stylus. There is an air gap between two layers of transparent material. When the user applies pressure to the outer layer, it touches the inner layer at specific locations. Answer B is incorrect. MIDI (Musical Instrument Digital Interface) defines the port connector, the format of the data sent, and the format in which the sounds are stored. Answer C is incorrect. NFC (Near field communication) is a short-range high frequency wireless communication technology that enables the exchange of data at 106 Kbps, 212 Kbps, and 424 Kbps


Kaugnay na mga set ng pag-aaral

Au Nom De Tous Les Miens Partie 3/4 Questions

View Set

CNNA Exam 8 - Questions and Answers (Quiz Format)

View Set

Sexton - Economics- Chapter 1- Concepts and Choices

View Set

Computer Support & Maintenance C10 Final

View Set

Factors affecting calcium absorption and excretion

View Set

Linear Word Problems: District 6

View Set

Affinity - 2. Federal Mortgage Laws pt. 2

View Set

COMM 393: Proprietorships and Partnerships

View Set

CK-12 Circulatory System Questions #5

View Set