A+ Assessment Test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

c

1. Which of the following is not considered a system component that can be found inside a computer? A. CPU B. RAM C. PCIe graphics adapter D. Motherboard

a

10. The is the measurement of the number of pixels an LCD monitor can display without the image appearing distorted. A. Native resolution B. Contrast ratio C. Pixelation D. Base frequency

d

11. Which of the following is not a common monitor technology? A. LCD B. Plasma C. OLED D. Super PMOLED

b

12. What can be used at the check-in desk of a doctor's office to prevent patients from viewing confidential information? A. An antiglare filter B. A privacy filter C. An LED-backlit display D. A thin client

d

13. Which of the following is a standard computer that can access resources locally as well as from servers but requires no specialized enhancements? A. Gaming PC B. Home server C. Thin client D. Thick client

c

14. Which of the following is a requirement for virtualization workstations? A. Enhanced video B. Enhanced audio C. Maximum RAM and CPU cores D. RAID array

a

15. Which of the following is not a requirement for a home server PC? A. TV tuner B. Print and file sharing services C. Gigabit NIC D. RAID array

c

16. Which network connectivity device stops broadcasts from being sent to computers on a different network segment? A. Hub B. Switch C. Router D. Firewall

d

17. Which layer of the OSI model has the important role of providing error checking? A. Session layer B. Presentation layer C. Application layer D. Transport layer

a

18. On which port does FTP run by default? A. 21 B. 25 C. 63 D. 89

d

19. Which of the following protocols can be used by a client to access email on a server? A. DNS B. FTP C. SMTP D. IMAP

a

2. Which of the following is a physical memory format installed directly in today's desktop computer systems? A. DIMM B. HDD C. SSD D. eMMC

b

20. Which of the following is a company that provides direct access to the Internet for home and business computer users? A. ASP B. ISP C. DNS D. DNP

c

21. What is the data throughput provided by one ISDN bearer channel? A. 16Kbps B. 56Kbps C. 64Kbps D. 128Kbps

a

22. Which LCD component in a laptop is responsible for providing brightness? A. Backlight B. Inverter C. Screen D. Backdrop

b

23. Your laptop has 2GB of installed memory and uses shared video memory. If the video card is using 512MB, how much is left for the rest of the system? A. 2GB B. 1.5GB C. 512MB D. Cannot determine

d

24. Which of the following standards supports both PCIe and USB 3.0? A. PC Card B. PlugCard C. ExpandCard D. ExpressCard

d

25. When using a capacitive touchscreen on a mobile device, what is the most common tool used to input data? A. Keyboard B. Trackball C. Stylus D. Finger

c

26. Which technology used by e-Readers gives them longer battery life than tablets? A. Lithium-polymer battery B. Low-power backlight C. Electrophoretic ink D. Capacitive touchscreen

b

27. What is the name of the mode that allows two NFC-enabled devices to transmit data to each other? A. Emulation mode B. Peer-to-peer mode C. Reader/writer mode D. Ad hoc mode

c

28. What is the function of the laser in a laser printer? A. It heats up the toner so that it adheres to the page. B. It charges the paper so that it will attract toner. C. It creates an image of the page on the drum. D. It cleans the drum before a page is printed.

a

29. What is the component called that stores the material that ends up printed to the page in a laser printer? A. Toner cartridge B. Ink cartridge C. Laser module D. Laser cartridge

a, b

3. Which of the following are components that can commonly be found on a motherboard? (Choose all that apply.) A. Slots B. Fan connectors C. Gyroscope D. Scanner E. HDD

c

30. What service was created by Apple to allow iPhones and iPads to print without installing printer drivers? A. TCP printing B. Bonjour C. AirPrint D. iPrint

c

31. Your laser printer has recently starting printing vertical white lines on the documents that it prints. What is the most likely cause of the problem? A. The print driver is faulty. B. The fuser is not heating properly. C. There is toner on the transfer corona wire. D. There is a scratch on the EP drum.

c

32. You are working with a Windows 7 computer that is assigned IP configuration information from a central server. You wish to refresh the IP Information on the system manually. Which of the following commands would you use? A. IPCONFIG /refresh B. IPCONFIG /all C. IPCONFIG /renew D. WINIPCFG /all

a

33. One laser printer in your office experiences frequent paper jams. What is the most likely cause of the problem? A. Worn paper feed rollers. B. Faulty stepper motor. C. Faulty fuser assembly. D. The EP drum isn't advancing properly.

c

34. One of your network users was recently caught browsing pornographic websites at work. Which of the following servers could be installed to prohibit this activity? A. Web B. Security C. Proxy D. DNS

a

35. Google Docs is an example of what type of cloud service? A. SaaS B. IaaS C. PaaS D. GaaS

d

36. Which type of software is required to run client-side virtualization on your home network? A. Terminal emulation B. Process replication C. Hyperthreading D. Hypervisor

a, d

37. Which of the following are popular mobile device operating systems? (Choose all that apply.) A. Android B. Windows 7 C. Ubuntu D. iOS

b

38. Which of the following protocols can be used in close range to transfer data between a mobile device and a computer system or to allow media to stream from the mobile device to an audio system? A. SMTP B. Bluetooth C. NFC D. Pegasus

d

39. What term refers to copying data between a mobile device and a computer system to mirror such things as contacts, programs, pictures, and music? A. Calibration B. Remote wipe C. Pairing D. Synchronization

a

4. What suffix indicates that the capacity of an optical disc is roughly twice that of its standard counterpart? A. DL B. R C. RW D. RE

a, c

40. Which of the following computer components can retain a lethal electrical charge even after the device is unplugged? (Choose two.) A. Monitor B. Processor C. Power supply D. RAM

c

41. Roughly how much time spent communicating should be devoted to listening? A. 23 percent B. 40 percent C. 50 percent D. 80 percent

b

42. You have found prohibited content on a user's machine and need to follow proper procedures. What is the term used to describe the handling of evidence from discovery to delivery to the proper authorities? A. First response B. Chain of custody C. Data preservation D. Documentation flow changes

b

43. Which of the following is a security mechanism used by HTTPS to encrypt web traffic between a web client and server? A. IPSec B. SSL C. L2TP D. PPPoE

a, d

44. Which of the following are 4G technologies? (Choose all that apply.) A. LTE B. GSM C. CDMA D. WiMax

c

45. Which of the following standards is also known as CardBus? A. PCMCIA 1.0 B. PCMCIA 2.0 C. PCMCIA 5.0 D. ExpressCard

a

46. When lifting heavy equipment, what is the proper technique? A. Get the heaviest part closest to your body and lift with your legs. B. Get the heaviest part closest to your body and lift with your back. C. Get the lightest part closest to your body and lift with your legs. D. Get the lightest part closest to your body and lift with your back.

a

47. Which of the following is a chip that is integrated into PATA drives, as opposed to being mounted on a daughter card? A. Controller B. CPU C. Host adapter D. IDE

c

48. After SATA was introduced, what was the retroactive term used for the original ATA specification? A. EIDE B. IDE C. PATA D. SCSI

d

49. Which of the following is a virtual machine manager—the software that allows the virtual machines to exist? A. Comptroller B. Shell C. Kernel D. Hypervisor

c

5. What is the name of the standard power connector that has been used with larger drives since the first IBM personal computers were introduced? A. AT system connector B. Berg C. Molex D. ATX system connector

c

50. Which of the following would not be considered a standard permission in Windows using NTFS? A. Full Control B. Modify C. Allow D. Write

c

51. Which feature is designed to keep Windows current by automatically downloading updates such as patches and security fixes and installing these fixes automatically? A. Security Center B. Action Center C. Windows Update D. Windows Anytime

b

52. With dynamic storage, which of the following partition types are possible? A. Complex, bridged, or mirrored B. Simple, spanned, or striped C. Simple, complex, or interleaved D. Spanned, interleaved, or striped

c

53. You have been told to use Task Manager to change the priority of a process to Below Normal. This equates to a base priority of what? A. 2 B. 4 C. 6 D. 8

a, c, d

54. Encrypting File System (EFS) is available in which editions of Windows 7? (Choose all that apply.) A. Professional B. Home Premium C. Enterprise D. Ultimate E. Business

a

55. Which of the following can provide electrical power over Ethernet cabling? A. PoE B. QoS C. DoS D. WoL

b

56. With which type of duplexing do communications travel in both directions but in only one direction at any given time? A. Full B. Half C. Auto D. Mechanical

d

57. Which applet in Windows Vista is the primary interface for configuring synchronization of offline files? A. Synchronization Wizard B. Action Center C. Merge D. Sync Center

c

58. Which Control Panel applet allows you to administer, as well as deploy, component services and configure behavior like security? A. SFC B. Data Sources C. Component Services D. DDR

b

59. In Windows, the Account Lockout Counter in an Account Lockout policy keeps track of the number of invalid attempts before lockout occurs. The default is 0 (meaning the feature is turned off), but it can be set from 1 to what? A. 9999 B. 999 C. 99 D. 24

c, d

6. Except in the case of RAID 0, which two things do all types of RAID offer? A. Faster read speeds B. Faster write speeds C. Redundancy D. Fault tolerance E. Ability to restore automatically from tape after a drive failure

a

60. What Windows operating system tool can be used to block access from the network (be it internal or the Internet)? A. Windows Firewall B. Windows Defender C. Advanced Security D. Device Manager

b

61. Which of the following are programs that enter a system or network under the guise of another program? (Choose the best answer.) A. Worms B. Trojans C. Rootkits D. Spyware

c

62. Which of the following involves applying a strong magnetic field to initialize the media before tossing it away? A. Fraying B. Fracking C. Degaussing D. Spreading

d

63. Which term is synonymous with MAC filtering? A. Disabling Autorun B. Shredding C. Port disabling D. Network Lock

a

64. Which of the following is a copy of your system configuration at a given point in time? A. Restore point B. MBR C. Registry D. BOOT.INI

c

65. Which of the following could be described as a small, deviously ingenious program that replicates itself to other computers, generally causing those computers to behave abnormally? (Choose the best answer.) A. Rogue B. Redirector C. Virus D. Pop-up

d

7. You are installing a new graphics adapter in a Windows 7 system. Which of the following expansion slots is designed for high-speed, 3D graphics adapters? A. USB B. FireWire C. PCI D. PCIe

c

8. A user complains that changing from a VGA graphics card to one that supports the latest HDMI revision has resulted in not being able to play back certain content from the computer. Some content does play back, however. What could be the problem? A. Digital signal required B. Resolution too low C. DRM D. VGA cable not compatible

b, c

9. Which of the following are modular ports used in data communications? (Choose two.) A. RG-6 B. RJ-45 C. RJ-11 D. Thunderbolt E. RG-11


Ensembles d'études connexes

МОВА ДIЛОВИХ ПАПЕРІВ

View Set

Physiology Exam Practice Questions

View Set

12.3.3-12.3.5 Time Dilation, Length Contraction, Mass and Energy

View Set