C++, CompTIA, etc.

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A Boss Key

A Boss Key A boss key is a simple keyboard shortcut, often a single key such as F10 or ScrLk, included in some applications or existing as a separate helper application altogether, that allows the user to rapidly conceal or exit a program that is not work appropriate.

back-side cache

A Level 2 memory cache with a dedicated channel to the CPU, enabling it to run at the full speed of the CPU.

80mm and 120mm are common sizes for which of the following PC components? A. Processors B. Case fans C. Heat sinks D. Video cards

B

A company would like to increase the security on their company’s smart phones. Which of the following should be configured to ensure information stored on a smart phone can be removed if it is lost or stolen? a) Username and passwords b) Remote wipe c) Strong password complexity d) Failed login attempts restrictions

B

Which NTFS permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes? A. List B. Read C. Modify D. Write

B. The Read permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes.

What is the proper order of the laser printing process? A. process, clean, charge, expose, develop, transfer and fuse B. process, charge, expose, develop, transfer, fuse and clean C. clean, expose, develop, transfer, process, fuse and charge D. clean, charge, expose, process, develop, fuse and transfer

B. process, charge, expose, develop, transfer, fuse and clean is the proper process.

Which standard covers DVD-ROM technology? A. MPEG-1 B. MPEG-2 C. MPEG-3 D. MPEG-4

B. The MPEG-2 standard covers DVD-ROM technology (among other things).

Which of these would you be most likely to find in an MBR? A. Location of the Windows Registry B. A disk signature C A list of usernames and passwords D The OS font tab

B. The Master Boot Record is found on the first sector of a storage device, and it commonly contains a table of primary partitions, a disk signature, and directions for starting the operating system.

The software that controls the printing of documents on a Windows XP system is called the: A. Print Server B. Print Spooler C. Printer D. Print Device

B. The Print Spooler controls the printing of all documents on a PC.

802.11g has a MAXIMUM speed of up to: A. 2.4Mbps B. 11Mbps C. 54Mbps D. 100Mbps

C

A 400GB IDE hard disk drive with a Molex connector uses how many volts? A. 3.3 B. 5 C. 12 D. 14

C

A KVM will allow the user to: A. prevent unauthorized users from removing devices from a computer. B. network multiple computers to gain optimum use of system resources. C. connect multiple computers to save on resources. D. allow multiple users the ability to share a single computer.

C

A customer reports that their computer crashes during usage. Which of the following is a common acronym used to describe this condition? a) RAID b) VPN c) BSOD d) LAN

C

A customer reports that while attempting to print a document it seems to queue up fine, but the printer does not print the job. Which of the following may be the cause? A. Outdated or corrupt print driver. B. The application used to create the document is incompatible with the printer. C. A print job is waiting in the print queue. D. Printer configuration is incorrect.

C

A customer reports the printer has an error message showing on the display and the printer is not printing any of the jobs in the queue. The technician arrives and finds the printer is online but there are not any lights on the network card. The NEXT step to evaluate the problem is to: A. check the printer for paper jams in the path. B. replace the network card in the printer. C. cycle the power on the printer and observe the boot process. D. power off the printer, have the customer clear the print queue and reboot.

C

A customer wants games from their child’s Windows XP computer removed. Which of the following is the BEST way to accomplish this task? a) Control Panel > Game Controller > Select controller > click Remove b) Control Panel > Administrative Tools > Computer Managementïƒ c) Control Panel > Add/Remove programs > Add/Remove Windows Components > select Accessories and Utilities > uncheck Games d) Programs menu > Right click Games > select Properties > select the Hidden check box

C

A customers computer crashes consistently when a specific application is launched. The technician has looked at the computer and confirmed the cause of the crash. Which of the following is the NEXT troubleshooting step the technician should take? A. Verify full system functionality. B. Document the findings, actions, and outcomes. C. Establish a plan of action to resolve the problem. D. Question the user and identify changes the user has made to the system.

C

While changing a toner cartridge in a printer, a user spilled some toner. A technician noticed and offered to help clean it up. Which of the following tools would be MOST appropriate? A. Damp cloth B. Lint free cloth C. Computer vacuum D. Compressed air

C

Which of the following network devices allows for full-duplex communication? a) Hub b) Bridge c) Switch d) Firewall

C

Which of the following ports is the default port for HTTPS? A. 80 B. 125 C. 443 D. 8080

C

Which of the following ports should be left open on the firewall to enable default Internet browsing? A. 21 B. 25 C. 80 D. 443

C

Which of the following printer types has the LOWEST cost per page? A. Inkjet B. Thermal C. Laser D. Impact

C

Which of the following printer types requires the use of toner? A. Impact B. Inkjet C. Laser D. Thermal

C

Which of the following programs can be scheduled to delete unwanted compressed old files? A. Disk Management B. Check Disk C. Disk Cleanup D. Disk Defragmenter

C

Which of the following protocols are commonly used for Windows Remote Desktop? A. NTP B. PPTP C. RDP D. LDAP

C

Which of the following should a technician be cautious of when removing a fuser from a printer that has been recently operational? A. The fuser being fragile B. The fuser being wet C. The fuser being hot D. The fuser containing toner

C

Which of the following should be done FIRST if a printer fails to print very large files but prints smaller sized files without issue? A. Replace communications cable. B. Check that the correct type of paper is being used. C. Add additional memory to the printer. D. Change the toner cartridges.

C

Which of the following should be used when cleaning toner inside a laser printer? A. Lint free gloves B. Static wrist bands C. Rubber gloves D. Protective eyewear

C

Which of the following storage resources gives the ability to hold the LARGEST amount of data? A. SD card B. Blue-ray C. DLT tape D. DVD-ROM

C

Which of the following technologies BEST refers to simultaneous data transfer in both directions? A. Half-duplex B. Ethernet routing C. Full-duplex D. Ethernet switching

C

Which of the following video adapter supports a potential MAXIMUM throughput of 4Gbps? A. PCI B. ISA C. PCIe D. AGP

C

Which of the following will allow the use of Bit Locker if the computer does not have a TPM chip? A. External hard drive B. SCSI hard drive C. USB key D. CD-ROM drive

C

Which of the following will allow the use of BitLocker if the computer does not have a TPM chip? A. External hard drive B. SCSI hard drive C. USB key D. CD-ROM drive

C

Which of the following wireless security techniques is the MOST secure? A. Enable Wired Equivalent Privacy B. Disable SSID broadcast C. Enable Wi-Fi Protected Access D. Enable MAC filtering

C

Which of the following would a technician use for RIS? A. Tape drive B. Zip drive C. Network D. HDD

C

Which type of connector is required for a coaxial network cable? A. RJ-11 B. Token ring C. BNC D. RJ-45

C

What kind of controller is built into a CF card? A. SATA B. IDE C. ATA D. SCSI

C. An ATA controller is built into the CF card and many other solid-state technologies.

Which of these would NOT be a valid IPv4 addresses? A 165.245.0.254 B 10.2.0.11 C 77.52.264.1 D 192.168.253.2

C. An IPv4 octet has only eight bits available, so the possible range could only be between 0 and 255.

An IPv4 address of 194.16.3.1 falls into which network class? A. Class A B. Class B C. Class C D. Class D

C. An address in which the first octet is between 192 and 223 is a Class C address.

Which of the following is the MINIMUM amount of hard disk space required to install Windows 7? A. 4GB B. 8GB C. 12GB D. 16GB

D

Which of the following is the MOST common use of a cable with an RJ-11 connector? A. Ethernet B. Network Backbone C. T1 D. POTS

D

Which of the following is the MOST secure method to use when setting up a wireless network? A. WPA B. WEP C. Hidden SSID D. WPA2

D

Which of the following is the chipset used by the CPU to communicate with the system memory? A. VLBUS B. ASIC C. Southbridge D. Northbridge

D

Which of the following is the definition of an ST fiber connector? a) Synthetic Tip b) Standard Tip c) Steel Tip d) Straight Tip

D

Which of the following is the native resolution of a WUXGA monitor? A. 1200 X 960 B. 1280 X 1024 C. 1600 X 1200 D. 1920 X 1200

D

Which of the following keys is used to change laptop hardware settings? A. Function B. Shift C. Numeric D. Control

D

Which of the following log files references Windows specific errors? A. Archive Logs B. Application Logs C. Security Logs D. System Logs

D

Which of the following memory modules is a DDR3 chip? A. PC3200 B. PC4800 C. PC5300 D. PC8000

D

Which of the following printers needs a fuser installed? A. Inkjet B. Impact C. Dot Matrix D. Laser

D

Which of the following should be performed regularly in order to help restore a computer’s data after a hard drive failure?? a) Windows Memory Diagnostics b) Factory Restore c) System Restore d) Scheduled Backups

D

Which of the following shows the correct progression of video quality from lowest to highest? A. Component, S-Video, Composite B. Composite, HDMI, Component C. S-Video, Composite, HDMI D. Composite, S-Video, Component

D

Which of the following states consumes the LEAST amount of power? Edit A. Sleep B. Suspend C. Standby D. Hibernate

D

Which of the following will dissipate heat and requires no moving parts? A. Liquid cooling system B. Motherboard riser C. Case fan D. Heat sink

D

Which of the following will enable a technician to easily identify a connection for each device? A. Installing SATA drives B. Using LCD monitors C. Using optical mice D. Cable management

D

Which of the following wireless protocols requires the use of MIMO antennas? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

D

Which of the following wireless technology standards can operate at either 2.4GHz or 5GHz frequencies? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

D

Which of the following wireless technology standards has the GREATEST indoor range? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

D

Which of the following would be the BEST resolution setting for an application that requires a minimum resolution of 1024 x 768? A. SVGA B. PAL C. VGA D. XGA

D

Which of the following would be used to increase the efficiency in which programs execute? A. Disk Cleanup B. Task Manager C. Task Scheduler D. Defrag

D

Which operating systems use the c:\WINNT\ directory? A. Windows 7 B. Windows Vista Home C. Windows Vista Ultimate D. Windows 2000

D

You need to view the path that network traffic takes to a destination. Which one of these commands would provide this functionality? A) netstat -a 8.8.8.8 B) ping 8.8.8.8 C) ipconfig /all 8.8.8.8 D) tracert 8.8.8.8 E) We really should pull over and ask for directions

D) tracert 8.8.8.8 The Windows traceroute command, tracert, uses the ICMP protocol to provide a step-by-step path of your network communication, and displays each router IP address along the path.

Which of the following cable types are rated for Gigabit Ethernet? (Select TWO). A. CAT3 B. CAT4 C. CAT5 D. CAT5e E. CAT6

D, E

Which of the following can a technician do to optimize an infrared connection between a laptop and a printer? (Select TWO). A. Install a repeater device B. Boost the power C. Change the transmission channel D. Shorten the distance E. Maintain a clear line of sight

D, E

Which of the following computing techniques will limit the vulnerability of a system to infection by a virus? (Select TWO). A. Install a NAT firewall on the network B. Run an online malware scan monthly C. Only open email from recognized senders D. Update antivirus signatures on a daily basis E. Automatically update the operating system

D, E

What are differences between declarations and definitions?

Declarations make type and name of variable, function or object known to the compiler. Can occur many times in a program. Definitions allocate storages for variables, functions or objects. Can occur only once in a program.

Character

Declared with ____, written with a ____character around the value, and then printed with ___. Character Declared with char, written with a ' (single-quote) character around the char, and then printed with %c.

String (Array of Characters)

Declared with _____, written with ___ characters, and printed with __. "String (Array of Characters) Declared with char name[] or char[] name, written with "" characters, and printed with %s."

List some of drawbacks of using arrays instead of std::vector.

1) arrays are fixed size 2) no size() operation on arrays

What are 4 ways to initialize std::bitset?

1) bitset<n> b 2) bitset<n> b(u) - u is an unsigned long value 3) bitset<n> b(s) - s is a string value with values '0' or '1' 4) bitset<n> b(s, pos, n) - a copy of n characters from s starting from pos

Which of the following chipsets is responsible for controlling the data flow between the RAM and the processor? A. Northbridge B. DMA controller C. CMOS D. Southbridge

A

Which of the following commands can be used to establish a connection to a remote computer? A. telnet B. ipconfig C. ping D. tracert

A

Which of the following commands is used to obtain an IP address from the DHCP server? A. ipconfig /renew B. ping -t C. nslookup D. msconfig

A

Which of the following communication devices needs to have a subscription to a service provider for Internet access? A. Cellular WAN B. Infrared C. Bluetooth D. WLAN (802.11g)

A

Within MSCONFIG, which of the following is the System Restore button located? Edit A. General B. BOOT.INI C. SYSTEM.INI D. Startup

A

What is RIS?

Remote Installation Services It is a utility offered by Windows Server (since Windows 2000 Server) that offers scripted installation or installation of an image.

SC connector

Subscriber Connector or Standard Connecor A square connector for fiber that comes in pairs single-contact-fiber-optic-square-connector-sc-39229-2503159.jpg

SC connector

Subscriber or Standard or Square

SC

Subscription Channel

SXGA

Super Extended Graphics Array

A long spike (sometimes lasting many seconds) is known as what?

Surge

True / False All variables must be declared before they are used.

True

True/False: An ESD strap should connect to the ground of an electrical outlet.

True

True/False: Every user on a system should have a unique username and password that are shared with no one else.

True

True/False: For a non-PnP device, resource assignments are controlled by jumpers on the device itself.

True

True/False: One of the most basic (but not necessarily the most utilized) security measures you can take is to implement a passcode lock on the device.

True

True/False: With many laptops, if you have the external monitor connected before you boot the laptop, it will automatically detect it and send the display to there.

True

True / False Declarations can appear almost anywhere in the body of a C++ function.

True.

TPM

Trusted Platform Module

USMT

User State Migration Tool USMT captures user accounts, user files, operating system settings, and application settings, and then migrates them to a new Windows installation.

armored virus

armored virus A computer virus that is protected in a way that makes disassembling it difficult. The difficulty makes it “armored†against antivirus programs that have trouble getting to, and understanding, its code.

What's wrong with the following piece of code? const size_t arr_size = 15; int arr[arr_size]; for(size_t ix = 1; ix <= arr_size; ++ix) {

arr[ix] = ix; } 1) first element of array remains uninitialized, 2) there's a buffer overflow because index exceeds array's size.

ADSL

asymmetrical digital subscriber line

Command line Inspect a file's attributes

attrib [filename]

attribute

attribute An option set on a file that identifies it as part of a particular class of files or changes it in some way.

ASR

automated system recovery

watching a variable

b main r watch var r c c ...

You need to write a loop that will keep reading and adding integers to a sum, until the sum reaches or exceeds 21. The numbers are all less than 20 and the sum is initially 0. Which is the preferred loop construct to use? a) while loop b) do while loop c) for loop

b) do while loop

You need to write a loop that will repeat exactly 125 times. Which is the preferred loop construct to use? a) while loop b) do while loop c) for loop

c) for loop a for loop is counter controlled. It is known a an definite loop vs an indefinite loop. for ( counter = 1 ; counter <= 125 ; counter++ ) ;

the symbol for the operator that is used to reverse the logical state of it's operand is

! (exclamation point) if a condition is true, then the logical NOT operator will make it false. if a condition is false, then the logical NOT operator will make it true. ! ( a && b)

the symbol for the operator that checks if the values of two operands are not equal is

!= (exclamation equal sign)

The stream manipulator endl is an abreviation for _____.

"""end line"""

Append ouput to a file, in order to debug

"#include <fstream> ofstream myfile; myfile.open (""example.txt"", ios::out | ios::app); myfile << variable << ""\n""; myfile.close();"

HAVE LOST MEANING OF THIS CARD arrays are passed by _____ and give the syntax for passing an array to a function

"#include <iostream> 1 using namespace std; 2 3 int sum(const int array[], const int length) { 4 long sum = 0; 5 for(int i = 0; i < length; sum += array[i++]); 6 return sum; 7 } 8 9 int main() { 10 int arr[] = {1, 2, 3, 4, 5, 6, 7}; 11 cout << ""Sum: "" << sum(arr, 7) << endl; 12 return 0; 13 }"

The eleven disallowed characters in Windows filenames:

"* "" / \ [] : ;| =,"

What is this this operator called and how is it used <<

"<< is the stream Insertion operator The value to the operator's right, the ""right"" operand is inserted into the output stream. example: cout << ""Hello World"" ; Notice that the operator points in the direction of where the data goes. In this case the data goes out of the program to the display console."

What is the stream extraction operator?

">> The value to the operator's right, the ""right"" operand is extrated from the input stream. example: cin >> firstName ; Notice that the operator points in the direction of where the data goes. In this case the data comes into the program from the keyboard."

name 3 file stream data types?

"ifstream (intput file stream). you can create an object of this data type when you want to open an existing file and read data from it. example: ifstream intputFile(employees.txt""); ofstream (output file stream). you can create an object of this data type when you want to create a file and write data to it. example: ofstream outputFile((employees.txt"") ; fstream (file stream). objects of this data type can be used to open files for reading , writing, or both. example:"

the symbol for the modulus operator that divides two operands and returns an int remainder is

% (percent sign)

the symbol for the assignment operator that performs modulus divides the left operand with the right operand and then assigns the result to the left operand is

%= c %= a is equivalent to c = c % a

the symbol for the operator that checks if both the operands are either zero (false) or non-zero (true) is

&& (double ampersand)

____ evaluates to the address of x in memory.

&x

Write code for summing up indetermined number of ints from standard input.

(One of many possible solutions) int sum = 0, value; while(std::cin >> value) { sum += value; } std::cout << sum << std::endl;

the symbol for the operator that multiplies both operands is

* (asterisk)

_____ evaluates to the value of a pointer x

*x

the symbol for the assignment operator that adds the right operand to the left operand and then assigns the result to the left operand is

+ = (minus equal) c + = a is equivalent to c = c + a

C++ has 5 arithmetic operators. What are they and what are their character symbols?

+ addition - subtraction * multiplication / division % modulus

the symbol for the increment operator that increases an int value is

++ (double plus signs) A++

vi

- A command line text editor. VIM is better sudo apt-get install vim ;)

chown

- Change ownership of file/folder

dd

- Converts & Copy files.

shutdown

- Shutdown the system, same as the Windows/DOS command

apt-get

- one of a few different ways to install software on a *nix system.

sublimination

- to cause something to change from a solid form into a vapor and then back into a solid - the process behind dye-sublimination printing

It's possible to use an air compressor instead of compressed-air cans when you need a lot of air. If you take this approach, make sure you keep the pounds per square inch (PSI) at or below

. 40PSI

There are four main types of PC resources you might need to be aware of when installing a new component: interrupt request (IRQ) lines, memory addresses, direct memory access (DMA) channels, and

. I/O addresses

An authentication tool that uses physical characteristics to identify the user is known as a

. biometric device

Virtual memory is comprised of RAM and the

. hard drive (paging file)

On an inkjet printer, calibration is more commonly known as

. head alignment

Print resolution is measured in...

... dots per inch (DPI)

how much memory does it take to store a char data type in memory

1 byte

how much memory does it take to store a unsigned char data type in memory

1 byte

What should be a result of: 1) adding pointers? 2) subtracting pointers?

1) Either another valid pointer or size_t value, 2) Either another valid pointer or ptrdiff_t value defined in <cstddef>

What are differences between pointers and references?

1) a reference always refers to an object (it's an error to create an empty reference), 2) a reference always refers to the same object: int a = 10, b = 20, c = 30, d = 40; int *p1 = &a, *p2 = &b; int &r1 = c, &r2 = d; p1 = p2; //p1 points now to 'b', not to 'a' r1 = r2; //now c = 40

"Assuming get_size() is a function without arguments and returns an int value, which lines are illegal and why? unsigned buf_size = 1024; 1) int tab[buf_size]; 2) int tab[get_size()]; 3) int tab[13*2-7]; 4) char s[11] = ""correctness"";"

1) nonconst expression 2) nonconst expression 4) there is no space for null at the end of the string

What are 4 ways to initialize a std::vector?

1) vector<T> v1 2) vector<T> v2(v1) 3) vector<T> v3(n, i) 4) vector<T> v4(n)

What are the seven steps in the laser printing process?

1. Processing 2. Charging 3. Exposing 4. Developing 5. Transferring 6. Fusing 7. Cleaning MM19324

Three ways to get to (Reliability and) Performance Monitor in Windows Vista/7

1. perfmon.msc 2. Control Panel -> Performance Information and Tools -> Advanced Tools -> Open (Reliability and) Performance Monitor 3. Control Panel -> Administrative Tools -> (Reliability and) Performance Monitor

What is the capacity on a floppy disk?

1.44 MB

Private IP address ranges

10.0.0.0 through 10.255.255.255 169.254.0.0 through 169.254.255.255 (APIPA only) 172.16.0.0 through 172.31.255.255 192.168.0.0 through 192.168.255.255

IPv4 Class C

192.0.0.0 - 223.255.255.255

1080p

1920x1080

how much memory does it take to store a short int data type in memory

2 bytes

"how much memory does it take to store a wchar_t data type in memory i.e. ""wide character"""

2 or 4 bytes

IPv4 Class D

224.0.0.0 - 239.255.255.255

IPv4 Class E

240.0.0.0 - 255.255.255.255

Which lines are incorrect? const int size1 = 10; int size2 = 11; const int size3 = get_size(); 1) char input[size1]; 2) string output[size1+2]; 3) double salaries[size2]; 4) int counts[size3]; 5) short numbers[get_size()];

3) 4) 5)

FAT32

32-Bit File Allocation Table

how much memory does it take to store a signed long int data type in memory

4 bytes

how much memory does it take to store a unsigned long int data type in memory

4 bytes

how much memory does it take to store an int data type in memory

4 bytes

how much memory does it take to store an unsigned int data type in memory

4 bytes

What are displayed values (assume that all chars here are 8-bit variables)? unsigned char a = 300; unsigned char b = -2; char c = 301; char d = -1;

44 254 undefined -1

DNS port number

53 in both TCP and UDP

uint64_t

64 bit unsigned integer.

how much memory does it take to store a double data type in memory

8 bytes

Ping WAN

8.8.8.8

DB-9

9 Pin D Shell Connector

SCSI uses which of the following connector types? edit A. DB-25 B. DB-9 C. RJ-45 D. RJ-11

A

Which of the following RAM types does a laptop use? A. SODIMM B. DIMM C. RIMM D. SIMM

A

what is a bit-field? and, how do you define one?

A bit-field is a set of adjacent bits within a single ’word’. Example: struct flag { unsigned i n t is _color :1; unsigned i n t has_sound : 1 ; unsigned i n t is _ntsc :1; };

8.3 naming convention

A convention prevalent with FAT in which files are named with up to eight characters and have an extension of up to three characters.

answer file

A file used to fill in values during an unattended installation.

Privacy Screen Filter / Film

A film that is placed on the surface of your monitor to make it so that only someone directly in front of it can see the contents of your monitor.

active heat sink

A heat sink with a fan to assist in removing heat from the CPU.

access list

A list of rules used on routers and firewalls to specify traffic that is either allowed or disallowed.

Wi-Fi Bands

A portion of the wireless communication spectrum is dedicated to wireless local area network (WLAN or Wi-Fi). Within this dedicated portion of the spectrum there are four distinct frequency bands, as specified by wireless networking standard IEEE 802.11: 2.4 GHz, 3.6 GHz, 4.9 GHz, and 5 GHz. The majority of Wi-Fi users are using the 2.4Ghz band which includes the 802.11 b/g/n standards used by most consumer Wi-Fi enabled devices.

application programming interface (API)

A set of standards to help the programmers writing applications and the hardware designers of video cards and other hardware develop products that work together.

What is a variable declaration.

A statement that declares a variable's data type. Examples of variable declarations: int number1; float number 2 str lastName

Which of the following operating systems do not allow you to disable simple file sharing? (Select two.) A. Windows XP Home B. Windows XP Media Center C. Windows XP Professional D. Windows Vista Ultimate

A, B. Windows XP Home and Windows XP Media Center do not allow you to disable simple file sharing.

A Windows XP workgroup computer can have up to how many concurrent connections?

A. 10 or fewer B. 15 or fewer C. 20 or fewer D. 25 or fewer A

A user needs to access a secure website behind a firewall. Which of the following would get the user into the website?

A. https:\\www.ipdomain.com:8080 B. https:\\www.ipdomain.com C. https:\\ipdomain.com\8080 D. https:\\www.ipdomain.com\8080 A

What integrated circuit device controls USB devices connected to a USB port? A. Host controller B. IC-USB C. Serial port D. UART

A. the host controller controls USB devices plugged into the USB bus via a USB port.

Which versions of Windows Vista offer offline file support? (Choose all that apply.) A. Enterprise B. Business C. Ultimate D. Home Professional

ABC. In Windows Vista, support for offline file support is limited to the Business, Enterprise, and Ultimate versions.

Which versions of Windows offer the Recovery Console? (Choose three.) A. Windows 2000 server B. Windows XP Professional C. Windows XP Home D. Windows Vista Ultimate

ABC. The Recovery Console is a command-line utility used for troubleshooting Windows 2000 and Windows XP. It is not included with Windows Vista.

AES

AES The Advanced Encryption Standard, which is currently the most secure encryption available and is required for FIPS compliance.

APIPA

APIPA automatic private internet protocol addressing

AGP

Accelerated Graphics Port

AUP

Acceptable Use Policy

ACL

Access Control List

AP

Access Point

AP

Access point

sudo

Act on behalf of user. Use this elevate and run commands.

AC

Alternating Current

master drive

An IDE drive responsible for managing data transfers for itself and the slave drive

ATM

Asynchronous Transfer Mode

BIOS

Basic Input/Output System

Why is this code legal? int arr[] = {2, 4, 6, -9}; int *p = &arr[2]; int a = p[1]; int b = p[-2];

Because when we subscript an array, we are really subscripting a pointer. It means we can use the subscript operator on any pointer, as long as that pointer points to an element in the array.

Declarations of variable can be placed almost anywhere, but they must appear _______ their corresponding variables are used in the program.

Before

What technology is used to create connections between mobile devices and items such as speakers, headphones, external GPS units, and keyboards?

Bluetooth

How to initialize a dynamically allocated array?

By using value-initialize, like: int *arr = new int[10](); Such initialization can be done only to default values of array elements.

A technician is upgrading a desktop with the largest storage medium available. Which of the following drives is installed? A. Blue-ray drive B. Tape drive C. Magnetic storage drive D. Solid state drive

C

How can a user open a .zip file in Windows 7? A. With a web browser B. With a 3rd party application only C. Double click the .zip file D. Use system restore

C

How many bits are included in IPv4 binary addresses? A. 4 B. 16 C. 32 D. 256

C. IP addresses are 32-bit binary numbers.

Which of the following cellular data technologies is often considered 4G? A. EDGE B. UMTS C. WiMAX D. CDMA

C. WiMAX is usually considered a 4G cellular data technology.

Which settings information is usually stored in a memory chip and retained by using a small electrical charge provided by a battery installed on the motherboard?

CMOS

CMOS

CMOS complementary metal-oxide semiconductor

CNR

CNR Communications and Networking Riser

COMx

COMx communication port (x=port number)

cp

COPY FILES

CPU

CPU central processing unit

CRIMM

CRIMM Continuity Rambus Inline Memory Mode

chmod

Change/Modify Read/Write permissions on file/folder

unsigned

Changes the type so that it does not have negative numbers, giving you a larger upper bound but nothing lower than 0.

Ping default gateway

Connectivity on local network

What will happen after execution of this code? int *vect = new int [20]; delete vect;

Consequences can be different. Least serious is a memory leak.

CCMP

Counter Cipher Mode with Block Chaining Message Authentication Code Protocol Used in WPA2 wireless encryption protocol

Hubs, switches, routers, VoIP phones and NIC cards all have which of the following out of the box? a) PS/2 port b) IP addresses c) HDMI d) MAC addresses

D

SCSI hard drives can spin at a maximum speed of: a) 5,400 rpm. b) 7,200 rpm. c)10,000 rpm. d)15,000 rpm.

D

The highest quality video will generally be obtained using which of the following connector types? A. VGA B. RGB C. DVI D. HDMI

D

When installing a wireless keyboard and mouse, which of the following should be installed in the laptop? A. Digitizer B. Infrared C. Ethernet D. Bluetooth

D

A client calls, wanting to copy his music from his iPhone to his new PC. How can you accomplish this task? A. Connect the iPhone to the new PC. When it shows up as a new device, right-click it and select Properties. In the Properties dialog box, select Export media files. B. Connect the iPhone to the new PC. Double-click it and go to the Media folder. Drag and drop the desired music to the Music library on his new PC. C. Access the iPhone wirelessly from the PC. Drag and drop the desired music to the Music library on his new PC. D. He can't.

D. You cannot copy music from an iPhone onto your PC.

DB-25

DB-25 serial communications D-shell connector, 25 pins

Barry has been told that it is important on the print server to keep the hard drive(s) defragmented. What tool should he use for this purpose?

Defrag

What tool can you use to keep the hard drives defragmented?

Defrag

DMZ

Demilitarized Zone

DoS

Denial of Service

means getting the value that is stored in the memory location pointed by the pointer.

Dereferencing a pointer

DIN

Deutsche Industrie Norm

DLP

Digital Light Processing

DNS

Domain Name Service or Domain Name Server

DDR

Double Data Rate

Which government organization keeps a copy of material safety data sheets?

EPA (Environmental Protection Agency)

ERD

ERD emergency repair disk

ESD

ESD electrostatic discharge

What is the free version of ESX called?

ESXi

EVDO

EVDO evolution data optimized or evolution data only

EVGA

EVGA extended video graphics adapter/array

What command closes a CMD window?

EXIT

What is the most effective method of preventing viruses, spyware, and harm to data?

Educating the user

EEPROM

Electrically Erasable Programmable Read-Only Memory

EMI

Electromagnetic Interference

EMP

Electromagntic Pulse

EFS

Encrypting File System

fopen

FILE *fopen(const char *file, const char *mode);

FPM

Fast Page Module

What type of protection can be hardware or software based and its role is to limit the traffic in (or out) of the network?

Firewall

The router gets______ _________ in the network ID.

First address. This is not technically required, but a generally accepted practice.

FDD

Floppy Disk Drive

All Windows systems reserve the drive letters A: and B: for...

Floppy drives

What benefits, if any, do you gain from completely shutting down your computer?

From a software perspective, an operating system and the programs you run on it tend to accumulate all sorts of cruft over extended periods of use â€" temporary files, disk caches, page files, open file descriptors, pipes, sockets, zombie processes, memory leaks, etc. etc. etc. All that stuff can slow down the computer, but it all goes away when you shut down or restart the system. So shutting down your computer every once in a while â€" and I do mean actually shutting down, not just hibernating or putting it to sleep â€" can give it a “fresh start†of sorts and make it seem nice and zippy again.

FSB

Front Side Bus

Gb

Gb gigabit

Gb

Gigabit

GB

Gigabyte

signed

Gives you negative and positive numbers, but halves your upper bound in exchange for the same lower bound negative.

GSM

Global System for Mobile Communications

GDI

Graphics Device Interface

HAV

Hardware-Assisted VIrtualization

HDMI

High-Definition Media Interface

HPFS

High-Performance File System

HTPC

Home Theatre PC

HTPC

Home theater PC

HTT

Hyper-threading Technology

The Ledge Where not interested in sales training, we simply don't use it...

I'm just curious, what do you use?

ICR

ICR intelligent character recognition

IDE

IDE integrated drive electronics

IDS

IDS Intrusion Detection System

IEEE

IEEE Institute of Electrical and Electronics Engineers

IIS

IIS Internet Information Services

IR

IR infrared

What is an IO problem? (Not I/O)

Ignorant Operator

Where should const initialized by constant expression be placed, in a header or in a source file?

In a header file.

Where should const initialized by nonconstant expression be placed, in a header or in a source file?

In a source file and with extern declaration of it in a header file.

What is the most common PIN required when pairing two devices?

In many cases the pin is 0000, but check the manual for the external device.

duplexing

In printing, the act of printing on both sides of paper. In networking, the communication method used allowing both parties to communicate simultaneously.

IPS

In-Plane Switching

IRP

Incident Response Plan

cin requires what header file?

Include <iostream>

ISO

Industry Standards Organization

IR

Infrared

IrDA

Infrared Data Association

IEEE

Institute of Electrical and Electronics Engineers

In C++ a whole number is referred to as an _______.

Integer Be aware: if you type a decimal point after an integer it become a float (aka real number) example: 2. or 25.

IDE

Integrated Drive Electronics

ISDN

Integrated Services Digital Network

IRQ

Interrupt Request

IDS

Intrusion Detection System

visualize the definition of custom function printDottedLine:

It has no parameters and returns nothing. it outputs to the console. it prints a single line consisting of 5 plus signs and is terminated by a new line character. look at the answer and see how you did! "void printDottedLine() { cout << ""+++++\n""; }"

How do you determine which floppy drive will become A: ?

It will be the one on the end of the cable. (As opposed to the connection in the middle.)

We have such an object: int ia[5][2]. What will ia[2] return?

It will return third inner array (third row).

[4.3] What is a C-style string?

It's a NULL-terminated array of characters.

Give a code: typedef string *pstring; const pstring cstr; what is the type of cstr?

It's: string *const cstr; //const pointer to string

JBOD

Just a Bunch of Disks

A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.

Kerckhoffs's principle

KB

Kilobyte or knowledge base

LGA

Land Grid Array, a type of CPU socket

Change drives (command line)

Letter of the drive followed by a colon. (i.e. e:) Should you return to the original drive, you will return to the same directory. c:\Program Files> e: e:\> c: c:\Program Files>

LDAP

Lightweight Directory Access Protocol

LPD/LPR

Line Printer Daemon/Line Printer Remote

LPT

Line Printer Terminal

LCD

Liquid Crystal Display

What NTFS permission allows the user to view the contents of a directory and to navigate to its subdirectories?

List Folder Contents

nbtstat -A (IP address of remote)

List Remote netBIOS names by IP

LVD

Low Voltage Differential

Fundamental types (int, float, double char, etc.) are keywords therefore must appear in _____ case.

Lower C++ is case sensitive therefore all keywords must be in lower case or they will not be recognized as keywords.

MCA

Micro Channel Architecture

NAC

Network Access Control

NAT

Network Address Translation

NAS

Network Attached Storage

NFS

Network File System

NIC

Network Interface Card

"Is this code OK? char *target, *source1 = ""Hello, "", *source2 = ""World!""; strcpy(target, source1); strcat(target, source2);"

No, because at first we need to allocate sufficient amount of memory to the destination string before using str* functions.

Is it legal and why? int a =331; int * const pointer = &a; pointer = pointer;

No, because pointer is a const pointer.

[4.2.5] Is it true that pointer to const object always points unchangeable object?

No, not always. That's because it's possible for such a pointer to point to nonconst object: int x = 14; const int *p = &x; //OK It's never possible to change the object through pointer to const object.

If you insert a floppy cable backwards, what will happen?

Nothing. It just won't work. Turn off the system and try again

OCR

Optical Character Recognition

PATA

Parallel Advanced Technology Attachment

PAN

Personal Area Network

PRI

Primary Rate Interface

PCL

Printer Control Language

QoS

Quality of Service

Which utility automatically verifies system files after a reboot to see if they were changed to unprotected copies?

SFC.EXE

iwconfig/ifconfig -

Same command as ipconfig. iwconfig deals with wireless

grep

Searches for a string of text

SCP

Secure Copy Protection

SRAM

Static Random-Access Memory

SAN

Storage Area Network

int

Stores a regular integer, defaulting to 32 bits in size.

ST

Straight Tip

ST connctor

Straight tip fiber connecor - Bayonet connector

SDRAM

Synchronous Dynamic Random-Access Memory

SFC

System File Checker

msinfo32

System Information

TelNet Telecom Port

TCP 23

POP3 Post Office Protocol PORT

TCP/110

What is the difference between UAC in Windows 7 and Vista?

The UAC in Vista is either on or off. 7's UAC has 4 degrees of intrusiveness.

What technology allows for memory and CPU to be dynamically allocated to the VMs as required? A. Network-based virtualization B. Hardware-assisted virtualization C. Hyperthreading D. Multitasking

The benefit derived from the virtualization product (also called a hypervisor) using hardware-assisted virtualization is it allows the hypervisor to dynamically allocate memory and CPU to the VMs as required.

What does having an address that starts with 169.254 mean?

The computer is using APIPA and cannot access the DHCP server.

Name two of the differences between tablet and laptop hardware.

The differences include: No field-serviceable parts, Typically not upgradeable, Touch interface, Solid-state drives.

UPD v. SPD

The first surge unit, (upstream SPD) mitigates the brunt of the surge energy while the second unit (the UPS) reduces any remaining surge energy to an inconsequential level.

[5.2] What is short-circuit evaluation?

The logical AND and OR operators always evaluate their left operand before the right. Short-circuit evaluation means that right operand is evaluated only if the left operand doesn't determine the result.

[4.4.1] We have: int ia[2][5]; What is a type of ia?

The name of that array is converted to a pointer to the first inner array. Which means: int (*ia)[5]; And: int (*ip)[5] = ia; //ip point to an array of 5 ints ip = &ia[1]; //ia[1] is an array of 5 ints

I'm busy

The only reason I'm calling is to set up an apptment

Which twisted pair wiring standard specifies the pin arrangements for the RJ-45 connectors on UTP or STP cables?

The pin arrangements for the RJ-45 connectors on UTP or STP cables are specified by wiring standards T568A (older) and T568B (newer).

Let's assume following situation: // file1.cpp int counter = 0; //file2.cpp counter++; Is the program legal? If no, then how to correct it?

The program is illegal because we need to write content of file2.cpp as below: //file2.cpp extern int counter; counter++;

[4.2.2] What would happen when using an uninitialized pointer?

The result is undefined. For example, it can result in run-time crash.

developing

The stage in the laser printing process when toner is applied to the charged drum, creating the image that will be formed.

C The type of a character literal is __, and not ___, that is sizeof 'a' is __ in an architecture where ints are 32bit (and CHAR_BIT is 8), while sizeof(char) is 1 everywhere.

The type of a character literal is int, and not char, that is sizeof 'a' is 4 in an architecture where ints are 32bit (and CHAR_BIT is 8), while sizeof(char) is 1 everywhere.

Web Cache

The web cache, or browser cache, is a mechanism for the temporary storage of web documents intended to reduce bandwidth usage, server load, and the user’s perception of browser latency.

What is the type of a pointer?

There seem to be two definitions Pointersarejustvariablesstoringintegers â€" butthoseintegershappentobememory addresses, usually addresses of other variables. data_type *ptr type is (pointer to a data_type var), or (data_type *)

How are multidimensional arrays stored in cpp?

They are exactly the same as 1D arrays

what does the all tag mean in a Makefile

This is by convention the first tag in the file. The first tag is run when make is ran with no arguments.

_______ occurs when the breaker on a device such as a power supply, surge protector, or uninterruptible power supply (UPS) turns off the device because it received a spike.

Tripping

UTP

Unshielded Twisted Pair

UAC

User Account Control

What are the three most recent Windows transfer utilities?

User Data Migration Tool (Windows NT) Files and Settings Transfer Wizard (Windows XP) Windows Easy Transfer (Windows Vista/7) for extra points: User State Migration Tool ()

UDP

User Datagram Protocol

UDF

User Defined Functions or Universal Disk Format or Universal Data Format

When a problem is believed to be resolved, what should be done before documenting the findings and closing the case?

Verify that the system is fully functional.

VESA

Video Electronics Standards Association

VGA

Video Graphics Array

VRAM

Video Random-Access Memory

net view \\<servename>

View network resources

VFAT

Virtual File Allocation Table

VM

Virtual Machine

VPN

Virtual Private Network

VoIP

Voice over Internet Protocol

What are void pointers and what are theirs features and limitations?

Void pointers are special kind of pointers that can hold an address of any object. Features: 1) comparing it to another pointer, 2) passing or returning it from a function, 3) assigning them to another void pointers. Limitations: not possible to use them to operate on object they address.

When do arrays are initialized?

When: 1) defined outside the body of a function 2) arrays hold elements of a class type 3) developer explicitely initialize them

WPS

WiFi Protected Setup

WAN

Wide Area Network

WUXGA

Wide Ultra Extended Graphics Array

WHQL

Windows Hardware Quality Labs testing or WHQL Testing is Microsoft's testing process which involves running a series of tests on third-party hardware or software, and then submitting the log files from these tests to Microsoft for review. The procedure may also include Microsoft running their own tests on a wide range of equipment, such as different hardware and different Microsoft Windows editions.

WINS

Windows Internet Name Service

WSUS

Windows Server Update Services (WSUS), previously known as Software Update Services (SUS), is a computer program developed by Microsoft Corporation that enables administrators to manage the distribution of updates and hotfixes released for Microsoft products to computers in a corporate environment. WSUS downloads these updates from the Microsoft Update website and then distributes them to computers on a network. WSUS runs on Windows Server and is free to licensed Microsoft customers.

ASR

Windows XP Automated System Recovery. ASR is your last line of defense when restoring functionality to your PC. It backs up your boot and system volumes and the system state information.

What is the absolute minimum RAM Windows XP will operate with?

Windows XP requires a minimum of 64 MB of RAM.

WEP

Wired Equivalent Privacy

WAP

Wireless Access Protocol or Wireless Access Point

WiFi

Wireless Fidelity

WLAN

Wireless Local Area Network

WPA

Wireless Protected Access

Is the following code legal and why? int arr[]={2, 4, -2}; int *p = arr;

Yes, because the name of an array is converted into a pointer to the first element of the array.

Is it possible to initialize std::vector from an array?

Yes, it can be done in the following way: const size_t arr_size = 3; int arr[arr_size] = {3, -1, 5}; std::vector<int> ivec(arr, arr+arr_size);

Is this code correct? int x = 45; int *const p = &x; *p = 42;

Yes. It would be illegal for example like this: p = 0.

ZIF

Zero Insertion Force

In a command line, how do you find out the syntax and switches used by a particular command?

[command] /?

raster image processor

a chip in a laser printer that translates a raster image into commands to the laser

Whats the difference between a function definition and a function prototype aka function declaration?

a function prototype (aka declaration) is not the same as a function definition which includes the function's header and the complete body of the function. a function prototype / declaration looks similar to a functions header and can be used to circumvent the need to place a function definition before all calls to the function.

Write a statement that declares:

a prototype for a function getName getName has an int parameter and returns an int value. int getName (int);

Performance Logs and Alerts

a snap-in that enables Windows to create a written record of just about anything that happens on your system

ARC naming system

a system that's designed to enable your PC to boot Windows from any hard drive, including removable devices

FPM RAM

a type of Dynamic RAM (DRAM) that allows faster access to data in the same row or page. Page-mode memory works by eliminating the need for a row address if data is located in the row previously accessed. It is sometimes called page mode memory.

What is a union?

a variable that may hold objects of different types/sizes in the same memory location.

What happens when the following excerpt of code is executed? string s; cin >> s;

a) Any leading whitespace (like spaces, newlines, tabs) are read and discarded b) Then characters are read until the next whitespace character

What are minimum size guaranteed by the C++ Standard of the following types? a) bool b) char c) wchar_t d) short e) int f) long g) float h) double i) long double

a) NA b) 8 bits c) 16 bits d) 16 bits e) 16 bits f) 32 bits g) 6 significant digits h) 10 significant digits i) 10 significant digits

What are forms of generalized escape sequences?

a) \ooo where ooo is one or more octal ASCII number, e.g. \12 (bell), \40 (blank) b) \xddd where ddd is one or more hexadecimal ASCII number

ACT

activity

Swap partition

acts as an overflow to your (RAM) memory.

ARP

address resolution protocol

ACPI

advanced configuration power interface

AC

alternating current

asian crisis 1997-8

america rode out

what does the sizeof( ) function return

amount of storage required by a data type that is passed as an arguement example: sizeof(double) would return 8

API

application programming interface A set of standards to help the programmers writing applications and the hardware designers of video cards and other hardware develop products that work together.

the function call method call by pointer copies the address of an a________ into the formal parameter of the function

argument

the function call method call by reference copies the reference of an a________ into the formal parameter of the function

argument

the function call method call by value copies the actual value of an a________ into the formal parameter of the function

argument

a computer virus that contains a variety of mechanisms specifically coded to make its detection and decryption very difficult.

armored virus

backup

backup A usable copy of data made to media. Ideally, the backup is made to removable media and stored for recovery should anything happen to the original data.

BIOS

basic input/output system an assortment of low-level system software to abstract and interface the hardware, often located in a computer's firmware

In Linux and UNIX, we hide files by

beginning their names with a dot

what is the keyword for the Boolean data type?

bool

bridges

bridges Devices that, like switches, operate at Layer 2 of the OSI model and make forwarding decisions based on MAC addresses.

cable

bundle wires

cord

cable for heavy duty use

Difference between malloc and calloc?

calloc() zero-initializes the buffer, while malloc() leaves the memory uninitialized.

command line change directory

cd or chdir

Move up a single directory (command line)

cd..

terminal command: cd to home directory

cd;

To return to the root directory (command line)

cd\

what does the following loop do while ( n < 1 || n > 10 ) {

cin >> n ;} repeatedly reads a value into n until at last a number between 1 and 10 (inclusive) has been entered.

The speed at which a microprocessor executes instructions expressed in megahertz (MHz) or gigahertz (GHz).

clock speed

clear screen command

cls

CD

compact disc (or, in the command line, Change Directory)

How to create: 1) pointer to const object, 2) const pointer to object, 3) const pointer to const object?

const int x = 14; int y = 13; 1) const int *p1 = &x; 2) int *const p2 = &y; 3) const int* const p3 = &x;

When you declare a series of variables, their locations are not necessarily in c_______ memory locations.

contiguous

ctype.h

convert case check whether a given character is an alphabetic character, an uppercase letter, or a punctuation character

xcopy

copy from and to multiple directories

CTD

crash to desktop

Device Manager program name

devmgmt.msc

DIP

dual inline package

print the HOME directory

echo $HOME

EEPROM

electrically erasable programmable read-only memory

EMP

electromagnetic pulse

EPROM

erasable programmable read-only memory

ECC

error correction code

int main() function is where program e______ begins

execution

ECP

extended capabilities port

"what does the ""f"" stand for in the fstream data type?"

file

what is the keyword for the Floating Point data type?

float

visualize the general form of a for loop then flip the card to see if you are correct

for ( <initalize> ; <condition> ; <update> ) { <statement(s)> ; }

"what does the following code do

for ( count = 50 ; count >0 ; count-- ) cout << count << "" "" ;" prints the integers 50 through 1, separated by spaces.

what does the following code do

for ( i = lo ; i <= hi ; i++ ) { result += i ; } it adds the integers between lo and hi (inclusive), and stores the result in result .

this data type represents the file stream generally, and has the capabilities of both ofstream and ifstream which means it can create files, write information to files, and read information from files

fstream

start an executable file with gdb, set a breakpoint, print a variable, and delete the breakpoint

gdb file breakpoint file.cpp:100 print foo clear

GB

gigabyte

GSM

global system for mobile communications

scope: variables that are defined outside of all function including main are ______ variables

global usually defined at the top of a program outside the main function. global variables: can be called by any function. hold their values throughout the life-time of a program.

What does this relational operator mean? >

greater than

command line When you can't remember commands

help help [command] for a specific command line utility (i.e. help cd)

what decision statement consists of a boolean expression followed by one or more statement

if statement

the way the postfix increment / decrement operators work is: evaluate x, increment x.

if the following statements are executed: int x = 5 ; int y = x++ ; what are the values in x and y? x = 5 y = 6

this data type represents the input file stream and is used to read information from files

ifstream

A motherboard's

includes the onboard circuitry for controlling the AGP bus, onboard sound circuitry, and main memory bus. chipset

ISA

industry standard architecture

what is the keyword for the integer data type?

int

To declare a pointer variable named ptr that points to an integer variable named x:

int *ptr = &x

set the value of a variable x using only a pointer

int *ptr = &x; *ptr=100;

To declare an integer array named arr of four elements in C++, we write

int arr[4]; of int [4] arr;

C++ programs have a least one function defined. what is that function

int main();

What is the typical main function parameters? What do they contain?

int main(int argc, char *argv[]) argc=number of arguments when program run, plus one argv = array of the arguments, 0 element is program name

How to change value of a pointer and value to which a pointer points?

int x = 3; int *p = &x; 1) p = 0; 2) *p = 4;

ls

lists all files/folders

scope: variables that are defined inside a function or block are ______ variables

local

Variable names (identifiers) correspond to l________ in the computer's memory.

locations

LBA

logical block addressing

Several of the basic data types can be modified using one or more of these 4 type modifiers: hint:

long signed unsigned short long

The ________ operator yields the remainder after integer division.

modulus %

mobo

motherboard

mv

move files

Program name for System Information

msinfo32

The notation std::cout specifies that we are using cout from n________ std.

namespace

when use one or more loops inside of an outer loop it is known as n_______ loops

nesting Loop_A { Loop_B { } }

net start <service>

net start spooler

net stop <service>

net stop spooler

NAT

network address translation

NAS

network-attached storage

When a value is read out of a memory location, the process is non_________.

nondestructive

Windows XP backup program (command line)

ntbackup

c.b. interest rate cuts

offers of funds through acution fund facilities federal funds target rate: min lending rate US

this data type represents the output file stream and is used to create files and to write information to files

ofstream

"what does the ""of"" stand for in the ofstream data type?"

open file

switch

or option command line An extra letter or number which may follow either the command or the target, which modifies the command.

A message that directs the user to take a specific action is known as a p____.

prompt

RIP

raster image processor a chip in a laser printer that translates a raster image into commands to the laser

++ (postfix)

read, then increment

You need to write a loop that:

reads the first 50 integers (1 - 50) adds (only) the positive numbers to a variable named sum Which is the preferred loop construct to use? a) while loop b) do while loop c) for loop b) for loop the for loop is a definite loop. there is a known starting and stopping point. It starts at 1 and performs exactly 50 iterations. for ( counter = 1 ; counter <= 50 ; counter + 1 ) arguement 1: sets a user defined counter to an initial value of 1. arguement 2: set the variable counter to accept the first 50 counting numbers then jump out of the loop. arguement 3: sets the value of the variable counter to be increased by 1 every iteration. note that counter++ is equivalent to counter + 1.

The modulus operator, % yeilds the r_______ after integer division

remainder 15 % 2 = 1 5 % 2 = 1 9 % 6 = 3

rm (r_m)

remove files

The #include statement is basically like a copy/paste operation. The compiler will r _____ the #include line with the actual contents of the file you're including when it compiles the file.

replace

C Pre-Processor

replacement of macros, including in code from libraries

What statement indicates the program has terminated successfully?

return 0; The C++ standard says if a program execution reaches the end of main without encountering a return statement, it's assumed that the program terminated successfully --- exactly as when the last statement in main is a return statement with the value 0. For that reason, it is not necessary to put the return statement at the end of the main function.

A library is a package of code that is meant to be r_______ in many programs

reused

sdelete

secure delete A command-line utility that deletes and overwrites a file or files in order to make sure that they are gone forever.

netstat

shows the network statistics for the local computer. The output shows current TCP connections.

What is a counterpart of std::string::size_type for arrays?

size_t

fwrite

size_t fwrite(const void *restrict buf, size_t size, size_t count, FILE *restrict fp);

docsis

specification for broadband cable

Using namespace std; enables the program to use all the names in any included C++ ________ library ______.

standard header

what does the following general form represent: return_type function_name ( parameter list ) {

statement(s); } defines a function

cstring give two functions

strcat strcpy

Output and input in C++ are accomplished with s_______.

streams

give an array declaration that will define a string array named lastNames that has 10 elements

string lastNames[10]; form is: type arrayName [ arraySize ] ;

"What are displayed values? int sum = 0, i = 1; for(int sum = 1, i = 0; i <= 3; ++i) {

sum += i; } std::cout << sum << "" "" << i;" 0 1

What is the value of sum after executing the code? int sum = 0; int i = 0; while (i <= 5) {

sum = sum + i; i++; } 15

visualize the general form of a switch then flip the card to see if you are correct

switch ( <expression> ) { case <constant1> ; <statement sequence1> ; break case <constant2> ; <statement sequence2> ; break

su

switch user

The __________ start the PC and then, at the end of that process, point the CPU to the location of the boot files. The CPU goes over and chats with ____________, and the GUI starts to load. The operating system is then up and running, and you're able to do work.

system files, ntoskrnl

fgets

takes characters from a file and puts it onto a buffer (char *) char *fgets(char *restrict buf, int n, FILE *restrict fp);

fscanf

takes input from a file, which can include stdin

scanf

takes user input only converts the input to the format specifier and returns it

what will happen if you omit the size when defining the following array: double balance[ ] = { 25.0, 30. };

the array will default to enough memory for the number of declared variables. In this case 2. if you omit the size of an array then initialize, it will create an array just big enough to hold the number of elements specified.

the predefined object cin is an instance of what class

the istream class

What is the order of precedence for multiplication, division and modulus operations?

they are all said to be on the same level of precedence and are treated equally, therefore applied left to right.

the bool data type stores either _____ or _____

true or false or 0 or 1

short

type modifier, makes it use less storage, usually half

RAID levels greater than RAID 0 provide protection against

unrecoverable sector read errors, as well as against failures of whole physical drives.

long (type modifier)

usually doubles the size

standard parallel cable

usually refers to a printer cable with a male DB-9 connector on one end and a 36-pin Centronics connector on the other. Usually are acceptable for transferring data at 150 KBs, and for distances of less than 6 feet, but they would be dangerously unreliable for some transfer modes.

"what is the keyword for the ""Valueless"" data type?"

void

what is the keyword for the Wide character data type?

wchar_t

"what does the following code do

while ( ( s != ""Y"" && s != ""y"" && s != ""N"" && s != ""n"" ) ) { cin >> s ; }" "it repeatedly reads a value from standard input into s until at last a ""Y"" or ""y""or ""N"" or ""n"" has been entered."

visualize the general form of a while loop then flip the card to see if you are correct

while ( <condition> ) { <statement(s)> ; }

which type of loop repeats a statement or group of statements while a given condition is true. It pre tests the condition before executing the loop body

while loop

tracert /d

will not resolve IP addresses to hostnames. Running numerical versions of commands can be faster because there is no name resolution to get in the way.

What is *( &x )

x

x- - ; is the same as:

x = x -1 ;

the way the prefix increment/decrement operators work is: increment x, then evaluate x if you execute the following statements: int x = 5 ; int y = ++x ; what are the values in x and y?

x =6 y =6

what expression is equivalent to

x++ ; x = x + 1 ;

What are differences between x1 and x2? double* x1, x2;

x1 is a pointer to double and x2 is an object of double type.

Arrays in C++ are ___-indexed

zero

the symbol for the operator that checks if any of the two operands are non-zero (true) is

| | (double pipes)

IIS

Internet Information Services

IMAP

Internet Mail Access Protocol

IPP

Internet Printing Protocol

IP

Internet Protocol

IPCONFIG

Internet Protocol Configuration

IPSec

Internet Protocol Security

IRC

Internet Relay Chat (IRC) is a protocol for live interactive Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfer, including file sharing.

ISP

Internet Service Provider

JBOD

just a bunch of disks

MAU

Media Access Unit or Media Attachment Unit

What utility is started with MSTSC.EXE?

Remote Desktop Connection

RDP

Remote Desktop Protocol

RIS

Remote Installation Service

DEFRAG /A

determines the degree of fragmentation without defragging

Which of the following are possible reasons for motherboard failure? (Select all that apply.) A. Power surge B. Manufacturer defect C. CD-ROM failure D. Incorrect USB device

"A & B. Power surges and manufacturing defects are possible reasons for motherboard failure. If a CD-ROM fails, it should not affect the motherboard, and any USB device can connect to a USB port (if it has the right connector). There isn't actually and ""incorrect"" USB device."

solenoid

"A solenoid (from the French solénoïde, derived in turn from the Greek solen ""pipe, channel"" + combining form of Greek eidos ""form, shape""[1]) is a coil wound into a tightly packed helix. The term was invented by French physicist André-Marie Ampère to designate a helical coil.[2] In physics, the term refers specifically to a long, thin loop of wire, often wrapped around a metallic core, which produces a uniform magnetic field in a volume of space (where some experiment might be carried out) when an electric current is passed through it. Solenoids are important because they can create controlled magnetic fields and can be used as electromagnets. In engineering, the term may also refer to a variety of transducer devices that convert energy into linear motion. The term is also often used to refer to a solenoid valve, which is an integrated device containing an electromechanical solenoid which actuates either a pneumatic or hydraulic valve, or a solenoid switch, which is a specific type of relay that internally uses an electromechanical solenoid to operate an electrical switch; for example, an automobile starter solenoid, or a linear solenoid, which is an electromechanical solenoid."

"Which of the following points to a hardware or CMOS problem rather than an OS problem with a PC that won't boot? A. A black screen with the error message ""invalid boot disk"" B. A black screen with the error message ""NTLDR bad or missing"" C. A black screen with the error message ""Invalid BOOT. INI"" D. A black screen with the error message ""Invalid BCD"""

"A. A black screen with an ""invalid boot disk"" error message points to a hardware or CMOS problem with a PC that won't boot."

How to include header for the standard library and for nonstandard ones?

"Standard library: #include <iostream> Nonstandard library: #include ""myheader.h"""

Which of the following utilities enables a Windows 7 user to edit a file offline, and then automatically update the changes when the user returns back to the office? A. Sync Center B. Windows Aero C. Windows Defender D. HomeGroup

"A. The Sync Center is a feature of Windows that enables you to keep information synchronized between your computer and network servers. You can still access the files and modify them even if you don't have physical access to the the server; in this case they are modified ""offline"" and are synchronized automatically when you return to the network. Some mobile devices are also compatible with Sync Center. The Sync Center can be configured within the Control Panel. Windows Aero is the premium visual experience included in some versions of Windows Vista and Windows 7. Windows Defender is the free Microsoft antimalware program. HomeGroup is meant to quickly and easily share printers and media between Windows 7 computers in a home network."

"Which of the following is true about the CONVERT command in Windows XP? A. The process is completely safe and there is no need to back up important files. B. The syntax used is ""convert C:/FS:NTFS"" C. You can convert from NTFS to FAT32 D. You can convert from FAT16 to FAT32"

"B. CONVERT can be use to make a file system go from FAT to NTFS by using the command ""convert C:/FS:NTFS"""

What is the primary reason for twisting the wires in a UTP cable? A Increases the usable bend radius B Minimizes interference C Designed for smaller spaces D Creates stronger cables

"B. The twist of a UTP cable keeps any interference from affecting a wire for any extended period of time. Since opposite signals are compared at the receiving end of the cable, it becomes much easier to detect interference and retain the ""good"" part of the signal."

Which error would CHKDSK most likely be able to repair? A. No ROM basic, system halted B. Incorrect partition type C. No boot device present D. Data error reading drive C:

"D. CHKDSK would most likely be able to repair the ""Data error reading drive C:"" error."

You have been using an SD card all day, switching it from your laptop to your camera. Now that it's back in your laptop, you find that you can't delete or edit any of your pictures, but you can still look through them. How do you solve this problem? A. Reboot your computer. B. Remove then re-insert the card. C. Blow on the end of the card to clear out dust. D. Pull up on the tab on the left side of the card.

"D. Some SD cards have a write-protect tab within the notch on the left side of the card. Sliding the tab down ""locks"" the card so that it can be read from but not written to."

DAC

"DAC discretionary access control In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria[1] ""as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control)""."

[4.3.1] What is a name of a memory for dynamically allocated objects in C++? How to access this memory?

"Either ""free store"" or ""heap"". Access is done by using C-style ""malloc"" and ""free"" functions or C++-style ""new"" and ""delete"" expressions."

Baud

"In telecommunication and electronics, baud (/ˈbÉ"Ëd/, unit symbol ""Bd"") is synonymous to symbols per second or pulses per second. It is the unit of symbol rate, also known as baud or modulation rate; the number of distinct symbol changes (signalling events) made to the transmission medium per second in a digitally modulated signal or a line code. Baud is related to but should not be confused with gross bit rate expressed in bit/s. However, though technically incorrect, in the case of modem manufacturers baud commonly refers to bits per second. They make a distinction by also using the term characters per second (CPS). In these anomalous cases, refer to the modem manufacturers documentation to ensure an understanding of their use of the term ""baud"". An example would be the 1996 User's guide for the U.S. Robotics Sportster modem, which includes these definitions."

"Is this code correct? char target[6+1+6+1], *source1 = ""Hello,"", *source2 = ""World!""; strncpy(target, source1, 6); strncat(target, "" "", 1); strncat(target, source2, 6);"

"No, because we have to remember about NULL character while invoking strn* functions. Correct sequence is: strncpy(target, source1, 7); strncat(target, "" "", 2); strncat(target, source2, 7);"

Is the following situation legal? //file1.cpp const int counter = 10; //file2.cpp extern int counter; int counter2 = counter;

"No, the program is illegal. It should be as below: //file1.cpp extern const int counter = 10; //file2.cpp extern const int counter; int counter2 = counter; Any variable, that is used in more than one file requires declarations that are separate from the variable's definition. Nonconst variables are extern by default. That's because if is that so, then we can use const in headers. And the rule ""one definition, many declarations"" is then not broken. But const variables declared at global scope are local to the file in which the object is defined. So that variable cannot be accessed from other files. We can make a const object accessible throughout the program by specifying that it's extern."

What does ESX stand for?

"Officially, nothing. Unofficially, it stands for ""Elastic Sky."""

What is a dynamically typed language?

"Something that allows this: employeeName = 9 employeeName = ""Steve Ferg"""

"In C, I can do like this: char s[]=""hello""; or char *s =""hello""; So I wonder what is the difference? I want to know what actually happens in memory allocation during compile time and run time."

"The difference here is that char *s = ""Hello world""; will place Hello world in the read-only parts of the memory and making s a pointer to that, making any writing operation on this memory illegal. While doing: char s[] = ""Hello world""; puts the literal string in read-only memory and copies the string to newly allocated memory on the stack. Thus making s[0] = 'J'; legal."

extern declaration keyword

"The storage for the variable is created elsewhere, used to export datga to other cimpilation units This keyword is a way to tell the compiler ""the variable exists, but it's in another 'external' location"". Typically this means that one .c file is going to use a variable that's been defined in another .c file."

What escape sequence is used to print a double quote character?

"\"" aka the double quote escape sequence."

What are escape sequences defined by the language?

"a) newline \n b) vertical tab \v c) carriage return \r d) alert (bell) \a e) question mark \? f) double quote \"" g) horizontal tab \t h) backspace \b i) formfeed \f j) backslash \\ k) single quote \'"

What are prefixes or suffixes for constant literals of the following types? a) unsigned int b) unsigned long c) signed int d) signed long e) float f) double g) long double h) bool i) char j) wchar_t k) signed short l) unsigned short m) string literal n) wide string literal

"a) prefix 'u', e.g. 120u b) prefix 'lu' or 'ul' (and any of theirs upper and lowercase combinations like 'Lu', 'lU' etc.), e.g. 1000UL c) none, e.g. 1000 d) 'l' or 'L', e.g. 1000L e) 'f' or 'F', e.g. 1000.0F or 1e3F f) none, e.g. 1000.0 or 1e3 g) 'l' or 'L', e.g. 1000.0L or 1e3L h) only 'true' and 'false' i) none, e.g. 'a' j) prefix 'L', e.g. L'a' k) none l) none m) none, e.g. ""C++"" n) prefix 'L', e.g. L""C++"""

ATAPI

"advanced technology attachment packet interface ATA Packet Interface (ATAPI) is a protocol that has been applied to ATA that allows a greater variety of devices to be connected to a computer than ATA would allow. ATA was originally designed for, and worked only with hard disks and devices that could emulate them. The introduction of ATAPI (ATA Packet Interface) by a group called the Small Form Factor committee (SFF) allowed ATA to be used for a variety of other devices that require functions beyond those necessary for hard disks. For example, any removable media device needs a ""media eject"" command, and a way for the host to determine whether the media is present, and these were not provided in the ATA protocol."

MAID

"an architecture using hundreds to thousands of hard drives for providing nearline storage of data, primarily designed for ""Write Once, Read Occasionally"" (WORO) applications, where increased storage density and decreased cost are traded for increased latency and decreased redundancy."

ATM

"asynchronous transfer mode Asynchronous Transfer Mode (ATM) is, according to the ATM Forum, ""a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voice, data, and video signals"". ATM was developed to meet the needs of the Broadband Integrated Services Digital Network, as defined in the late 1980s, and designed to unify telecommunication and computer networks. It was designed for a network that must handle both traditional high-throughput data traffic (e.g., file transfers), and real-time, low-latency content such as voice and video. The reference model for ATM approximately maps to the three lowest layers of the ISO-OSI reference model: network layer, data link layer, and physical layer. ATM is a core protocol used over the SONET/SDH backbone of the public switched telephone network (PSTN) and Integrated Services Digital Network (ISDN), but its use is declining in favour of all IP."

normal backup

"is a full backup. Every file selected is backed up, and the archive bit is turned off for every file backed up. This is the standard ""back it all up"" option."

rename all c files to cpp

"ls *.c | awk '{system(""mv ""$0 "" ""$0 ""pp"")}' for x in *.c;do mv $x ${x}pp;done ls *.c | xargs -I{} mv {} {}pp"

Calculations can also be performed in o_______ statements.

"output Rather than coding: sum = number1 + number2; cout << ""Sum is "" << sum << endl ; We could forego the sum variable and code: cout << ""Sum is "" << number1 + number2 ;"

Command line Rename

"ren [original filename] [new filename] For more complicated names (names with multiple words and spaces), put the filename in quotations. i. e. ren img30225.jpg ""Staring at the sunset.jpg"""

A preprocessor directive begins with ___.

# example: #include <iostream>

what header file is required to creating and using file stream objects

#include <fstream>

IPv4 Class A

0.0.0.0 - 127.255.255.255

If you're only installing one floppy...

... make sure you install it in the A: drive position.

If the computer will not boot and the user smells something...

... one of the components might be fried

Print speed is measured in...

... pages per minute (PPM)

The IPv4 networking standard defines Class E addresses as...

... reserved, meaning that they should not be used on IP networks. Some research organizations use Class E addresses for experimental purposes.

the symbol for the operator that divides numerator by denominator operands is

/ (forward slash)

In a given code: size_t n = get_size(); int *p = new int[n]; for(int *q =p; q != p + n; ++q) {

//array processing } what will happen when get_size() returns 0? "Then code will be still valid. The language specifies, that using ""new"" to allocate an array of zero size (which otherwise is impossible), it will return valid, nonzero pointer which will be distinct from any other pointer returned by ""new"". Such pointer cannot be dereferenced (because it has no elements) but can be used in comparizons. So if ""n"" is 0 then body of the loop is not executed."

What can be a problem with the following code? if(val == true) {

//sth } If val is a bool variable the it's OK, because it's an equivalent to: if(val) { //sth } But if val isn't of bool type, then because bools can be converted to any arithmetic type, that code is equivalent to: if(val == 1) { //sth } And that's different than: if(val) { //sth }

the symbol for the assignment operator that divides the left operand with the right operand and then assigns the result to the left operand is

/= c / a is equivalent to c = c / a

3 / 2

1

how much memory does it take to store a unsigned data type in memory

1 byte

[4.3] Given those definitions: int i = -1; const int ic = i; const int *pic = &ic; int *const cpi = &ic; const int *const cpic = &ic; Which of the following are legal and why? 1) i = ic; 2) pic = &ic; 3) cpi = pic; 4) pic = cpic; 5) cpic = &ic; 6) ic = *cpic;

1) 2) 4) 1) I can change nonconst value by using const value 2) types are the same -> L==P 4) nonconst pointer to const value can be changed by using const pointer to const value Other cases are illegal because of invalid conversions or assignment of read-only variables.

Assuming the following two definitions: unsigned long ul1 = 3, ul2 = 7; what would be the result of each line? 1) ul1 & ul2; 2) ul1 && ul2; 3) ul1 | ul2; 4) ul1 || ul2;

1) 3 2) 1 3) 7 4) 1

[5.1] What are results of those? 1) 21 % 6;, 2) 21 %7;, 3) -21 % -8;, 4) 21 % -5;, 5) 21 / 6;, 6) 21 / 7;, 7) -21 / -8;, 8) 21 / -5;.

1) 3, 2) 0, 3) -5, 4) machine-dependent (1 or -4), 5) 3, 6) 3, 7) 2, 8) machine-dependent (-4 or -5). When one operand of / or % is negative, then results are machine-dependent.

What are 14 operations of std::bitset?

1) any() 2) none() 3) count() 4) size() 5) [pos] 6) test(pos) 7) set() 8) set(pos) 9) reset() 10) reset(pos) 11) flip() 12) flip(pos) 13) to_ulong() 14) <<

[5.3.1] How to set bit number 21, reset bit number 7 and test bit number 13 in those cases? 1) bitset<30> bitset_test; 2) unsigned long test;

1) bitset_test.set(21); bitset_test.reset(7); bitset_test.test(13); 2) test |= 1UL << 21; test &= ~(1UL << 7); test & (1UL << 13);

What are string operations?

1) bool empty() 2) string::size_type size() 3) s[n]; 4) + 5) = 6) == 7) != 8) <, <=, >, >=

What kind of values may be used to correctly initialize or assign to a pointer?

1) constant expression of value 0, 2) address of an object of an appropriate type, 3) address one past the end of another object, 4) another valid pointer of the same type.

What are results? int i; double d; 1) d = i = 3.5; 2) i = d = 3.5;

1) d== 3.0; i == 3; 2) d ==3.5; i == 3;

Which lines are correct or incorrect and why? 1) const int* p1 = new const int[13]; 2) const int* p2 = new const int[12](); 3) const string* p3 = new const string[3];

1) incorrect, because elements aren't initialized, 2) correct, elements are initialized with 0, 3) correct, default constructor will be used to initialize values.

What is a difference between 1) and 2)? 1) int ia[3][4] = { {0}, {4}, {8} }; 2) int ia[3][4] = {0, 4, 8};

1) initialization only element 0 in every row, 2) initialization of the first 3 elements in the first row and implicit initialization of other elements to 0.

How can we initialize some or all elements of an array?

1) int arr[] = {0, 1, 2}; //all three elements are initialized 2) int arr[5] = {0, 1, 2}; //last two values are 0

How to initialize such array? int ia[3][4];

1) int ia[3][4] = { {0, 1, 2, 3}, {4, 5, 6, 7}, {8, 9, 10, 11}}; 2) int ia[3][4] = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11}; This object will have identical content after 1) or 2).

[4.2.4] We have an array defined as: int arr[] = {3, 2, 13, 5, 4, 1}; What are ways to get element '5' of this array?

1) int x = arr[4]; 2) int x = *(arr + 4); //the sum of pointer and integral value is itself a pointer. Hence we can dereference the sum.

What are functions from <cctype>?

1) isalnum() 2) isalpha() 3) iscntrl() - is a control char 4) isdigit() 5) isgraph() - is not a space but is printable 6) islower() 7) isupper() 8) isprint() - is printable 9) ispunct() - is a punctuation char 10) isspace() - is a whitespace char 11) isxdigit() 12) tolower() 13) toupper()

Are these lines correct? int tab1[] = {0, 1, 2}; 1) int tab2[](tab1); 2) int tab3[3]; tab3 = tab1;

1) no 2) no

"What is a difference between those loops? const char *cp = ""Hello""; int cnt = 0; 1) while(cp) { ++cnt; ++cp;} 2) while(*cp) { ++cnt; ++cp;}"

1) the loop will go through all non-zero values of the pointer cp, 2) the loop will go through all non-zero values of the memory location pointed by the pointer cp.

What are meaning of the following definitions and which are illegal? 1) int i; 2) const int ic; 3) const int *pic; 4) int *const cpi; 5) const int *const cpic;

1) uninitialized integer object 2) uninitialized const integer object 3) uninitialized pointer to const integer object 4) uninitialized const pointer to integer object 5) uninitialized const pointer to const integer object Illegal are: 2, 4, 5 because are uninitialized. Other cases (1,3) are OK because 1) is a nonconst value (and therefore can always be changed) and 3) is a nonconst pointer to const value (which means that it's value can always be changed).

[4.2.3] What do the following lines mean and which of them are illegal. 1) int *p; 2) string s, *ps = 0; 3) int i; double *pd = &i; 4) int* p, p2; 5) const int i = 0, *p = i; 6) string *p = NULL;

1) uninitialized pointer, 2) creating object s of string type and pointer to a string initialized as a pointer to no object, 3) creating uninitialized int i and pointer to double initialized incorrectly to i object, 4) p is a pointer to int, p2 is an object of int type, 5) creating constant i and creating a pointer to const int initialized as a pointer to no object, 6) creating pointer to a string initialized as a pointer to no object.

Which of the following initializations are legal? Explain why. 1) int i = -1; 2) const int ic = i; 3) const int *pic = &ic; 4) int *const cpi = &ic; 5) const int *const cpic = &ic;

1, 2, 3, 5. Number 4) is illegal because there is a danger when I can change the value of const int by pointer to nonconst. This is ridiculous and thus illegal. 1) type of the left side == type of the right side 2) rvalue is given and it's value is known at runtime initialization 3) type of the left side == type of the right side 5) type of pointed value on the left side == type of the right side

Three ways to access Windows RE in Windows 7:

1. Boot from the Windows installation media and select Repair. 2. Use the Repair Your Computer option on the Advanced Boot Options (F8) menu. 3. You can create a system repair disc before you have problems.

Before opening a laptop case make sure... (Three things)

1. You know the warranty implications 2. You have the right tools (check the manual) 3. Organization and documentation plan

What are the two basic rules for configuring a computer for multibooting?

1. You must format the system partition in a file system that is common to all installed operating systems. 2. You must install the operating systems in order from oldest to newest

XGA

1024 x 768

What is the maximum data rate of 802.11b?

11 Mbps

FAT12

12-Bit File Allocation Table

Ping Loop Back IP

127.0.0.1

Loopback IP Address

127.0.0.1 is the loopback address in IP. Loopback is a test mechanism of network adapters. Messages sent to 127.0.0.1 do not get delivered to the network. Instead, the adapter intercepts all loopback messages and returns them to the sending application. IP applications often use this feature to test the behavior of their network interface.

IPv4 Class B

128.0.0.0 - 191.255.255.255

SXGA

1280 X 1024

FAT16

16-Bit File Allocation Table

UXGA

1600 X 1200

"What are sizes (numbers of array elements) of these arrays? Which of them have identical contents? 1) char x1[] = {'C', '+', '+'}; 2) char x2[] = {'C', '+', '+', '\0'}; 3) char x3[] = {""C++""};"

3, 4, 4, 2 and 3.

A best practice is to use identifiers of ___ characters or fewer to ensure portability.

31 C++ allows identifiers of any length, but your C++ implemenation may restrict identifier lengths.

SDHC has a maximum capacity of ...

32GB

Floppy drives connect to the computer via a...

34-pin ribbon cable

how much memory does it take to store a float data type in memory

4 bytes

how much memory does it take to store a long int data type in memory

4 bytes

how much memory does it take to store a signed int data type in memory

4 bytes

Which of the following cable types uses an RJ-45 connector, and would MOST commonly be used in an environment with high EMI or RFI? A. STP B. Coaxial C. UTP D. Fiber

A

Which of the following can be disabled to help prevent access to a wireless network? A. SSID broadcast B. MAC filtering C. WEP key D. WPA passphrase

A

name 3 header files that are important for input / output operations

<iostream> //defines the cin, cout, ceer and clog objects <iomanip> // declares services useful for formatted I/O operations such as setw and setprecision <fstream> // declares services for user-controlled file processing operations

visualize the general form of a function prototype then flip the card to see if you are correct

<return_data_type> <function_name> ( parameter list )

What character(s) is the assignment operator?

= // a single equal sign

Thermal grease

= Thermal compound

the symbol for the operator that checks if the values of two operands are equal is

== (double equal signs) a = = b

the symbol for the operator that checks if the value of the left operand is greater than or equal to

>=

"A technician is working on a PC and notices the error message ""CMOS BATTERY LOW."" Exercising best practices, what should he do next? A. Replace the battery with a CR-2032. B. Ignore the message and continue on. C. Disable the warning in CMOS. D. Reseat the battery."

A

A Windows directory is also referred to as a: A. folder B. cluster C. volume D. partition

A

A downloadable game that is actually a program used to steal information is an example of: A. a Trojan B. spam C. a worm D. adware

A

A system administrator has multiple computers, of the same make and model that will remotely turn on using Wake-On-LAN (WOL). All but two systems wake correctly. Which of the following is the MOST likely problem with the two systems? A. WOL is not enabled in the BIOS. B. The computers do not support WOL functionality. C. The network card settings in Windows are incorrect. D. Power settings are incorrect in the BIOS.

A

A technician is adding a company video from a video cassette to the company’s website. Which of the following devices should be used to complete this task? A. Video capture card B. Video card C. Windows Easy Transfer cable D. Super I/O card

A

A technician needs to upgrade several Windows XP Professional 64-bit computers to Windows 7 Professional 64-bit. The technician wants to retain the user settings. Which of the following tasks should the technician perform? A. Upgrade the 64-bit Windows XP Professional to 64-bit Windows VISTA Professional, and then upgrade the 64-bit Windows VISTA Professional to 64-bit Windows 7 Professional. B. Do a clean install of 32-bit Windows VISTA Professional, and then an upgrade to 64-bit Windows 7 Professional. C. Do a clean installation of 64-bit Windows 7 Professional. D. Upgrade from 64-bit Windows XP Professional to 64-bit Windows 7.

A

Which of the following can be hot-swappable? A. Hard drive B. Tape drive C. Floppy drive D. DVD-RW

A

Which of the following utilities can be used to view the start-up programs? A. REGEDIT B. IPCONFIG C. PING D. DXDIAG

A

A technician notices that there are two appointments scheduled for the same time. Which of the following should the technician do to resolve the issue? A. Call one of the clients and apologize, then reschedule B. Do not go to the second scheduled appointment C. Email each client for rescheduling D. Go to the first scheduled appointment then after completion go to the next

A

A technician wants to prevent anyone from logging into a computer that is running in a common area unless they are authorized. The technician has locked the case. Which of the following should actions should the technician take NEXT to prevent access? A. Create user accounts for only the authorized users. B. Add a BIOS password. C. Disconnect the keyboard and the mouse. D. Add a privacy screen to the monitor.

A

A technician would like to rebuild the MBR without reinstalling Windows. Which of the following recovery options would be used to build a new MBR? A. Recovery Console B. System Restore C. Automated System Recovery D. Emergency Repair Disk

A

A user is attempting to connect to a Wi-Fi hot-spot at a local coffee shop where the user connects every weekend. The user is receiving the message, no wireless devices detected, but other users in the coffee shop can connect. Which of the following is the MOST probable cause of this issue? A. The wireless switch on the side of the laptop is turned off. B. The coffee shop no longer offers Wi-Fi to customers. C. The Wi-Fi hotspot has reached its maximum number of connections. D. The user is allowing Windows to manage wireless connections.

A

A user needs to transfer numerous personal financial documents from an existing hard drive to a new hard drive. Which of the following should the technician perform? A. Copy all data over without viewing them B. Review all data and write down important account numbers in case information is lost C. Remove all financial documents since they are confidential D. Print out all personal financial documents in case information is deleted

A

A user notices that the battery light on the laptop is flashing when the laptop is on a docking station. Which of the following should the technician perform FIRST? A. Reseat in the docking station B. Reinstall the operating system C. Remove and reseat the battery D. Replace the laptop battery

A

A user reports that their computer seems to be running slow and frequently reboots on its own. Which of the following is the FIRST thing the technician should check to address this issue? A. Check for newly installed software on the system B. Check to determine if the graphics card is faulty C. Reinstall antivirus software and run a scan D. Check for newly added peripherals to the system

A

A user reports that video is not displayed when their laptop is powered on. Which of the following should be performed after verifying the power and charging indicators are lit? A. Attach an external monitor and check for video. B. Replace the BIOS battery. C. Verify the AC adapter is a known good adapter. D. Replace the power switch.

A

A users laptop has a PATA controller. The user wishes to add a SATA hard drive for storage. Which of the following would be the BEST method to solve this issue? A. Use an external USB enclosure. B. Change the BIOS settings to support SATA drives. C. Exchange the drive for a PATA hard drive. D. Replace the motherboard with one that supports SATA drives.

A

An end user reports that their computer is making noise constantly. The technician notes that the hard drive activity light is on frequently. The technician finds plenty of free space on the drive. Which of the following BEST explains why the drive light is continuously active? A. The system has a fragmented hard drive. B. The drive interface needs to be changed. C. The user has too many documents on the hard drive. D. The system page file has an issue.

A

Computers should NEVER be placed on which of the following materials? A. Carpet B. Wood C. Tile D. Plastic

A

Customer satisfaction is best achieved by: a) never minimizing the customer’s problems. b) being defensive. c) talking to coworkers while interacting with customers. d) being judgmental.

A

During troubleshooting, the technician establishes a theory of probable cause. Which of the following is the NEXT step? A. Test the theory to determine cause. B. Establish a plan of action to resolve the problem and implement the solutions. C. Identify the problem. D. Verify full system functionality and if applicable implement preventative measures.

A

Fingerprint readers are an example of which of the following security technologies? A. Biometric B. Password C. Smart card D. Username authentication

A

In which of the following is a 2032 CMOS battery MOST often found? A. Desktops B. Portable printers C. Bluetooth Mice D. Notebooks

A

Programs that run when the Windows OS starts are stored in which of the following registry hives? A. HKEY_LOCAL_MACHINE B. HKEY_CURRENT_CONFIG C. HKEY_CLASSES D. HKEY_USERS

A

The FASTEST cache in a computer is: A. L1. B. L2. C. L3. D. L4.

A

The portion of a disk or drive that contains the MBR is known as the: A. boot sector B. primary partition C. extended partition D. boot partition

A

Which of the following adapter types will use a RJ-45 connector? A. NIC B. Video C. Sound D. Dial-up modem

A

Which of the following are features of Windows 7 that are not in Windows Vista? A. Application Dock B. UAC C. Aero D. Side Bar

A

Which of the following are speeds supported by PC3200 memory? A. 400MHz, 333MHz, and 266MHz B. 533MHz, 400MHz, and 333MHz C. 800MHz, 400MHz, and 200MHz D. 600MHz, 250MHz, and 100MHz

A

Which of the following bus slots would provide the HIGHEST potential performance for a video card? A. PCIe B. AGP C. PCI D. SCSI

A

Which of the following cable types uses an RJ-45 connector and is MOST commonly used in an Ethernet network? A. UTP B. Fiber C. Coaxial D. STP

A

Which of the following configuration changes can a user perform that will save the MOST energy? A. Let the system blank the screen after five minutes of inactivity B. Disable screen saver C. Disable the hibernate mode D. Enable a photo album screen saver

A

Which of the following connections must be paired FIRST with the device before use? A. Bluetooth B. Infrared C. Wi-Fi D. Ethernet

A

Which of the following connectors allows both audio and video to pass through them? A. HDMI B. VGA C. RGB D. DVI

A

Which of the following connectors is commonly used with two-pair UTP cable? A. RJ-11 B. RJ-14 C. RJ-21 D. RJ-45

A

Which of the following devices would MOST likely require a serial adapter to be installed on a modern PC? A. External modem B. TV tuner C. Mouse D. Keyboard

A

Which of the following has the LEAST amount of storage capacity? A. FDD B. Tape drive C. Blue-Ray D. SSD

A

Which of the following is a best practice when applying thermal paste? a) Follow the CPU manufacture’s guidelines and apply the correct amount of thermal paste. b) The more thermal paste applied, the better. c) Use as much as desired, as long as it is the most popular thermal paste. d) The less thermal paste applied, the better.

A

Which of the following is a standard that supports speeds of up to 480Mbps? A. USB 2.0 B. RS-232c C. IEEE 1284 D. IEEE 1394

A

Which of the following is another name for an RS-232 connection? A. Serial B. USB C. IEEE 1394 D. Ethernet

A

Which of the following is not a root key: A. HKEY_USER_DOCUMENTS B. HKEY_CURRENT_USER C. HKEY_LOCAL_MACHINE D. HKEY_USERS

A

Which of the following is the BEST example of a strong password? A. oU812#% B. AYBABTU C. 17011701 D. Make Safe

A

Which of the following is the BEST example of social engineering? A. A caller pretending to be an administrator to acquire a password B. A social website that secretly records users actions on the Internet C. A program that attempts to steal users credit card information D. An unsolicited email that attempts to get a user to make a purchase

A

Which of the following is the MAXIMUM recommended cable length for connecting USB devices? A. 5 meters (16 feet) B. 7 meters (23 feet) C. 10 meters (33 feet) D. 15 meters (49 feet)

A

Which of the following is the MOST secure form of wireless security? A. WPA2 B. MAC filtering C. SSID D. WEP

A

Which of the following is the NEXT step in the troubleshooting theory after identifying the problem? A. Establish a theory of probable cause B. Test the theory C. Implement preventative measures D. Establish a plan of action

A

Which of the following is the form factor of a VGA connector? A. 15-pin D shell B. BNC connector C. 25-pin D shell D. Yellow RCA connector

A

Which of the following is the function of a power inverter? A. Converts AC to DC B. Provides a regulated AC voltage C. Steps down AC voltages D. Provides a backup power source

A

Which of the following is the purpose of thermal compound? A. To facilitate the transfer of heat from the CPU to the heat sink B. To facilitate the adhesion of the CPU to the heat sink C. To facilitate the reduction of heat to the heat sink D. To assist in insulating the CPU from electrical damage

A

Which of the following log files would reference third party software specific error messages? A. Application Logs B. Security Logs C. Archive Logs D. System Logs

A

Which of the following media has the LARGEST potential storage capacity? A. Blue-Ray B. CD-RW C. CD-R D. DVD-RW

A

Which of the following memory types is the MOST current? Edit A. DDR B. RAMBUS C. DRAM D. SDRAM

A

Which of the following occurs by default when a file is copied from a CD-ROM to a folder on an NTFS partition? A. The file inherits the permissions of the folder it is copied to. B. The CD structure is indexed and the index is stored in the folder. C. The file is copied with the Read Only attribute. D. A shortcut is created on the drive pointing to the CD file.

A

Which of the following ports is the standard SMTP port? A. 25 B. 80 C. 110 D. 443

A

Which of the following ports would Windows Firewall need to make an exception to allow FTP access? A. 21 B. 80 C. 443 D. 3389

A

Which of the following printer types requires the use of special paper to print? A. Thermal B. Inkjet C. Laser D. Dot Matrix

A

Which of the following printer types uses a charged corona wire in the printing process? A. Laser B. Impact C. Inkjet D. Thermal

A

Which of the following printers requires a specialized paper in order to operate? A. Thermal B. Laser C. Inkjet D. Impact

A

Which of the following services assigns IP addresses automatically when requested by the client? A. Dynamic Host Configuration Protocol B. Automatic Private IP Addressing C. Domain Name Services D. Windows Internet Name Service

A

Which of the following should a technician do to protect exposed hardware from ESD? A. Touch a piece of metal to discharge any static electricity. B. Touch one of the computer expansion cards to discharge any static electricity. C. Touch the motherboard to discharge any static electricity. D. Touch the floor to discharge any static electricity.

A

Which of the following troubleshooting steps is NEXT after determining the cause? A. Establish a plan of action to resolve the problem and implement the solution. B. Document findings, actions, and outcomes. C. Verify full system functionality and if applicable implement preventative measures. D. Question the user and identify user changes.

A

Which of the following utilities can a technician use to stop unwanted programs from loading at startup? A. MSCONFIG B. Recovery Console C. ASR D. CMD

A

Which of the following is true of the copy command? (pick two) A. You can rename as you copy B. You can copy both files and folders C. You can move multiple files at once D. The copy command is forgiving of syntax errors

A & C

What are two possible reasons why a laptop's display suddenly went blank? A. Damaged inverter B. Damaged LCD C. Burned out backlight D. Incorrect resolution setting

A & C. A damaged inverter or burned out bulb could cause a laptop's display to go blank. You can verify if the LCD is still getting a signal by shining a flashlight at the screen. A damaged LCD usually works to a certain extent and will either be cracked, have areas of Windows missing, or show other signs of damage. An incorrect resolution setting usually makes Windows look garbled on the screen.

What kind of network connection can you make with a crossover cable? (Select two.) A. Hub to hub (without uplink port) B. PC NIC to a hub C. PC NIC to PC NIC D. Hub to modem

A & C. Normal patch cables won't work when connecting two PCs directly by their NICs. You can also use a crossover cable to connect two hubs that aren't using an uplink port.

Which of the following statements are true about SCSI IDs? (Select two.) A. The device itself is where the SCSI IDs are set, either by software, jumpers or DIP switches. B. The host adapter dynamically assigns SCSI IDs for the device when its ROM is enacted on booting the system. C. There is no order for the use of SCSI IDs. D. They must follow the SCSI chain in sequence.

A & C. SCSI IDs may be used in any order, and a SCSI devices ID is set on the device itself.

Which of these wireless standards operate at a theoretical maximum of 54 megabits per second? Pick two. A 802.11g B 802.11n C 802.11a D 802.11b

A & C. The 802.11a standard was one of the initial 802.11 formats, and it provided a maximum of 54 megabits per second in the 5 GHz range. The 802.11g standard was an upgrade to 802.11b that also provided 54 megabits per second of maximum throughput, but used the 2.4 GHz range.

How would you edit the boot.ini file? (Select two.) A. Control Panel -> System -> Advance tab -> Startup and Recovery button B. Control Panel -> Administrative Tools -> Computer Management -> Boot Editor C. Right-click My Computer -> Properties -> System Properties -> Boot Management D. Edit with a text editor E. regedit32 -> HKLM

A & D

During an annual network planning session, you’ve found a number of older Ethernet networks that are connected by 10-BASE2 coaxial cable. What might be some reasons for replacing this older bus network topology for another type? Pick two. A Any disconnection along the bus disrupts the communication for the entire network B Bus topologies are no longer supported in the IEEE specifications C Ethernet on a bus network is not compatible with Ethernet on other network types D The cabling for a coax bus is difficult to manage when adding, moving, or changing devices

A & D. There’s nothing technically wrong with using a bus topology network, but you should always consider some of the disadvantages of using this style of networking over a more modern star topology. Bus architectures are functionally a single link, and any disruption of that link can cause outages for the entire network. Coax-based bus topologies are also difficult to manage, since any change of device location requires some additional planning to find the best place to connect the device to the bus.

Which of the following is a common type of biometric authentication on a laptop? (Select TWO).? a) Facial recognition b) Blood sample c) Retinal d) Voice recognition e) Fingerprint

A &E

A user doesn't see anything on his laptop screen. He tries to use AC power and thinks that the laptop is not receiving any. What are two possible reasons for this? A. Incorrect AC adapter. B. The AC adapter is not connected to the laptop. C. Windows won't boot. D. The battery is dead.

A and B. An incorrect adapter will usuall not power a laptop. The adapter used must be exact. And of course, if the laptop is not plugged in properly to the adapter, it won't get power. Windows doesn't play into this scenario. And if the battery was dead, it could cause the laptop to not power up, but only if the AC adapter was also disconnected; the scenario states that the user is trying to use AC power.

A computer you are troubleshooting shuts down without warning. After a few minutes it boots back up fine, but after running for a short time, it shuts down again. What components could be the cause? (Select the two best answers.) A. Power supply B. SATA hard drive C. RAM D. CPU fan E. Video card

A and D. The two components that could cause the system to shut down are the power supply and the CPU fan. Check the CPU fan settings and temprature in the BIOS first before opening the computer. If those are fine, then you most likely need to replace the power supply. The RAM, video card, and hard drive should not cause the system to suddenly shut down.

If a device has been disabled, how would it be indicated in Device Manager?

A black down arrow.

A broadcast address is a ...

A broadcast address is a logical address at which all devices connected to a multiple-access communications network are enabled to receive datagrams. A message sent to a broadcast address may be received by all network-attached hosts.

auto-duplexing

A function found in some network adaptors that allows the adaptor to sense the duplex mode set on the other end of the connection.

accounting

A function of a TACACs+ or RADIUS server that records authentication and authorization events permitted or denied by the server.

Laser printer maintenance kits typically consist of what elements?

A fuser, transfer roller, and the feed/separation rollers

baseband

A means of transmission in which the entire medium’s capacity is used for one signal.

[4.2.2] What is NULL?

A preprocessor variable defined in <cstdlib> header. It's value is 0 and as preprocessor variable it's not defined in std namespace.

disk imaging

A process of deploying operating systems in which the installation process is avoided by applying an image of an installed operating system directly to a computer hard drive. It also usually requires the removal of installation specific information to prevent duplicate computers on the network.

What is the difference between a reference and a pointer?

A reference is essentially a permanent pointer. Therefore it does not require the dereferencing * operator.

What is a typedef?

A renaming of a variable type, like String for char *

macros

A set of instructions that can be recorded in a software program

access control list (ACL)

A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.

adapter

A term used to describe any card inserted into an available slot on the motherboard, thereby providing additional functionality including, but not limited to, network functions, sound functions, and so on.

Bayonet Neill-Councelman

A type of network connector used with Thinnet (10Base2)

You’ve opened the case of a desktop computer and you see many of these connectors inside. What kind of connector is this? connector20090312.jpg

A) Floppy drive data interface connection B) SATA hard drive slimline power connector C) ATX12V 2.0 motherboard connector D) 4-pin peripheral power connector, also known as a Molex connector D) 4-pin peripheral power connector, also known as a Molex connector These power connectors are standard on all desktop computers, and they’re used to provide power for many different kinds of peripherals. You’ll often see many unused connectors inside of a desktop, ready for any type of expansion you might need. It’s a bit of a misnomer to call the port a “Molex†connector, since Molex (the company) actually makes over 100,000 different products.

How does the following prefix increment operator work: ++x

A) increments value stored at the x memory address, then evaluates the value of x B) evaluates the value stored at the x memory address, then increments x A) increments value stored at the x memory address, then evaluates the value of x

At what speed does USB 1.1 run? A. 12 Mbps B. 120 Mbps C. 480 Mbps D. 840 Mbps

A. USB 1.1 runs at 12 Mbps, and USB 2.0 runs at 480 Mbps.

Which of the following are ways that a laptop can communicate with other computers? A. Bluetooth B. WLAN C. Ultraviolet D. Cellular WAN

A, B and D. Laptops can communicate with other computers through Bluetooth, WLAN, IrDA, and Cellular WAN wireless connections, plus wired connections like Ethernet (RJ45) and dial-up (RJ11)..

What types of ports can typically be found on laptops? A. RJ45 B. USB C. IEEE 1284 D. DVI

A, B and D. RJ45, USB, and DVI ports are all common on a laptop. However, IEEE 1284 printer ports are not common.

How do you open the Registry Editor from the command prompt? (Select two.) A. regedit B. regedt32 C. regeditor D. rgstry

A, B. From the command prompt, you can use either regedit or regedt32 to open the Registry Editor.

Which of the following port types most commonly support printers? (Select two.) A. Parallel B. USB C. Infrared D. RS-232

A, B. You'll find almost all printers hooked up to parallel or USB ports.

Which of the folloving display types will you commonly find on a portable PC today? (Select two.) A. LCD B. LED C. OLED D. Plasma

A, B. You'll only see LCD and LED displays on portables today.

The PING command can be used to determine which of the following? (Select TWO). A. If there is connection to a specified IP address B. The gateway address of a currently logged on user C. The response time of the connection to a specific IP address D. The amount of hops it takes to reach destination computer E. The active connections to a computer

A, C

Which of the following are digital audio-only formats? (Select TWO). A. AAC B. WMV C. WMA D. AVI E. DES

A, C

Which of the following wireless technology standards can operate at a MAXIMUM of 54Mbps? (Select TWO). A. 802.11a B. 802.11b C. 802.11g D. 802.11k E. 802.11n

A, C

Where can you view how much RAM you have in your computer? (Select all that apply.) A. Task Manager B. My Computer C. System Properties D. BIOS

A, C, and D. The BIOS displays what type of RAM you have and the amount. Windows has several locations in which you can discern how much RAM there is, including the Task Manager, System Properties, and System Information.

Which of the following are organized inside the Registry's root keys? (Select two.) A. Subkeys B. Subfolders C. Values D. Objects

A, C. The Registry's root keys are further organized into subkeys and values.

When working within large computer networks, which of the following is the disadvantage of using NETBEUI over TCP/IP? (Select TWO). A. NETBEUI is designed to be used on small size LANs. B. NETBEUI is unavailable on non-Windows operating systems. C. NETBEUI can only be used on pre-Windows NT networks. D. NETBEUI is not a routable protocol. E. NETBEUI can only be used with DHCP.

A, D

Which of the following conditions are detected during POST? (Select three.) A. A defective keyboard B. An overheating hard drive C. Legacy device IRQ conflict D. Missing video card E. A bad DIMM

A, D, E. Missing or unseated video cards, defective or unplugged keyboards and mice, and bad or unseated RAM sticks are detected IRQ conflicts do not manifest themselves until two devices try to operate at the same time. POST has no facility for checking IRQ conflicts on legacy devices. The hard drive won't overheat for a while. So POST probably won't catch it. You'll notice it when you get into Windows after you have been operating for a bit.

Joan recently bought a new gamepad and used the Add a Device wizard to install it, but it still won't work. What should she do next? (Select two.) A. Check the manufacturer's Web site for updated drivers B. Run the Automated System Recovery tool to return the PC to a functioning state C. Usa a restore point in System Restore to return the PC to a funcitoning state D. Run Windows Update to search for new drivers

A, D. Joan should check the manufacturer's Web site and Windows Update for the latest drivers.

Which of the following are good ideas when it comes to batteries? (Select two) A. Keep the contacts clean by using alcohol and a soft cloth. B. Store them in a freezer if they will not be used for a long period of time. C. Toss them in the garbage when they wear out. D. Store them in a cool, dry place.

A, D. Keeping a battery in the freezer is a good idea in theory, but not in practice. All bateries contain toxic chemicals and should never be treated like regular trash.

Tablet PCs come in which of the following form factors? (Select two.) A. Convertible B. Desktop C. Secure Digital D. Slate

A, D. Tablet PCs come in convertible and slate form factors.

Which of the following are potential sources of EMI? (Select TWO). A. Strong magnets B. Toaster ovens C. Cordless phones D. Flat panel TVs E. AC power runs

A, E

Which of the following represents a private IP address?

A. 11.6.42.90 B. 21.4.3.7 C. 172.31.4.3 D. 196.22.57.3 C

Which of the following is a broadcast address?

A. 169.254.10.127 B. 192.168.1.1 C. 127.0.0.1 D. 255.255.255.255 D

Which of the following is the MAXIMUM partition size of the FAT32 file system?

A. 16GB B. 32GB C. 1024GB D. 2048MB B

Secure socket layer communications take place on which of the following ports?

A. 21 B. 23 C. 443 D. 8080 C

Which of the following is the default port used for TELNET?

A. 21 B. 23 C. 80 D. 443 B

Which of the following is the default port for RDP?

A. 21 B. 80 C. 3389 D. 8080 C

Which of the following are the voltages supplied to a drive on a standard Molex connector?

A. 3.5v and 16v B. 3.5v and 9v C. 3.3v and 24v D. 5v and 12v D

Which of these is a unique characteristic of multi-channel memory? A Installed in pairs or trios for maximum throughput B Unused slots must be filled with memory terminators C Memory modules are synchronized to the bus speed D Uses an additional parity bit to identify errors

A. : Multi-channel memory requires that a pair or trio of memory modules installed simultaneously to maximize the throughput. If fewer modules are used, the memory bus will only have a fraction of the available bandwidth available.

Which of these connector types is designed with locking mechanism to prevent accidental disconnections? A BNC B RCA C HDMI D DisplayPort

A. A BNC (Bayonet Neill-Concelman) connector has a twisting lock, making it a good choice for high-end video use.

Which of these network throughputs would you expect to see on a DOCSIS network? A 4 Mbit/sec through 100 Mbit/sec B Up to 1 Gbit/sec C 56 kbit/sec with up to 320 kbit/s with compression D Up to 2 Mbit/sec

A. A Data Over Cable Service Interface Specification is used by cable modem technology, so the common throughput for that technology would be anywhere from 4 megabits per second through 100 megabits per second.

How many speakers are in a Dolby Digital 5.1 setup? A. Five speakers plus a subwoofer B. Six speakers plus a subwoofer C. Seven speakers plus a subwoofer D. Eight speakers plus a subwoofer

A. A Dolby Digital 5.1 setup has five speakers and one suboofer

You are working on a computer that is giving a non-system disk error. Which of the following is most likely the cause? A. There is a disk in the floppy drive. B. The registry has become corrupted. C. The incorrect driver was loaded. D. The RAM is not seated properly.

A. A Non-System Disk error tells you that the computer cannot boot properly and that the boot media is the culprit. A common cause of this is a disk in the floppy drive. Floppy drives are definitely older technology, but you may still see them in the field; however, another example of this would be a nonbootable CD-ROM or DVD-ROM in an optical drive.

Which of the following is an advantage that a USB mouse has over a PS/2 mouse?

A. A USB mouse uses less power B. A USB mouse is more portable C. A USB mouse is hot swappable D. A USB mouse is more secure C

A Keyboard Shortcut Designed To Hide Your Current Activity Is Known As What? A. A Boss Key B. A Disco Drop C. An Escape Hatch D. A Panic Button

A. A boss key is a simple keyboard shortcut, often a single key such as F10 or ScrLk, included in some applications or existing as a separate helper application altogether, that allows the user to rapidly conceal or exit a program that is not work appropriate.

Which type of display responds to the difference in electrical potential between you and the screen? A. Capacitive B. LCD C. IPS D. Resistive

A. A capactitive touchscreen display responds to the difference between you and the screen.

Which of the following would most likely be the cause of vertical black lines running down a page coming from a laser printer? A. A scratch in the EP drum B. Spilled toner C. Foreign matter on the transfer corona wire D. Improper driver

A. A groove or scratch in the EP drum can cause the problem of vertical black lines running down all or part of the page.

What is commonly used to cool a heat sink? A Air B Coolant C Water D Thermal paste

A. A heat sink works by dissipating heat from hot components using thermal conduction. The heat is then transferred to the much cooler air that is constantly blown through the computer case.

A technician observes that the lights in a customer’s building flicker periodically during the course of the day. Which of the following should the technician recommend to protect the customer’s equipment?

A. A power supply B. A generator C. A heavy duty electrical cord D. A UPS D

Which of the following are encryption technologies? (Select TWO).

A. ATA B. DES C. AES D. DOS E. FAT B, C

A technician is having trouble closing a running program that is no longer responding. Which of the following will allow the technician to end the process?

A. Add/Remove Programs B. Event Viewer C. Task Manager D. Device Manager C

The user reports to the help desk that a UPS trips the internal circuit breaker each time the laser printer is powered on. The technician should do which of the following?

A. Advise the user that the laser printer needs to be replaced. B. Move the printers power cable to a surge only socket. C. Put the UPS on a separate power circuit. D. Order a UPS with a slightly lower wattage. B

Which of the following malicious software types will create multiple pop-ups on a computer?

A. Adware B. Grayware C. Worms D. Spyware A

Which type of virus is designed to make itself difficult to detect or analyze? A. Armored B. Red C. Companion D. Murky

A. An armored virus is designed to make itself difficult to detect or analyze.

A new device is installed on a machine and some of its features are not working correctly. Which of the following should be updated?

A. Anti Virus B. MSCONFIG C. Partition table D. Drivers D

Which of the following is the MOST appropriate question to ask a customer first when attempting to troubleshoot an input device over the phone?

A. Are you sure that the device is plugged in? B. Have you verified all PS/2 plugs are secure? C. Can you describe the steps you have taken? D. Have you tried turning it off and on again? C

You've had your computer for a couple of years, and you've noticed recently that the fan inside of the case is running more often and at higher rates of speed. What is the most likely cause of this issue? A The airflow through the computer is blocked B The internal temperature sensors are faulty C The fan controller software is faulty D All fans run faster as time goes on

A. As the temperature inside of your computer rises, the fans will compensate by running faster and longer. If the airflow is blocked or dust has accumulated on the vents, you'll find the cooling process is not as efficient as it once was. Clearing the vents and cleaning the inside of the computer will cause your fan volume level to decrease dramatically!

A user wants to try a live version of another operating system that is on a DVD. In order to use this, the user must do which of the following?

A. Authorize the boot DVD in Windows. B. Install a live version to the hard drive first. C. Edit the boot.ini in Windows to allow the DVD to boot. D. Ensure the DVD-ROM is placed first in the boot priority. D

In regards to computer case form factors, which of the following provides the MOST room for effective cooling?

A. BTX B. ATX C. NLX D. Micro ATX A

Which of the following mice technologies most needs to be cleaned? A. Ball B. Optical C. Parallel D. Serial

A. Ball mice get the dirtiest.

What is the width of the USB bus? A. 1 bit B. 8 bit C. 16 bit D. 32 bit

A. Because USB is a serial interface, its width is 1 bit.

If you are experiencing problems with Windows XP and wish to install Windows 7, what type of installation is required? A. Clean installation B. Upgrade installation C. Network installation D. Image deployment

A. Because you are upgrading from Windows XP to Windows 7, you need to perform a clean installation.

Which class of the following is an infrared technology that can connect a printer to a computer at a short range? A. Bluetooth B. Ethernet C. CRT D. Parallel

A. Bluetooth is an infrared technology that can connect a printer to a computer at a short range; its absolute maximum range is 100 meters (330 feet), and most devices are specified to work within 10 meters (33 feet).

Which of the following MOST accurately describes the relationship between ATX and micro-ATX boards?

A. Both ATX and micro ATX boards will fit in a laptop. B. Both ATX and micro ATX boards will fit in an ATX case. C. Both ATX and micro ATX boards will fit in a micro-ATX case. D. Micro-ATX boards do not fit in an ATX case, while ATX boards will. B

Which of the following areas allows a user to switch the left and right button commands?

A. Button tab in the mouse properties B. Device Manager properties C. Use MouseKeys in accessibility D. Hardware profiles in the system properties A

By default, what port(s) does the FTP service use? A. 20 and 21 B. 80 C. 143 D. 443

A. By default, the FTP service uses ports 20 and 21.

Which of the following is the default location for 32-bit applications when installed on Windows 7 64-bit?

A. C:\Program Files (x86)\ B. C:\Windows\system32\ C. C:\Program Files (32)\ D. C:\Program Files\ A

Which of the following is the MOST common port to configure for an external modem?

A. COM1 B. LPT3 C. PS/2 D. LPT1 A

Which of the following commands will take a FAT32 file system and make it an NTFS file system?

A. COMPACT B. CONVERT C. CHKNTFS D. COPY B

Which of the following will dissipate heat MOST efficiently?

A. CPU fan B. Liquid cooling systems C. Heat sink D. Power supply B

Which typically uses more wattage? A. CRT B. DVI C. LCD D. VGA

A. CRTs use a lot more wattage than LCDs.

Which of the following would be used to record off-air TV programs?

A. Capture card B. Bluetooth C. Wireless card D. POST card A

A user reports that their laptop cannot connect to the wireless network. Which of the following is the FIRST step the technician should take to resolve this problem?

A. Check that the WiFi switch is enabled on the laptop. B. Check the area for possible sources of interference. C. Check the wireless adapter settings in the OS. D. Check that the wireless security settings are correct for the network. A

Which of the following programs would be the LEAST useful in removing malware? A. Chkdsk B. Recovery console C. Anti-virus D. Anti-spyware

A. Chkdsk has no ability to clear malware.

What is the name of the extensions to the DirectSound3D standard developed by Creative Labs? A. EAX B. MP3 C. Positional audio D. Reverberation

A. Creative Labs developed the EAX extensions.

Which two technologies are used for backlights in LCD monitors? A. CCFL and LED B. CCFL and LCD C. CCFL and AC D. HDMI and DisplayPort

A. Current LCD monitors use one of two competing backlight technologies, CCFL or LED.

Which of the following command line paths shows the recovery console s installation?

A. D:\i386\tools\console B. D:\i386\tools /cmdcons C. D:\i386\utilities\console D. D:\i386\winnt32 /cmdcons D

What is the pinout for a stick of SO-DIMM DDR RAM? A. 200 B. 168 C. 144 D. 204

A. DDR SODIMM modules have 200 pins. Desktop SDRAM has 168 pins. SODIMM SDRAM has 144 pins, and DDR3 SODIMMs have 204 pins.

What kind of memory would be associated with PC-1600 RAM? A DDR B DDR3 C ROM D SRAM

A. DDR memory module names use the designation PC for DDR memory, PC2 for DDR2, and PC3 for DDR3.

Which of the following is a valid motherboard memory slot type?

A. DIMM B. AGP C. CMOS D. PCI A

The operation of mapping an IP address to a host name is handled by which of the following?

A. DNS B. DHCP C. TCP/IP D. IPv6 A

Which of the following will allow a user account to logon to Microsoft Windows Vista when the Microsoft Windows Networking domain needs to be specified? (Select TWO).

A. DOMAIN\USER B. USER@DOMAIN C. USER-DOMAIN D. DOMAIN-USER E. DOMAIN USER A, B

Which of the following optical media has the GREATEST storage space?

A. DVD B. Hard drive C. HD-DVD D. Blu-Ray D

What is Data Execution Prevention (DEP)? A. A technology that prevents viruses from taking over programs loaded in system memory B. A technology that enables you to set permissions for different users on your computer C. A technology that prevents programs from being installed on your computer D. A technology that prevents files from being written on your hard drive

A. Data Execution Prevention, introduced in Windows XP Service Pack 2, prevents viruses from taking control of programs loaded into memory.

What does Disk Cleanup do? A. Helps you identify and clean up unnecessary files on a hard drive. B. Erases and re-formats a disk C. Automatically cleans the surface of the hard disk. D. Optimizes files that have been fragmented across the hard drive.

A. Disk Cleanup helps you clean up unused and temporary files.

Which of the following items is listed in the control panel of a Windows 7 PC?

A. Disk Defragmenter B. Device Manager C. System Log files D. Task Manager B

A customer with a laptop frequently goes into the office to work. However, the laptop only has two USB ports, and they are unable to connect their keyboard, mouse, monitor and scanner at the same time. Which of the following devices would BEST address this issue?

A. Docking station B. KVM switch C. Bluetooth adapter D. IEEE 1394 cable A

Which of the following is an advantage of NTFS over FAT32?

A. Dual OS functionality B. File encryption support C. Drive size exceeding 128GB D. Support for Windows XP B

During the installation of the Windows Vista operating system, log files are created. Where would you likely find these on a Windows-based system? A. C:\WINNT\DEBUG B. C:\WINDOWS\LOG C. C:\WIN32\DATA D. C:\INSTALL

A. During the installation of the OS, log files are created in the %SystemRoot% or %SystemRoot%\Debug folder (C:\WINNT and C:\WINNT\DEBUG, by default).

During the process of creating an ERD backup, the Registry files are also backed up (in uncompressed state) in what directory? A. %systemroot%\repair\RegBack B. %systemroot%\RegBack C. %systemroot% D. %systemroot%\repair

A. During the process of creating the backup, the Registry files are also backed up (in uncompressed state) to %systemroot%\repair\RegBack.

Which of the following disturbances can affect your computers or network? A. EMI B. ESD C. RBI D. IMAP

A. Electromagnetic interference (EMI) disturbances can affect your computers or network. The disturbance is a form of electrical radiation and can emanate from sources such as electrical circuits, wireless devices (such as Bluetooth), magnets, cordless phones, or microwave ovens.

In which of these would you be most likely to use ECC memory? A Database server B Desktop computer C Print server D Laptop computer

A. Error Correcting Code (ECC) memory not only detects when memory errors occur, but it can also correct these errors on the fly. This makes ECC memory a perfect fit for mission-critical servers.

How are most solid-state media formatted by the manufacturer? A. As FAT32 B. As NTFS C. As FAT16 D. As FAT12

A. FAT32 is the most common file system used on solid-state media such as USB flash drives, SD cards, and CF cards. FAT 16 is another possibility, but less common. Users have the option to reformat most of these devices as NTFS if they want.

Which of the following cables has the LONGEST viable length?

A. Fiber B. CAT6 C. CAT5e D. CAT5 A

Which of the following broadband technologies allows for communication across the FARTHEST distance?

A. Fiber B. DSL C. Satellite D. Cable C

Which of the following should be performed during a hard drive replacement to BEST maintain data privacy?

A. Format the new hard drive twice prior to installation. B. Completely erase the old drive prior to disposal. C. Install antivirus software on the computer before removing the old hard drive. D. Only use FAT32 file systems when formatting the new drives. B

What benefit does full-duplex offer? A. It enables NICs to send and recieve signals at the same time. B. It enables NICs to send data twice as fast. C. It enables NICs to receive data twice as fast. D. It enables a switch to connect to both coaxial and fiber optic cables

A. Full-duplex technology enables NICs to send and receive signals at the same time.

Which of the following protocols uses port 443 by default?

A. HTTPS B. IMAP C. TELNET D. POP A

How should you hold RAM when installing it? A. By the edges B. By the front and back C. With tweezers D. With and Integrated Circuit (IC) puller

A. Hold RAM by the edges to avoid contact with the pins, chips, and circuitry.

You have just purchased a new dual-core PC, but when you look at the Windows Task Manager's Performance tab, you see usage statistics for four CPUs. What would be the most likely cause of this difference? A The dual-core CPUs are using HTT B The new computer uses dual-channel memory C Dual-core CPUs appear as four separate CPUs in Windows D Windows Task Manager is improperly configured

A. Hyper-Threading Technology is designed to allow a single CPU to schedule two processes at the same time, allowing the system to share the workload between both threads. If you view an HTT-enabled CPU in Task Manager, it will appear as if the computer has two or more CPUs for every physical CPU.

Which of the following is correct about IPv6?

A. IPv6 only supports IP addresses up to 64-bits in length. B. IPv6 is the only type of IP address supported on today s networks. C. Both IPv6 and IPv4 can exist on the same network. D. The last 64-bits of an IP address represent the device MAC address. C

What does a double-colon designate in an IPv6 address? A Abbreviation of two or more groups of zeros B The separation of the host and subnet C The beginning of the address D The end of the address

A. If an IPv6 address has two or more groups of zeros, the entire group can be replaced with a pair of colons. Only one range of zeros in an IP address can be abbreviated with the double-colon designation.

What is a possible symptom of a failing CPU? A. CPU is beyond the recommended voltage range B. Computer won't boot. C. BIOS reports low tempratures within the case. D. Spyware is installed into the browser.

A. If the CPU is running beyond the recommended voltage range for extended periods of time, it can be a sign of a failing CPU. If the computer won't boot at all, another problem might have occured, or the CPU might have already failed. Low case tempratures are a good thing (if they aren't freezing!) and spyware is unrelated.

A technician is attempting to backup 5 GB of data to an external hard drive that has been formatted as FAT32; however the backup keeps failing. What is the best way to solve the problem? A. Reformat the drive as NTFS. B. Replace the drive. C. Back up the data to a USB drive. D. Back up to CD-ROM.

A. If the backup keeps failing, you should look at the file system used on both drives. If the drive where the data is backed up to uses FAT32, and there is currently no data on the drive, it should be reformatted as NTFS. NTFS is the superior choice for a variety of reasons, plus it is more common than FAT32. Always try to reformat the drive before you incur the cost of replacement. From the scenario, you don't know the original type of backup drive. It might already be a USB drive, but who knows? Many USB flash drives are preformatted as FAT32. Regardless of all this, before trying another drive, try reformatting to NTFS first. A CD-ROM does not have enough storage space for the amount of data you need to backup. Plus, optical media is good for long-term backups that won't be used often. But if the technician in the scenario is trying to back up to hard disk, then it can be assumed that the data will be needed more often, and requires a faster solution such as SATA, or at least USB, either of which should be formatted as NTFS.

If the floppy disk you used last week will not work today in your floppy drive, what should you do first to determine if the problem is the disk or the drive? A. Try another disk in the drive or try the disk in another drive. B. Open the computer and check the ribbon cable. C. Replace the floppy drive. D. Check the CMOS settings.

A. If the floppy disk won't read in the drive, try another disk first.

One of the tape drives in the server room is reporting errors. What should you do first to maintenance the tape drive? A. Use the included cleaning tape for the drive. B. Uninstall the backup software and reinstall it. C. Install a new IDE cable. D. Replace the tape with a new one.

A. If the tape drive reports errors, the first thing you should do is use the included cleaning tape. You must remove the current tape and insert the cleaning tape; then run through the cleaning process. Finally, replace the original tape to see if it works without the tape drive reporting errors. If there is a problem with the backup software, the backup software usually displays an error, not the tape drive. It is more likely that the tape drive needs a simple cleaning than the backup software needing to be reinstalled. It's more common for a tape drive to use a SCSI cable as opposed to an IDE cable. You don't want to replace the tape because that tape may have information that you need. Try cleaning the drive first, and if the tape has failed, make sure you back up the original data to a new tape.

You just installed new, compatible RAM into a motherboard, but when you boot the computer it does not recognize the memory. What should you do? A. Flash the BIOS. B. Replace the RAM. C. Upgrade the CPU. D. Add more RAM.

A. If you are sure that the RAM is compatible and the system doesn't recognize it during POST, try flashing the BIOS. It could be that the RAM is so new that the motherboard doesn't have the required firmware to identify the new RAM.

You reboot a customer's computer and see a pop-up message that says one or more services failed to start. Which of the following can give you more information? A. System event logs B. Task Manager C. Application event logs D. Security log

A. If you get a message that says One or More Services Failed to Start, should follow-up on this and look for more information within the System log in the Event Viewer. The Application log contains information, warnings, and errors pertaining to programs built into the OS as well as third-party applications. The Security log shows information recarding file access, permissions, logins, and so forth. The Task Manager gives you performance information about the computer and shows what processes and applications are running.

You reboot a customer's computer and see a pop-up message that says one or more services failed to start. Which of the following can give you more information? A. System event logs B. Task Manager C. Application event logs D. Security logs

A. If you get a message that says One or More Services Failed to Start, then you should follow-up on this and look for more information within the System log in the Event Viewer. The Application log contains information, warnings, and errors pertaining to programs built into the OS as well as third-party applications. The Security log shows information regarding file access, permissions, logins and so forth.

Which of the following printers would be the BEST choice for printing on multi-part forms?

A. Impact printer B. Thermal printer C. Inkjet printer D. Laser printer A

In which mode do all the wireless devices connect directly to each other? A. Ad hoc mode B. Circular mode C. Infrastructure mode D. Mesh mode

A. In ad hoc mode networks, all the nodes connect directly to each other.

Which Microsoft technology enables you to share a single Internet connection with multiple computers? A. Internet Connection Sharing B. My Network Places C. Remote Access D. Remote Desktop

A. Internet Connection Sharing enables you to share a single Internet connection with multiple computers.

You have been called to a site to clean a plethora of computers. Doing so will take cartons of compressed air and you are looking for another solution. Which of the following can you use? A. Air compressor B. Feather duster C. Iodized water D. Hydrogen peroxide

A. It’s possible to use an air compressor instead of compressed-air cans when you need a lot of air. If you take this approach, make sure you keep the pounds per square inch (PSI) at or below 40, and include measures on the air compressor to remove moisture.

Which power connector would be used to power an IDE hard drive? A. Molex B. Mini C. P1 D. P8/P9

A. Molex connectors power IDE devices. Mini connectors are for floppy drives, P1 is a name used for the main motherboard connector, and P8/P9 are legacy main power connectors for AT systems.

What voltages are supplied by a Molex power connector? A. 12 V and 5 V. B. 5 V and 3.3 V C. 3.3 V and 1.5 V D. 24 V and 12 V

A. Molex connectors provide 12 volts and 5 volts. There are four wires: Yellow is 12 V, red is 5 V, and two blacks which are grounds.

When do you need to discharge a CRT? A. When replacing a component inside the CRT. B. Before unplugging the unit for servicing C. When storing the CRT D. During degaussing of the CRT

A. Monitors can hold charges of up to 35,000 volts for a long period of time. If you plan to replace a part inside, it's best to have the monitor discharged

A customer is experiencing unusual problems with a printer due to voltage fluctuations in the wall outlet. Which of the following should be used to eliminate the fluctuations?

A. Multimeter B. Ohm meter C. UPS D. Surge protector C

What Is The Only NASA Asset Named After A Living Person? A. The Colbert Treadmill B. The James Webb Space Telescope C. The Hubble Telescope D. The Ames Research Facility

A. NASA has a long history of naming assets after influential astronomers, scientists, and other individual that have both worked directly for NASA or simply contributed greatly to related fields of study. Most of the time the names are selected from a pool of famous but deceased contributors (most likely in a bid to avoid bruising the egos of the living). The Hubble Telescope is a famous example of this: it was named after Edwin Hubble, a scientist who played a crucial role in establishing the field of extra-galactic astronomy. Hubble died in 1953 and the telescope bearing his name was launched in 1990. The only current exception to this rule is that of the Colbert Treadmill. In 2009 NASA held an online poll to encourage the public to help name the newest module of the International Space Station. Comedian and television host Stephen Colbert urged viewers of his show, The Colbert Report, to write in “Colbert†as their suggested name for the module. Although Colbert ended up being the most popular name in the polls, NASA ultimately declined to use it and instead went with the less popular nomination “Tranquilityâ€. In a nod to Colbert, however, they renamed their new space treadmill the COLBERT (Combined Operational Load Bearing External Resistance Treadmill)â€"making it the only NASA asset that bears the name of a living person.

Which of the following commands can be used to set a user’s password? A. NET ACCOUNTS B. NET COMPUTER C. NET CONFIG D. NET FILES

A. NET CONFIG is used to see network-related configuration. NET ACCOUNTS is used to set account options (password age, length, etc.). The NET COMPUTER command can be used to add and delete computer accounts. NET FILES can be used to close open files.

Which of the following occurs during POST?

A. OS loads B. Safe Mode starts C. RAM check D. MBR check C

The new high volume laser printer has a number of different interface options to connect directly to James' Windows XP Professional PC. He wants to use the fastest one possible. Which one should he use? A. IEEE 1394 B. 802.11b C. USB 1.0 D. IEEE 1284

A. Of the choices listed, the IEEE (FireWire) connection is the fastest by far.

The PCIe 8x video card in a PC workstation has failed and there are no empty PCIe slots available. The only replacement card is not the same model. Which of the following will work in place of the original?

A. PCIe 16x B. PCI-X C. PCIe 4x D. AGP 2.0 C

Which of the following protocols uses port 143 by default?

A. POP B. HTTPS C. TELNET D. IMAP D

Which of the following is commonly used for RS-232 connections? edit

A. PS/2 B. Parallel C. SCSI D. DB-9 D

Before implementing a potential solution to a problem, which of the following should be done?

A. Perform a system backup B. Determine what has changed C. Test the solution D. Document the solution A

A help desk technician receives a phone call from a user reporting a computer problem. During the phone call, the user starts a conversation with the technician asking detailed information about personnel in upper management. The technician then asks the users name again, after which the user promptly hangs up. Which of the following attacks did the technician experience?

A. Phishing attack B. Eavesdropping attack C. Social engineering attack D. Spyware attack C

Which of the following describes the purpose of encryption?

A. Prevents unauthorized users from deleting data stored on computers. B. Prevents unauthorized users from viewing or reading data. C. Prevents unauthorized users from posing as the original source sending data. D. Prevents unauthorized users from posing as the intended recipient of data. B

Which of the following is an advantage of running Windows on NTFS as opposed to FAT32? A. Security B. Support for DOS applications C. Long filenames D. Network support

A. Security is an advantage of running NTFS as opposed to FAT32.

A customer reports that their laptop is unable to print a document from a word processing application. A technician confirms that the printer settings are correct. Which of the following is the NEXT step?

A. Print a test page from Printer Properties B. Restart the print spooler service C. Re-load the printer drivers D. Direct the user to another printer A

Which of the following is the MOST important consideration when installing Windows 7 64-bit?

A. Processor speed B. Processor type C. Memory type D. Memory speed B

After a technician physically installs a bar code reader, which of the following is the NEXT step?

A. Program the reader to recognize the required code systems. B. Reinstall the operating system to add support for bar code readers. C. Adjust the light wavelength. D. Test the reader by typing commands from the keyboard. A

Which of the following is important when planning for solving a customer’s problems? A. Punctuality B. Belatedness C. Cell access D. Humor

A. Punctuality is important and should be a part of your planning process before you ever arrive at the site. If you tell the customer you’ll be there at a certain time, you need to make every attempt to be there at that time.

Why would you configure QoS on your router? A You need to prioritize one type of traffic over another B You need to provide access to an internal web server C Your MTU was not set correctly D You want to encrypt traffic on your wireless networK

A. Quality of Service is commonly used when you need to prioritize a certain traffic flow over another. This is common used with Voice over IP to maintain voice quality, even when large file transfers and streaming video connections are occurring.

Which of the following could an administrator use to manage the amount of bandwidth provided to applications that don’t function well with lagsâ€"voice and video, for example? A. QoS B. PoE C. WPS D. NAS

A. Quality of service (QoS) describes the strategies used to manage the flow of network traffic. A network administrator can use QoS to manage the amount of bandwidth provided to applications that are latency sensitive.

How are components referenced in a SCSI-connected device? A Logical Unit Number B Serial number C IP address D MAC address

A. Question 1 Explanation: A SCSI LUN (logical unit number) is used to identify the individual components within a SCSI-connected device.

Which of these is contained within step 1 of the six-step troubleshooting process? A. Question the user. B. Document findings. C. Establish a new theory. D. Escalate the problem.

A. Questioning the user is important when gathering information to identify the problem.

Which of the following RAID arrays does only striped volumes?

A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 10 A

You would like to build a drive array configuration that provides the highest levels of throughput. You don't need the RAID array to provide any redundancy if a drive fails. What RAID type would be the best fit? A RAID 0 B RAID 1+0 C RAID 5 D RAID 1

A. RAID 1 (mirroring) and RAID 5 (striping with parity) both provide redundancy if you lose a hard drive. RAID 0 (striping) provides high performance, but there's no redundancy if a drive crashes.

Which of these would be true about RAID 1? A In the case of a failure, an exact duplicate of your data exists B Data is made redundant through the use of parity blocks C RAID 1 is generally much faster than RAID 0 D In the case of failure, the array is broken and data is unrecoverable

A. RAID 1 may not be the fastest form of RAID, but it's certainly one of the safest. With RAID 1, data is completely duplicated between drives. If a drive were to fail, the remaining drive would continue to provide uninterrupted data reading and writing.

Which configuration requires three same-sized volumes? A. RAID 5 B. Mirrored set C. Spanned volume D. Striped volume

A. RAID 5 requires three same-sized volumes.

Which of the following protocols uses port 3389, by default?

A. RDP B. HTTP C. SMTP D. FTP A

Which of the following memory slots would be used in a laptop?

A. RIMM B. SODIMM C. RAMBUS D. SIMM B

What utility is started with MSTSC.EXE? A. Remote Desktop Connection B. System Configuration Tool C. Windows Defender D. Duplex Manager

A. Remote Desktop Connection is the MSTSC.EXE utility.

Replacing which of the following items usually requires soldering? A. DC jack B. Battery C. Touchpad D. Antenna

A. Replacing a bad DC jack usually requires soldering. If this is not a skill you possess, just replace the motherboard.

What do you add to the end of a SCSI bus to prevent signal reflection? A Terminator B Delimiter C Supressor D Compressor

A. SCSI terminators are used to prevent the signal from reflecting back down the SCSI bus. Some terminators are connected externally, and many SCSI devices include the option to enable an internal SCSI terminator.

Which of these protocols is commonly used to monitor the health and availability of network infrastructure devices? A SNMP B SMTP C DHCP D LDAP

A. SNMP (Simple Network Management Protocol) is commonly used to query network infrastructure devices for status information.

Which of the following Internet services would you LEAST likely use with VoIP? A. Satellite B. Cable C. Dial-up D. DSL

A. Satelite has more latency than just about any other internet connection out there. You should never use it when attempting to use VoIP.

Which of the following is an advantage of running Windows on NTFS as opposed to FAT32? A. Security B. Support for DOS applications C. Long Filenames D. Network support

A. Security is an advantage of running NTFS as opposed to FAT32.

Which of the following characteristics and port numbers are associated with SMTP?

A. Sends outbound email, Port 25 B. Receives inbound email, Port 25 C. Sends outbound email, Port 110 D. Receives inbound email, Port 110 A

Which of the following cable ratings should be used in air handling spaces?

A. Shielded B. PVC coated C. Plenum D. Unshielded C

What service commonly uses port tcp/25? A SMTP B POP3 C DNS D RDP

A. Simple Mail Transfer Protocol uses TCP port 25 as its well-known server port.

A user states that a bank employee called and asked to verify information about a relative s account (e.g. balance, address and telephone number). Which of the following is occurring in this scenario?

A. Spam B. War driving C. Adware D. Social engineering D

On a SOHO network, which service should you avoid using to keep from issuing IP addresses to hosts other than those you recognize and want on the network? A. DHCP B. NAT C. DNS D. IMAP

A. Static IP addresses should be used (avoiding issue by DHCP) on small office/home office networks to keep from issuing them to hosts other than those you recognize and want on the network.

Which of the following is a Windows XP system file? A. boot.ini B. win32.exe C. bootmgr D. autorun.inf

A. System Files are files that start the operating system. In Windows XP, they include: ntldr, boot.ini and ntdetect.com (and ntbootdd.sys if you have a SCSI hard drive.)

What does System Information do? A. Provides you with a report about the hardware resources, components, and software environment in your computer B. Enables you to select which programs and services start when Windows boots up C. Enables you to schedule hard drive defragmetation, CHKDSK scans, and other computer tasks D. Enables you to perform automatic custom backups of your files and settings

A. System Information gives you a wide variety of information about your system.

What kind of video technology do most laptops incorporate currently? A.TFT active matrix B. Passive Matrix C. CRT D. TFT Passive Matrix

A. TFT active matrix LCDs are the most common in laptops today. Passive matrix screens have been discontinued; although you might see an older laptop that utilizes this technology. There is no TFT passive matrix, and cathode ray tubes (CRTs) were used only on the first laptops many years ago. Due to CRT's weight and heavy power usage, it is not a good solution for laptops.

Which utility is useful in identifying a program that is hogging the processor? A. Task Manager B. Device Manager C. System Monitor D. System Information

A. Task Manager will identify very quickly a program that is hogging the processor.

Which switch is used with DEFRAG to determine the degree of fragmentation only? A. /A B. /F C. /V D. /Z

A. The /A switch is used with DEFRAG to analyze the state of fragmentation without running the operation.

Which switch is used with CHKDSK to tell it to fix errors that it finds? A. /R B. /C C. /S D. /A

A. The /R (or /F) switch is used with CHKDSK to tell it to fix errors that it finds.

Which of these processors are supported by a Socket H2? A Intel Core i3/5/7 B AMD Athlon II C Intel Core 2 Duo D AMD Athlon 64 FX

A. The 1,155 pin Socket H2 is an Intel socket that supports the Sandy Bridge and Ivy Bridge versions of the Core i3, i5, and i7 processors.

Which of the following tools can help you more efficiently install multiple copies of Windows 7? A. Automated Installation Kit B. Windows Easy Transfer C. Upgrade Advisor D. Activation Key

A. The Automated Installation Kit (for Windows Vista/7) can help you set up an automatic procedure for installing copies of Windows on multiple machines.

Which of the following tools can help you more efficiently install multiple copies of Windows 7? A. Automated Installation Kit B. Windows Easy Transfer C. Upgrade Advisor D. Activation key

A. The Automated Installation Kit (for Windows Vista/7) can help you set up an automatic procedure for installing copies of Windows on multiple machines.

What does the CAS latency represent? A The time it takes to receive data from memory after making the request B The time delay from a power-off state until a login prompt is shown C The network delay between a workstation and a server, in milliseconds D The delay in reading data from the hard drive

A. The Column Address Strobe (CAS) Latency refers to the delay between the time that the memory controller requests some data from RAM and the moment the data is available on the memory module's output pins. In SDRAM, the CL is specified in clock cycles. The value refers to the time delay, so a CL of 2 is faster than a CL of 3.

Which of the following file systems enables you to encrypt files, thus making them unviewable by any account but your own? A. EFS B. FAT C. FAT32 D. OSR

A. The Encrypting File System (EFS) enables you to encrypt files, making them unviewable by any account but your own.

Which of these sockets can support an AMD A-series processor? A Socket FM1 B Socket H1 C Socket T D Socket B

A. The FM1 is a more modern socket type, and the only one listed here that is an AMD socket. The other options are all Intel sockets.

You've been asked to put together a RAID array for a new server. Which of these disk types can be combined to create a RAID array? A Any disk type B SCSI C SATA D PATA

A. The ability to create a redundant array of disk isn't dependent on the disk type, although the same disk type is usually together in a single RAID array.

Which bus connects the RAM to the CPU? A. Address B. System C. Expansion D. AGP

A. The address bus connects the RAM to the CPU.

What types of characters are the asterisk (*) and the question mark (?)? A. Wildcards B. Optionals C. Designators D. Switches

A. The asterisk and question mark characters are wildcards when use with command-line commands.

What is the autoconfigured address range in IPv6? A. FE80:: B. :::0 C. 169.254.0.0 D. 255.255.255.0

A. The autoconfigured address range in IPv6 is FE80::. In IPv4, it is 169.254.0.0.

John's computer has an error that says bootmgr is corrupted. What tool can he use to fix this problem? A. bcedit B. chkdsk C. config.sys D. regedit

A. The bcedit program can fix a corrupted bootmgr.

What is the command to make myfile.txt read-only? A. attrib +r myfile.txt B. attrib -r myfile.txt C. readonly myfile.txt D. myfile.txt /readonly

A. The command attrib +r myfile.txt will make myfile.txt read-only.

What is a default gateway? A The router that allows you to communicate outside of your local subnet B The central switching device for the network C The device that provides automatic IP addressing for every workstation D The route to an encrypted private virtual network connection

A. The default gateway configuration is required if you’re planning to communicate to any devices outside of your local network.

The power supply in your computer has failed, and you need to get the system up and running again. What's the best way to repair the power supply? A Remove the entire power supply and replace it with a new power supply B Move the hard drive, motherboard, and other peripherals to another computer with a working power supply C Open the power supply and use a multimeter to identify and replace the bad components D Power supply units can't be individually replaced. You'll need a completely new computer system.

A. The internal components of a PC power supply aren't designed for a field repair at the component level. Since it's almost always more cost effective to completely replace the power supply, a quick swap is in order. Removing a few screws will free the existing power supply, and the replacement should fit into the same form-factor.

Which of these would be a characteristic of satellite networking? A Latency is relatively high B Throughput comparable with dial-up networking C Data is provided over two bearer channels and one signaling channel D The speed of the satellite link is based on the distance to a central office (CO)

A. The latency of a satellite-based network connection can average 250ms up and 250ms down, a significant increase over most terrestrial-based network types.

Which of the following items cannot be set through CMOS setup? A. IP address B. Port settings C. Boot order D. Date and time

A. The most common settings to adjust in CMOS include port settings (parallel, serial, USB), drive types, boot sequence, date and time, and virus/security protections, but do not include IP address.

Which twisted pair wiring standard specifies the pin arrangements for the RJ-45 connectors on UTP or STP cables? A. T568B B. 802.11b C. IEEE1394 D. WiMAX

A. The pin arrangements for the RJ-45 connectors on UTP or STP cables are specified by wiring standards T568A (older) and T568B (newer).

A user reports that they are suddenly unable to print to a network printer. It was working fine yesterday. The technician can ping the users workstation and the printer. The technician can also print a test page from another workstation. Which of the following is the MOST likely cause of the problem?

A. The printer is no longer the users default printer. B. The users workstation has a faulty NIC. C. The printer has corrupt drivers. D. The printer has a faulty NIC. A

A user reports that their last several jobs have not printed, even though other users can print. In which of the following locations should the technician look FIRST?

A. The servers printer list B. The printers onboard memory C. The computers print queue D. The Add/Remove Programs window C

Which of the following root keys contains the data for a system's non-user-specific configurations? A. HKEY_LOCAL_MACHINE B. HKEY_USERS C. HKEY_CURRENT_USER D. HKEY_CLASSES_ROOT

A. The system's non-user-specific configurations are stored in the HKEY_LOCAL_MACHINE root key of the Registry.

A technician on a service call is dealing with a furious customer who is shouting loudly. The technician cannot calm the customer down. Which of the following should the technician do NEXT?

A. The technician should shout back at the customer and remain in control of the situation. B. Let the customer continue to be loud because sooner or later the customer will get tired and calm down. C. Call the supervisor and complain. D. Leave the customer site and document the incident. D

You need to create a firewall rule to allow telnet traffic to pass through. What port should you open in your firewall rule? A tcp/23 B tcp/20 C tcp/21 D tcp/25

A. The telnet protocol normally communicates over TCP port 23

A CD-RW has a speed rating of 12x/10x/32x. What do the three numbers refer to, in order? A. Write, rewrite, read. B. Read, write, rewrite. C. Rewrite, read, write. D. Write, read, rewrite.

A. The three speeds listed for CD-RW drives stand for write, rewrite, and read.

One of your co-workers is attempting to access a file on a share located on a remote computer. The file's share permissions are set to allow the user full control; however, the NTFS permissions allow the user to have read access. What will be the user's resulting access level for the file? A. Read B. Write C. Modify D. Full control

A. The user will have only read access to the file. Remember that NTFS permissions take precedence over share permissions, even if the share-level permissions offer a higher level of access. It is possible for the user to get write, modify, or full control access, but only if the NTFS permissions are configured to allow the user to do so.

During a laptop start up, a technician is able to see the Windows splash screen as the OS loads. Shortly after reboot, the technician experiences a black screen. The technician can plug in an external monitor and the display works correctly. Which of the following is a MOST likely cause of the display issue?

A. The video card on the laptop is faulty B. There are unneeded peripherals that should be removed C. The function key needs to be pressed to toggle monitors D. The motherboard on the laptop is faulty C

A user is attempting to connect to a Wi-Fi hot-spot at a local coffee shop where the user connects every weekend. The user is receiving the message, no wireless devices detected , but other users in the coffee shop can connect. Which of the following is the MOST probable cause of this issue?

A. The wireless switch on the side of the laptop is turned off. B. The coffee shop no longer offers Wi-Fi to customers. C. The Wi-Fi hotspot has reached its maximum number of connections. D. The user is allowing Windows to manage wireless connections. A

What is the command to quit the command-line interface? A. exit B. bye C. quit D. stop

A. Type exit and press the ENTER key to bail out of a command-line interface in Windows.

What does the x refer to in Compact Disc technology? A. 150 KB/s B. 1.32 MB/s C. 133 MB/s D. 4.5 MB/s

A. The x in CD technology is equal to 150 KB/s. A 1x drive can read or write 150 KB/s; a 2x drive can read or write 300 KB/s; and so on. 1.32 MB/s is the 1x speed of a DVD. 133 MB/s is the maximum data transfer rate of an Ultra ATA-7 connection, and 4.5 MB/s is the 1x speed of a Blu-ray disc.

You are planning a network installation on the floor of a manufacturing facility, and you expect the network run will be less than 100 meters. Which of these cabling types will be the best choice to guarantee that the manufacturing equipment will not electrically interfere with the network link? A Multimode fiber B UTP copper C Single-mode fiber D STP copper

A. Third-party equipment can often interfere with copper cabling, even when that cabling has additional shielding. To guarantee that no electrical interference will be a problem, you must use a fiber connection. If the connection is less than 2 kilometers, a best-practice is to use less-expensive multimode fiber over single-mode fiber.

You are troubleshooting a computer that reboots at strange times. Even when you try and access the CMOS setup, the computer will reboot. What should you do FIRST? A. Check for blown capacitors. B. Replace the CR-2032 battery C. Check to see if your operating system is corrupted. D. Check to see if the case fan is spinning.

A. This is a rough situation there. When this happens, it will short circuit the conductors that are carrying power, causing random reboots, among other types of errors.

A technician is on-site fixing a keyboard problem. Apparently, the user can't use Microsoft Word to type any documents. After a few questions with the user, the tech finds out that the use spilled soda on the keyboard. According to the troubleshooting theory, what should the technician do next? A. Replace the keyboard with a new keyboard B. Verify the system functionality C. Document the repair D. Ask the user open-ended questions.

A. Time to swap out the keyboard!

You recently told your friend about how amazing Blu-Ray is, so they decided to install a BD-ROM in their PC. After installation, they call you because now their existing DVD-RW and the new drive aren't working. What should you tell them they need to replace? A. Power supply B. SATA controller C. DVD-RW D. BD-ROM

A. Time to upgrade that power supply unit! Looks like the addition of a new drive just tilted the scale and now your PSU can't power all you devices. Get a 1000-watt PSU... you'll never worry about power again.

To avoid ESD, you should maintain what range of humidity in the room where the computer is operating? A. 50â€"80 percent B. 60â€"90 percent C. 70â€"100 percent D. 90â€"100 percent

A. To avoid ESD, you should maintain 50 to 80 percent humidity in the room where the computer is operating.

Which of the following would extend the wireless network range and allow out-of-range users to share an Internet connection? A. Implement a wireless access point for the out of range users. B. Enable network sharing on the users' computers that are within range C. Upgrade the out-of-range users' SSID searching software D. Create a new VLAN for the out-of-range users

A. To extend the wireless network range and allow out of range users to share an Internet connection, you would add a wireless access point for the out of range users. The wireless access point will ultimately connect to the organization's router which will allow the out of range users the ability to share the Internet connection. By adding wireless access points at various locations of the building, you can increase the wireless network range.

Which hardware firewall feature enables incoming traffic on a specific port to reach an IP address on the LAN? A. Port forwarding B. NAT C. DMZ D. Multifactor authentication

A. To open a port on your hardware firewall and send incoming traffic to a specific PC, use port forwarding.

What are the steps involved in pairing a Bluetooth keyboard with a tablet? A. Enable Bluetooth on the tablet; turn on the Bluetooth device; find the device with the tablet; enter a PIN code or other pairing sequence. B. Turn on the Bluetooth device; find the device with the tablet; enter a PIN code or other pairing sequence. C. Search for a Bluetooth device from the tablet; select pair from the options to enable the device. D. Enable Bluetooth on the tablet; turn on the Bluetooth device; find the device with the tablet; select pair from the options to enable the device.

A. To pair a Bluetooth keyboard with a tablet, enable Bluetooth on the tablet, turn on the Bluetooth device, find the Bluetooth device in the tablet's settings screen, then enter a PIN code or finalize the pairing.

Mark wants to monitor a PC that's been having performance issues overnight. He needs something that will record the data while he's away from the computer. What tool should he use? A. Performance Logs and Alerts B. Task Manager C. System Monitor D. Registry

A. To record data while he is away (as opposed to watching the computer live), Mark should use the Performance Logs and Alerts snap-in.

Which of the following is the correct net syntax for discovering which network shares on a particular server are mapped on your computer? A. net view \\fileserver B. net \\fileserver C. net map \\fileserver D. net share \\fileserver

A. To see the network shares mapped on your computer, use net view \\fileserver

______________ is a user interface feature used by dragging your finger up and down or left and right to access common tasks on the screen. This movement is akin to scrolling the screen left and right or scrolling the screen up and down. A. Touchflow B. Multitouch C. Multiflow D. Sliding window

A. Touchflow or TouchFLO is a user interface feature designed by HTC. It is used by dragging your finger up and down or left and right to access common tasks on the screen. This movement is akin to scrolling the screen left and right or scrolling the screen up and down.

A technician’s company prints forms on multi-layer carbonless copy paper. When asked to replace the printer, which of the following printing technologies will allow the technician to continue to use the company’s copy paper?

A. Transfer B. Dot Matrix C. Thermal D. Laser B

Which of the following is an advantage of HDMI over DVI?

A. Transmits high definition content B. More resistant to EMI C. Allows for greater cable length D. Transmits audio and video D

What type of PCMCIA card is used for memory? A. Type I B. Type II C. Type III D. PCMCIA cards cannot be used for memory

A. Type I is used mostly for memory. These are very rarely used in today’s systems, since the new laptops have other means of increasing memory, such as SoDIMMs.

A duplexer unit has been added to an existing laser printer. The printer prints normally but it will not print on both sides of the paper. Which of the following is the FIRST action a technician should take when addressing this issue?

A. Update the printer firmware to the latest version for duplexing. B. Delete the printer queue and recreate it. C. Check the manufacturer s documentation and website for any known problems with the duplexer unit. D. Check the configuration settings of the printer for duplex enabled. D

Which of the following should be included in a password to BEST prevent the password from being compromised?

A. Uppercase letters, lowercase letters, numbers, special characters B. First name, last name, birthday, address, phone number C. Dictionary words with proper capitalization, transposition of letters with similar looking numbers D. Prime numbers and repeating digits A

A client’s spreadsheet is not printing all the columns. Which of the following can be done to fix this?

A. Use the Print Landscape option under the File menu B. Push the landscape button on the printer C. Change the document orientation in printing preferences D. Adjust the documents formatting in the devices Control Panel C

What command do you type at the Run dialog box to access the command-line interface in Windows XP? A. cmd B. conand C. msdos D. cp

A. Use the cmd command in the Run dialog box to access a command line in Windows XP.

Which of the following tools would enable you to create a new user account in Windows XP? A. User Accounts B. User Account Control C. Users and Groups D. Users and Passwords

A. User Accounts would enable you to create a new user account in Windows XP.

You need to clean out the dust that has accumulated on the fans of your desktop computer. Why is it important to use a vacuum cleaner that has been designed for computer systems? A Computer vacuums minimize the potential for static electricity discharges B Computer vacuums will not suck up any silicon-based materials C Computer vacuums have larger debris storage areas D Non-computer vacuums don't have enough power

A. Vacuum cleaners that are designed for computers use materials that help minimize the potential for static electricity. Dust can create static electricity as it moves around in the air, and some plastic materials and motors can contribute to static electricity buildup. By using different materials and design, a vacuum cleaner designed for computers can limit static electricity discharges.

Which of the following should be used when cleaning up printer toner?

A. Wet cloth and a paper cloth B. Dry cloth and a paper bag C. Dry cloth and compressed air D. Wet cloth and a plastic bag B

When computer systems are retired, the disk drives should be zeroed out, and all magnetic media should be: A. Degaussed B. Filtered C. Reset D. Calibrated

A. When computer systems are retired, the disk drives should be zeroed out, and all magnetic media should be degaussed.

Why is a ground connection through the use of a wrist strap or floor mat important when working with computer components? A The ground connection normalizes the electrical potential between the technician and the components, minimizing the chances of static electricity discharge. B The ground connection protects against electrocution during the maintenance process. C The use of a grounding strap is a myth. Ground straps provide no practical use. D Modern personal computers require a constant ground point to prevent data loss.

A. When you’re working with electronics, the components are very sensitive to static electricity. By connecting yourself and your electronics to a common ground point, you lower the chance that the static electricity will move between you and the electronics and cause damage.

You receive a message in Windows XP that warns you of a memory-read error. What should you do to fix this? A. Reseat or replace RAM modules. B. Change the memory settings in the BIOS. C. Replace the hard drive. D. Remove any USB flash drives.

A. Windows XP might give memory read errors when RAM cannot be read from properly. If it is definitely a RAM error and not an OS issue; the best thing to try is to reseat and/or replace the RAM. While you're there you can try using compressed air on the RAM and the RAM slots to remove any dust that has accumulated over time.

"To get to ""Add a Printer"" Wizard in Windows XP with the Start menu set to Windows XP mode, you would: A. Click Start | Control Panel | Printers and Faxes | Add a Printer B. Click Start | Settings | Printers and Faxes | Add a Printer C. Click Start | All Programs | Add a Printer D. Right-click My Computer and choose the Add a Printer icon."

A. With the Start menu in Classic Start menu mode, you would click Start | Settings | Printers and Faxes | Add a Printer

Which command is like COPY but also duplicates any subfolders? A. XCOPY B. SCOPY C. DCOPY D. GCOPY

A. XCOPY is like COPY, but it also duplicates any subfolders.

Which of the following connector types are typically used on LCD displays? (Select TWO).

A. XGA B. Bluetooth C. CGA D. DVI E. VGA D, E

You can save a copy of a CD or DVD as what type of file? A. ISO B. ISO-9660 C. INF D. CDDA

A. You can save a complete CD or DVD as an ISO image.

Which of the following commands will delete all of the files in a directory? A. del *.* B. del all C. del ?.? D. del *.?

A. You can use the *.* wildcard combination to affect every file in a particular folder.

Which switch is used to indicate PING should continue to ping the host without stopping until you break out of it (using Ctrl+C)? A. /T B. /L C. /C D. /S

A. You can use the /T switch to indicate PING should continue to ping the host without stopping until you break out of it.

Steven's Windows system can't connect to the Internet, and he comes to you, his PC tech, for help. You figure out that it's a DHCP problem. What program should you run to get him a new DHCP lease? A. ipconfig B. ifconfig C. config D. dhcp /review

A. You should run ipconfig to get a new DHCP lease for Steven's Windows XP system. ifconfig is the program used by Linux systems for this task. Neither config nor dhcp is valid.

You are troubleshooting a computer that won't power on. You have already checked the AC outlet and the power cord, which appear to be functioning properly. What should you do next? A. Test the computer with a PSU tester. B. Plug the computer into a different outlet. C. Check that the RAM is seated correctly. D. Install a UPS.

A. You should test the computer with a PSU tester. This can tell you whether the power supply functions properly. You already know that the AC outlet is functional, so there is no reason to use another outlet. The computer would still turn on if the RAM wasn't seated properly. A UPS won't help the situation because it is part of the power flow before the power supply.

What file begins the Windows XP boot process? A. ntldr B. boot.ini C. autorun.inf D. NT.exe

A. boot.ini also runs as XP is booting, but ntldr gets the ball rolling. autorun.inf is the default start for a CD-ROM. NT.exe I made up.

ACT

Activity

ARP

Address Resolution Protocol

ASLR

Address Space Layout Randomization a security feature that causes a program’s data locations to be randomly arranged in memory. Before ASLR, a program’s data locations in memory could be predictable, which made attacks on a program much easier. With ASLR, an attacker has to guess the correct location in memory when trying to exploit a vulnerability in a program. An incorrect guess may result in the program crashing, so the attacker won’t be able to try again. This security feature is also used on 32-bit versions of Windows and other operating systems, but it’s much more powerful on 64-bit versions of Windows. A 64-bit system has a much larger address space than a 32-bit system, making ASLR that much more effective.

ACPI

Advanced Configuration Power Interface

AHCI

Advanced Host Controller Interface

APM

Advanced Power Management

ATA

Advanced Technology Attachment

ATAPI

Advanced Technology Attachment Packet Interface

ATX

Advanced Technology Extended

AHCI

Advanced host controller interface The Advanced Host Controller Interface (AHCI) is a technical standard defined by Intel that specifies the operation of Serial ATA (SATA) host bus adapters in a non-implementation-specific manner. The specification describes a system memory structure for computer hardware vendors to exchange data between host system memory and attached storage devices. AHCI gives software developers and hardware designers a standard method for detecting, configuring, and programming SATA/AHCI adapters. AHCI is separate from the SATA 3 Gbit/s standard, although it exposes SATA's advanced capabilities (such as hot swapping and native command queuing) such that host systems can utilize them.

802.11n

An amendment to the 802.11 wireless networking standard that provides for bandwidths of 150 Mbps+ in the 2.4 GHz and 5 GHz frequency spectrums.

JBOD

An architecture involving multiple hard drives, while making them accessible either as independent hard drives, or as a combined (spanned) single logical volume with no actual RAID functionality.

[4.4] What is a kind of this object? int matrix[3][4];

An array of three arrays of four elements of int type.

Obfuscator

An obfuscator is a program designed to make it difficult to understand or reverse engineer source code. The obfuscator takes the clean human-readable source code the programmer has created and does a thorough job shuffling it around, changing simple variables to confusing ones, and otherwise making it difficult for another person to sit down and read the original clean copy (but all while still maintaining the functionality of the source code). Obfuscators are particularly valuable for interpreted languages (such as JavaScript) where the end user can open and inspect the code; without obfuscation it would be trivially easy for someone to lift the code from any interpreted language source code.

network appliance

Any headless computer (that is, one with no direct interface) designed to do very specific duties. A NAS box is a perfect example of a network appliance.

When does C create an array of characters terminated by a /0, and when does it not?

Apparently the only way to create that is by setting the length of the array in the declaration statement.

Given the code below: const size_t arr_size = 4; int arr[arr_size] = {-3, 3, -9, 0}; write a code for displaying values of the array using array iterators.

Array iterators are just pointers. The code with iterator-style displaying elements of the array is: for(int *begin = arr, *end = arr + arr_size; begin != end; ++begin) { cout << *begin << ' '; }

Zero addresses

As with the loopback range, the address range from 0.0.0.0 through 0.255.255.255 should not be considered part of the normal Class A range. 0.x.x.x addresses serve no particular function in IP, but nodes attempting to use them will be unable to communicate properly on the Internet.

ADSL

Asymmetrical Digital Subscriber Line

A/V

Audio Video

ASR

Automated System Recovery

APIPA

Automatic Private Internet Protocol Addressing

By default, how often does Windows create restore points?

Automatically, every 24 hours

"""a text file that lists the OSs available to ntldr and tells ntldr where to find the boot partition for each of them"" A. ntdetect B. boot.ini C. ntbootdd.sys D. winstart.exe"

B

A customer reports that their computer is displaying operating system not found while booting. The technician confirms that the computer booted fine the previous day and that no devices were added. The technician also confirms that no software changes were made to the system from the previous day. Which of the following is the problem? A. The network cable is unplugged. B. A diskette was placed in the disk drive. C. The keyboard is unplugged. D. The system has been infected with spyware.

B

A helpdesk phone support technician is finding it difficult to understand a customer due to their heavy accent. Which of the following actions should the technician take NEXT to help the customer resolve their problem? A. Have the customer call back at a later time. B. Repeat back to the customer what they heard as the problem. C. Tell the customer that their accent is preventing the technician from helping them. D. Ask the customer to not speak with an accent.

B

A laptop docking station does which of the following? a) Allows the user to synchronize mobile devices without additional hardware b) Allows the user to connect one device to a monitor, network drop, and USB printer c) Allows the user to connect wireless devices more efficiently d) Allows the user to protect sensitive data more effectively

B

A new printer driver has just been installed on a desktop computer. Which of the following is the correct location to find the Print Test Page button? A. In Computer Management under Administrative Tools B. The General tab of the properties page of the printer C. In the Print Spooler service D. The Hardware tab of the Systems properties page

B

A technician dropped a screw in the case of a desktop computer. Which of the following tools should be used to retrieve the screws? A. Computer vacuum B. Plastic tweezers C. Canned air D. Screwdriver with magnetized tip

B

A technician finds the inside of a desktop computer completely covered in almost 1 inch (2.54 centimeters) of dust. Which of the following would be the BEST solution to clean out the inside of the case? A. Wet rag B. Compressed air C. Lint free cloth D. Dry rag

B

A technician has been taken to a users desk to resolve a problem. The users desk is covered with papers and it is obvious to the technician that these papers are of a confidential nature. Which of the following is the BEST course of action? A. Put the confidential papers in a neat pile at the side of the desk. B. Ask the user to clear the desk of the confidential papers. C. Work around the papers to resolve the problem. D. Refuse to work until the user has cleared the desk.

B

A technician has rebooted a PC, and the machine has paused on a black screen with a white blinking underscore on the top left of the screen. Which of the following is the MOST likely problem? A. PC is running in Safe Mode B. Boot order C. Recovery Console is running D. BIOS update in process

B

A technician wants to setup a network printer on a print server to default to duplex printing for all users. Which of the following will allow default duplex printing? A. Configure the settings from the users printer properties. B. Configure settings through the printers web interface. C. Configure the printer from the users page setup menu. D. Configure the settings through the computers control panel.

B

A technicians company prints forms on multi-layer carbonless copy paper. When asked to replace the printer, which of the following printing technologies will allow the technician to continue to use the companys copy paper? A. Transfer B. Dot Matrix C. Thermal D. Laser

B

A user downloads and installs software which sends a list of their recently visited websites to a server on the Internet without their knowledge. Which of the following BEST describes this situation? A. Spam B. Spyware C. Trojan D. Virus

B

A user has a docking station at work, but now wants to take their laptop home. Which of the following features would a technician use to allow this? A. Remote Access B. Hardware Profiles C. Advanced Power Management D. Device Manager

B

A user has reported that their computer is not working. The user cannot properly explain the computers problem. Which of the following steps should the technician take NEXT in order to resolve the situation? A. Perform a System Restore on the machine. B. Ask simple questions to further identify the issue. C. Escalate the issue to a manager for further resolution. D. Ask the user to turn the computer off and on again to see if the problem can be recreated.

B

A user is unable to login to their laptop when away from the office. Which of the following is the MOST likely reason? A. Login attempts within the office extend the login account password expiration period. B. The users domain login credentials need to be cached. C. Microsoft Windows cannot authenticate the users login when not connected to the network. D. The users account was created on the network after the initial user logged in.

B

A user needs to print to a printer. They have a laptop with Windows 7. The printer has a USB and an Ethernet connector. Which of the following is the EASIEST way to connect the laptop to the printer? A. Use the Ethernet connector. B. Use the USB connector. C. Use the network connection. D. Use the parallel port.

B

A user running Windows reports that their computer has not been printing any subsequent documents since a printer jam occurred earlier that day. The printer is now working normally for other users. Before rebooting the computer, which of the following is the FIRST step the technician should take? A. Remove and re-add the printer. B. Restart the print spooler service. C. Reset the maintenance page count on the printer. D. Attempt to print a test page.

B

All Windows systems reserve the drive letters A: and B: for... A. SCSI drives B. Floppy drives C. Optical drives D. NIC

B

An end user reports that their laptop cannot access the wireless network. The user had access to the network yesterday, before taking the laptop out of the office. Which of the following is the MOST likely reason for the connection problem? A. The wireless network is down. B. The user turned the wireless switch off. C. The battery needs to be charged. D. The wireless antenna has become disconnected.

B

An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice? A. Data mining B. Social engineering C. Intrusion detection D. Hacking

B

Hyperthreading technology: A. only works on computer systems with multiple core CPUs. B. enables a processor to work with two independent computer instructions at once. C. enables two independent processors to work on the same task, simultaneously. D. allows a computer program to work on multiple tasks simultaneously.

B

Multiple users report that the network color printer is not printing in color, but only in monochrome. The technician knows the print server had maintenance done over the weekend that included driver updates. The NEXT action would be to: A. flash the firmware on the printer to match the new driver B. check the printer properties on the server C. power cycle the printer to update the driver D. have each user remove and re-install the printer to update the driver

B

PC2700 memory runs at which of the following clock speeds? A. 270MHz B. 333MHz C. 400MHz D. 566MHz

B

Software threats to a computer are commonly referred to as: a) device drivers. b) malware. c) biometrics. d) SOHO.

B

The process of a virus or worm copying itself, then propagating to multiple systems is known as: A. repudiation B. replication C. duplication D. redundancy

B

The smallest unit of data that a Windows operating system can access is called a: A. folder B. file C. volume D. partition

B

Traditional hard disk drives use which of the following storage technologies? A. Solid B. Magnetic C. Optical D. Impact

B

Utilizing a WSUS or testing new updates on a non-critical PC is an example of which of the following? A. Virtualization B. Patch management C. A host-based firewall D. Application base lining

B

Which of the following BEST describes a situation that would require STP cable? A. Installation in an area with low EMI B. Installation in an area with high EMI C. Installation in an air handling space D. Installation is an area with high humidity

B

Which of the following bus slots is in a laptop? edit A. AGP B. PCMCIA C. PCI D. AMR

B

Which of the following cable types is characterized by a twist-on BNC type connector? A. Fiber B. Coaxial C. STP D. UTP

B

Which of the following cable types is required for a BNC connector? A. Fiber Optic B. Coaxial C. CAT5 D. CAT3

B

Which of the following commands is BEST to use when testing remote connectivity to a host? A. win/s B. ping C. telnet D. ipconfig

B

Which of the following connectors is used for musical equipment? A. HDMI B. MIDI C. PS/2 D. DVI

B

Which of the following data connectors does SATA use? A. 6-pin B. 7-pin C. 8-pin D. 15-pin

B

Which of the following defines the protocol associated with the following TCP or UDP port numbers, in order? 21, 23, 25, 69, 443 A. FTP, SSH, SMTP, HTTPS, TFTP B. FTP, TELNET, SMTP, TFTP, HTTPS C. TELNET, FTP, SMTP, HTTPS, TFTP D. TELNET, SSH, TFTP, SMTP, HTTPS

B

Which of the following describes a Quad Core processor? A. A CPU with four direct channels to the FSB. B. Four CPU cores operating off one CPU package. C. A PC with four unique processors. D. A CPU with four cache memory locations.

B

Which of the following devices will allow a technician to use a single set of input devices on several computers? A. Smart card reader B. KVM C. SCSI D. Bar code reader

B

Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS? a) /A b) /C c) /H d) /E

B

Which of the following explains a yellow exclamation point next to a device in the Device Manager? A. A driver was installed but was not digitally signed. B. A usable driver could not be installed for this device. C. The device is operable, but not at full capacity. D. The device is built-in and not upgradable.

B

Which of the following explains what the wattage rating of a power supply determines? A. Number of power connectors available B. Number of potential internal drives C. Storage capacity of optical disks D. Speed of the processor chip

B

Which of the following is MOST likely an advantage that a tablet has over a laptop PC?? a) A tablet is easily upgraded. b) A tablet is lightweight. c) A tablet has a larger screen. d) A tablet can natively run most software.

B

Which of the following is a function of the PS/2 port? A. Connection of a gaming controller B. Connection of a keyboard or mouse C. Connection of a biometric device D. Connection of an external optical drive

B

Which of the following is a standard connector for an external SCSI device? A. 40-pin B. 68-pin C. 72-pin D. 144-pin

B

Which of the following is an example of a biometric identifier? A. Employee badge B. Fingerprint C. Birthday D. Pets name

B

Which of the following is an example of an APIPA address? a) 10.20.30.40 b) 169.254.43.40 c) 172.30.22.159 d) 192.168.23.110

B

Which of the following is the BEST way to ensure that a hard drive is secure for disposal? A. FDISK the drive multiple times. B. Magnetically erase the drive. C. Format the drive. D. Convert the drive to NTFS.

B

Which of the following is the MAXIMUM data rate of IEEE 1394? A. 20Mbps B. 200Mbps C. 1000Mbps D. 2000Mbps

B

Which of the following is the MAXIMUM theoretical range of Bluetooth Class 2? A. 1 meter (3 feet) B. 10 meters (33 feet) C. 30 meters (98 feet) D. 100 meters (328 feet)

B

Which of the following is the MOST common way to cool a CPU? A. Water cooling B. Heat sink C. Case fan D. Air conditioning

B

Which of the following is the MOST secure way to destroy sensitive data? A. Use the command line delete on the data. B. Use a program that rewrites over the data several times. C. Move the data into the Recycle Bin and then empty it. D. Move the data onto a portable drive and then destroy the drive.

B

Which of the following is the clock speed of a CPU? A. The bus speed is the speed of the CPU before incorporating the internal clock multiplier. B. The clock speed is the internal speed of the CPU. C. The clock speed is the external speed of the CPU, which matches the bus speed of the computer. D. The clock speed of the CPU matches the speed of the RAM.

B

Which of the following must be performed when installing a touch screen? A. Disable the keyboard B. Calibration C. Boot the computer in safe mode D. Disable the mouse

B

Which of the following network types would be MOST likely used on a high school campus? a) MAN b) LAN c) PAN d) WAN

B

Which of the following ports does the Simple Mail Transfer Protocol use? A. 21 B. 25 C. 80 D. 443

B

Which of the following ports is MOST likely used for high-end graphics cards? A. PCI B. PCIe C. ISA D. AGP

B

Which of the following properties of a heat sink has the GREATEST affect on heat dispersion? A. Proximity to the power supply B. Surface area C. Connection mechanism D. Shape

B

Which of the following protocols uses port 21? A. Telnet B. FTP C. HTTP D. POP3

B

Which of the following protocols uses port 443, by default? A. TELNET B. HTTPS C. FTP D. POP

B

Which of the following provides data redundancy by writing data to two disks simultaneously? A. RAID 5 B. RAID 1 C. JBOD D. RAID 0

B

Which of the following provides high speed or broadband networking at speeds over 384kbps using phone lines? A. Bluetooth B. DSL C. VPN D. Dial-up modem

B

Which of the following provides the LOWEST level of wireless security protection? A. Use WPA B. Disable SSID broadcast C. Use RADIUS D. Enable WEP on the access point

B

Which of the following should the technician verify FIRST if the customer reports that a laptop battery is not charging? A. Remove all unneeded peripherals B. Check the power light on the AC adapter C. Swap the laptop battery for a new or refurbished battery D. Check the backlight for functionality

B

Which of the following speeds is the maximum transmission rate of the USB 2.0 interface? A. 400Mbps B. 480Mbps C. 800Mbps D. 1280Mbps

B

Which of the following storage types has no movable parts? A. DVD-RW B. Flash C. Tape D. IDE hard drive

B

Which of the following technologies has the HIGHEST potential throughput? A. DSL B. Fiber C. Satellite D. Cable

B

Which of the following user accounts has the LEAST access privileges? a) Standard b) Guest c) Administrator d) Power

B

Which of the following uses pair authentication to provide a wireless connection between two devices? A. 802.11n B. Bluetooth C. Infrared D. Cellular

B

Which of the following utilities can be scheduled to run on boot to verify file system integrity? A. DEFRAG B. CHKDSK C. MSCONFIG D. TSKMGR

B

Which of the following utilities is used for troubleshooting video issues? A. REGEDIT B. DXDIAG C. DCDIAG D. MSCONFIG

B

Which of the following video connectors can display the HIGHEST resolution? a) Composite b) HDMI c) VGA d) S-video

B

Which of the following will help dissipate heat through the heat sink when upgrading a CPU? A. Case fan B. Thermal compound C. Motherboard riser D. Power supply

B

Which of the following wireless encryption technologies is the WEAKEST? a) WPA2 b) WEP c) WPA d) TKIP

B

Which of the following wireless technology standards can operate at a MAXIMUM of 11Mbps? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

B

Which of the following would BEST optimize a computer that is heavily used? A. Scandisk B. Defrag C. Indexing D. Chkdsk

B

Which of the following would a technician enable on a router to allow specific devices to connect to the Internet? A. DHCP B. MAC filtering C. DNS D. SSID

B

While attempting to resolve an issue, a customer talks to the technician about a recent activity that has no relevance on the repair. Which of the following is the MOST appropriate response? a) Ask the customer for a timetable about recent activities. b) Let the costumer complete their statement and then continue resolving the issue. c) Document the customer’s statement and continue resolving the issue. d) State that the activity is not relevant to the repair and continue resolving the issue.

B

While checking the print queue, a technician determines that a print job at the top of the queue requires a paper size not loaded in the printer. Which of the following is the BEST option to get the other print jobs to print until the issue can be resolved? A. Force the job to print on the paper that is loaded in the printer. B. Lower the priority of the jammed print job. C. Delete all print jobs and have all the users resubmit the print jobs. D. Increase the priority of all other jobs in the print queue.

B

Which of the following is MOST likely used at a large company? (Select TWO). a) Windows 7 Home Premium b) Windows 7 Professional c) Windows XP Professional d) Windows 7 Starter e) Windows Vista Home Premium

B & C

Which of these PC input types would you most commonly use with a microphone? Pick two. A HDMI B USB C Analog audio jack D MIDI

B & C Microphones commonly plug into existing audio input jacks or through a digital connection on a USB port.

Which of the following are possible reasons that a laptop's keyboard might fail completely? (Select the two best answers.) A. A stuck key. B. A disconnected ribbon cable. C. The user spilled coffee on the laptop. D. The keyboard was disabled in the Device Manager.

B & C. A laptop's keyboard could fail due to a disconnected or loose keyboard ribbon cable. It could also fail if a use spilled coffee on the laptop, or through general abuse, or by being dropped on the ground, and so on. One stuck key will not cause the entire keyboard to fail, and on most laptops, the keyboard cannot be disabled in the Device Manager.

What kind of network connection can you make with a crossover cable? (Select two.) A. PC NIC to a hub B. Hub to modem C. PC NIC to PC NIC D. Hub to hub (without uplink port)

B & C. Normal patch cables won't work when connecting two PCs directly by their NICs. You can also use a crossover cable to connect two hubs that aren't using an uplink port.

Which of the following are possible faulty components when there is nothing on the display? (Select all that apply.) A. Sound card B. Video card C. Processor D. Network card

B & C. The big four (as I like to call them) are the video card, RAM, processor, and motherboard. If your computer is definitely getting power and there is still nothing on the display, you want to check these, most likely in order.

Which of these wireless standards can use the 5 GHz frequency range? Pick two. A 802.11b B 802.11n C 802.11a D 802.11g

B & C.The 802.11a was one of the original wireless standards, and it used the 5 GHz range exclusively. The 802.11n standard can use either 2.4 GHz and/or 5 GHz in normal operation.

A user on your network complains that his mouse is acting erratically. The pointer moves in the direction the user points, but it jumps and skips. What is the most probable cause? (Select two.) A. Button overcharge B. The connection is loose or the mouse is dirty. C. Static electricity D. The wrong mouse drivers are installed

B & D. The connection is loose or the mouse is dirty. Dirty mice are notorious for the jumping effect caused by dirt and dust wrapped around their rollers.

If a user wants to write information more than one time to a DVD, which type should you recomment? (Select all that apply.) A. DVD-R B. DVD-RW C. DVD+RW D. DVD+R

B and C. DVD-RW and DVD+RW are the rewritable versions of DVDs. DVD-R and DVD+R are write-once formats.

Which connectors are used to connect a DSL modem to a network card and to a phone line? (Choose two.) A. RJ-8 B. RJ-11 C. RJ-45 D. RJ-60

B&C

Which of these laptop expansion card types is available in a 34 mm card width? A) CardBus B) ExpressCard C) PC Card D) PCIe E) The one that always doesn’t seem to fit in my laptop

B) ExpressCard The ExpressCard adapter standard provides for both 34 millimeter and 54 millimeter card widths.

How does the following prefix increment operator work: x++ A) increments value stored at the x memory address, then evaluates the value of x B) evaluates the value stored at the x memory address, then increments x

B) evaluates the value stored at the x memory address, then increments x

Which of the following drive connections uses a ribbon cable with a 40-pin connector? (Select TWO). A. SATA B. IDE C. PATA D. FDD E. SCSI

B, C

In the Windows XP boot process, what are the three required files: A. winstart.ini B. boot.ini C. ntldr D. boot.exe E. ntdetect.com F. rxestart

B, C and E. They are referred to as the system files. If you are using a SCSI hard drive, there's a fourth file called ntbootdd.sys.

Which of the following components are included in a typical laser printer maintenance kit? (Select THREE). A. Image drum B. Paper pickup rollers C. Fuser D. Duplexer E. Toner F. Transfer roller

B, C, F

Which of the following partitioning schemes enables the creation of more than four partitions or volumes on a single hard drive? (Select two.) A. MBR B. GPT C. Dynamic disk D. MFT

B, C. Both GPT and dynamic disk partitioning schemes enable the creation of more than four partitions or volumes on a single hard drive.

When using the Performance console, which settings are defined to track resource usage? (Select two.) A. Processes B. Objects C. Counters D. Values

B, C. To track resource usage in the Performance console, you need to configure objects and counters.

A user reports a loud noise from their desktop PC. Which of the following would be suspected as a source? (Select TWO). A. USB thumb drive B. Cooling fan C. CMOS battery D. Power supply E. Motherboard

B, D

Which of the following should be replaced when performing laser printer preventative maintenance? (Select THREE). A. Paper trays B. Transfer bar C. Paper D. Pickup rollers E. Fuser F. Toner

B, D, E

Which of these items are considered to be dot-matrix consumables? (Select two.) A. Drive motor B. Paper C. Flywheel D. Ribbon

B, D. Both paper and ribbons are considered dot-matrix printer consumables.

Which of the following options are available when you right-click on a process in the Task Manager's Processes tab? (Select two.) A. Start Service B. Go to Service(s) C. Go To Process D. Set Priority

B, D. From the Processes tab, you can select a process and go to the service or set the priority.

Which of the following are locations where a computer virus could exist and then further infect a computer? (Select TWO). A. Optical scanner B. Boot sector of the hard drive C. Optical media D. Ethernet switch E. USB mouse

B,C

Which of the following are the BEST means of ensuring that data is not lost? (Select TWO). A. Ensure all preventative maintenance tasks are being performed B. Deploy a RAID system C. Schedule regular system backups D. Ensure that all servers are in secured areas E. Deploy all OS and security updates

B,C

What is the maximum distance you would expect to get from a Bluetooth Class 2 device? A 27 meters B 10 meters C 20 meters D 44 meters

B. A Bluetooth version 2.0 + EDR can reliably communicate 10 meters for Class 2 devices.

How does CPU cache memory increase the overall performance of your computer? A Moves twice as much data in a single cycle as a CPU without a cache B Provides faster access to information in memory C Increases the number of CPU cores D Increases the overall clock rate of the CPU

B. A CPU cache is very fast memory that stores the data from frequently used memory locations. Because this information is in the fast cache, access to the data is much faster than requesting the data from slower memory locations.

In which of these situations would a KVM be used? A You need to increase the throughput of your hard drive B You have many computers but only one display C You need to down-convert HD video to standard definition D You would like to improve the efficiency of your FSB

B. A Keyboard-Video-Mouse switch allows you to use a single set of input and output across many different computers. These systems can be small enough to use in a home office and other KVMs can scale large enough to cover hundreds of servers in a data center.

What is the physical component where data is stored in a HDD? A. Read/write head B. Platter C. Sector D. Cluster

B. A conventional HDD contains discs called platters, on which data is stored magnetically through read/write heads by way of a magnetic coating.

What is the difference between incremental and differential backups? A. A differential backup turns off the archive bit, while an incremental backup leaves it alone. B. A differential backup leaves the archive bit alone, while an incremental backup turns it off. C. A differential backup backs up everything on the system, while an incremental backup only backs up things that have changes. D. Differential backup is just another name for an incremental backup - they're the same thing.

B. A differential backup is the same as an incremental backup, but it leaves the archive bit alone instead of turning it off.

Powerful hypervisors like ESX are often booted from ____________. A. Floppy diskettes B. USB thumb drives C. Firmware D. Windows

B. A good hypervisor can be tiny, loading from something as small as a USB thumb drive.

Which of the following is any machine or interface that participates in a TCP/IP network? A. Workstation B. Host C. Client D. Server

B. A host is any machine or interface that participates in a TCP/IP network, whether as a client or a server. Every interface on a TCP/IP network that must be issued an IP address is considered a host.

Which of these network types would you commonly use to connect one office location to another across town? A LAN B MAN C PAN D WAN

B. A metropolitan area network (MAN) generally connects devices in the same geographic area. In many cases, there are more options for connectivity in a metropolitan area than something that might extend out longer distances.

Which of these options should NOT be used to clean a motherboard? A Use a brush to dislodge dust B Use your finger to dislodge dust from smaller components C Remove large dust collections with a vacuum D Use air to blow out smaller layers of dust

B. A motherboard contains many small components, and many of the components are only mounted onto the surface of the board. A slight bit of pressure can easily dislodge the components, and physically touching the components could potentially discharge static electricity and permanently damage the silicon.

Your customer has just upgraded the operating system on their laptop, and they’re now complaining that information on the screen is blurry in the new OS. Which of these is the most likely cause of this issue? A The new operating system is not designed for laptop displays B The native resolution is set incorrectly C The Windows Device Manager has disabled the LCD display D The laptop backlight is faulty

B. A new operating system is also probably using new video drivers, and it’s very easy for an updated video driver to use a resolution that’s not native to the LCD display. A simple resolution change should solve this common issue.

Which of these network types is commonly seen on Metro Area Networks and provides fault-tolerance as part of its topology? A Star B Ring C Bus D Peer-to-peer

B. A ring network connects devices in series, creating a physical structure that is similar to a ring. If a connection between the devices is severed, many ring topologies can recognize the break and minimize downtime by looping the data back the other direction.

What is the part of a virus that uniquely identifies it? A. Fingerprint B. Signature C. Swirl D. Yarn

B. A signature is an algorithm or other element of a virus that uniquely identifies it.

Which of these network types would be most commonly associated with modern Ethernet networks? A Bus B Star C Ring D Hybrid

B. A star network design is commonly seen on modern Ethernet networks. On these networks, all devices connect directly to a central network switch, creating the star design.

What motor is used by an impact printer to move the print head back and forth? A. Klemson B. Stepper C. Wangle D. Ladder

B. A stepper motor is a motor that can move in very small increments. Printers use stepper motors to move the print head back and forth as well as to advance the paper.

What is the most common reason for moving the DVD drive to the top of the boot order? A. To listen to music on the DVD B. To install an operating system C. To copy data off the DVD D. To boot to an operating system on the DVD

B. Although it is possible to boot to an operating system on a DVD, that is not the most common reason for moving the DVD to the top of the list. You might set the DVD drive first to boot from a Windows 7 Setup disk on a system that already contains an operating system.

You have been given the task of installing a new hard drive on a server for a customer. The customer will be supervising your work. What should you ask your customer first? A. What is the administrator password? B. Are there any current backups? C. Do you want me to shut down the server? D. Which version of Windows Server is this?

B. Always check whether there are backups and physically inspect and verify the backup before changing out any drives.

What is the difference between a virtual machine (VM) and an emulator? A. A VM converts commands to and from a host machine to an entirely different platform, whereas an emulator creates an environment based on the host machine and does no converting. B. An emulator converts commands to and from a host machine to an entirely different platform, whereas a VM creates an environment based on the host machine and does no converting. C. An emulator requires a host OS, wheras a VM runs on bare-metal servers without an OS. D. A VM requires a host OS whereas an emulator runs on bare-metal servers without an OS.

B. An emulator converts from one platform to another, whereas a virtual machine mirrors the host machine.

When you insert a CD, the AutoPlay feature of Windows looks for which file? A. autoplay.inf B. autorun.inf C. autoplay.ini D. autorun.exe

B. By default, Windows looks for AUTORUN.INF when you insert a CD.

You are troubleshooting a CPU and have already cut power, disconnnected the power cable, opened the case, and put on your antistatic strap. What should you do next? A. Check the BIOS. B. Check connections. C. Remove the CPU D. Test the motherboard with a multimeter.

B. Check connections first; it is quick, easy, and a common culprit.

Why is WPA encryption preferred over WEP? A WEP encryption limits total wireless network throughput B WPA is cryptographically more secure than WEP C WPA is more compatible with modern web servers D WEP is only supported with certain operating systemS

B. Cryptographic vulnerabilities in WEP allow knowledgeable hackers to obtain the encryption key of a WEP network in just a few minutes. Due to these vulnerabilities, WPA was created to replace the older WEP wireless encryption standard.

What advantages does dial-up have over DSL? A. Dial-up is faster than DSL. B. You can be farther than 18,000 feet from a main phone service switching center. C. You can get a second phone line to use just for dial-up. D. None. Dial-up has no advantages over DSL.

B. DSL has a fairly short limit of 18,000 feet from a main switch, leaving people in rural areas (in the United States, at least) out of luck. Dial-up just requires a phone line.

What is the capacity of data that DVDs normally hold? A. 650 MB B. 1.6 GB C. 61 GB D. 160 GB

B. DVDs normally hold 1.6 GB of data. In a double-sided, double-layered configuration, this can stretch to as much as 4.7 GB.

What is the top speed for data transfers using IrDA technology? A. 2 Mbps B. 4 Mbps C. 11 Mbps D. 54 Mbps

B. Data transfers using the IrDA protocol top out at 4 Mbps.

Of the following four Internet connection options, which typically offers the slowest connection speed? A. Cable B. Dial-up C. DSL D. Satellite

B. Dial-up connections are robust and widely available, but much slower than the other connection types.

What type of memory is commonly called “flash memory?†A. SRAM B. EEPROM C. SDRAM D. DRAM

B. Electrically Erasable Programmable Read Only Memory is used as the storage media on motherboards and USB flash drives.

Which of the following has the fastest data transfer rate? A. CardBus B. ExpressCard PCIe C. PC Card D. ExpressCard USB

B. ExpressCard in PCI Express mode (PCIe) has the highest data transfer rate at 250 MB/s. The next fastest would be the CardBus, followed by ExpressCard in USB mode, with PC Card bringing up the rear.

You need to increase the storage in a new laptop with an external hard drive, but your applications require high-speed access to storage. Which of these external hard drive interfaces provide the fastest throughput? A FireWire 400 B eSATA C USB D SCSI

B. External SATA drive connections provide the same fast throughput as SATA, with SATA revision 3.0 speeds at 600 megabytes per second.

What can a government use to determine your location at a specific time as long as you're using your mobile device? A. Angry Birds B. Geotracking C. Google Earth D. Gyroscope

B. Geotracking can locate you and your GPS-equipped mobile device.

You’re installing a new server with a RAID array, and you need to decide how to best implement your RAID solution. What is an advantage of using hardware-based RAID over a software-based solution? A Hardware-based RAID is less expensive B Hardware-based RAID has better performance C Hardware-based RAID is optimized for the operating system D Hardware-based RAID has better integration with the operating system

B. Hardware-based RAID provides its own hardware for processing and takes much of the processing away from the operating system. Although it’s faster, hardware-based RAID requires the additional cost of specialized drive controllers. Hardware-based RAID is also invisible to the operating system, so there’s no optimization or integration with the OS running on the hard drives.

To move files between drive letters, what key should be held down while dragging? A. CTRL B. SHIFT C. ALT D. DEL

B. Holding the SHIFT key while dragging a file moves it.

What type of formatting is done by manufacturers of IDE drives and must be done before a drive can be partitioned? A. High-level B. Low-level C. Quick D. Cursory

B. IDE hard drives are low-level formatted by the manufacturer. Low-level formatting must be performed even before a drive can be partitioned.

Cletus receives a computer that has a Trojan horse virus. Which of the following should you do first? A. Establish how the virus was acquired. B. Identify the malware. C. Rollback to the System Restore Point D. Run the System Recovery utility.

B. Identify the type of malware that poor Cletus acquired. We know it's a Trojan, but exactly what kind of Trojan did he get?

If Automatic Private IP Addressing is being used with IPv4, what range will a host’s IP address fill within? A. 192.168.x.x B. 169.254.x.x C. 255.255.x.x D. 127.0.x.x

B. If a DHCP server cannot be found, the clients automatically assign themselves an IPv4 address, somewhat randomly, in the 169.254.x.x range with a subnet mask of 255.255.0.0.

The Ethernet port on your motherboard has stopped working, so you moved an Ethernet PCI adapter card from another computer to your desktop PC. However, when you start your Windows operating system the PnP adapter card isn't seen by the operating system. Which of these is the most likely cause of this issue? A The Windows OS doesn't include drivers for your adapter card B The adapter card isn't fully seated in the PCI slot C The PCI card isn't compatible with your computer D The Ethernet adapter must be connected to the network to be automatically identified by Windows

B. If an adapter card isn't seen by the operating system, it probably isn't seen by the motherboard either. The Windows OS will always identify a new PnP (Plug and Play) adapter card, even if Windows doesn't currently have the proper driver.

You discover that a new SDXC card won't work in the card reader of a user's PC. It works fine in another computer's card reader, and standard SD cards work fine in the user's PC. What should you do to fix the problem? A. Format the card. B. Install the latest firmware and drivers. C. Purchase a new external USB card reader. D. Use a CF card instead.

B. If older SD cards work, but new ones don't, install the latest firmware and/or drivers for the card reader. Do this before trying other technologies or making purchases. No reason to try formatting the card if it works fine on another computer.

A laptop you are troubleshooting will not display any video through the laptop's screen or through external monitors. What should you replace? A. Inverter B. Video card C. LCD D. Drivers

B. If the laptop can't display on the LCD or on an external monitor, that tells you that the video card is most likely faulty. The laptop would need to be opened to replace this. In some cases, it is integrated inot the motherboard, requiring an entire motherboard replacement. If the inverter fails you would see a dim display, but the external monitor should work fine. If the LCD fails, you would not see anything on the display (which can be aided by using a flashlight) and the external monitor would work fine. If the LCD fails, you would not see anything on the display, but the external monitor again would funcition fine. Incorrect drivers can give a variety of problems such as unattainable maximum resolutions, or a garbled screen. However, the display should show something in that case, and should work fine in Safe Mode, where new drivers could be installed.

What is a common symptom of a bad network cable? A. Rapidly blinking link lights B. No link lights C. Solid on link lights D. Steady blinking lights

B. If there are no link lights, you probably have a bad network cable.

A customer reports to you that he can no longer open any .tiff files. What is the most likely cause? A. The .tiff files are corrupted B. File associations have been removed C. There is no photo-editing program available D. File extension is not a commonly used type

B. If users were able to open .tiff files, but can no longer do so, then the most likely cause is that the file associations for .tiff (and possibly .tif) have been removed. Programs such as Photoshop, Fireworks and SnagIt can save and open files with the .tiff and/or .tif extension. When a program such as Photoshop is installed, a file association between that program and .tiff files is automatically created. This can be removed on purpose in the OS, by associating the file type with another program, or inadvertently by installing another program. When the person boes to open the file, a message should display, asking to open the file automatically, or select a program to use to open it. Chances are that multiple .tiff files will not have been corrupted at the same time. If it were one file, that would be a differend story, but that the user cannot open any .tiff files should be an indicator of an application issue. If the person were able to open files previously, then there should still be a photo-editing program such as Photoshop loaded on the computer. .tiff and .tif are common lossless file formats for storing images.

There is a problem with the power supplied to a group of computers, and you do not know how to fix the problem. What should you do first? A. Establish a theory of why you can't figure out the problem. B. Contact the building supervisor or your manager. C. Test the theory to determine cause. D. Document findings, actions and outcomes.

B. If you can't figure out a cause to a problem and have exhausted all possible theories, escalate the problem to the appropriate persons.

If you do not complete the activation process for Windows, what will happen to your computer? A. Nothing. Activation is optional. B. The computer will work fine for 30 days and then Windows will be disabled. C. Microsoft will not know how to contact you to provide upgrade information. D. You will have to use a floppy disk set to boot to Windows

B. If you do not complete the activation process for Windows XP, Vista or 7, the computer will work fine for 30 days and then Windows will be disabled.

If you do not complete the activation process for Windows, what will happen to your computer? A. Nothing. Activation is optional. B. The computer will work fine for 30 days then Windows will be disabled. C. Microsoft will not know how to contact you to provide upgrade information. D. You will have to use a floppy disk set to boot to Windows.

B. If you do not complete the activation process for Windows XP, Vista, or 7, the computer will work fine for 30 days and then Windows will be disabled.

What is the primary benefit of adding more RAM to a laptop that uses shared memory? (Select the best answer.) A. Improved battery life. B. Improved system performance. C. Improved video performance D. None. Adding more RAM is pointless with systems that use shared memory.

B. Imroved overall system performance is the primary benefit to adding more RAM to a laptop that uses shared memory.

Which feature in Windows XP enables you to change to another user account without logging out of the current user account? A. Change Accounts B. Fast User Switching C. User Account Control D. Users and Groups

B. In Windows XP, Fast User Switching enables you to change to another user account without logging out of the current user account.

What should be the first solution attempted after a BSOD? A. Reinstall the operating system B. Reboot C. Restart in Safe Mode. D. Run a System Restore.

B. In the majority of cases, a reboot solves a blue screen of death.

A _________________ once activated stays in contact with a Monitoring center, allowing you to send the commands to lock the device and delete data via the center if the device is stolen. A. TPM chip B. Lo-jack C. Wipe master D. Remote cleaner

B. Lo-jack is a product made by Absolute Software that allows you to remotely locate and lock the device, and delete the data on a mobile device when it is stolen.

Which of the following tools allows a person with administrator priviledges to add local users to a Windows system? A. The Local Users and Groups Control Panel applet B. The Local Users and Groups Snap-in under Computer Management C. The Local Users and Groups tab in the properties for My Network Places D. The Local Users and Groups tab in the properties for My Computer

B. Local Users and Groups Snap-in under Computer Management

Many of the newer SOHO router solutions, and some of the personal firewall solutions on end-user workstations, close down which port(s) by default? A. SNMP B. ICMP C. UDP D. DNS

B. Many of the newer SOHO router solutions (and some of the personal firewall solutions on end-user workstations) close down the ICMP ports by default.

What does Microsoft call the 32- or 64-bit installation environment in Windows 7? A. WinEE B. WinPE C. WinRE D. Recovery Console

B. Microsoft calls the 32- or 64-bit installation environment in Windows 7 the Windows Preinstallation Environment or WinPE.

Which of the following cannot be monitored in the BIOS? A. Fan speeds B. Network card traffic rate C. Intrusion detection notifications D. Temprature

B. NIC traffic rates cannot be monitored in the BIOS.

Which of the following is considered the IPv4 loopback address? A. 0.0.0.1 B. 127.0.0.1 C. 192.168.0.1 D. 255.255.255.255

B. On all TCP/IP IPv4 implementations, 127.0.0.1 is the loopback address.

On an ATX, there is a single power connector consisting of a block of how many holes (in two rows)? A. 12 B. 20 C. 24 D. 36

B. On an ATX, there is a single power connector consisting of a block of 20 holes (in two rows).

On your impact printer, the characters are not coming out clean. Which of the following should you attempt? A. Lubricate the print head B. clean the print head with denatured alcohol C. Replace the ink tank D. Clean the drum with a moist cloth

B. On an impact printer, the print head should never be lubricated, but you can clean off debris with a cotton swab and denatured alcohol. A ribbon is used instead of an ink tank, and there is no drum.

Which of these display technologies does not have a backlight and only uses power when displaying colors other than black? A LCD B. OLED C Plasma D CRT

B. Organic Light Emitting Diode technology that only uses power when lighting individual pixels. Since the individual pixel glows, a backlight isn’t required and the color black does not require any power.

What port does POP3 use? A. 22 B. 110 C. 42 D. 256

B. POP3 uses port 110.

On an LCD monitor, what is the technology that uses a matrix of wires under colored glass? A. Active matrix B. Passive matrix C. Active TFT D. Passive TFT

B. Passive matrix technology uses a matrix of wires under colored glass.

The act of using the Internet via e-mail and fake Web pages to pose as someone else in order to get usernames and passwords is called: A. DoS B. Phishing C. Spoofing D. Spamming

B. Phishing

To install a floppy drive as the A: drive, what must you do? A. Attach the mini connector. B. Plug it into the end connector of the ribbon cable. C. Plug it into the middle connector on the ribbon cable. D. Attach the Molex connector.

B. Plug the floppy drive into the end of the ribbon cable to make it the A: drive.

Which type of virus changes form in order to avoid detection? A. Phage B. Polymorphic C. Phlegmatic D. Time Bomb

B. Polymorphic viruses change form in order to avoid detection.

On a dot-matrix printer, what physically strikes the ribbon to form an image? A. Electromagnets B. Printwires C. Character wheel D. Print hammers

B. Printwires physically strike the ribbon in dot-matrix printers.

You'd like to build a server that provides redundancy in the case of a drive outage, but you also want to maximize the amount of available space on the disk array. Which of these RAID types would fit this requirement? A RAID 0 B RAID 5 C RAID 1+0 D RAID 1

B. RAID 5 stripes data across multiple drives, using a separate drive for parity information. This allows for complete redundancy without the need to duplicate the data.

Which of the following commands will repair a damaged master boot record in a Windows 7 PC? A. bootrec/fixboot B. bootrec/fixmbr C. fixboot D. fixmbr

B. Run bootrec /fixmbr in the Windows RE to repair a damaged master boot record in a Windows 7 PC.

What command should you run to check and fix corrupt system files, DLLs, and other critical files? A. cmdcons /fixboot B. sfc /scannow C. chkdsk /r D. deflrag -a

B. Run the sfc /scannow command to check and fix corrupt system files, DLLs, and other critical files.

SATA (Serial ATA) drives typically include which utility for erasing the hard drive’s contents? A. Wiper B. Hdderase C. Clearall D. Format

B. SATA (Serial ATA) drives typically include the Hdderase utility for erasing hard drives.

Which of these throughputs would you most likely associate with SATA revision 2.0? A 1.5 gigabits per second B 3.0 gigabits per second C 100 megabits per second D. 6.0 gigabits per second

B. SATA revision 2.0 supports speeds up to 3.0 gigabits per second

What is the maximum number of devices that you can connect to a wide SCSI bus? A Sixty-three B Sixteen C Two D. Eight

B. SCSI comes in many different flavors, but you’ll generally find a narrow bus that supports 8 connected devices and a wide bus that supports 16.

Which of the following types of hardware is least likely to be used as a security device? A. Biometric thumbprint reader B. SD flash card C. Smart card D. Key fob

B. SD flash RAM is not a common type of device used for security.

What is the main difference between SD and SDIO? A. SD cards are faster. B. SDIO cards incorporate input/output funcitonality. C. SD cards incorporate input/output funcitonality. D. SDIO cards can identify a user's cell phone.

B. SDIO cards integrate I/O functionality into a standard SD card. They are basically the same speed as SD cards. Answer D is referring to SIM cards, not SDIO cards.

What type of memory is most commonly associated with a CPU cache? A. Synchronous DRAM B. Static RAM C. Double Data Rate 3 (DDR3) SDRAM D. Read Only Memory

B. Static RAM (SRAM) is very fast memory that does not need to be periodically refreshed to maintain its data. The speed of Static RAM makes it a good choice for high-speed CPU caching.

Which term describes the stereo speakers in a 2.1 sound system? A. Woofers B. Satellites C. Subwoofers D. Twins

B. Stereo speakers are called satellites.

Which port type offers the fastest transfer speed? A. IEEE 1394a B. SuperSpeed USB C. Full-Speed USB D. Hi-Speed USB

B. SuperSpeed USB easily spanks the competition here.

Which switch is used with the COPY command to tell it that you are working with an ASCII text file? A. /Z B. /A C. /V D. /Y

B. The /A switch tells COPY that you are working with an ASCII text file.

Which switch is used with IPCONFIG to show all the information related to the network card(s) and not just the summary information? A. /VIEW B. /ALL C. /SHOW D. /TRACE

B. The /ALL switch with IPCONFIG shows all the information related to the network card(s) and not just the summary information.

Which switch is used with DEFRAG to force defragmentation even when disk space is low? A. /A B. /F C. /V D. /Z

B. The /F switch is used with DEFRAG to force defragmentation even when disk space is low.

Which SFC option replaces files without prompting? A. /Y B. /QUIET C. /ENABLE D. /GO

B. The /QUIET option tells SFC to replace files without prompting.

What is the maximum theoretical throughput of 802.11n? A 54 megabits per second B 600 megabits per second C 11 megabits per second D 300 megabits per second

B. The 802.11n standard can support 5 GHz and/or 2.4 GHz at a maximum theoretical throughput of 600 megabits per second using four separate 150 megabit per second streams.

Which of these wireless encryption types would provide integration with RADIUS servers? A WPA2-Personal B WPA2-Enterprise C RC4 D WEP

B. The 802.1x protocol allows enterprise users to integrate an existing authentication method (Active Directory/LDAP, etc.) wireless access. Instead of sharing access passwords and remembering multiple usernames and passwords, users can instead use their normal login information to gain access to all network resources, including the wireless network.

The ASCII standard defines how many 8-bit characters? A. 64 B. 256 C. 512 D.64,000

B. The ASCII standardhas 256 characters because that's all 8 bits can handle!

When deciding on a CPU for use with a specific motherboard, what does in need to be compatible with? A. Case B. Socket C. Wattage range D. PCI slotes

B. The CPU needs to be compatible with the socket of the motherboard. The case doesn't actually make much of a difference when it comes to the CPU. (Just make sure it's large enough!) There is no wattage range of the CPU, and PCI slots don't actually play into this at all because there is no direct connectivity between the two.

Which of the following services leases IP addresses to hosts? A. DNS B. DHCP C. NFS D. Telnet

B. The DHCP service leases IP addresses to hosts and automatically configures them to use the TCP/IP network.

Which of these protocols would be commonly be used to automate the assignment of IP addresses? A AutoIP B DHCP C BOOTIP D POP3

B. The Dynamic Host Configuration Protocol is the common method for automatically assigning IP addresses. When you first connect to the network, your DHCP-enabled computer will automatically find a DHCP server and obtain an IP address.

In Windows XP, how do you tell Windows Update to automatically download and install only high-priority security updates? A. You can't customize Windows Update. B. Click the Express button on the Windows Update page. C.Check the High-priority updates only checkbox. D. Run the Microsoft Security Updater.

B. The Express button on the Windows Update page will only install important updates.

In Windows Vista, which System Recovery Options menu choice is used to fix problems with startup, such as missing operating system files? A. System Restore B. Startup Repair C. Windows Complete PC Restore D. Windows Diagnostic Tool

B. The Startup Repair choice is used to fix problems with startup, such as missing operating system files.

Which feature in Windows 7 enables you to right-click a file or folder and restore previous versions of that file or folder? A. Reversion B. System Protection C. System Revert D. Undelete

B. The System Protection feature in Windows 7 enables you to right-click a file or folder and restore previous versions of that file or folder.

Which are the only wires that are different between T568A and T568B? A 5, 6, 7, and 8 B 1, 2, 3, and 6 C 1, 2, 3, and 4 D 2, 4, 6, and 8

B. The T568A and T568B standards have very simliar wiring maps, except pins 1 and 3 are swapped and pins 2 and 6 are swapped.

You need to automatically check for performance issues in Windows 7. Which tool is the best option? A. Device Manager in the Control Panel B. Troubleshooting item in the Control Panel C. Task Manager D. Upgrade Advisor

B. The Troubleshooting item in the Control Panel of Windows 7 can automatically check for performance issues. You can check for issues with hardware, networking, applications, and security. You must set the Control Panel to either small or large icons because the Troubleshooting item is not shown in Category view. The Device Manager is where you go to reconfigure devices, change device settings, and install/update drivers. The Task Manager gives some information about the performance of the computer, but there is no automatic check for performance issues. The Upgrade advisor (for Windows 7) is a downloadable tool that can tell you whether an older OS can be upgraded to Windows 7.

Which of the following is not a type of wireless encryption that can be used on a SOHO wireless network? A. WPA2 B. TFTP C. WEP D. WPA

B. The available types of wireless encryption available include WEP, WPA, and WPA2. TFTP is an unsecure form of FTP.

Which command can be used in Windows XP to start the Recovery Console on the CD? A. cmdcons /winnt32 B. winnt32 /cmdcons C. cmdcons /recovery D. winnt32 /recover

B. The command to start the Recovery Console is winnt32 /cmdcons.

Which command would you use to delete an empty directory? A. EDIT B. RD C. FORMAT D. DIR

B. The command used to delete an empty directory in a Windows Command Prompt is RD. RD stands for remove directory. CD is change directory, and MD is make directory. Know your old DOS commands! The EDIT command is used to make changes to text files within the Command Prompt, for example if you were to edit a batch file. FORMAT writes a new file system to a partition, while overwriting any file information located there. DIR is the directory command; it enables you to see the contents of a particular folder.

The system board’s underlying circuitry is called the __________. A. Backplane B. Bus C. Backbone D. Artery

B. The computer’s bus moves information into and out of the processor and other devices.

Which of the following paths is the default directory for user profiles in Windows 7? A. C:\Program Files B. C:\Users C. C:\Users and Settings\ D. C:\Documents and Settings|

B. The default directory for user profiles in Windows 7 is C:\Users. Previously in Windows XP, user profiles were stored solely in C:\Documents and Settings. That folder still exists in Windows Vista and Windows 7 but is redirected to the \Users folder, and Documents and Settings is locked out. This redirection is known as a Junction, where the information appears to reside in two seperate locations.

There are 40-wire PATA cables and 80-wire PATA cables, but they both have 40 pins on each connector. Why are there 80-wire PATA cables if there are only 40 pins connectors? A The 80-wire cables can support twice as many drives than a 40-wire cable B The 80-wire cables have reduced crosstalk between the signal wires C The 80-wire cables can also be used for SATA drives D The 80-wire cables are more durable

B. The extra wires in an 80-wire cable aren't used to pass traffic, but they can reduce the amount of crosstalk between the signal wires. This becomes especially important as the speed increases

Before opening a printer to insert a new toner cartridge: A. Remove the fuser assembly B. Turn off the printer C. Make sure that the transfer roller is locked D. Ensure that all of the printer's memory is good

B. The extremely high voltage of the high-voltage power supply makes it one of the most dangerous devices in the world of PCs!

You just upgraded a PC's motherboard and CPU. However, when you turn the computer on, it will not POST. What should you do first? A. Check that the system hasn't overheated. B. Check if the RAM is properly seated. C. Check that the OS was istalled properly. D. Check if the mouse and keyboard are connected properly.

B. The first thing you should do is check if the RAM is seated properly. This is easier than troubleshooting the CPU or motherboard and is a more common culprit due to the amount of force it takes to install DIMMs. A system will not have enough time to overheat before it gets to the POST. The OS hasn't even started yet, so you can rule that out. Mice and keyboards don't play a part in a sytem not posting.

Which of the following takes the DC power the laptop is providing and boosts it up to AC to run the backlight? A. Converter B. Inverter C. Polarizer D. Adapter

B. The inverter takes the DC power the laptop is providing and boosts it up to AC to run the backlight.

With a laser printer, what creates the image on the photosensitive drum? A. Primary corona B. Laser imaging unit C. Transfer corona D. Toner

B. The laser imaging unit creates an image on the photosensitive drum.

Which of the following devices go into a DIMM slot? A. Video card B. Memory C. CPU D. Sound card

B. The listed devices would be placed in the following slot types: Video card- Advanced Graphics Processor (AGP) slots were made to provide better support for video card. Memory- will go into either a SIMM or DIMM slot CPU- will fit into a slot called a socket such as LGA 775 Sound card- most likely will use a PCI slot

What is the minimum video requirement for Windows Vista? A. VGA B. SuperVGA C. XGA D. LGA

B. The minimum video requirement for both Windows Vista and Windows XP is SuperVGA.

What is the term used to describe where network hardware and patch panels are kept? A. Drop room B. Telecommunications Room C. Routing room D. Telecloset room

B. The network hardware and patch panels are kept in the telecommunications room.

Which of the following is the best way to ensure you've made a quality backup? A. Run backups when the least number of users are online. B. Verify your backup. C. Always close all files before a backup. D. Do only full backups

B. The only true test of a backup's quality is to restore it and see the results - but that is practically very difficult to do. Instead, use the backup software's verification utility - verifiers are quite good at determining the quality of a backup job.

If you could choose only one of the following tools to open a case and remove a video card, which one would you pick? A. A ball-peen hammer B. A Phillips screwdriver C. A Torx wrench D. A flathead screwdriver

B. The overwhelming majority of screws on a PC use a Phillips head.

What part must be vacuumed or replaced periodically to prevent damage caused by the action of the corona? A. The rubber rollers B. The ozone filter C. The transfer filter D. The cleaning blade

B. The ozone filter should be periodically vacuumed or changed.

Which device tests multiple wires of a power supply at the same time? A. Multimeter B. Power supply tester C. Line conditioner D. Surge protector

B. The power supply tester tests 3.3 V, 5 V, -5 V, 12 V, and -12 V simultaneously. A multimeter tests one wire at a time. Line conditioners and surge protectors are preventative devices, not testing devices.

Which principle should be used with assigning permissions? A. Grandfather-father-son B. Least privilege C. Differential D. Incremental

B. The principle of least privilege is that when assigning permissions, give users only the permissions they need to do their work and no more.

Joey wants to change the name of a file from start.bat to hammer.bat. Which of the following commands would accomplish the feat? A. ren hammer.bat start.bat B. ren start.bat hammer.bat C. rename /s start.bat hammer.bat D. rename /s hammer.bat start.bat

B. The ren command with the proper syntax--ren start.bat hammer.bat--will rename the file.

What is the name of the command-line version of the Task Manager? A. taskman B. tasklist C. taskkill D. tasks

B. The tasklist command opens the command-line version of the Task Manager

Which term describes the capability to burn files to a CD-R and then come back later and burn additional files? A. MultiBurn B. Multisession C. MultiDrive D. Multibuffer

B. The term multisession describes the capability to burn files to a CD-R and then come back later and burn additional files.

Which port number is commonly associated with the Remote Desktop Protocol? A tcp/3989 B tcp/3389 C tcp/389 D tcp/3889

B. The well-known port of the Remote Desktop protocol is TCP over port 3389.

What is the most common battery used by today's laptops? A. AA batteries B. Lithium Ion (Li-ion) C. Nickle-metal hydride (NiMH) D. Nickle-cadmium (NiCd)

B. There are a few different types of batteries that a laptop might use including Lithium Ion (Li-ion), Nickle-metal hydride (NiMH) and Nickle-cadmium (NiCd), but Lithium-ion is by far the most common. Believe it or not, some laptops (namely children's) can run on 4 AA batteries, but it is not common or feasible in today's business environments.

What is the firmware called that contains settings that can be manipulated and diagnostic utilities that can be used to monitor the device? A. Registry B. BIOS C. CMOS D. TPM

B. This firmware called the Basic Input/Output System (BIOS) contains settings that can be manipulated and diagnostic utilities that can be used to monitor the device.

A BIOS intrusion detection notification informs you of what? A. Unauthenticated logins B. Opening of the case C. Access to the BIOS D. Malware attacks

B. This may also be referred to as chassis intrusion detection or possibly a case open warning.

Which class of fire extinguisher is meant for flammable liquids? A. Class A B. Class B C. Class C D. None of the above

B. Three major classes of fire extinguishers are available, one for each type of flammable substance: A for wood and paper fires, B for flammable liquids, and C for electrical fires.

USB 1.1 devices can run at two speeds. What are the speeds? A. 1 and 2 Mbps B. 1.5 and 12 Mbps C. 1.5 and 15 Mbps D. 12 and 48 Mbps

B. USB 1.1 devices can run at either 1.5 Mbps or 12 Mbps.

Which of these describe a fundamental operation of a port trigger? A Encryption is enabled only for certain applications B A reverse port-forward is dynamically created C The speed of an Ethernet port is adjusted in real-time D Incoming services are always available

B. Unlike a permanent port-forward, a port trigger is only created when an application uses a predefined outgoing port number. For example, a port trigger could create a reverse port-forward for incoming users every time a game server is launched.

Which of these technologies can only transmit analog video data? A DVI B VGA C FireWire D. HDMI

B. VGA is an analog-only video technology. Although other technologies like HDMI can also transmit analog video signals, it can also transmit digital signals as well.

With what does VMware Workstation replace CTRL-ALT-DELETE? A. A mouse click B. CTRL-ALT-INSERT C. CTRL-ALT-TAB D. CTRL-ALT-SHIFT

B. VMware uses CTRL-ALT-INSERT for logon.

The Windows Vista Sidebar comes with a number of individual functions that can be enabled and disabled such as CPU meters, Time, Calendars, etc. What are these individual functions called? A. Applets B. Gadgets C. Libraries D. Applications

B. Vista's Windows Sidebar enables users to load or unload hundreds of different Gadgets. This is not a technical term, merely the term Microsoft chooses to use for this feature of Windows Sidebar.

WPA increased security by using what to scramble encryption keys? A. AES B. TKIP C. Kerebos D. RG-6

B. WPA was able to increase security by using Temporal Key Integrity Protocol (TKIP) to scramble encryption keys using a hashing algorithm. The keys are issued an integrity check to verify they have not been modified or tampered with during transit.

Which of the following is a chip found in the motherboard that can enhance drive encryption security? A. CMOS B. TPM C. EEPROM D. BIOS

B. When the device has a Trusted Platform Module (TPM) chip present on the motherboard, additional security and options become available for drive encryption.

What is WPS? A A protocol for automating IP addressing B A method of connecting new devices to a wireless network C A type of wireless encryption D A method of prioritizing traffic flows

B. Wi-Fi Protected Setup was an attempt to remove the complexity of encryption technologies, but it ultimately was found to be an enormous security issue. You should always disable WPS on your wireless device.

Which of the following tools provides comprehensive information about the system’s resource usage, hardware, and software environments? A. Device Manager B. WinMSD C. Dr. Watson D. Task Manager

B. WinMSD provides comprehensive information about the system’s resource usage, hardware, and software environments.

You need to install two SATA drives into a new computer system. What determines which drive has boot priority? A The jumpers on the drive B The BIOS setting C The cable select option D The location of the drive on the cabl

B. With SATA drives, a single drive is connected to a single port on the motherboard. There are no cable settings or jumpers required to set priorities. You can change the boot priority of the drives from the configuration options in your PC's BIOS.

What is the top upload speed possible with SDSL? A. 1 MB/s B. 1.5 MB/s C. 1.6 MB/s D. 3 MB/s

B. With SDSL (symmetric DSL), the top upload speed is 1.5 MB/s. The top download speed is also 1.5 MB/s.

Which wireless encryption standard uses AES-based encryption? A WEP B WPA2 C TKIP D 802.1X

B. With the creation of WPA2, a new AES-based encryption method called CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) was created to replace the older TKIP (Temporal Key Integrity Protocol) used by WEP and WPA.

Which of these standards is most associated with directory services? A EUI-48 B ITU-T X.500 C IEEE 802.3 D SMB

B. X.500 is the standard associated with directory services, including those used by Microsoft Active Directory Services.

You have counted the number of chips on a SIMM stick and are convinced that it’s parity RAM. How many chips should be there? A. 8 B. 9 C. 10 D. 11

B. You can identify parity SIMM by counting the number of chips on the stick. If there are nine, it’s parity RAM. If there are eight, it’s nonparity.

What command often enables you to diagnose TCP/IP errors such as connection problems? A. FTP B. ping C. netstat D. ICS

B. You can often use the ping command to diagnose TCP/IP problems.

What do you need to install a legal copy of Windows 7 Professional into a virtual machine using VMware Workstation? A. A valid VM key B. A valid Windows 7 Professional installation media C. A valid ESX key D. A second NIC

B. You need a copy of the Windows installation media to install Windows.

What type of device must be installed on your system so you can access data on a flash memory card? A. Scanner B. Card reader C. Floppy drive D. Zip Drive

B. You need some sort of card reader to read a flash memory card.

You just upgraded a motherboard in a computer, and put the system back together. It boots, but the power LED on the front of the computer case doesn't light when the system is on. The rest of the computer seems to work fine. what should you do first? A. Check the power supply B. Check the power LED pinout. C. Replace the LED. D. Replace the power button.

B. You should check the power LED pinout. The case connector that goes to the motherboard is probably installed backward. Motherboards are usually labeled. If not, check your documentation for the computer. If the power button works, there is no reason to replace it. The rest of the computer works fine, and other case connectors are getting power, so the power supply can be ruled out. Replacing the LED can be difficult and time-consuming, plus LEDs almost never need to be replaced.

When You Receive Bacn, You’ve Received What? A. A DCMA Notice B. Email C. A Virus D. Food

B. Your email inbox is most likely inundated with waves of emails falling into several distinct categories: email you want from people you directly communicate with, email you don’t want (SPAM) from people you don’t communicate with, and a sort of nebulous third wave composed of emails you want to receive but aren’t a high priority. That last wave is the province of Bacn. Bacn is a term coined by participants at PodCamp Pittsburgh 2 in 2007 to refer to emails you have specifically subscribed to receiveâ€"such as coupons from retailers, notifications from services, social network alerts, etc.â€"but that you may not wish to read immediately. The group’s announcement included a slogan for the new term: Bacn is email you want â€" but not right now.

Zander downloaded a game off the Internet and installed it, but as soon as he started to play, he got a Blue Screen of Death. Upon rebooting, he discovered that his My Documents folder had been erased. What happened? A. He installed spyware. B. He installed a Trojan horse. C. He broke the Group policy. D. He broke Local Security Policy.

B. Zander clearly installed a Trojan Horse, a virus masquerading as a game.

BTX

Balanced Technology Extended

BNC

Bayonet-Neill-Concelman or British Naval Connector

BNC

Bayonet-Neill-Concelman or British Naval Connector The BNC connector (Bayonet Neillâ€"Concelman) is a miniature quick connect/disconnect RF connector used for coaxial cable. It features two bayonet lugs on the female connector; mating is achieved with only a quarter turn of the coupling nut. BNCs are ideally suited for cable termination for miniature-to-subminiature coaxial cable (e.g., RG-58, 59, to RG-179, RG-316). They are used with radio, television, and other radio-frequency electronic equipment, test instruments, video signals, and was once a popular connector for 10BASE2 computer networks. BNC connectors are made to match the characteristic impedance of cable at either 50 ohms or 75 ohms. It is usually applied for frequencies below 4 GHz and voltages below 500 Volts. Similar connectors using the bayonet connection principle exist, and a threaded connector is also available. United States military standard MIL-PRF-39012 entitled Connectors, Coaxial, Radio Frequency, General Specification for (formerly MIL-C-39012) covers the general requirements and tests for radio frequency connectors used with flexible cables and certain other types of coaxial transmission lines in military, aerospace, and spaceflight applications.

A laptop docking station will enable a user to do which of the following? A. Simultaneously connect to multiple network subnets B. Provide an additional layer of security for the laptop C. Connect and use multiple peripherals from one device D. Add additional RAM to a laptop that might not have available slots

C

A new video card requires a 600 watt power supply. The power supply should have how many pins on the main cable? A. 12 B. 20 C. 24 D. 26

C

A print job fails to leave the queue. Which of the following services may need to be restarted? A. Printer Driver B. Windows Spool Service C. Print Spooler D. NIC driver

C

A supervisor has asked a technician to configure some Windows 7 PCs with some pre-established shared printers. The printers are all accessed via a wireless network. Where would a technician go in Windows 7 to add these printers? a) %SystemDir%\Resources b) Enter the paths to the printers in the Registry. c) Start >Devices and Printers >Add a printer d) Start >Devices and Printers >Add a Device

C

A technician has determined that there is constant interference from other wireless devices over the wireless network. Which of the following should the technician do FIRST to resolve the problem? A. Change the admin password on the wireless router. B. Change the encryption type on the wireless router. C. Change the channel being used by the wireless router. D. Change the SSID on the wireless router.

C

A technician has installed a new driver on a computer. Upon rebooting the computer, a stop error occurs before the technician can log back in. Which of the following would be the BEST option for the technician to do NEXT? A. Boot the computer to the Recovery Console. B. Boot the computer with a Windows Installation CD. C. Boot the computer using Last Known Good Configuration. D. Boot the computer using Safe Mode with Networking.

C

A technician just finished removing spyware from a computer and now they are not able to connect to any websites. Which of the following is the MOST likely cause? a) Automatic configuration b) Network card driver is damaged c) Proxy settings d) The Internet is not functioning

C

A technician takes notes while a customer explains the potential issue. Which of the following parts of the troubleshooting process does this represent? A. Establish a theory B. Document findings C. Identify the problem D. Verify full system functionality

C

A user receives an email stating that the user has won a lottery. The user is asked to send their address, phone number and bank account number so that the winning funds can be deposited directly into the users account. This is an example of: A. a worm spread from peer to peer B. a destructive virus C. social engineering D. spyware

C

A user reports an unusual amount of spam in their inbox. The technician should advise the user to do which of the following? A. Find a new ISP. B. Reply to all spam email opting out of future emails. C. Add the sender to the junk email sender list. D. Create a new email account.

C

A user reports that they walked away from their laptop for 30 minutes and when they came back the screen was very dim. The user tried moving the mouse and increasing the brightness setting, but neither worked. Which of the following should the technician do FIRST? A. Plug in an external monitor to test the video card. B. Run a check disk scan to verify there is no corruption. C. Check if the laptop is now on battery power. D. Have the LCD screen replaced with a known good screen.

C

A user reports their laptop has just been powered on and there is no display, but the power indicator is still on. The technician suspects that the laptop display is bad. Which of the following troubleshooting steps should be performed to confirm the display is bad? A. Press and hold the Fn-toggle key several times. B. Change the brightness of the display to see if anything appears on the laptop. C. Plug an external monitor into the video output port, and then Fn-toggle key several times. D. Press the power button until the unit shuts down, then press and hold the Fn-toggle key as power is reapplied.

C

A user wishes to secure their tablet from unauthorized access. The BEST option is to:? a) enable RFID authentication. b) establish a remote wipe policy. c) setup a strong passcode. d) establish strong email passwords.

C

An AMR slot is generally used with which of the following interface card types? A. Video game emulator card B. Video capture card C. Modem D. Mini-PCI card

C

In order to perform a network installation of Windows, which of the following MUST be supported by the computers network interface? A. PCL B. AGP C. PXE D. PCI

C

In which of the following steps of the troubleshooting theory is it important to perform backups? A. Verify full system functionality. B. Test the theory to determine cause. C. Identify the problem. D. Document findings, actions, and outcomes.

C

Setting an administrator password in the BIOS will accomplish which of the following? A. Prevent a user from reading email B. Prevent a virus from infecting the BIOS C. Prevent a user from rearranging boot devices D. Prevent an outside intruder from attacking the system

C

What file is required in the Windows XP boot process if you have a SCSI hard drive? A. alxvi.exe B. scsicom C. ntbootdd.sys D. ntldr

C

Which of the following BEST describes a network of computers inside a house that communicate with each other but not with computers outside of the house? A. WAN B. VPN C. LAN D. VLAN

C

Which of the following BEST describes attempts to guess a password by trying possible combination of letters, numbers, and symbols? A. Social engineering B. Phreaking C. Brute force D. War driving

C

Which of the following BEST describes the differences between a switch and a router? A. A router broadcasts all data packets that are sent on the network, and a switch transmits data directly to the device. B. A switch interconnects one or more networks, where a router interconnects devices on a network. C. A switch interconnects devices on the same network to be able to communicate, where a router interconnects one or more networks. D. A switch broadcasts all data packets that are sent on the network, and a router transmits data directly to the device.

C

Which of the following BEST explains the concept of hyperthreading? A. Allows two program threads to be stored in memory simultaneously B. Allows one program thread to be processed by more than one processor simultaneously C. Allows two program threads to be processed by a single processor simultaneously D. Allows one program thread to be stored in memory faster than another program thread

C

Which of the following IP addresses would a technician see if a computer is connected to a network device but is not receiving an IP address from the DHCP server? A. 172.16.10.10 B. 192.168.0.10 C. 169.254.10.10 D. 192.168.10.10

C

Which of the following RAID levels uses striping across three or more disks with parity? A. RAID 1 B. RAID 3 C. RAID 5 D. RAID 10

C

Which of the following RAM types is used to resolve certain memory errors? A. Non-ECC B. Non-parity C. ECC D. Parity

C

Which of the following adapter cards is used for connecting external hard drives? A. RAID B. PCMCIA C. eSATA D. PATA

C

Which of the following adapter cards would be the FASTEST for connecting an external hard drive? A. Wide SCSI B. FireWire 800 C. eSATA D. USB 2.0

C

Which of the following allows a user to permanently disable a hardware device? A. Control Panel B. Task Manager C. Device Manager D. Event Viewer

C

Which of the following application stores are compatible with iOS? a) Android Market b) Windows Marketplace c) App Store d) Amazon Appstore

C

Which of the following cable types can transmit data the LONGEST distance without the use of a repeater? A. UTP B. Coaxial C. Fiber D. STP

C

Which of the following cable types supports a transmission speed no greater than 100 Mbps per the IEEE specification? A. CAT3 B. CAT4 C. CAT5 D. CAT6

C

Which of the following characteristics and port numbers are associated with POP3? A. Sends outbound email, Port 25 B. Receives inbound email, Port 25 C. Receives inbound email, Port 110 D. Sends outbound email, Port 110

C

Which of the following chipsets is responsible for controlling the data flow between a PATA optical drive and the processor? A. Northbridge B. BIOS C. Southbridge D. DMA controller

C

Which of the following connectors is MOST commonly used for POTS lines? A. BNC B. SC C. RJ-11 D. RJ-45

C

Which of the following connectors is commonly used on a coaxial cable? A. RJ-45 B. HDMI C. BNC D. RJ-11

C

Which of the following default ports is used for Telnet? A. 21 B. 22 C. 23 D. 25

C

Which of the following devices can be used to setup a WAN? A. Hub B. Repeater C. Router D. Switch

C

Which of the following devices is used to connect to a WAN? A. Hub B. Switch C. Router D. MUX

C

Which of the following hard drives would BEST meet the MINIMUM system requirements for installing Windows Vista Business 64-bit? A. 160GB HDD with 10GB free space B. 20GB HDD with 15GB free space C. 40GB HDD with 15GB free space D. 80GB HDD with 10GB free space

C

Which of the following is a protocol that does not depend on acknowledgement of receipt from the sender? A. TCP B. HTTP C. UDP D. IP

C

Which of the following is a unique characteristic of a dual-core processor vs. a single-core processor? A. A dual-core processor uses higher voltage than a single-core processor. B. A dual-core processor has several unique cores, with the same cache, on two different chips. C. A dual-core processor has two cores, with separate caches, on the same physical chip. D. A dual-core processor requires more RAM to function than a single-core processor.

C

Which of the following is an example of DDR2 RAM? A. PC100 B. PC2700 C. PC6400 D. PC10666

C

Which of the following is considered social engineering? A. Forging a login account on a server in order to gain access to a system B. Posting confidential information on a public website C. Entering a facility by posing as a telecommunications contractor D. Sending a computer virus by email

C

Which of the following is the FIRST step in the troubleshooting theory? A. Establish a plan of action to resolve the problem and implement the solution. B. Establish a theory of probable cause. C. Identify the problem. D. Verify full system functionality and if applicable implement preventative measures.

C

Which of the following is the MOST important piece of information required for a wireless client to connect to a specific wireless network? A. MAC address B. BSID C. Channel number D. SSID

C

Which of the following is the difference between a Cellular WAN and a WLAN card? A. A WLAN card generally has a range of 6 miles (9.7 kilometers), while a Cellular WAN card is limited in range to 1200 feet (365 meters). B. A Cellular WAN card will work on most public Wireless Access Points, while a WLAN card is more proprietary. C. A Cellular WAN card requires subscription to a cellular provider, while a WLAN card can work without provider payment. D. A WLAN card is usually an external card, while a Cellular WAN card is usually an internal card.

C

Which of the following is the number of devices that can be daisy-chained to an IEEE 1394 port? A. 7 B. 15 C. 63 D. 127

C

Which of the following is the purpose of a monitors degauss feature? A. Automatically adjusts the display settings for optimal performance B. Increases the monitor brightness to reduce glare C. Removes stray magnetic fields D. Resets the monitor to factory default settings

C

Which of the following memory modules uses a 240-pin connector? A. DDR B. SIMM C. DDR2 D. RAMBUS

C

Which of the following memory types has a clock speed of 400MHz? A. PC1600 B. PC2700 C. PC3200 D. PC5200

C

Which of the following memory types will fit in a 168-pin DIMM slot? A. DDR B. DRAM C. SDRAM D. RAMBUS

C

Why would the display dim on a laptop when the power supply from the electrical outlet is disconnected? A. The laptop displays require a 60 hertz alternating power source. B. Incorrect security settings on the laptop. C. The power management settings on the laptop. D. The laptop cannot use full brightness on battery power.

C

Which of the following is usually provided by DHCP? Pick two. A Source NAT address B Loopback address C DNS address D Subnet mask

C & D. DHCP can automatically configure many different TCP/IP parameters, but loopback addresses and source NAT addresses are not part of the DHCP specification.

In which of these situations would you use the bootcfg command in Windows XP? A) Rebuild the master boot record B) Modify the startup applications C) Modify the boot configuration file D) Update the boot sector E) Who’s been clicking email links again!?

C) Modify the boot configuration file Windows XP uses the boot.ini file to store configuration settings used during the boot process. The bootcfg command can be used to modify or rebuild the boot.ini file settings in Windows XP.

Your Windows 7 startup process is performing very slowly, but it’s difficult to tell which application is causing the issue. Which of these utilities would be the most help to identify the problematic application? A) Event Viewer B) System Repair Disk C) System Configuration D) Defragmentation E) Try booting the computer in a car going the speed of light

C) System Configuration The Windows System Configuration utility, or MSCONFIG, identifies all of the services and applications that are run during the startup process, and the utility provides an easy checkbox method to enable or disable any of the apps. It may take some time to narrow down the troublemaker, but it’s very easy to use.

A user reports that their computer is very loud and occasionally turns itself off. The computer is located under a desk on carpet. Which of the following steps should the technician perform to BEST remedy the situation? (Select TWO). A. Replace the power cord. B. Install a new hard drive. C. Remove the computer from the floor. D. Clean the inside of the computer. E. Wipe the computer with a cloth.

C, D

Which of the following programs enable you to access and work on a remote computer? (Select two.) A. FTP B. Internet Connection Sharing C. Remote Desktop D. Telnet

C, D. Both Telnet and Remote Desktop enable you to access and work on a remote computer. The latter is just prettier!

ExpressCards connect to which buses? (Select two) A. ISA B. PCI C. PCIe D. Hi-Speed USB

C, D. ExpressCards connect to either the PCI Express bus or the Hi-Speed USB bus.

A technician is called to a school lab to fix a computer. The computer worked fine the day before, but now does not power on. The computer is plugged into a power strip with another computer. The other computer works fine. Which of the following could be the problem? (Select TWO). A. The power strip is overloaded. B. The monitor is unplugged. C. The power cable is unplugged from the computer. D. The power strip is unplugged. E. The voltage switch on the computer is set incorrectly.

C, E

Which of the following cable types use shielding to protect against EMI and RFI? (Select TWO). A. Fiber B. Crossover C. Coaxial D. UTP E. STP

C, E

What is a common resolution on today's laptops? A. 640x480 B. 800x600 C. 1280x800 D. 2048x1536

C. 1280x800 (WXGA) is a common resolution used by today's laptops. 640x480 and 800x600 are older VGA modes that can't fit much on the screen. 2048x1536 (QXGA) is a higher resolution than most laptop's video adapters can display.

What is the maximum size a partition can be using the FAT32 file system? A. 32768 MB B. 1024 GB C. 2048 GB D. 4096 MB

C. 2048 GB. Which, normally would be written out as 2 TB. But I wanted to see if you could move your decimal point around. Did you know that even though Windows won't let you CREATE a FAT32 partition over 32 GB, you can still make one with another partitioning tool and then just load up Windows and it will recognize it just fine?

Which of these is NOT true about a 64-bit architecture? A A 64-bit data path can move data twice as fast as a 32-bit data path B Software must be written to take full advantage of a 64-bit architecture C A 64-bit operating system cannot run 32-bit software D Hardware drivers must be written specifically for a 64-bit OS

C. A 64-bit OS can run 32-bit applications, but a 32-bit operating system cannot run 64-bit apps. You can go smaller, but not bigger.

What would you commonly see attached to a 4-pin Berg connector? A Printer connection B Motherboard power C Floppy drive D USB device

C. A Berg connector is the formal name for the unique 4-pin power connector on legacy floppy drives.

What would you use to test all of your computer's hardware before you installed Windows 7? A. MBR B. Another PC C. POST card D. BIOS

C. A POST card can be installed in your computer and it will ensure that all of your devices are working correctly on bootup.

What default subnet class is represented by 255.255.255.0? A Class A B Class D C Class C D Class B

C. A class C subnet mask used 24 bits as a mask. This class C mask is 11111111.11111111.11111111.00000000 binary, or 255.255.255.0 in decimal.

What do you make when you save a copy of a VM? A. Replacement B. Save C. Snapshot D. Zip

C. A copy or saved version of a VM is called a snapshot.

One of your customers is connecting a digitizer to their computer. Which of these would be the most likely use of this device? A Word processing B Gaming C Image editing D Web browsing

C. A digitizer often uses a stylus to simulate the use of a pen or pencil as an input device. Also known as a tablet

Which of these cooling methods dissipate heat from a processor using thermal conduction? A Run the computer without a case cover B Case fan C Heat sink D Remove all expansion slot cover

C. A heat sink is a copper or aluminum alloy that is fastened to a processor. The top of the heat sink is a series of fins that transfer the heat from the processor to the relatively cool air that is pulled through the computer.

What kind of network is commonly used inside of an automobile? A MAN B WAN C PAN D LAN

C. A personal area network (PAN) is a network that’s localized to an individual’s personal area. An example of a PAN is the Bluetooth network that’s used in an automobile to integrate a mobile phone with the automobile speakers and microphones.

Which term describes a combination of many updates and fixes? A. Hot fix B. Hot pack C. Service pack D. Service release

C. A service pack is a combination of many updates and fixes.

What is the maximum number of devices that you can connect to a single PATA motherboard interface? A Eight B One C Two D Sixteen

C. A single PATA motherboard connection can support a ribbon cable with two PATA devices

What type of power supply can operate in different countries that have different voltages? A High-voltage B Notched C Switching D Primary

C. A switching power supply can be used for both 110 volts and 220 volts, making it easy to go between different power standards without changing the power supply or modifying the power source.

A client's C: drive is badly fragmented and needs to be defragmented. What percentage of the drive must be free to finish the job completely? A. 2% B. 30% C. 15% D. 10%

C. A volume must have at least 15% free space for defrag to work completely and adequately. Defrag uses this space as a sorting area for file fragments. If a volume has less than 15% free space, defrag will only partially deframent it. To increase the free space on a volume, delete unneeded files or move them to another disk.

You need to connect to a district office that's located many states away. What type of network would be the best choice for connecting to this site? A LAN B MAN C WAN D PAN

C. A wide area network generally connects LANs across a long distance, and the speed of the connection is generally much slower than LAN speeds.

Which of the following uses a 24-pin main motherboard power connector? A. ATX B. ATX 12V 1.3 C. ATX 12V 2.0 D. ATX 5V 2.0

C. ATX 12V 2.0 combined the 20-pin and 4-pin connectors used in ATX 12V 1.3 into one 24-pin connector.

Upgrading which component of a host machine would most likely enable you to run more virtual machines simultaneously? A. CPU B. Hard drive C. RAM D. Windows

C. Adding more RAM will enable you to run more simultaneous VMs. Upgrading a hard drive could help, but it's not the best answer here.

You have installed the CPU and heat sink/fan assembly. What should you do next? A.Apply thermal compound B. Boot the computer C. Plug in the fan. D. Replace the BIOS jumper shunt.

C. After installing the heat sink/fan assembly, plug in the fan to the appropriate connector on the motherboard.

You have confirmed the theory that a video card is bad and needs to be replaced. What should you do next? A. Escalate the problem. B. Document your actions so far. C. Establish a plan of action. D. Question the user

C. After you confirm the theory, move to step 4 to establish a plan of action, and implement the solution.

Which of the following take the signal going out and echo it back, allowing you to test ports? A. Punchdown tools B. Toner probes C. Loopback plugs D. Multimeters

C. Also called wrap plugs, loopback plugs take the signal going out and essentially echo it back. This allows you to test ports to make certain they’re working correctly.

Which of these would be true about RAID 0? A RAID 0 does provide redundancy, and every file is duplicated and stored on separate physical hard drives. B RAID 0 is used to describe a system that does not use multiple hard drives to enhance performance or provide additional availability. C RAID 0 does not provide drive redundancy, but it does split files across hard drives to improve performance. D RAID 0 does provide redundancy. Files are split across physical drives and a separate parity block is calculated and stored. In the case of a drive failure, the parity information is used to recreate the missing file data.

C. Although RAID 0 doesn’t provide any availability benefits in the event of a hard drive error, it does improve performance by splitting information across multiple drives. Instead of going to a single drive and reading an entire file at once, multiple drives can work independently to speed operation. Some high-end servers will include hundreds of hard drives working together to form very large RAID arrays.

Before installing a motherboard, what should you do? A. Install the processor. B. Verify that it is compatible with the case. C. Employ ESD prevention methods. D. Test the motherboard with a multimeter.

C. Always employ ESD prevention methods before working with any components inside the computer. Although A and B are correct, they are not the best answers.

You get a tech call froma distraught Windows XP user who can't get into Windows. He says he has a Recovery CD from the manufacturer and plans to run it. What would you suggest? A. Run the Recovery CD to restore the system. B. Run the Recovery CD to return the system to the factory-installed state. C. Try to get the computer to boot into Safe Mode. D. Reinstall Windows by using a Windows XP disc.

C. Always try Safe Mode before doing anything like running a Recovery CD from the manufacturer.

Which of these would be a valid APIPA address? A 192.168.224.1 B 172.254.1.2 C 169.254.254.7 D 224.254.224.1

C. Automatic Private IP Addressing (APIPA) is a method of automatically assigning an IP address to a device when no other option is available. If a local address is not assigned and a DHCP server is not available, an IP address will be assigned to a device that allows communication across a local subnet. Although communication outside of the subnet isn't possible, the ability to communicate to some devices is more useful than no communication at all. APIPA addresses are reserved to be between 169.254.1.0 through 169.254.254.255.

Which of the following answers can be the cause of a blue screen error? A. Rogue DHCP server B. Incorrect router configuration C. Bad driver D. Incompatible USB device

C. Bad drivers can be the cause of a stop error or blue screen error (also known as BSOD), for example, if cdrom.sys, the basic CD-ROM system driver file, were to fail during bootup. The CPU and RAM can also cause these errors to occur. The blue screen error affects only the local computer; it is not a netwokwide problem that could be associated wit a rogue DHCP server or incorrect router configuration. An incompatible USB device should not cause a blue screen error, nor should that device's driver. Also, the whole idea of USB is that devices you connect to it are automatically recognized and are generally all compatible. However, the USB driver could be a culprit though it is less common.

Of the following ways to manipulate a file, which can retain the file's NTFS permissions? A. Moving the file to another NTFS volume B. Copying the file to another FAT32 volume C. Moving the file to a new location on the same volume D. Copying the file to a new location on the same volume

C. Basically, the only way a file can retain its NTFS permissions is if the file is moved to a new location on the same volume.

By default, what port(s) does the IMAP service use? A. 20 and 21 B. 80 C. 143 D. 443

C. By default, the IMAP service uses port 143.

What is the ideal humidity level to strive for to protect equipment? A. 80 percent B. 60 percent C. 50 percent D. 35 percent

C. Care should be taken to maintain the relative humidity at around 50 percent. If it is too high, moisture starts to condense on the equipment. If it is too low, ESD can result.

Which of the following entails ensuring that data expected to remain private is seen only by those who should see it? A. Repudiation B. Negation C. Confidentiality D. None of the above

C. Confidentiality entails ensuring that data expected to remain private is seen only by those who should see it. Confidentiality is implemented through encryption.

What network connection speed would you expect from a dial-up connection? A 5 Mbit/s B 56 Mbit/s C 56 kbit/s D 560 kbit/s

C. Dial-up connections over telephone lines don’t provide much throughput, but they can provide a useful connection for simple applications.

What type of memory architecture maximizes throughput by using pairs of memory modules? A. Secondary IRQ B. RAM pair C. Dual-channel D. DDR2

C. Dual-channel

Rafael gets a tech call from a user with a brand new laptop complaining that working on it was causing headaches. What could the problem be? A. The laptop uses a plasma display. B. The laptop uses a CRT display. C. The laptop uses an LED display in power saving mode. D. The laptop uses an LED display in full power mode.

C. Flicker is a side effect of dimming on some lower-end LED monitors.

Which function enables a mobile device to be located? A. GPS B. Screen orientation C. Geotracking D. Wireless scanning

C. Geotracking which can be done through both cell towers and through 802.11s APs can be used to locate a mobile device.

What would you replace in a laser printer if you see ghosted images? A. Fuser B. Cartridge C. Drum D. Printhead

C. Ghosted images often mean that the print drum of a laser printer needs to be replaced. Perhaps the drum cannot hold a charge any longer, causing an ineffective joining of toner to the drum, and ultimately leading to ghosted images.

Where can you find HKLM? A. Device Manager B. My Documents C. Registry D. Start Menu

C. HKLM is short for HK_LOCAL_MACHINE, which you can find in the registry.

Which of the following commands can be used to set network-related configuration? A. NET ACCOUNTS B. NET COMPUTER C. NET CONFIG D. NET FILES

C. NET CONFIG is used to see network-related configuration. NET ACCOUNTS is used to set account options (password age, length, etc.). The NET COMPUTER command can be used to add and delete computer accounts. NET FILES can be used to close open files.

What is the name of the program that boots Vista and Windows 7? A. ntldr B. boot.ini C. bootmgr D. Registry

C. On Windows Vista and Windows 7 machines, bootmgr is used to boot the operating system.

If You’ve Received HTTP Status Code 418 It Means The Server Is? A. On the moon. B. Out of bandwidth. C. A Teapot. D. Restricted.

C. HTTP status codes are usually reserved for serious issues like server faults, missing files, and other matters of importance. Thanks to an April Fools’ Day joke in 1998, however, there’s a particularly curious (and entirely nonsensical) HTTP status code devoted to indicating the device contacted is, in fact, a teapot. How did such an odd code come about? On April 1, 1998, the The Internet Society released a tongue-in-cheek network protocol memo through The Internet Engineering Task Force’s Request For Comments (RFC) system. This memo, RFC 2324, entitled Hyper Text Coffee Pot Control Protocol, detailed the HTCPCP protocol, a derivative of HTTP intended for controlling, monitoring, and diagnosing internet connected coffee pots. Among the many codes included in the HTCPCP return/error code schema, there is a code 418 “I’m a teapot†intended to politely inform the recipient that the device they are attempting to brew coffee with is, in fact, a teapot and incapable of producing the coffee they desire. As you can imagine, the error code was never formally added to the HTTP error code schema and, should you actually receive the code, you’ve either encountered a very mischievous web master or an actual internet-enabled brewing machine coded by a tinkerer with a fondness for yesteryear’s April Fools’ Day pranks.

Jim likes his laptop but complains that his wireless seems slow compared to all the new laptops. On further inspection, you determine his laptop runs 802.11g. What can be done to improve his network connection speed? A. Add more RAM. B. Replace the display with one with a better antenna. C. Replace the Mini-PCIe 802.11g card with an 802.11n card. D. Get a new laptop, because this one can't be upgraded.

C. He can have the 802.11g NIC replaced with an 802.11n NIC.

What is the central virtual machine manager called? A. VMS B. Resource Manager C. Hypervisor D. Virtual System Controller

C. Hypervisor

Which of these would be a valid IPv6 address? A fe80::230:h812:11:19 B fe80::5d18::652:cffd:8f52 C fe80::2231:7:a:8:2 D fe80:0000:0000:0000:5d18:0652:cffd:8f52:23ff

C. IPv6 addresses are summarized by collapsing the zero fields with one set of double colons. Another shortcut is dropping the leading zeros in a group. An IPv6 address consists of eight groups, with two bytes in each group.

If Automatic Private IP Addressing is being used, what will the host’s subnet mask be? A. 255.255.255.255 B. 255.255.255.0 C. 255.255.0.0 D. 255.0.0.0

C. If a DHCP server cannot be found, the clients automatically assign themselves an IP address, somewhat randomly, in the 169.254.x.x range with a subnet mask of 255.255.0.0.

One of your organization's technicians reconfigures the BIOS boot order on a PC and sees that the system time is incorrect. The technician resets the clock to the correct time but sees tata a couple days later, the system time is wrong again. What is most likely the cause? A. The motherboard is not seated properly. B. The time zone settings are incorrect in the OS. C. The CMOS battery has failed. D. The power supply is not providing correct voltage.

C. If the technician reset the time in the BIOS and it fails a few days later, this most likely means that the CMOS battery has failed. The CMOS battery is in charge of keeping the time and date.

If you spill anything on a keyboard, you can clean it by soaking it in which of the following? A. Soapy water B. Windex C. Distilled, demineralized water D. None of the above

C. If you spill anything on a keyboard, you can clean it by soaking it in distilled, demineralized water.

What is the distance limitation of 1000BaseLX fiber in multi-mode? A. 220 meters B. 412 meters C. 550 meters D. 5 km

C. In a multi-mode format, the distance limitation is 550 meters (in single-mode, it is 5 km).

You suspect that incorrect voltage is provided to a power supply. What tool should you use to test this? A. PSU tester B. Loopback adapter C. Multimeter D. Voltage detector

C. In this scenario, you should test the AC outlet with a multimeter because you suspect incorrect voltage. The multimeter can tell you exactly what voltage is supplied. A voltage detector and PSU tester tell you only if voltage is present on a given wire, not the exact amount; plus you don't want to test the power supply. However, the multimeter is the right tool to use if you wanted to find out exactly what voltages were supplied to the motherboard. Loopback adapters are used to test network cards and serial ports.

When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. What is this known as? A. Annulment B. Reinforcement C. Chain of custody D. Compliance

C. It's known as chain of custody.

Kevin gets a call from a user who is trying to install a new piece of software. The user doesn't have administrative rights, so she's unable to install the software. What tool can Kevin use to install the software without giving the user the local administrator password? A. Remote Assistance B. Regedit C. Remote Desktop D. Computer Management

C. Kevin can use Remote Desktop to login to the computer with administrative rights and perform the install for the user.

Which sound format contains no actual sound recording but only a series of commands stored in a text file for the sound card to interpret? A. WMA B. WAV C. MIDI D. MP3

C. MIDI files contain no actual sound recording but only a series of commands stored in a text file for the sound card to interpret.

Louis notices his PCMCIA 802.11 NIC has a small screw hole on the end. What is this probably used for? A. AC adapter B. Wireless Repeater C. Antenna D. Ethernet

C. Many wireless NICs come with a connector to install an external antenna that can improve reception.

"Mike has a Windows XP system that fails at boot with an ""NTLDR missing or corrupt"" message. His system has one drive formatted as NTFS. He does not have any floppy boot disks, but his system can boot to a CD-ROM. Which of the following methods will get his system working again? A. Boot the recovery console and use the Repair utility. B. Boot to the CD-ROM and load a new copy of NTLDR. C. Boot to the CD-ROM and do a repair. D. Boot from a Windows 98 startup disk and copy NTLDR from C:\WINNT to the C:\ drive."

C. Mike should run the install program off the CD-ROM. When prompted for install or repair, he should select R to repair.

As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she checked last week. This surprises her, since she didn't make any changes to her TCP/IP configuration. The user had no problems running her web browser. You immediately know that: A. Her IP address is static B. He is running Internet Explorer C. Her computer is a DHCP client D. Her default gateway is dynamic

C. Only DHCP clients can change IP addresses dynamically.

Which of the following virtualization programs works well with Mac OS X? (Select the best answer.) A. ESX B. KVM C. Parallels D. Virtual PC

C. Parallels is the dominant virtualization program for Mac OS X.

What video technology applies voltage to noble gas and mercury to create light? A OLED B LCD C Plasma D CRT

C. Plasma displays create plasma by applying a voltage to noble gas an mercury, and the mercury sheds energy as UV light. This light is then projected through colored phosphors to create the final picture.

The paper is not being pulled into the printer properly. Which of the following would likely be causing this? A. Bad HVPS unit B. Broken fuser C. Poor quality paper D. Broken cleaning blade

C. Poor quality paper can result in the pickup rollers not pulling the paper into the printer properly.

You've just replaced Jane's PC with a new Windows 7 machine. What post-installation tool should you run to make the transition as painless as possible for her? A. Windows Activation B. Repair installation C. Windows Easy Transfer D. User State Migration Tool

C. Run the Windows Easy Transfer tool to move all her personal files and familiar settings, like her desktop, to the new computer.

You've just replaced Jane's PC with a new Windows 7 machine. What post-installation tool should you run to make the transition as painless as possible for her? A. Windows Activation B. Repair installation C. Windows Easy Transfer D.User State Migration Tool

C. Run the Windows Easy Transfer tool to move all her personal files and familiar settings, like her desktop, to the new computer.

SATA drive technology brings many advantages to hard-drive storage. Which of these is NOT one of those advantages? A Thinner cables for improved airflow B Support for hot-swapping C. Sixteen drives on a single SATA cable D Faster transfer speeds than PATA

C. SATA technology brings many advantages, but one of its most notable features is the lack of multiple drives per cable. Unlike other drive technologies, SATA uses a single cable for every drive and there are no master/slave or multiple drives per cable.

Which type of flash memory card is currently the most popular? A. CompactFlash B. Memory Stick C. Secure Digital D. SmartMedia

C. Secure Digital cards are the current kings of the marketplace.

In which of these instances would you most likely install a run of STP? A Increase the strength of a wireless network between buildings B Connect different floors of a building C Connect devices where electrical noise might be an issue D Connect high speed links between switches

C. Shielded Twisted Pair cabling is useful when additional shielding is needed to protect against any type of electromagnetic interference. Manufacturing floors usually contain large pieces of industrial equipment that can interfere with non-shielded cabling.

Your ISP offers email over POP3. What port number should be opened on your firewall to allow POP3 to work properly? A tcp/20 B tcp/25 C tcp/110 D tcp/23

C. TCP port 110 is used for the Post Office Protocol version 3. This protocol is one of the most common used for email clients. Email servers generally communicate between each other using the Simple Mail Transfer Protocol (SMTP) over TCP port 25.

A customer complains that an important disc is stuck in the computer's DVD-ROM drive. What should you recomment to the customer? A. To get a screwdriver and disassemble the drive B. To format the disc using CDFS C. To use a paper clip to eject the tray D. To dispose of the drive and replace the media

C. Tell the customer to use a paper clip to eject the DVD-ROM tray. Disassembling the drive is not necessary, and the customer shouldn't be told to do this. If the disc is rewritable, formatting it would erase the contents, even if you could format as CDFS in this scenario. Never tell a customer to dispose of a DVD-ROM drive; they rarely fail.

What throughput speed should you expect from a SATA Revision 3.0 interface? A 3.0 gigabits per second B 1.5 gigabits per second C 6.0 gigabits per second D 4.5 gigabits per secon

C. The 3.0 version of SATA can have theoretical throughputs of 6 gigabits per second

What kind of processor package is associated with the AMD socket AM2? A SECC B LGA C PGA-ZIF D DIPP

C. The AMD sockets listed in the CompTIA exam requirements are primarily PGA-ZIF sockets, except for the LGA-based Socket F.

What color do EFS files display in by default? A. Blue B. Black C. Green D. Red

C. The Encrypting File System (EFS) is the Windows built-in file encryption standard. EFS filenames display in green by default.

What type of cabling is associated with F connectors? A Fiber B Shielded twisted pair C Coaxial D Unshielded twisted pair

C. The F connector is commonly associated with cable television or cable modem connections running over a coax cable.

Which of these fiber connectors would fit into the smallest form-factor? A ST connector B RJ11 connector C LC connector D SC connector

C. The LC connector has a few different names; Lucent Connector, Local Connector, or the aptly-named Little Connector.

Which type of cache holds data that is exiting the CPU? A. L4 B. L3 C. L2 D. L1

C. The Level 2 cache, also known as the L2 or back-side cache, holds data that is exiting the CPU and is waiting to return to RAM.

Which NTFS permission allows the user to view the contents of a directory and to navigate to its subdirectories? A. Write B. Read C. List Folder Contents D. Modify

C. The List Folder Contents permission (known simply as List in previous versions) allows the user to view the contents of a directory and to navigate to its subdirectories. It does not grant the user access to the files in these directories unless that is specified in file permissions.

The speed rating PC 1066 is linked to which DRAM technology? A. SDRAM B. DDR-SDRAM C. RDRAM D. EDO

C. The PC1066 speed rating is unique to RDRAM. Other common speeds were PC600, PC700, PC800 and PC1200.

If you install a driver on your system and it causes problems, which tool can you use to roll back to a previous driver? A. Driver Manager B. msconfig C. Device Manager D. System Info

C. The Roll Back Driver option in Device Manager is a great tool for fixing driver problems.

In Windows Vista, which System Recovery Options menu choice copies all the files from a backup and overwrites anything currently on the system? A. System Restore B. Startup Repair C. Windows Complete PC Restore D. Windows Diagnostic Tool

C. The Windows Complete PC Restore choice copies all the files from a backup and overwrites anything currently on the system.

You're replacing a broken adapter card with the same make and model of PCI card, and you notice there's a new driver on the manufacturer web site. The instructions for the new driver clearly state to uninstall the existing driver before installing the new driver. What would be the best way to uninstall these drivers in Windows XP? A Event Manager B Task Manager C Device Manager D Computer Manager

C. The Windows XP Device Manager can be used to determine the status and availability of a driver, and it's a centralized place for uninstalling drivers or reverting to previous drivers.

The Windows XP disc contains which two tools for checking hardware and software compatibility? A. The HCL and the HAL. B. the HCL and the Windows Catalog C. The Windows Catalog and the Upgrade Advisor. D. The Upgrade Advisor and the HCL.

C. The Windows XP disc contains the Windows Catalog and the Upgrade advisor for checking hardware and software compatibility.

What do you call the time it takes to draw the entire screen and get the electron guns back to the upper-left corner? A. Horizontal refresh rate B. Horizontal redraw rate C. Vertical refresh rate D. Vertical redraw rate

C. The amount of time it takes to draw the entire screen and get the electron guns back to the upper left corner is called the vertical refresh rate.

You just investigated a computer that is suffering from intermitten shutdowns. You note that the RAM modules are overheating. What is the best solution? A. Install a heat sink on the memory controller B. Install more CPU fans C. Install heat sinks on the RAM modules. D. Install a heat sink on the chipset.

C. The best thing to do in this situation is to install heat sinks on the RAM modules. On older computers the memory controller in a northbridge doesn't usually overheat because it already has a heat sink; on newer computers it is within the CPU. A CPU can only have one fan. You can't install more; although an additional case fan might help. The chipset also usually has a heat sink.

What refers to the number of characteristics of a particular sound captured when sampling? A. Sample rate B. Kilohertz C. Bit depth D. Quality rating

C. The bit depth refers to the number of characteristics of a particular sound captured when sampling.

What happens to bus speed and power usage when you plug multiple devices into a USB hub? A. The bus speed stays constant, but power usage increases. B. The bus speed increases because each device brings a little burst; power usage increases. C. The bus speed decreases because all devices share the same total bandwidth; power usage increases. D. The bus speed decreases because all devices share the stame total bandwidth; power usage decreases.

C. The bus speed decreases because all devices share the same total bandwidth; power usage increases.

The Design Of Super Mario Bros. Was Heavily Influenced By Which Novel? A. The Great Gatsby B. Dr Jekyll and Mr Hyde C. Alice's Adventures in Wonderland D. Gulliver's Travels

C. The classic video game Super Mario Bros. has more than a few similarities to the iconic novel Alice’s Adventures in Wonderland including magic mushrooms, anthropomorphic animals, mysterious portals and passageways, and an all around sort of suspension of reality as we know it that marks both trips through the game and the novel. The comparison isn’t merely the parlor talk of video game geeks though, as Super Mario Bros. creator Miyamoto himself cited the influence of Alice’s Adventures in Wonderland in an interview with Business Week magazine: It started with a simple idea. I thought: “I wonder what it would be like to have a character that bounces around. And the background should be a clear, blue sky.†I took that idea to a programmer, and we started working on it. Mario ended up being too big, so we shrank him. Then we thought, “What if he can grow and shrink? How would he do that? It would have to be a magic mushroom! Where would a mushroom grow? In a forest.†We thought of giving Mario a girlfriend, and then we started talking about Alice in Wonderland.

What is the default subnet class of the IP address 165.245.77.2? A Class D B Class A C Class B D Class C

C. The default range of a class B subnet mask is for IP addresses that start with 128 through 191

You pick up a sheet from a laser printer, run your thumb across it, and the image comes off on your thumb. What should you replace? A. Toner B. EP unit C. Fuser D. Drum

C. The fuser isn’t heating the toner and fusing it into the paper.

You copy a file from a folder on a hard drive formatted as NTFS, with permissions set to Read for everyone, to a USB thumb drive formatted as FAT32. What permissions does the copy of the file have? A. Read-only for everyone B. Full Control for everyone C. None D. You can't copy a file from an NTFS drive to a FAT32 drive.

C. The key here is that you are copying from an NTFS hard drive to a FAT32 USB drive. Copying from an NTFS-based partition to a FAT- or FAT32-based partition creates two copies of the object; the copy of the object in the new location has no permissions at all.

Which component is usually removed to access a laptop's motherboard and other internal components? A. Display B. Bezel C. Keyboard D. Battery

C. The keyboard is the component usually removed to access a laptop's motherboard and other internal components. The bezel is not a component of the laptop; it is usually a piece of plastic, but a bezel might need to be removed to get access to the keyboard.

You are down under your desk organizing some wires when you notice that the activity light on your NIC is blinking erratically. Is there a problem? A. Yes, the activity light should be on steadily when the computer is running. B. Yes, the activity light should be blinking steadily, not randomly. C. No, the light blinks when there is network traffic. D. No, the light blinks to show bus activity.

C. The lights should be blinking to show activity- this is normal.

What is the maximum capacity for a standard SD card? A. 1 GB B. 2 GB C. 4 GB D. 8 GB

C. The maximum capacity for a standard SD card is 4 GB.

You just completed a CPU installation. However, when you turn on the computer, the POST sounds a series of beeps, and the system won't boot. What is most likely the cause? A. The mouse is not plugged it. B. The operating system is corrupted. C. The CPU is not properly seated. D. The fan is running too fast.

C. The most likely cause is that the CPU needs to be reseated, or there is a RAM problem. None of the other answers would cause the POST to issue a series of beeps. Also, the POST doesn't look for operating system corruption, it is relegated to hardware only.

What technology enables 802.11n networks to make multiple simultaneous connections and thus improve speeds over previous Wi-Fi standards? A. Use of the 2.4-GHz frequency B. Use of the 5-GHz frequency C. MIMO D. WPA2

C. The multiple in/multiple out (MIMO) technology implementing multiple antennas enables 802.11n networks to run at much faster speeds than previous Wi-Fi networks.

When a user types, a laptop's screen displays letters and numbers instead of only letters. What should you check first? A. Fn key B. LCD cutoff switch C. Num Lk key D. Scroll Lock key

C. The number lock key (Num Lk) can enable or disable the numeric keypad. This might be necessary if the user inadvertently turned it on or disconnected an external keyboard from the laptop. Some laptops require you to press CTRL+Num Lk to enable or disable the numeric keypad. Laptops are usually color-coded: White options require the CTRL key and blue options require the Fn key. In this scenario, pressing the Function (Fn) key is not necessary when pressing the Num Lk key. The LCD cutoff switch is used to turn off the buld that lights the LCD. The scroll lock key is used little but is meant to lock any scrolling done with the arrow keys.

You are installing a new server into a large data center, but you've not been provided with any power information about the data center or the server. Which of these would be the best way to proceed? A Use a multimeter to verify that the data center power is 115V or 230V. If it is, connect the server and power on normally. B Connect a surge suppressor to the data center power to regulate the flow to the server. C Use a multimeter to verify the data center power and check the server manual to verify any manual voltage switches. D Plug in the data center power to the computer. All modern power supplies are auto-switching and will adjust to the input.

C. The power input to a server must match the settings of the power supply. Although many power supplies are auto-switching, you can't assume that a power supply will adjust to any input. Always check your manuals and verify your power source before connecting a new piece of equipment.

Printer drivers vary based on which of the following? A. The operating system being used on the file server B. The operating system being used on the printer host C. The operating system being used on the client computer D. None of the above

C. The printer drivers vary based on the operating system being used on the client computer. If a printer is attached to more than one operating system, you have to make sure you have the appropriate driver for each operating system in use.

At one of your customer's locations, two users share the same Windows 7 computer. The first user creates a document intended to be used by both users and then logs off the computer. The second user logs on and types the name of the document in the Start menu but the document cannot be found. What is the problem? A. The document is locked. B. The document is set to be hidden. C. The document is owned by the first user. D. The document is encrypted.

C. The problem in this scenario is that the document is owned by the first user. By default, files created under one user account cannot be seen by another user account. For the second user to see the file, the user needs to become an owner or needs to be given permission to the file. In this scenario the user never locked, hid, or encrypted the document in any way; this is simply a default security precaution that is built into Windows.

If you attempt to scan an item and the scanner light assembly does not move, what is most likely the problem? A. The scanner is frozen. B. The scanner is broken. C. The scanner light assembly is locked. D. The scanner light assembly is resetting.

C. The scanner light assembly is most likely locked.

You need to connect securely from your laptop on a public wireless network to a remote computer at your office. Which of these protocols is commonly used to create an encrypted communication link to another computer? A netstat B telnet C ssh D ping

C. The secure shell (ssh) protocol is commonly used to encrypt data when working at the command line of a computer.

Which of the following laptop states keeps the session in memory and puts the computer in a low-power state that you can quickly resume from? A. Hibernate B. Shut down C. Sleep D. Lock

C. The sleep option keeps the session in memory and puts the computer in a low-power state that you can quickly resume from.

What command would you use to view the path taken by an Ethernet packet? A. ping B. ipconfig C. tracert D. nslookup

C. The tracert command traces the path a data packet takes to get to its destination.

Which of the following would most likely be the cause of vertical white lines running down a page coming from a laser printer? A. A scratch in the EP drum B. Jammed paper C. Foreign matter on the transfer corona wire D. Improper driver

C. The vertical white lines are caused by foreign matter (more than likely toner) caught on the transfer corona wire.

You're building a web server that is only going to communicate over encrypted connections. What port would you most likely need to open in your firewall to allow this communication? A tcp/25 B udp/53 C tcp/443 D tcp/80

C. This answer is a two-step process. First, you need to know that encrypted web communication usually occurs with the HTTPS protocol. Secondly, you'll need to know that HTTPS is almost always configured to use TCP port 443.

Laptops often allow you to switch the display to an external monitor. This is accomplished through what type of key combination? A. Alt B. Ctrl C. Fn D. Shift

C. This is accomplished through an Fn key combination (for example, Fn+F8 on most Dells, Fn+F4 on many HPs, and so on).

Which class of fire extinguisher is meant for electrical fires? A. Class A B. Class B C. Class C D. None of the above

C. Three major classes of fire extinguishers are available, one for each type of flammable substance: A for wood and paper fires, B for flammable liquids, and C for electrical fires.

What information do you need to connect an Android-based tablet to an IMAP account? A. POP3 server DNS name B. Username and password C. Username, password, sending and receiving server addresses D. Exchange server name, username, and password.

C. To connect an Android-based tablet to an IMAP account, you'll need a user-name and password and the sending and receiving server addresses.

A client calls and is upset that he's misplaced his iPad. The mobile device has literally thousands of client records, including business addresses, e-mail addresses, phone numbers, and, in some cases, credit card information. What should he do first? A. There's nothing he can do. B. He should call his ISP and have them track his iPad. C. He should access his iCloud account and reset his iPad to erase all personal data. D. He should purchase another iPad and sync with his iTunes account. This automatically erases the information on the old tablet.

C. To protect his data, the client should log in to his iCloud account and reset the iPad and erase all personal data.

After installing a thumbprint reader, you must also __________ it. A. Reset B. Defrag C. Train D. Enable

C. Training is the process by which the reader scans and stores the fingerprints you want to use.

At what speed does USB 2.0 run? A. 12 Mbps B. 120 Mbps C. 480 Mbps D. 840 Mbps

C. USB 1.1 runs at 12 Mbps, and USB 2.0 runs at 480 Mbps.

What is the maximum cable length for USB 2.0? A. 1.2 meters B. 1.2 yards C. 5 meters D. 5 feet

C. USB has a maximum cable length of 5 meters.

What is WSXGA+ resolution? A. 1024x768 B. 1280x1024 C. 1680x1050 D. 1920x1080

C. WSXGA+ resolution is 1680x1050.

What is used to identify each host by its unique number and determine specifically which addresses are allowed to access the network? A. Port forwarding B. SSID C. MAC filtering D. Port triggering

C. When MAC filtering is implemented, you identify each host by this number and determine specifically which addresses are allowed access the network.

Which of the following statements about booting in Windows 7 is true? A. BIOS does not use bootmgr. B. UEFI looks for the MBR, which finds the boot code that launches bootmgr. C. BIOS looks for the MBR, which finds the boot code that launches bootmgr. D. UEFI does not use bootmgr.

C. When booting Windows 7, the BIOS looks for the MBR, which finds the boot code to launch the OS.

Leroy's old Windows XP Home system works beautifully, but he doesn't have a printer. He purchases a new laser printer, turns it on and plugs it into his USB port. After not noticing anything, he assumes the printer installs, but when he tries to print, he gets an error saying there are no printers installed on this computer. Which of the following is most likely the mistake he made that led to this problem? A. He used USB instead of parallel B. He turned off Automatic Device Detection in Control Panel C. He forgot ot install the printer's device drivers D. He didn't configure the new printer as default

C. While Windows can often install a printer using it's own built-in drivers, unrecognized USB devices won't function without proper drivers installed first.

What is the backup utility for Windows XP called? A. Win Backup B. Backup 2000 C. NTBackup D. NSBackup

C. Windows XP uses NTBackup to back up files.

When performing automatic updates, Windows uses which feature to download addition updates for other Microsoft Products? A. Software notifications B. msinfo32 C. Microsoft update D. Registry

C. Windows uses the Microsoft update feature to download additional updates for other Microsoft products, such as Microsoft Office.

What tool would you use to enable auditing on a local level? A. AD Policy B. Group Policy C. Local Security Policy D. User Settings

C. You can enable local auditing through Local Security Policy.

Which tool can be used to configure the size of the Security log file in Windows 7? A. Task Manager B. Performance C. Event Viewer D. MSConfig

C. You can set maximum log size by right-clicking on the log in the Event Viewer and selecting Properties. By default, when a log fills to its maximum size, old entries are deleted in FIFO order.

You can upgrade directly to Windows 7 from which of these operating systems? A. Windows 2000 B. Windows XP C. Windows Vista D. All of the above

C. You can upgrade directly to Windows 7 from Windows Vista.

You can upgrade directly to Windows 7 from which of these operation systems? A. Windows 2000 B. Windows XP C. Windows Vista D. All of the above

C. You can upgrade directly to Windows 7 from Windows Vista.

Which of the following tools would enable you to stop a user from logging on to a local machine but still enable him to log on to the domain? A. AD Policy Filter B. Group Policy Auditing C. Local Security Policy D. User Settings

C. You can use Local Security Policy to stop someone from logging on to a local machine.

Which of the following is the correct path for a file named yoda.txt on the C: drive in a directory called Jedi that's in a directory called Rebels that's in the root directory? A. C:\Root\Jedi\yoda.txt B. C:\Jedi\Rebels\yoda.txt C. C:\Rebels\Jedi\yoda.txt D. C:\Root\Rebels\Jedi\yoda.txt

C. You'll find the yoda.txt file in the C:\Rebels\Jedi\ folder

Which of the following commands would you use to install the Recovery Console? A. Start | Run, then type d:\i386\winnt32 /copydir:recovery_console B. Start | Run, then type d:\i386\winnt32 /cmd:command_line C. Start | Run, then type d:\i386\winnt32 /cmdcons D. Start the computer with the Windows Vista installation disc

C. d:\i386\winnt32 /cmdcons is what you would type in at the run dialog box to install the Recovery console on a Windows XP computer. WINNT32 is the setup file to run an installation of Windows XP while in the GUI. By adding the switch /cmdcons, you will enable setup to install the Recovery Console.

What command enables you to make a new directory in a Windows 7 Professional system? A. mf B. mkfol C. md D. makedir

C. md enables you to make a directory or folder. You can also use the older form, mkdir.

What tool enables you to modify which programs start when Windows starts? A. msstartup B. msinfo32 C. msconfig D. ipconfig

C. msconfig enables you to select the processes and services that startwith Windows.

What is the proper order of the laser printing process? A. process, clean, charge, expose, develop, transfer and fuse B. clean, expose, develop, transfer, process, fuse and charge C. process, charge, expose, develop, transfer, fuse and clean D. clean, charge, expose, process, develop, fuse and transfer

C. process, charge, expose, develop, transfer, fuse and clean is the proper process

CFS

CFS Central File System, Common File System, Command File System

CIFS

CIFS Common Internet File Systemp The Common Internet File System (CIFS) is the standard way that computer users share files across corporate intranets and the Internet. An enhanced version of the Microsoft open, cross-platform Server Message Block (SMB) protocol, CIFS is a native file-sharing protocol in Windows 2000.

CRT

CRT cathode-ray tube

Luminance

Candela per square meter (cd/m^2) more is better

CRT

Cathode Ray Tube

What two types of networks can be used to gain access to the Internet on a mobile device?

Cell phone networks and WiFi networks

CFS

Central File System or Common File System or Command File System

CPU

Central Processing Unit

passwd

Changes user's password

Ping Local IP

Checks local config, adaptor, link signal

cmd cls

Clear screen

RG-59

Coax cable with a 75-ohm impedance

RG-6

Coax cable with a 75-ohm impedance

CCFL

Cold Cathode Fluorescent Lamp

CCFL

Cold Cathode Fluorescent Lamp A cold cathode is a cathode (an electrode that emits electrons) that is not electrically heated by a filament. It is used in gas-discharge lamps, such as neon lamps, discharge tubes, and some types of vacuum tube. The other type of cathode is a hot cathode, which is heated by electric current passing through a filament. A cold cathode does not necessarily operate at a low temperature: it is often heated to its operating temperature by other methods, such as the current passing from the cathode into the gas.

CAS

Column Address Strobe

Commit Charge

Commit charge is a term used to describe the total amount of pageable virtual address space. If your PC is sluggish and locks up, your commit charge will be extraordinarily high. To fix this, buy more RAM.

CIFS

Common Internet File System

COMx

Communication Port (x=Port Number)

CNR

Communications and Networking Riser

CD

Compact Disc

CDFS

Compact Disc File System

CD-ROM

Compact Disc-Read-Only Memory

CD-RW

Compact Disc-Rewritable

CAPTCHA

Competely Automated Public Turing Test to tell Computers and Humans Apart

CMOS

Complementary Metal-Oxide Semiconductor

CAPTCHA

Completely Automated Public Turing Test To Tell Computers and Humans Apart

A custom configured PC with surround sound audio, HDMI output, and a compact form factor would be MOST suited to which of the following applications? a) Thick Client b) Gaming PC c) Audio / Video Editing Workstation d) Home Theater PC

D

A customer states their computer was fine until yesterday when they heard a pop noise and the computer stopped working. Which of the following components should the technician test FIRST? A. Main system board B. Processor C. Hard disk drive D. Power supply

D

A first level help desk support technician receives a call from a customer and works with the customer to resolve the call for several minutes unsuccessfully. Which of the following should the technician do NEXT? A. Continue working with the customer until the problem is resolved. B. Explain to the customer that they receive a call back when someone more qualified is available. C. Explain to the customer that the problem cannot be resolved and end the call. D. Escalate the call to another technician.

D

A small shock of electricity transferred from a computer or other electronic component to a person is known as: A. EMF. B. RFI. C. EMI. D. ESD.

D

A technician determines through testing that their probable cause theory is correct. Which of the following is the NEXT step in the troubleshooting process? A. Question the user and identify any user changes to the computer. B. Verify full system functionality. C. Leave a list of instructions for the user to implement. D. Establish a plan of action to resolve the problem.

D

A technician has a customer with a Windows 7 Home Basic machine who wants to play movies through the Media Center program. Which of the following should the technician do to allow this to happen? A. Upgrade the Media Player program to the Media Center program. B. Enable the Media Center program. C. Upgrade the system to Windows 7 Business. D. Upgrade the system to Windows 7 Home Premium Edition.

D

A technician has replaced a memory stick in a computer. After the operating system starts to boot, the computer displays a BSOD. Which of the following is the MOST likely cause? A. The chipset firmware needs to be updated B. The motherboard has failed C. The hard drive has failed D. The memory is not seated properly

D

A technician is deploying Windows 7 in a company. The supervisor wants to ensure that greatest flexibility is provided for the employees when printing. Which of the following lists defines all of the supported Windows 7 interfaces? a) USB, Network, LPT, and Wireless b) USB, IR, Bluetooth, and Network c) IR, LPT, and USB d) IR, LPT, Network, USB, and Wireless

D

A technician is installing an old Windows 2000 application on a Windows 7 workstation. Which of the following will allow the application to be installed correctly? A. Run Windows Upgrade Advisor B. Disable UAC C. Upgrade the application software D. Install in compatibility mode

D

A technician is trying to install an OS to a remote PC without the use of physical media. Which of the following is used to perform this task? A. FTP B. Initiate a network share C. Telnet D. PXE boot environment

D

A technician observes that the lights in a customers building flicker periodically during the course of the day. Which of the following should the technician recommend to protect the customer’s equipment? A. A power supply B. A generator C. A heavy duty electrical cord D. A UPS

D

A user calls about their workstation not powering on in the morning. According to the troubleshooting theory, which of the following steps should the technician perform a) Document the resolution to problem. b) Purchase the appropriate replacement part. c) Verify that the workstation is able to boot up. d) Ask the user about any previous changes.

D

A user is trying to use their laptop with a video projector and cannot get the projector to display the computer screen. Which of the following should the technician try FIRST? A. Check the power cable to the projector. B. Put a new bulb in the projector. C. Replace the video cable to the projector. D. Toggle the function key for the display in the laptop keyboard.

D

A user reports that their machine will not power up. The technician has already tested the wall outlet and the power cord, which are functioning properly. Which of the following should the technician do NEXT? A. Test the machine on a UPS battery backup. B. Plug the machine into a different wall outlet. C. Check to make sure the motherboard is seated correctly. D. Test the machine with a power supply tester.

D

A user reports that their workstation is having trouble connecting to the Internet. Which of the following should the technician do FIRST to begin troubleshooting the issue? A. Establish a plan of action to resolve the problem. B. Establish a theory of probable cause. C. Reset the users computer and then test the connection. D. Identify any changes the user may have made.

D

A user reports that when trying to input data using a touch screen, items other than the ones being touched are displayed. Which of the following would be the FIRST action to take? A. Ensure the users PC has the latest touch screen drivers installed. B. Have the user check to see if the touch screen control cable is loose. C. Have the user run a complete virus scan. D. Ensure the user has calibrated the screen.

D

After the BIOS message disappears, which of the following would a technician press to boot a PC into Safe Mode? A. Press F1 B. Press F2 C. Press F5 D. Press F8

D

After verifying full system functionality, which of the following should a technician do NEXT when troubleshooting a problem? A. Establish a theory of probable cause. B. Identify user changes to the computer. C. Move on to the next issue that requires troubleshooting. D. Document findings, actions, and outcomes.

D

Before using Registry Editor you should: A. Set a System Restore Point B. Backup all of your data C. Kiss your ass goodbye D. Backup your Registry

D

Cain wants to install a wireless access point in his house, but he is unsure of the different wireless technologies in the market. Which wireless access point operates ONLY on the 5-GHz frequency? A. 802.11g B. 802.11b C. 802.11n D. 802.11a

D

During troubleshooting, the technician determines the cause of the problem. Which of the following is the NEXT step in the troubleshooting theory? A. Document findings, actions, and outcomes. B. Verify full system functionality and if applicable implement preventative measures. C. Establish a theory of probable cause. D. Establish a plan of action to resolve the problem and implement the solutions.

D

IEEE1394b is capable of transfer rates of up to: A. 12Mbps B. 400Mbps C. 480Mbps D. 800Mbps

D

In 64-bit versions of Windows, all drivers... A. Must be installed individually B. Be encrypted C. Be set with a PIN code D. Be signed

D

Printouts from a printer are a random mix of letters, numbers, and symbols. Which of the following is MOST likely the cause of this problem? A. The toner cartridge needs to be replaced. B. Duplex printing is selected on a single-sided printer. C. The print spooler is full and needs to be restarted. D. The incorrect printer driver is installed.

D

Sections of the registry in Windows that contain system, software, device and user information are called: A. archives B. partitions C. folders D. hives

D

The customer calls a technician and informs them that their keyboard was cleaned with a solution, and now their fingers sting. Where would the technician or medical personnel find information about the substance on the keyboard? A. The MSDS B. The local fire department C. The Standard Operating Procedures manual D. The facilities department of the company

D

The most effective use of clusters on a hard drive is in which of the following file systems? A. FAT12 B. FAT16 C. FAT32 D. NTFS

D

The on-site technician is asked to load a copy of the companys purchased software on a personal computer. The technician should FIRST: A. notify the companys owner of the breach B. leave the premises and call local law enforcement C. advise the individual that downloading unlicensed software is illegal D. verify the install is allowed under the companys licensing agreements

D

To eliminate the printer as the problem, first check that the printer is on, and then___________. A. reset the printer B. Install printer driver C. Reboot the printer D. Print a printer self-test page

D

When a user was installing a new program, the computer suddenly restarted. Now when the computer starts, it gets partially through the boot process, then reboots. Which of the following is the QUICKEST method to get the computer running without losing any of the users data? A. Reinstall the OS B. Perform a factory restore C. Boot into Safe Mode and perform Windows Restore D. Boot using Last Known Good Configuration

D

Which of the following broadband technologies would typically have a different uplink and downlink speed? A. T-1 B. Fiber C. SDSL D. ADSL

D

Which of the following cable types is required to be fire-resistant and does not emit toxic fumes when exposed to high temperatures? A. STP B. Coaxial C. UTP D. Plenum

D

Which of the following commands can be used to verify the gateway IP address on a local computer? A. net use B. telnet C. ping D. ipconfig

D

Which of the following does PXE use? a) USB b) DVD-ROM c) CD-ROM d) NIC

D

Which of the following is BEST to use when adding a network printer in Windows? A. USB B. COM5 C. LPT1 D. TCP/IP

D

Which of the following is a common protocol used to send email? A. POP3 B. FTP C. SFTP D. SMTP

D

Which of the following is a private IP address? A. 12.25.153.17 B. 169.250.10.10 C. 192.165.0.1 D. 172.16.1.1

D

Which of the following is a user replaceable memory in a computer system? A. SRAM B. CMOS C. ROM D. DRAM

D

Which of the following is an advantage of a 64-bit processor versus a 32-bit processor? A. The ability to access memory beyond 2GB B. Lower power requirements for hard drive interfaces C. The ability to access virtual memory D. A wider data path to handle program execution

D

Which of the following is an example of EMI? A. Degraded LAN performance due to too many Bluetooth devices being used in close proximity B. Degraded LAN performance due to CAT5 cable being wound too tightly C. Degraded LAN performance due to a cellular phone being used in close proximity D. Degraded LAN performance due to CAT5 and AC power cables in close proximity

D

Which of the following is characterized by the creation of a secure tunnel into a known server location? A. HTTPS B. FTP C. SSL D. VPN

D

Which of the following is indicated by repetitive flashing lights on a keyboard at POST? A. A password is needed B. An external peripheral error C. A software error D. A hardware error

D

Which of the following is the BEST way to provide power to a laser printer? A. Directly to a UPS B. Directly to a computer via USB cable C. Directly to a power strip D. Directly to a grounded wall outlet

D

Which of the following is the MAXIMUM data rate of IEEE 1394a? A. 20Mbps B. 40Mbps C. 200Mbps D. 400Mbps

D

Which of the following is the MAXIMUM number of primary partitions that can exist on a physical hard drive? A. One B. Two C. Three D. Four

D

If you connect a “cable select†PATA drive to an 80-wire PATA-4 standard cable, which connector would configure the drive as Device 0? A The connecter closest to the motherboard B Either connector will work as Device 0 C None of the connectors will configure Device 0 when using cable select D The connector farthest from the motherboard

D. 80-wire cables are used on later PATA standards to reduce crosstalk interference on the cable, and this standard places Device 0 (the Master drive) on the interface at the end of the cable, farthest from the motherboard.

Which wireless technology is also known as Wi-Max? A. 802.11a B. Bluetooth C. DSSS D. 802.16

D. 802.16 or Wi-Max can transmit up to 10 miles and is often used to cover parts of a city.

What would happen if you were to configure 802.1X on your wireless network? A The network would take advantage of multiple wireless access points B Users on the wireless network would obtain IP and DNS settings automatically C Your wireless network would use encrypted communication D Users would be required to authenticate before gaining access to the network

D. 802.1X is port-based Network Access Control (PNAC, or NAC). With NAC, you can restrict access to a port on the network until the proper authentication mechanisms have been correctly negotiated. This process can limit access to both wireless and wired networks.

You've just replaced a motherboard, and you are now reconnecting all of the internal components. The system contains a single PATA drive configured for cable select, and the drive uses a 40-wire PATA cable. Which connector on the cable would be the best choice for attaching the drive? A The connector farthest from the motherboard B The PATA cable only has a single port C The drive should connect to either connector D The connecter closest to the motherboard

D. A PATA ribbon cable has a motherboard connector and two drive connectors. On a 40-wire cable, the primary drive is attached to the connector that's closest to the motherboard. On later 80-wire cables, the primary drive attaches to the connector that's farthest away from the motherboard.

Placing your phone in a typical protective cover will not protect your phone from: A. Scratches B. Impact C. Small amounts of water D. Immersion in water

D. A cover will not protect your phone from being immersed in water.

Which of the following is an area where you can place a public server for access by people you might not trust otherwise? A. WPS B. NAS C. PAN D. DMZ

D. A demilitarized zone (DMZ) is an area where you can place a public server for access by people you might not trust otherwise. By isolating a server in a DMZ, you can hide or remove access to other areas of your network. You can still access the server using your network, but others aren’t able to access further network resources.

Edgar successfully replaced the display on a laptop (a toddler had taken a ballpoint pen to it), but the customer called back almost immediately complaining that his wireless didn't work. What could the problem be? A. The problems are unrelated, so it could be anything. B. Edgar inadvertently disconnected the antenna from the Mini-PCIe 802.11 card. C. Edgar replaced the display with one without an internal antenna. D. Edgar failed to reconnect the antenna in the new display.

D. A disconnected antenna makes Wi-Fi unhappy.

What is the largest NTFS volume size supported by windows XP? A. 256GB B. 2TB C. 128TB D. 256TB

D. A fixed number of clusters is supported by each operating system, leading to a corresponding maximum volume size. If the maximum NTFS cluster size of 64KB is used, Windows XP can support a single - volume size, of 256TB. When a cluster size of one sector, or 512 bytes, is used, the maximum volume size reduces to 2TB.

You want to add a printer to a network but not add a host computer. Which of the following is an appropriate solution? A. Print monitor B. Print driver C. Print spooler D. Print server

D. A print server is a popular option for adding a printer to the network and not adding a host computer. To be a print server, the network interface card (NIC) in the printer differs from a NIC in a computer in that it has a processor on it to perform the management of the NIC interface and it is made by the same manufacturer as the printer.

Which image includes all the drives required for Windows to run as well as default system settings, programs, and files? A. Development B. Advanced C. Renewal D. Recovery

D. A recovery image is an image that includes all the drives required for Windows to run as well as default system settings, programs, and files.

Which of these connectors is commonly used to configure infrastructure devices? A PS/2 B FireWire C Parallel D Serial

D. A serial connection is commonly seen as a DE-9 or DE-25 connector, although modern implementations may use an RJ-45 connector or USB port. Because of the ubiquity of serial connectivity, it’s common to see serial ports used as a standard for the configuration of infrastructure devices.

If a BSOD occurs, what should you do? A. Replace all the RAM. B. Re-install the operating system. C. Check the RAM settings in the BIOS. D. Wait for it to happen again.

D. A singular BSOD doesn't necessarily mean that the RAM or any other components have gone bad. Often, a single BSOD occurs, but you never see it again. You want to see two or more of the same error before starting into a lengthy troubleshooting session!

Name the primary feature that seperates a smartphone and a tablet. A. iTunes B. OLED screen C. Capacitive touchscreen D. Capability to make telephone calls

D. A smartphone can make telephone calls, while a tablet cannot.

ATA-7 supports transfers of up to what speed? A. 33 MBps B. 65 MBps C. 100 MBps D. 150MBps

D. ATA-7 supports UltraDMA/133, with transfer modes of up to 150 MBps.

All recorded sound formats used in PCs today are derived from which format? A. WAV B. Fraunhoffer C. MP3 D. PCM

D. All recorded sound formats used in PCs today are derived from the PCM format.

One of the computers on the manufacturing floor is having problems with the barcode reader that inventories all new products. Which of these interfaces would most commonly be used with this reader? A MIDI B SCSI C 25-pin serial D USB

D. Although barcode readers are relatively specialized, they almost always use a very common PC interface. In many cases, you'll find a barcode reader using one of the older mini-DIN (PS/2) or the more-common USB connection.

What is one benefit of ESX over VMware Workstation? A. ESX costs less. B. ESX is easier to set up. C. ESX uses less electricity. D. You can move a running VM from one machine to another with ESX.

D. Among the many benefits of ESX over its little brother is the capability of moving a running VM from one machine to another.

What 19-pin connector is often used to transmit high-definition video and audio? A DisplayPort B VGA C BNC D HDMI

D. An HDMI (High-Definition Multimedia Interface) connection is one of the most common video connectors for consumer devices.

How many bits are in an IPv4 address? A 16 B 64 C 24 D 32

D. An IPv4 address consists of four eight-bit octets, for a total of 32 bits. IPv6 expands on this address space, bringing the total to 128 bits.

What is the generic term used for the process to determine the identity of a user logging into a system? A. Identification B. Authorization C. Idemnificaton D. Authentication

D. Authentication is the generic term for determining the identity of a user logging into a system. Authorization is for determining what a user can and cannot do.

Your customer has a computer (called comp112) that has been infected by a worm. The worm has propogated to at least 30 other computers on the network. What should you do first before attempting to remove the worm from the computer named comp112? A. Log the user off the system. B. Boot the system in Safe Mode. C. Run a full virus scan. D. Disconnect the network cable from the computer.

D. Before you do anything else, disconnect the network cable from the computer, in this cas comp112. This can help to isolate the problem. You might also decide to disconnect the network cables from any other systems that were infected by this worm. Sometimes, it is easier to do this at the server room. After the network cable is disconnected, the computer should be shut down (which will log off the user anyway) and rebooted into Safe Mode. Then the worm should be isolated and quarantined. Finally a full virus scan should be run. This of course is just a quick example; you probably need to do more to resolve this problem on all computers concerned.

How can you encrypt an entire drive, including files and folders belonging to other users? A. EFS B. User Account Control C. Administrative Shares D. BitLocker

D. BitLocker Drive Encryption enables you to encrypt an entire drive, including files and folders belonging to other users.

Which of the following are similar to inkjet printers with the exception that there is a small heater used to heat the ink? A. Dye jet B. Heat jet C. Twist jet D. Bubble jet

D. Bubble jet printers are very similar to inkjet with the exception that there is a small heater used to heat the ink.

Clara's laptop has a DVI connector to which she has connected a projector. As she prepares to make her presentation, however, nothing comes on the projector screen. The laptop shows the presentation, and the projector appears to be functional, with a bright white bulp making a blank image on the screen. What's most likely the problem? A. She needs to plug in the projector. B. She's running the laptop on batteries. You need to plug in laptops to use the DVI connector. C. She needs to update her PC Card services to support projectors. D. She needs to press the Function key combination on her keyboard to cycle through monitor modes.

D. Clara needs to press the Function key combination on her keyboard to cycle through monitor modes.

Which of the following tools enables programmers to share objects between applications and computers? A. Task Manager B. Performance console C. bootmgr D. Component Services

D. Component Services enables programmers to share objects between applications and computers.

A computer won't turn on when you press the power button. What shoulld you check first? A. If an operating system is installed B. Documentation C. If the monitor is plugged in. D. If the computer is plugged in.

D. Connections are quite often the culprit outside and inside the computer. If a computer won't turn on, make sure it is plugged securely into an AC outlet.

Which of these video formats can be converted to HDMI or DVI with a passive adapter? A MiniDIN B Plasma C VGA D DisplayPort

D. DisplayPort connection was designed for backwards-compatibility with HDMI and DVI through the use of a passive (non-powered) adapter.

If a user wanted to stretch their desktop across two monitors, what Windows technology would they look for? A. Multiple monitor B. Video replication C. SideCar D. DualView

D. DualView enables a laptop running Windows to stretch the desktop across two monitors. It is a basic version of Multiple Monitor that is only available on desktop PCs. SideCar is a third-party hardware/software solution that enables a desktop PC or laptop to stretch the desktop over multiple monitors but is not included in Windows.

What primary function does DHCP provide? A Identifies the IP subnet B Converts domain names to IP addresses C Provides a loopback address D Automates the configuration of IP addresses

D. Dynamic Host Configuration Protocol is used to automate the assignment and management of IP address configuration settings.

Wearing an anti-static wrist strap while installing a CPU protects _________ from ESD. A. Both B. Neither C. You D. The CPU

D. ESD will not hurt humans, only components, including the CPU.

Ghosting is occurring on paper coming from your laser printer. Which of the following would likely be causing this? A. Bad HPVS unit B. Broken fuser C. Poor quality paper D. Broken cleaning blade

D. Ghosting means you can see light images of previously printed pages on the current page. This is caused by one of two things: bad erasure lamps or a broken cleaning blade.

What is the fastest speed that Hi-Speed USB 2.0 can go? A. 12 Mbps B. 120 Mbps C. 400 Mbps D. 480 Mbps

D. Hi-speed USB 2.0 has a theoretical maximum of 480 Mbps.

Up to how many chained IEEE 1394 devices can be on a single set of resources? A. 4 B. 20 C. 36 D. 63

D. IEEE 1394 transfers data at 400 Mbps and supports up to 63 chained devices on a single set of resources.

What is the speed at which IEEE 1394 transfers data? A. 100 Mbps B. 200 Mbps C. 300 Mbps D. 400 Mbps

D. IEEE 1394 transfers data at 400 Mbps and supports up to 63 chained devices on a single set of resources.

If Windows locks up during the installation, what should you do? A. Press CTRL-ALT-DEL to restart the installation process B. Push the Reset button to restart the installation process C. Press the ESC key to cancel the installation process D. Unplug the computer and restart the installation process.

D. If Windows locks up during the installation, you should unplug the computer and restart the installation process.

If Windows locks up during the installation, what should you do? A. Press CTRL-ALT-DEL to restart the installation process. B. Push the Reset button to restart the installation process. C. Press the ESC key to cancel the installation process. D. Unplug the computer and restart the installation process.

D. If Windows locks up during the installation, you should unplug the computer and restart the installation process.

Your co-worker is having trouble tapping icons on his smartphone. What should you check first? A. Screen orientation B. Geotracking C. Global positioning D. Screen calibration

D. If a user has trouble tapping icons on a smartphone, tablet, or other touch-oriented device, you should check the screen calibration tool. This tool calibrates the screen properly when you place the device on a flat surface with its face up.

The printed output has a white gap in the printing. What should you replace? A. Toner B. EP unit C. Fuser D. Drum

D. If the drum has a scratch on it, it will exhibit this behavior where the scratch is located.

A user tells you that her Windows 7 laptop does not display a picture when it is connected to a projector. However, there is a picture on the laptop's screen. What is most likely the cause? A. Windows 7 does not support multiple displays on laptops. B. The Windows 7 video driver is missing. C. the presentation resolution is too big. D. The laptop external display setting has been turned off.

D. If you can see the display on the main laptop screen, but not the projector, then the laptop external display setting has most likely been turned off. Most laptops come with a toggle button (or alternative display switch) that enables you to switch between the laptop screen, external display, or both.

You work at a PC bench and receive a laptop that has a dim display. You confirm that it is a hardware issue. Which part should be replaced first? A. LCD panel B. Video adapter C. Display harness D. LCD inverter

D. If you see a dim laptop display that cannot be brightened through the use of a button or knob near the keyboard, then the LCD inverter might need to be replaced. The inverter supplies the power to the backlight of the display. If it fails, you should still dimly see the displayed OS; using a flashlight can aid in this. To fix this, you would need to disassemble the LCD and then replace the inverter, which is simply a small circuit board. If the video adapter fails, you won't see anything on the screen, even dimly. This is rarer, and the video adapter is usually integrated into the motherboard. The inverter is often connected to the display harness of the LCD.

One of your customers reports that she walked away from her laptop for 30 minutes. When she returned, the display was very dim. The user increased the brightness setting and moved the mouse but to no effect. What should you do first? A. Replace the LCD screen. B. Check the operating system for corruption. C. Connect an external monitor to verify that the video card works. D. Check if the laptop is now on battery power.

D. It could be that the laptop is now on battery power, which is usually set to a dimmer display and shorter sleep configuration. This indicates that the laptop is not getting AC power from the AC outlet anymore for some reason. The battery power setting is the first thing you should check; afterward, start troubleshooting the AC adapter, cable, AC outlet and so on. It's too early to try replacing the display; try not to replace something until you have ruled out all other possibilities. A dim screen is not caused by OS corruption. No need to plug in an external monitor; you know the video adapter is working, it's just dim.

John has a high-resolution image on his iPad of his 2-year-old son and the family dog. The image initially displays smaller than the screen, so he wants to zoom in to get the details of his son's expression. How can he accomplish this task? A. Click the mouse in the middle of the picture to select it, then use the scroll wheel ont the mouse to zoom in. B. Tap the picture with his index finger on his son's face. C. Right click the picture with his index finger on his son's face. D. Touch his son's face on the screen with his thumb and finger, then pinch outward to scroll in.

D. John can pinch outward with his fingers to zoom in on the image.

"You take a tech call from a user who complains that she gets an error message, ""Hub power exceeded,"" when she plugs her new thumb drive into her USB keyboard's external USB port. Worse, the device won't work. What's most likely the problem? A. Her USB port is defective. B. She has a defective thumb drive. C. She plugged in a Hi-Speed device into a Full-Speed port. D. She plugged one too many devices into the USB hub."

D. Just like the error message said, the thumb drive drew too much power for the hub to handle.

Many motherboard connectors are keyed. What does this keyed connector provide? Select the best answer. A Reduced interference from other components B Reduced voltage requirements C Additional interface grounding D Proper cable connection

D. Keyed connectors ensure that a cable can't be connected backwards or incorrectly. This is especially helpful when working inside of cramped computer cases.

Which protocol provides a mechanism to access and query directory services systems? A. SNMP B. SMTP C. DNS D. LDAP

D. LDAP (Lightweight Directory Access Protocol) provides a mechanism to access and query directory services systems.

Which of these would NOT be a best-practice for preventing ESD? A Keep the humidity over 60% B Avoid touching components directly C Touch your hand on exposed metal section of the computer chassis before working on internal components D Use latex gloves to handle any equipment

D. Latex gloves do not provide any protection against ESD

Steve complains that his Windows 7 laptop isn't snappy enough after upgrading the RAM. What might improve system performance? A. Add more RAM B. Replace the power supply. C. Replace the battery. D. Replace the HDD with an SSD.

D. Replacing the HDD with an SSD will speed up the system.

Ricardo's Windows XP installation has failed. What file should he check to see What files failed to copy? A. Install.log B. Setup.log C. Setup.txt D. Setuplog.txt

D. Ricardo should check Setuplog.txt

The power supply of your computer lists these specifications on the label: Input: 100-120V ~ / 4.0A 220-240V ~ / 2.0A What does this information mean? A The power supply uses 4 amps of power when using a 220-240V AC power source. B The power supply can support both 100-120V DC and 220-240V DC power sources. C The power supply uses 2 amps of power when using a 110-120V DC power source. D The power supply can support both 100-120V AC and 220-240V AC power sources

D. Many computer power supplies are switched-mode power supplies that can support multiple voltage inputs. On these specifications, both 100 through 120 volt and 220 through 240 volt power sources are supported. Some power supplies can automatically switch between these input voltages and others have a physical switch on the outside of the power supply. You would normally switch the power input value based on your country’s power specifications. The squiggly tilde (~) designates an alternating current (AC). If the specifications showed a solid line above a dashed line, it would be referencing direct current (DC). The amperage used by the power supply will differ when using different voltages, so the input amperage is listed as different values at 100-120 volts versus 220-240 volts.

Which of the following should Mary set up on her Wi-Fi router to make it the most secure? A. NTFS B. WEP C. WPA D. WPA2

D. Mary should set up WPA2 on her Wi-Fi router.

What mechanism is used by most inkjet printers to push ink onto the paper? A. Electrostatic discharge B. Gravity C. Air pressure D. Electroconductive plates

D. Most inkjet printers use electroconductive plates to push the ink onto the paper.

A company salesperson just returned to the United States after 3 months in Europe. Now the salesperson tells you that the PC, which worked fine in Europe, won't turn on. What is the best solution? A. Install a new power supply. B. The computer will not work in the United States due to European licensing. C. Install a power inverter to the power supply. D. Change the voltage from 230 to 115.

D. Most likely, the voltage selector was set to 230 V so that it could function properly in Europe. It needs to be changed to 115 V so that the power supply can work properly in the United States. Make sure to do this while the computer is off and unplugged.

Your Windows XP computer at home continues to lock up over and over again when you are working on important projects. While doing some troubleshooting, you open the Task Manager and notice your PC has a high commit charge. What does this tell you about your system and what should you do about it? (Choose the BEST answer.) A. The hard drive is almost filled and is causing lock ups, so install a new one with a larger capacity. B. Your CPU is running near 100% usage and is causing lock-ups, so you need to purchase a faster CPU. C. Most of your available memory address space has been taken up causing lock-ups, so increase your virtual memory. D. Most of your available memory address space has been taken up causing lock-ups, so you need more physical RAM.

D. Most of your available memory address space has been taken up causing lock-ups, so you need more physical RAM. Commit charge is a term used to describe the total amount of pageable virtual address space. If your PC is sluggish and locks up, your commit charge will be extraordinarily high. To fix this, buy more RAM.

What do most techs call a toner or tone generator? A. TDR B. UTP C. UDP D. Fox and Hound

D. Most techs refer to a toner or tone generator as a Fox and Hound, the name of a popular brand of tone generator.

Which tool would you be using if you were setting the computer to boot with the Selective Startup feature? A. Task Manager B. Recovery Console C. Safe Mode D. Msconfig

D. Msconfig enables you to modify the startup selection. You can boot the computer in different modes with Msconfig.

Which of these light sources is commonly associated with multimode fiber? A Green laser B Incandescent C Red laser D Light-emitting diode

D. Multimode fiber is used for relatively short distances, so a high-powered (and expensive) light source is not necessary. For many of these installations, an LED light is used to transmit information from one side of the fiber to the other.

Which Windows 7/Vista files replaced NTLDR? A. bootmgr.exe, bootsect.dos, io.sys B. io.sys, win.exe, bootmgr.exe C. ntdetect.exe, ntoskkrnl.exe, io.sys D. bootmgr.exe, winload.exe, and winresume.exe

D. NTLDR is the boot file for Windows XP, 2000, and NT operating systems. It was replaced in Windows Vista (and continuing on through Windows 7) with bootmgr.exe, and winresume.exe. Bootsect.dos is used with NTLDR if an older dual-boot system is required such as Windows NT and Windows 98. Io.sys is the MS-DOS core file that contains device drivers and the initialization program; it works along with msdos.sys as the main OS files for DOS. Ntdetect.exe is a known Trojan, watch out for it; ntdetect.com on the other hand is a component of Windows NT systems that detects basic hardware at startup. Ntoskrnl.exe was originally the main core file for Windows NT systems but it is still used through Windows 7.

Which mobile device screen technology uses no backlight? A. CCFL B. LCD C. LED D. OLED

D. OLED technology does not use a backlight.

Which is the best password for the user Joy, who has a pet named Fido and a birth date of January 8, 1982? A. joy1982 B. joylovesfido C. 1982cutie D. oddvr88*

D. Of the choices listed, oddvr88* would be the best password; it has a non-alphanumeric character, which makes it more difficult for a hacker to crack.

What is another name for MAC filtering? A. Pharming B. Sanitation C. Disabling SSID D. Network Lock

D. On a number of wireless devices, the term network lock is used in place of MAC filtering, and the two are synonymous.

Ralph suspects a bad RAM stick is causing Windows to fail to boot. What default Windows tool can he use to check the RAM? A. MEMMAKER B. Memtest86+ C. Windows RAM Diagnostics Tool D. Windows Memory Diagnostics Tool

D. Ralph should use the Windows Memory Diagnostic Tool to scan his RAM.

Ricardo's Windows XP installation has failed. What file should he check to see what files failed to copy? A. Install.log B. Setup.log C. Setup.txt D. Setuplog.txt

D. Ricardo should check Setuplog.txt.

One of your eight-outlet under-desk UPS units has stopped working, and you'd like to find the best way to decommission the unit. Which of these would be the best way to dispose of this broken UPS? A Dispose of the unit in the garbage bin B Send the old unit back to the manufacturer C Contact your local electronics store for disposal instructions D Refer to the MSDS for the proper procedures

D. Since the UPS contains hazardous chemicals in the batteries, the Material Safety Data Sheet (MSDS) for the UPS will have specific information for proper disposal.

Which of these would be the decimal equivalent of a /16 subnet mask? A 255.255.255.0 B 255.0.0.0 C 255.255.255.255 D 255.255.0.0

D. Sixteen bits of a subnet mask is equivalent to 11111111.11111111.00000000.00000000 in binary, or 255.255.0.0 in decimal.

Which of the following might offer good hardware authentication? A. Strong passwords B. Encrypted passwords C. NTFS D. Smart cards

D. Smart cards are an example of hardware authentication devices.

What is the process for using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social Engineering

D. Social engineering is the process of using or manipulating people to gain access to network resources.

Which of these steps would be the best choice prior to physically installing a new adapter card into a computer? A Add the computer to the Active Directory domain B Upgrade the anti-virus software C Defragment the primary storage drive D Check the documentation to determine the order of installing the drivers and the physical adapter card

D. Some adapter cards require that a driver be installed prior to the physical installation of the card. Be sure to check the instructions with your adapter card to determine the option you should take prior to placing the adapter card inside of the computer.

Up to how many USB devices can share a single set of system resources? A. 7 B. 27 C. 77 D. 127

D. Some of the advantages of USB include hot-plugging and the capability for up to 127 USB devices to share a single set of system resources.

Which of the following is not a good reason for virtualization? A. Power saving B. Hardware consolidation C. System recovery D. Reduced hardware costs

D. Switching to virtual machines may or may not save money on hardware. A good virtual machine server can cost a lot more than a series of PCs, but operating costs are reduced.

Which switch can be used with IPCONFIG to obtain a new IP address? A. /RELEASE B. /NEW C. /IP D. /RENEW

D. The /RENEW switch can be used with the IPCONFIG command to obtain a new IP address.

What was the original motherboard speed of the ATX board? A. 33 MHz. B. 60 MHz. C. 66 MHz. D. 100 MHz.

D. The ATX board had an original motherboard speed of 100 MHz.

Aaron has a system with a single PCIe x16 slot along with three other PCIe slots. He inserts a PCIe graphics card and a PCI graphics card and connects a monitor to each of these cards. When he boots up his computer, which monitor will display the boot process? A. Always the PCIe. B. Depends on the Windows settings C. Always the PCI D. Depends on the CMOS settings.

D. The CMOS settings determine which video output is used during the boot process.

Which Recovery Console command shows the partitions on the drive and lets you manage them? A. Type B. Map C. Listsvc D. Diskpart

D. The Diskpart command shows the partitions on the drive and lets you manage them.

Which type of cache holds data that is waiting to enter the CPU? A. L4 B. L3 C. L2 D. L1

D. The Level 1 cache, also known as the L1 or front-side cache, holds data that is waiting to enter the CPU.

Which of the following laptop states leaves programs running but requires the user’s password to be entered again before the session can continue? A. Hibernate B. Shut down C. Sleep D. Lock

D. The Lock state leaves programs running, but locks the computer and requires the user’s password to be entered again before the session can continue.

Which bus architecture supports 32-bit/64-bit cards and transfers information at 33 MHz? A. ISA B. EISA C. AGP D. PCI

D. The PCI bus architecture is a 32-bit and 64-bit architecture that runs at 33 MHz. AGP runs at 66MHz, and both ISA and EISA run at 8 MHz.

You suspect your system is failing to boot because of a corrupt master boot record. Which utility is the best to fix this? A. Automated System Restore B. Device Manager C. System Restore D. Recovery Console

D. The Recovery Console enables you to run utilities such as fixboot and fixmbr. That's the quickest and easiest way to fix a corrupt master boot record.

What is the name of the standard digital connection that replaces many analog connections on some sound cards? A. CD audio connector B. AUX connector C. TAD connector D. S/PDIF connector

D. The S/PDIF connector can replace analog connctions on some sound cards.

What set of folders is available to all users on a computer in Windows XP? A. My Documents B. Personal Documents C. Public Folder D. Shared Documents

D. The Shared Documents set of folders is available to all users on a computer in Windows XP.

Which permission enables an administrator to change the ownership of a file without knowing the user account password for that file? A. Change permission B. Change Ownership permission C. Ownership permission D. Take Ownership permission

D. The Take Ownership permission enables an administrator to change the ownership of a file without knowing the user account password for that file.

A serial port receives and sends serial data. What chip translates that serial data into parallel data for the computer to use? A. Parallel translator chip B. Serial translator chip C. COM chip D. UART chip

D. The UART chip handles the serial to parallel and parallel to serial translation.

What is the maximum cable length supported by USB 3.0? A 10 meters B 14 meters C 1.5 meters D 3 meters

D. The USB 3.0 SuperSpeed standard supports 4.8 gigabits per second of throughput and a maximum cable length of 3 meters.

What feature of Windows 7 opens a consent prompt for standard users to enter administrator credentials to accomplish various tasks reserved for the latter group? A. User Access Command B. User Access Control C. User Account Command D. User Account Control

D. The User Account Control feature in Windows 7 provides a consent prompt for standard users to enter administrator credentials to accomplish various tasks normally reserved for the Administrators group.

Which sampling rate would produce the highest-quality sound? A. 8 Hz B. 8 KHz C. 128 Hz D. 128 KHz

D. The bigger the number, the better the quality, so 128 KHz is the king here.

How many pins are commonly associated with a motherboard power connector? A 4 pins B 8 pins C 12 pins D 24 pins

D. The modern ATXV12 power supply standards use 20- and 24-pin motherboard connectors.

What is the default IP class of 224.0.0.1? A Class A B Class B C Class C D Class D

D. The multicast address of 224.0.0.1 is part of the Class D address block, which ranges from addresses that begin with 224 through addresses starting with 239.

When a technician runs the defrag utility, what types of files would be excluded from the process? A. Music files B. System32 files C. Document files D. Paging files

D. The paging files are pretty much always being used by the system, so the defrag utility will never defragment them. Other files would be both Master File tables, the one at the beginning of the disk and the other one in the middle.

Which technology is used to transmit electrical power over twisted-pair cabling? A. Half duplex B. Wake-on-LAN C. QoS D. PoE

D. The purpose of Power over Ethernet (PoE) is pretty much described in its name: Electrical power is transmitted over twisted-pair Ethernet cable (along with data).

In which of these cases would you use thermal grease? A To securely fasten the fans to the computer case B To increase the computer case fan RPMs C To minimize vibration caused by the cooling fans D To create a connection between a processor and a heat sink

D. Thermal grease or thermal compound is used to create an efficient thermal connection between a component and a heat sink. If you're installing a heat sink, the connection to the hot component must be as thermally efficient as possible.

From which government agency can MSDS sheets be obtained? A. FCC B. OSHA C. FTC D. EPA

D. These are traditionally created by the manufacturer, and you can obtain them from the manufacturer or from the Environmental Protection Agency at www.epa.gov.

Which of these IPv6 addresses would be a complete abbreviation of 2001:0db8:0000:0000:0000:ff00:0042:8329? A 2001:0db8::ff00:0042:8329 B 2:1:db8::ff00:42:8329 C 21:db8::ff:42:8329 D 2001:db8::ff00:42:8329

D. To abbreviate an IPv6 address, remove all of the leading zeros and replace one string of multiple zeros with a double-colon.

Where would a user go to modify the battery alarms in Windows? A. Display Properties window B. Power Properties window C. BIOS D. Power Options window

D. To change the thresholds for battery alarms, a user would access the Power Options window.

To learn the syntax of the dir command, what can you type? A. help dir B. dir /? C. dir /help D. Both A and B

D. To learn the ins and outs of any command-line program, type the command followed by the /? switch or else type help and then the command.

USB 2.0 supports three data transfer rates: __________, ___________, and __________. A. 1.5 MBps, 12 MBps, 480 MBps B. 120 Mbps, 200 Mbps, 400 Mbps C. 100 Mbps, 266 Mbps, 480 Mbps D. 1.5 Mbps, 12 Mbps, 480 Mbps

D. USB 2.0 supports three data transfer rates: 1.5 Mbps, 12 Mbps, and 480 Mbps.

What command-line utility would you run to show a list of network computers? A. net send B. show net_servers C. net use D. net view

D. Use the net view command to show a list of computers on the network.

What tool enables you to correct a corrupted Windows operating system by reverting your computer to a previous state? A. Windows Restore B. Restore State Manager C. Time Machine D. System Restore

D. Using System Restore, you can restore your computer to a previous restore point.

When a virtual machine is not running, how is it stored? A. Firmware B. RAM drive C. Optical disc D. Files

D. VMs are just files, usually stored on a hard drive.

An LCD flat panel suddenly starts smoking badly. What should you do after unplugging the monitor? A. Check the MSDS. B. Call the fire department C. Call the manufacturer D. Ventillate the room.

D. Whenever a device creates smoke, ventillate the room to remove noxious fumes. Incorrect Answers: Your passion for research is exemplary, but checking the MSDS is not your priority isn this case. The manufacturer cannot help you right now. Calling the fire department is a bit extreme for this situation.

"You've been asked to remove a hard drive from one computer and install the drive into a computer in another building. Which of these would be the best way to transport the hard drive from one building to another? A Hard drives park their heads when powered off, so you can simply use a paper folder for transport B Use bubble wrap to protect the drive during transport C Pack the hard drive into a box full of foam ""peanuts"" D Place the hard drive into a cushioned anti-static bag"

D. While it's true that hard drives are relatively protected from physical damage when powered off, you still have to consider the dangers of static electricity.

Which of the following can be bootable media? A. CD-R disc B. Floppy disk C. USB thumb drive D. All of the above

D. You can make a boot disk out of optical discs, floppy disks, or flash memory drives.

A marketing kiosk requires a CD-ROM to be in the drive for the program to work correctly. However, the kiosk fails to boot when restarted. What should you do? A. Change the drive letter assignments. B. Defrag the hard drive. C. Replace the CD-ROM with rewritable media D. Configure the BIOS settings.

D. You should configure the BIOS boot order so that the CD-ROM is first, and the kiosk computer will boot to that drive. Changing drive letter assignments in the operating system will have no effect on the boot order. The hard drive has nothing to do with this scenario. And if you replace the CD-ROM, you lose the program that the kiosk needs to boot to.

How much video RAM does your video card need to have in order to use Windows Vista's Aero interface? A. 64 MB B. 512 MB C. 1 GB D. 128 MB

D. You will need a video card with 128 MB of RAM, DirectX 9, Pixel Shader 2.0, and Windows Display Driver Model (WDDM) to be exact.

What kind of interface would NOT commonly be used to connect an external video camera to your computer? A HDMI B USB C FireWire D eSATA

D. eSATA is used for external storage device connectivity

DB-9

DB-9 9 pin D shell connector

DC

DC direct current

Data Execution Prevention (DEP)

DEP works in the background to stop viruses and other malware from taking over programs loaded in system memory.

DFS

DFS distributed file system

Half-duplex

Data only flows one way, usually meaning you need two cables

access points

Devices, operating either as switches or routers, that provide wireless access to a network.

DRM

Digital Rights Management

DSL

Digital Subscriber Line

DVD

Digital Video Disc or Digital Versatile Disc

DVD-RAM

Digital Video Disc-Random-Access Memory

DVD-ROM

Digital Video Disc-Read-Only Memory

DVD-R

Digital Video Disc-Recordable

DVD-RW

Digital Video Disc-Rewritable

DVI

Digital Video Interface

DLT

Digitial Linear Tape

DC

Direct Current

DMA

Direct Memory Access

DAC

Discretionary Access Control

ps

Display information about process

pwd

Display the full working path

Command line hostname

Displays the name of the computer

DDoS

Distributed Denial of Service

DFS

Distributed File System

DDR RAM

Double Data Rate Random-Access Memory

DDR SDRAM

Double Data Rate Synchronous Dynamic Random-Access Memory

Which software tool, prior to Windows Vista, enabled detailed logging of errors?

Dr. Watson

DIP

Dual In-line Package, a CPU form factor, used with the Intel 8088 line

DIMM

Dual Inline Memory Module

DHCP

Dynamic Host Configuration Protocol

DRAM

Dynamic Random Access Memory

True / False The arithmetic operator *, /, %, +, - all have the same level of precedence.

False. *, /, %, have a higher level of precedence than +, -

ESD

Electrostatic Discharge

ERD

Emergency Repair Disc

asymmetric algorithms

Encryption that uses two keys to encrypt and decrypt data. These keys are referred to as the public key and the private key.

EULA

End-User Licence Agreement

EIDE

Enhanced Integrated Drive Electronics

EPP

Enhanced Parallel Port

EPROM

Erasable Programmable Read-Only Memory

ECC

Error Correcting Code or Error Checking and Correction

FSB

FSB Front Side Bus

EVDO

Evolution Data Optimized or Evolution Data Only

Which form of the ExpressCard will accept both form factors?

ExpressCard slots may be either 34 or 54 mm wide. The 54 mm slot will accept either card whereas the 34 mm slot will only accept a 34 mm card.

A programming statement that has a value is called an _____

Expression number = 2; sum = 10 +15; result = 15 / 3; result = sizeof(int)

ECP

Extended Capabilities Port

XGA

Extended Graphics Array

EVGA

Extended Video Graphics Adapter/Array

FTP

FTP file transfer protocol

FLOPS

FLOPS, or FLoating point Operations Per Second, is a measurement of floating point calculations. This measurement is typically used to reference the performance of super computers as it is a better indicator of the performance and computing power of super computer array than referencing the collective processing power of the array. Thus you’ll frequently hear a super computer discussed in terms like 100 teraflops (100 trillion FLOPS) instead of the speed of the processor like one references when talking about desktop and mobile computers.

FPM

FPM fast page-mode

FQDN

FQDN fully qualified domain name

FRU

FRU field replaceable unit

"True/False: Touch flow allows for movements such as those used for expanding or enlarging pictures with two fingers and then ""closing"" them back again with the reverse movement."

False

True / False The modulus operator (%) can be used only with integer operands.

False

True/False: Android phones come with an official remote wipe.

False

True / False C++ considers the variables number and NuMbEr to be identical.

False C++ is case sensitive, therefore the variables are unique.

True or False: Mobile devices do not require antivirus software.

False. Mobile devices can suffer from viruses and malware just like laptops and desktops. Major antivirus vendors such as McAfee and Kaspersky make antivirus products for mobile devices that provide the same real-time protection that the products do for desktops. The same guidelines apply for these mobile devices: keep them up to date by setting the device to check for updates whenever connected to the Internet.

Features of the C++ Standard Library are declared within the ... namespace.

Features of the C++ Standard Library are declared within the std namespace.

FRU

Field Replaceable Unit

FAT

File Allocation Table

FTP

File Transfer Protocol

The stream manipulator endl outputs a new line then f______ the output buffer.

Flushes

What will happen as a result? char bits = 3; bits = ~bits;

For signed values, results of bitwise operators are machine-dependent.

[4.2.2] What are states of valid and invalid pointer?

For valid one: 1) holding an address of a specific object 2) pointing one past the end of an object 3) of zero value Invalid pointer is uninitialized.

FQDN

Fully Qualified Domain Name

Fn

Function (referring to the function key on a laptop)

GDI

GDI graphics device interface

GHz

GHz gigahertz

GPS

GPS global positioning system

GUI

GUI graphical user interface

I'm already happy with what I've got

Great! A lot of ppl already tell me that before they have a chance n they see we complement what they have...

HDMI

HDMI high definition media interface

If You’ve Received HTTP Status Code 418 It Means The Server Is?

HTTP status codes are usually reserved for serious issues like server faults, missing files, and other matters of importance. Thanks to an April Fools’ Day joke in 1998, however, there’s a particularly curious (and entirely nonsensical) HTTP status code devoted to indicating the device contacted is, in fact, a teapot. How did such an odd code come about? On April 1, 1998, the The Internet Society released a tongue-in-cheek network protocol memo through The Internet Engineering Task Force’s Request For Comments (RFC) system. This memo, RFC 2324, entitled Hyper Text Coffee Pot Control Protocol, detailed the HTCPCP protocol, a derivative of HTTP intended for controlling, monitoring, and diagnosing internet connected coffee pots. Among the many codes included in the HTCPCP return/error code schema, there is a code 418 “I’m a teapot†intended to politely inform the recipient that the device they are attempting to brew coffee with is, in fact, a teapot and incapable of producing the coffee they desire. As you can imagine, the error code was never formally added to the HTTP error code schema and, should you actually receive the code, you’ve either encountered a very mischievous web master or an actual internet-enabled brewing machine coded by a tinkerer with a fondness for yesteryear’s April Fools’ Day pranks.

crimpers

Handheld tools used to secure connectors to cables.

HDD

Hard Disk Drive

HAL

Hardware Abstraction Layer

HAV

Hardware Assisted Virtualization

HCL

Hardware Compatibility List

What is an HCL and where can you find it?

Hardware Compatibility List It's a list of known hardware that is compatible with Windows. You can find it on the Microsoft website.

Where does malloc allocate memory? Stack or heap?

Heap

ICR

Intelligent Character Recognition

IMEI

International Mobile Equipment Identity

IMSI

International Mobile Subscriber Identity

ISO

International Organization for Standardization/Industry Standards Organization

ICMP

Internet Control Message Protocol

nbtstat -n

List local netBIOS names

nbtstat -a server1

List remote net BIOS names by name

netdom query /d:<servername> workstation|server|ou|dc|pdc|fsmo|trust

Lists device in server database

The Lost app for Android is an example of what type of application?

Locator app

LBA

Logical Block Addressing

LFN

Long filenames. Starting with Windows 9x, Windows versions did not suffer from the 8.3 filename limitation. Instead they supported filenames of up to 255 characters. Windows systems using LFN retained complete backward compatibility by automatically creating two names for every file, an 8.3 filename and a long filename.

nslookup

Look up names and IP addresses

LC

Lucent Connector

LC connector

Lucent Connector or Local Connector or Little connector image54.png

LC

Lucent connector

net use h: \\<servername>\<sharename>

Map a network share to a drive folder

MBR

Master Boot Record

MAPI

Messaging Application Programming Interface

What are methods?

Methods are functions of a class

MicroDIMM

Micro Dual Inline Memory Module

MBSA

Microsoft Baseline Security Analyzer

MMC

Microsoft Management Console

MPEG

Moving Picture Experts Group

MFD

Multi-Function Device

MFP

Multi-Function Product

MUI

Multilingual User Interface

MIMO

Multiple Input, Multiple Output

MIME

Multipurpose Internet Mail Extension

MIDI

Musical Instrument Digital Interface

fclose

NAME fclose, _fclose_r - close a file SYNOPSIS #include <stdio.h> int fclose(FILE *fp); int _fclose_r(struct _reent *reent, FILE *fp); DESCRIPTION If the file or stream identified by fp is open, fclose closes it, after first ensuring that any pending data is written (by calling fflush(fp)). The alternate function _fclose_r is a reentrant version. The extra argument reent is a pointer to a reentrancy structure. RETURNS fclose returns 0 if successful (including when fp is NULL or not an open file); otherwise, it returns EOF.

appliances

Network devices that are dedicated to performing a function as opposed to software installed to perform the function.

NNTP

Network News Transfer Protocol

NTP

Network Time Protocol

NetBIOS

Networked Basic Input/Output System

NetBEUI

Networked Basic input/output system Extended User Interface

NLX

New Low profile Extended

NTFS

New Technology File System

NTLDR

New Technology Loader

NiCd

Nickel Cadmium

NiMH

Nickel Metal Hydride

What are differences between a) and b)? a) string *s; b) string* s;

None.

What are differences between 1), 2) and 3) ? string s; typedef string * pstring; 1) const pstring cstr1 = &s; 2) pstring const cstr2 = &s; 3) string* const cstr3 = &s;

None. They all are const pointers to string.

is a chipset that handles communications among the CPU, in some cases RAM, and PCI Express (or AGP) video cards.

Northbridge

What are some of the image deployment utilities that are available?

Norton Ghost from Symantec Clonezilla True Image from Acronis

OLED

Organic Light Emitting Diode

OEM

Original Equipment Manufacturer

PEBCAK

PEBCAK, or Problem Exists Between Chair And Keyboard, is a commonly used acronym within the tech support community to indicate that the reported problem with the system is not a failure of any software or hardware component, but is instead a wetware failureâ€"the user of the computer is the source of the problem. Variations on the theme include PICNIC (Problem In Chair, Not In Computer) and EBCAK (Error Between Chair And Keyboard).

a snap-in that enables Windows to create a written record of just about anything that happens on your system

Performance Logs and Alerts

PCI

Peripheral Component Interconnect

PCIX

Peripheral Component Interconnect Extended

PVC

Permanent Virtual Circuit

PCMCIA

Personal Computer Memory Card International Association

PS/2

Personal System/2 Connector

PGA2

Pin Grid Array 2

PGA

Pin Grid Array, a type of CPU socket

What is an easy way to test whether a NIC is working properly?

Ping the loopback. Ping 127.0.0.1 while the device is hooked up to a switch or loopback plug.

POTS

Plain Old Telephone Service

PnP

Plug and Play

To install a floppy drive as the A: drive, what must you do?

Plug the floppy drive into the end of the ribbon cable to make it the A: drive.

PoS

Point of Sale

PPP

Point-to-Point Protocol

PPTP

Point-to-Point Tunneling Protocol

POP3

Post Office Protocol 3

POST

Power On Self Test

PSU

Power Supply Unit

RFI

Radio Frequency Interference

PXE

Preboot Execution Environment

PRL

Preferred Roaming List

PE

Preinstallation Environment

What can be a problem with std::string.c_str()?

Problem would arise in case when after invoking c_str() method, value of the string object is changed. Then the array is invalidated.

PROM

Programmable Read-Only Memory

System Information Start...

Programs | Accessories | System Tools | System Information

Progressive video

Progressive video, also known as progressive scanning, is a way of displaying video wherein each line of the video display is drawn in sequence. This is a direct contrast to interlaced video wherein the odd and then even lines are refreshed. Progressive video is more bandwidth-intensive than interlaced video (thus most satellite, cable, and digital broadcasts are sent in 1080i instead of 1080p) but provides a much smoother video. The artifacts commonly present in interlaced video such as combing (where rapid motion onscreen causes the alternating lines of the current refresh to become visible to the viewer like the tines of a comb) are completely eliminated in progressive video. Modern televisions and computer displays are all capable of progressive video display. For a more in-depth look at the difference between progressive and interlaced video scanning, check out What Is the Difference Between 1080p and 1080i?

PKI

Public Key Infrastructure

PSTN

Public Switched Telephone Network

When connecting a floppy cable to the controller on the motherboard, how do you orient it?

Put the side of the cable with a red stripe on it on the same side as the pin 1 marker on the motherboard. (Often, just a 1 on the board.)

RTC

Real-Time Clock

What is an eight-wire connector commonly used to connect computers onto an Ethernet local area network (LAN) that uses unshielded twisted pair (UTP)? They are somewhat wider than RJ-11 connectors.

RJ-45 (Registered Jack-45)

RAM

Random Access Memory

how much memory does it take to store an unsigned short int data type in memory

Range of values - 0 to 65,535

how much memory does it take to store a signed short int data type in memory

Range: -32768 to 32767

ROM

Read-Only Memory

RISC

Reduced Instruction Set Computer

RAID

Redundant Array of Independant (or Inexpensive) Discs

RJ-11

Registered Jack Function 11

RJ-45

Registered Jack Function 45

RAS

Remote Access Service

Which feature in Windows Vista allows the local workstation to be used from a remote computer (and can help an administrator troubleshoot problems with the machine from a remote location)?

Remote Assistance

"A technician is working on a PC and notices the error message ""CMOS BATTERY LOW."" Exercising best practices, what should he do next?"

Replace the battery with a CR-2032.

Are those expression identical? int i = 3; i = i + 3; i += 3;

Results are exactly the same, but there is one difference: when using compound operator, left-hand operand is evaluated once (and longer version - twice).

static declaration keyword

Retains value between function calls This keyword is kind of the inverse of extern and says that the variable is only used in this .c file, and should not be available to other parts of the program. Keep in mind that static at the file level (as with THE_AGE here) is different than in other places (functions).

RMA

Returned Materials Authorization

are software programs that have the ability to hide certain things from the operating system.

Rootkits

RIP

Routing Information Protocol

SOHO

Small Office, Home Office

fread 1. what you must include 2. what it returns and what each parameter means

SYNOPSIS #include <stdio.h> size_t fread(void *restrict buf, size_t size, size_t count, FILE *restrict fp); DESCRIPTION fread attempts to copy, from the file or stream identified by fp, count elements (each of size size) into memory, starting at buf. fread may copy fewer elements than count if an error, or end of file, intervenes. fread also advances the file position indicator (if any) for fp by the number of characters actually read. fread_unlocked is a non-thread-safe version of fread. fread_unlocked may only safely be used within a scope protected by flockfile() (or ftrylockfile()) and funlockfile(). This function may safely be used in a multi-threaded program if and only if they are called while the invoking thread owns the (FILE *) object, as is the case after a successful call to the flockfile() or ftrylockfile() functions. If threads are disabled, then fread_unlocked is equivalent to fread. _fread_r and _fread_unlocked_r are simply reentrant versions of the above that take an additional reentrant structure pointer argument: ptr. RETURNS The result of fread is the number of elements it succeeded in reading.

SLI

Scalable Link Interface (SLI) is a brand name for a multi-GPU solution developed by NVIDIA for linking two or more video cards together to produce a single output. SLI is an application of parallel processing for computer graphics, meant to increase the processing power available for graphics. The name SLI was first used by 3dfx under the full name Scan-Line Interleave, which was introduced to the consumer market in 1998 and used in the Voodoo2 line of video cards. After buying out 3dfx, NVIDIA acquired the technology but did not use it. NVIDIA later reintroduced the SLI name in 2004 and intended for it to be used in modern computer systems based on the PCI Express (PCIe) bus; however, the technology behind the name SLI has changed dramatically.

SLI

Scalable Link Interface or System Level Integration or Scanline Interleave Mode

Command sfc

Scans and replaces any Microsoft Windows file on the computer and replaces any changed file with the correct version. This is a great command to run when you are running into an issue that is difficult to troubleshoot.

SD Card

Secure Digital Card

SSH

Secure Shell

SSL

Secure Sockets Layer

S.M.A.R.T.

Self-Monitoring, Analysis, and Reporting Technology

Choosing meaningful identifiers makes a program s____ d_______

Self-documenting

SATA

Serial Advanced Technology Attachment

SAS

Serial Attached SCSI

DB-25

Serial Communications D-Shell Connector, 25 Pins

SMB

Server Message Block or Small to Midsize Business

SLP

Service Location Protocol

SP

Service Pack

SSID

Service Set Identifier

Shadow Copy

Shadow Copy, also known as Volume Snapshot Service, is a data backup technology included in Microsoft Windows that allows the operating system to take snapshots of the system which include files which are locked or otherwise inaccessible to the user. The service can only be used on NTFS-based disks and interacts with the data at the block level. Shadow Copy is integral to the Windows Backup and System Restore utilities. For a more in depth look at how Shadow Copy works, check out HTG Explains: What are Shadow Copies and How Can I Use Them to Copy or Backup Locked Files?

STP

Shielded Twisted Pair

SMS

Short Message Service (SMS) Short Message Service (SMS), or as most of us call it, texting, is the text messaging component of cellular communication networks. It’s the most widely used communication protocol in the world, with billions of people the world over collectively sending six trillion text messages annually. SMS was first proposed and outlined in the mid 1980s but the first text message wasn’t sent using an SMS gateway until 1992â€"commercial deployment followed a year later in 1993. The text messages were short then and they’re short now, due entirely to the constraints of the messaging systemâ€"text messages cannot exceed 1120 total bits of data. As a result, U.S. Cellular users, whose phones use the GSM 7-bit alphabet, are limited to 160 characters (160 * 7-bit characters = 1120 total bits).

In Windows Vista, it is possible to have a pane of gadgets appearing on the desktop. What is this pane known as?

Sidebar

SMTP

Simple Mail Transfer Protocol

SNMP

Simple Network Management Protocol

SEC

Single Edge Connector

SECC

Single Edge Contact Cartridge, a CPU form factor

Windows XP offered different Standby and Hibernate modes for laptops. In Windows Vista, these have been combined into what mode?

Sleep

SCSI

Small Computer System Interface

SCSI ID

Small Computer System Interface Identifier

SFF

Small Form Factor

SoDIMM

Small outline Dual Inline Memory Module

SPDIF

Sony/Philips Digital Interface Format

SPGA

Staggered Pin Grid Array

What is required for strings when we use C library string functions?

Strings must be NULL-terminated.

APIPA - Auto Private IP Address

Sub net Not routable 169.254.1.0 to 169.254.254.255

IMAP4 Internet Message Access Protocol PORT

TCP/143

FTP File Transfer Protocol Port

TCP/20 UDP 21

SSH Secure Shell Port

TCP/22

SMTP Simple Mail Transfer Protocol PORT

TCP/25

RDP Remote Desk Protocol PORT

TCP/3389

SLP Service Location Protocol PORT

TCP/427 UDP/ 427

HTTPS HyperText Ttrans Proto Secure PORT

TCP/443

SMB Service Message Block

TCP/445

DNS Domain Name System PORT

TCP/53 UDP/53

AFP Apple Filing Protocol PORT

TCP/548

HTTP Port Hyper Text Markup Protocol

TCP/80

TKIP

Temporal Key Integrity Protocol

I alraedy have...

That's great this can complement that

Which switch is used with DEFRAG to determine the degree of fragmentation only?

The /A switch is used with DEFRAG to analyze the state of fragmentation without running the operation.

What kind of processor package is associated with the AMD socket AM2?

The AMD sockets listed in the CompTIA exam requirements are primarily PGA-ZIF sockets, except for the LGA-based Socket F.

ping -n

This pings a host a specific number of times. i.e. ping -n 20 192.168.0.1 would ping that host 20 times and then display the result.

Why do array indices start at 0?

The name of an array is actually a pointer to the first element in the array. Writing myArray[3] tells the compiler to return the element that is 3 away from the starting element of myArray. This explains why arrays are always passed by reference: passing an array is really passing apointer. This also explains why array indices start at 0: the first element of an array is the element that is 0 away from the start of the array.

802.11g

The wireless networking standard that provides for bandwidths of 54 Mbps+ in the 2.4 GHz frequency spectrum

802.11b

The wireless networking standard that provides for bandwidths of up to 11 Mbps in the 2.4 GHz frequency spectrum

802.11a

The wireless networking standard that provides for bandwidths of up to 54 Mbps in the 5 GHz frequency spectrum.

codec

The word codec is a portmanteau of “coder-decoder†and denotes the role of codecs in encoding/decoding digital data. Specifically, codecs refer to the hardware and/or software that encode and decode digital audio and video streams, such as those used for watching local digital video, streaming video over the Internet, video conferencing, and other multimedia applications.

"Let's suppose that we have allocated some memory by using ""new"". What would happen if that memory weren't freed?"

Then computer's memory would be gradually used up and eventually exhausted.

[5.3] What are bitwise operators?

There are 6 of those: ~, <<, >>, &, ^, |.

What are relational and logical operators?

There are 9 of those: !, <, <=, >, >=, ==, !=, &&, ||.

What is a difference between 1) and 2) ? 1) string const s1; 2) const string s2;

There is no difference.

Given a pointer p, how to determinine it's validity?

There is no safe way to do it.

[4.3] Where and what are functions defined in C++ library which operate on C-style strings?

They are defined in <cstring> header and are the following: 1) strlen(cstr) -returns length of cstr, 2) strcmp(cstr1, cstr2) - returns 0 if cstr1 == cstr2, positive value if cstr1 > cstr2 and negative value if cstr1< cstr2, 3) strcat(cstr1, cstr2) - appends cstr2 to cstr1 and returns cstr1, 4) strcpy(cstr1, cstr2) - copies cstr2 into cstr1 and returns cstr1, 5) strncat(cstr1, cstr2, n) - appends n characters from cstr2 onto cstr1 and returns cstr1, 6) strncpy(cstr1, cstr2, n) - copies n characters from cstr2 into cstr1 and returns cstr1.

ping -l

This pings the host but you can specify the amount of bytes per packet sent. i.e. ping -l 1500 192.168.0.1 would send four 1500 byte packets to another host. this can also be beneficial when testing how a server, router, or other device react to larger packet sizes.

[5.4.3] What are compound assignment operators?

Those are 10: +=, -=, *=, /=, %=, <<=, >>=, &=, ^=, |=.

TDR

Time Domain Reflectometer n electronic instrument that uses time-domain reflectometry to characterize and locate faults in metallic cables (for example, twisted pair wire or coaxial cable).

tracert Windows command line traceroute linux

Time to live

Touch-screen monitors on mobile devices use what two technologies?

Touch flow and multitouch

TCP

Transmission Control Protocol

TCP/IP

Transmission Control Protocol/Internet Protocol

TFTP

Trivial File Transfer Protocol

Which PCMCIA type is the most common?

Type II

NetBIOS

UDP/137 Name UDP/138 Diagram TCP/139 Session

UXGA

Ultra Extended Graphics Array exactly four times the default resolution of SVGA (800×600) fullscreen monitors

Do not use identifiers that begin with u___________

Underscores

UEFI

Unified Extensible Firmware Interface

UPS

Uninterruptible Power Supply

UNC

Universal Naming Convention

Command line Wildcards

Using an * to replace part or all of a filename for a more general search. i. e. dir *.txt will show all text files dir a*.* will show all files starting with a

include files are also known as _______ files

header files

To run System Restore, what group must you be a member of?

You must be a member of the Administrators group in order to run System Restore.

What will happen if you install a floppy drive and put the mini power connector in the wrong way?

You will destroy the floppy drive.

ZIP

Zig-zag Inline Package

command line syntax

[command] [target (if any)] [switches] or [command] [switches] [target (if any)]

What is this C++ character called and how is it used

\ \ is the escape character

What escape sequence is used to print a single quote character?

\' aka the single quote escape sequence.

What escape sequence is used to print a backslash character?

\\ aka the backslash character escape sequence.

What escape sequence sounds the system bell?

\a aka the alert escape sequence

A single statement can print multiple lines by using the ______ escape sequence.

\n

What escape sequence positions the screen cursor to the beginning of the next line?

\n aka the newline escape sequence.

To get a blank line in your output, place two _____ characters back to back.

\n\n

What escape sequence positions the screen cursor to the beginning of the current line?

\r aka the carriage return escape character.

What escape sequence moves the screen cursor to the next tab stop?

\t aka the horizontal tab escape sequence.

scroll tmux

^B, [

why declare a function prototype?

a function prototype eliminates the need to place a function definition before all calls to the function. Just as you can't refer to a variable before it has first been defined, you can't call a function before it has been defined. example: void myFirstFunction() { void mySecondFunction() ; // define a prototype for an external function named mySecondFunction mySecondFunction ; // call now call function mySecondFunction from within myFirstFunction. }

Before the compiler encounters a call to a particular function, it must already know the function's return type, the number of parameters it uses, and the type of each parameter, That means that function A cannot call a function that is declared after it within the source code. However there is a statement that will allow a function to call another function that has been defined downstream in the source code. What is that statement called:

a function prototype or optionally a function declaration

What are 11 C++ alternative names?

a) and b) and_eq c) bitand d) bitor e) compl f) not g) not_eq h) or i) or_eq j) xor k) xor_eq

Let's define Points and Forms as follows: enum Forms { shape = 1, sphere, square }; enum Points {point2D = 2, point2W, point3D = 3, point3W}; Which of the following are correct? a) Points pt3d = point3D; b) Points pt2w = 3; c) pt2w = square; d) pt2w = pt3d;

a) d)

"What are meanings of these instances of text? a) extern std::string text; b) std::string text(""text""); c) extern std::string text(""text"");"

a) declaration of 'text' b) definition of 'text' c) definition of 'text'

Write decimal '20' as a constant literal of: a) binary value b) octal value c) hexadecimal value

a) impossible b) 024 c) 0x14

What are results of executing of: a) int val = 12; b) int &rval = val; c) int &rval2 = 10; d) int &rval3; e) rval = 11; f) const int &rval4 = 14; g) int &rval5 = rval4; h) int val2 = rval4;

a) val == 12 b) rval is an alias of val and therefore rval == val c) error: variable is required d) error: references cannot be unitialized e) val == rval == 11 f) rval == 14 g) error: nonconst reference can't reference to const reference h) val2 == rval4 == 14

You have a variable, n, with a non-negative value, and need to write a loop that will print n blank lines. What loop construct should you use?

a) while loop b) do while loop c) for loop c) for loop

"Are these lines correct? (y or n separated by space): a) std::cout << ""/*""; b) std::cout << ""*/""; c) std::cout << /* ""*/"" */;"

a) yes, b) yes, c) no.

ACL

access control list

AMD

advanced micro devices

APM

advanced power management

ATA

advanced technology attachment

ATX

advanced technology extended ATX (Advanced Technology eXtended) is a motherboard form factor specification developed by Intel in 1995 to improve on previous de facto standards like the AT form factor. It was the first major change in desktop computer enclosure, motherboard and power supply design in many years, improving standardization and interchangeability of parts. The specification defines the key mechanical dimensions, mounting point, I/O panel, power and connector interfaces between a computer case, a motherboard and a power supply. With the improvements it offered, including lower costs, ATX overtook AT completely as the default form factor for new systems within a few years. ATX addressed many of the AT form factors annoyances that had frustrated system builders. Other standards for smaller boards (including microATX, FlexATX and mini-ITX) usually keep the basic rear layout but reduce the size of the board and the number of expansion slots. In 2003, Intel announced the BTX standard, intended as a replacement for ATX. As of 2009, the ATX form factor remains a standard for do-it-yourselfers; BTX has however made inroads into pre-made systems. This[clarification needed] was designed to solve the problems in BAT and LPX motherboards.

plenum

air-handling space: circulation

what type of argument is allowed in the sizeof( ) function

all data types char, int, short int, long int, float, double,wchar_t, ... etc.

BTX

balanced technology extended BTX (for Balanced Technology eXtended) is a form factor for motherboards, originally intended to be the replacement for the aging ATX motherboard form factor in late 2004 and early 2005. It was designed to alleviate some of the issues that arose from using newer technologies (which often demand more power and create more heat) on motherboards compliant with the circa-1996 ATX specification. The ATX and BTX standards were both proposed by Intel. However, future development of BTX retail products by Intel was canceled in September 2006 following Intel's decision to refocus on low-power CPUs after suffering scaling and thermal issues with the Pentium 4. The first company to implement BTX was Gateway Inc, followed by Dell and MPC. Apple's Mac Pro utilizes some elements of the BTX design system as well but is not BTX compliant, rather using a proprietary form factor.

To share the C:\SPENCER directory as MKTING, which command would you use? A. NET USE MKTING C:\SPENCER B. NET SHOW MKTING C:\SPENCER C. NET SHARE MKTING=C:\SPENCER D. NET MAKE C:\SPENCER MKTING

c. To share the C:\SPENCER directory as MKTING, the command to use is NET SHARE MKTING=C:\SPENCER.

cd

change directory

what is the keyword for the Character data type?

char

C ways to declare an array of strings

char *argv[]

CDFS

compact disc file system ISO 9660 (also known as ECMA-119), also referred to as CDFS (Compact Disc File System) by some hardware and software providers, is a file system standard published by the International Organization for Standardization (ISO) for optical disc media. It aims at supporting different computer operating systems such as Windows, classic Mac OS, and Unix-like systems, so that data may be exchanged.

CD-ROM

compact disc-read-only memory

CD-RW

compact disc-rewritable

The IEEE 1284 standard requires support for five distinct modes of operation:

compatibility mode, nibble mode, byte mode, EPP, ECP.

The -c option means

compile only. The code is not turned into an executable.

source files are c_______ and not #included

compiled

iostream, fstream, math cctype, string are commonly used h_______.

headers include < headerName >

Using multiple stream insertion operators (<<) in a single statement is referred to in any of 3 ways: con_________ , cha_______ , or cas________ stream insertion operations.

concatenating , chaining , or cascading stream insertion operations.

When a value is placed in a memory location, the value o______ the previous value in that location; thus placing a new value into a memory location is said to be d________.

destructive

get every 3rd character from a text file

cut 3 textfile.txt

CMYK

cyan, magenta, yellow, black

RAID 1 consists of ...

data mirroring, without parity or striping.

int, char, float, double, void, bool are all examples of _____ ______

data types

A powerful feature of C++ is that you can create your own d_____ t_____ called c_____.

data types classes

all variables in C++ must be ________ before they can be used.

declared

reset to higher rates

default on payments bubble burst chain rxn asset backed securities slumped in value

DLP

digital light processing

DLT

digital linear tape

DVI

digital visual interface

DMA

direct memory access

NBTSTAT

displays network protocol statistics that use NetBIOS over TCP/IP connections.

visualize the general form of an do-while loop then flip the card to see if you are correct

do { <statement(s)> ; } while ( <condition> ) ;

which type of loop repeats a statement or group of statement while a given condition is true. this type (post) tests the condition at the end of the loop body.

do...while loop the do...while loop executes the body one time before it checks the condition. known as trailing decision or post decision loop

DPI

dots per inch

what is the keyword for the Double floating point data type?

double

which is bigger, float or double

double

how would you initialize array

double balance[5] to hold the first 5 counting numbers 1 - 5 double balance[5] = {1, 2, 3, 4, 5 } ;

Write short piece of code (without main(), headers, etc.) to show how to use pointer to pointer to double.

double d = 3.14159; double *p1 = &d; double **pp1 = &p1;

why use malloc?

dynamic allocation

EMI

electromagnetic interference

EFS

encrypting file system

northern rock

englsih bank 2007 debitors withdraw cash liquidity support from BoE

EIDE

enhanced integrated drive electronics

EPP

enhanced parallel port

what does the following code do

for ( i= 0 ; i <= 39 ; i++ ) cout << i << '\n' ; prints the integers 0 through 39, separated by spaces.

"what does the following for loop output? f

for ( int i = 1; i < 200 ; i++ ) if ( ( i % 2 ) == 0 && ( i % 3 ) == 0 ) cout << i << "" "" ;" it prints in ascending order: all positive integers less than 200 that are divisible by both 2 and 3 the numbers are separated by spaces.

"what does the following code do

for ( j = 1 ; j <= n ; j++ ) cout << ""*"" ;" it prints a single line consisting of n asterisks. Thus if n contains 5, five asterisks will be printed.

what header file defines the data types ofstream , ifstream , and fstream?

fstream #include <fstream>

what header file is necessary to support file I/O?

fstream #include fstream

function prototypes are also know as function d__________.

function declaration

what statement eliminates the need to place a function definition before all calls to the function?

function prototype aka function declaration function prototypes are usually placed near the top of a program so the compiler will encounter them before any function calls. programmers who like the main function to remain at the top of the program before all other functions, often place prototypes for all existing functions in the main function after the using namespace std; statement

HAL

hardware abstraction layer

HCL

hardware compatibility list

"what does this return: string bob = ""bye""; cout <<( bob = ""hi"") << endl;"

hi

HPFS

high performance file system

Command line Display the name of the computer

hostname

HTML

hypertext markup language

global variables are automatically i_________ by the system

initialized initializers for data types: int 0 char '\0' float 0 double 0 pointer NULL

"what does the ""if"" stand for in the ifstream data type?"

input file

What are values of i and j after executing the following piece of code? int i = 2, j = 5; int *p1 = &i, *p2 = &j; *p2 = *p1 * *p2; *p1 *= *p1;

i == 4; j == 10;

"What does the following for loop output ? for ( int i = 11 ; i <= 121 ; i++ )

if ( ( i % 2 ) != 0 ) cout << i << "" "" ;" it prints: the odd integers 11 through 121 inclusive, separated by spaces.

"what does the follow loop do for ( int i = 80 ; i >= 20 ; i-- )

if ( ( i % 2 ) == 0 ) cout << i << "" "" ;" prints all the even integers from 80 through 20 inclusive, separated by spaces

"what does the following loop do for ( int i = 1 ; i < 175 ; i++ ) {

if ( ( i % 5 ) == 0 ) cout << i << "" "" ; }" it prints in ascending orderpositive multiples of 5 that are less than 175, separated by spaces.

visualize the general form of an if else statement then flip the card to see if you are correct

if ( <condition> ) { <statement 1> ; } else { <statement 2> ; }

what decision statement consists of a boolean expression followed by one or more statements that execute when the condition is true followed by one or more statement that only execute if the condition is false

if ... else statement

header files are not complied, the are #_______

included #include <iostream>

visualize a single statement that:

increments the value of integer variable myTotal by the value of variable myAmount. in otherwords, add the value of myAmount to myTotal. total += amount ;

local variables are not automatically I________ by the system

initialized

"The source code below is incorrect. What should we add in the place marked as 'X' to make the source code valid? #include <iostream> //X int main() {

int a, b; cin >> a >> b; cout << ""Sum is: "" << a+ b << endl; return 0; }" a) using namespace std; b) using std::cin; using std::cout; using std::endl;

fseek

int fseek(FILE *fp, long offset, int whence); NAME fseek, fseeko, _fseek_r, _fseeko_r - set file position SYNOPSIS #include <stdio.h> int fseek(FILE *fp, long offset, int whence); int fseeko(FILE *fp, off_t offset, int whence); int _fseek_r(struct _reent *ptr, FILE *fp, long offset, int whence); int _fseeko_r(struct _reent *ptr, FILE *fp, off_t offset, int whence); DESCRIPTION Objects of type FILE can have a ``position'' that records how much of the file your program has already read. Many of the stdio functions depend on this position, and many change it as a side effect. You can use fseek/fseeko to set the position for the file identified by fp. The value of offset determines the new position, in one of three ways selected by the value of whence (defined as macros in `stdio.h'): SEEK_SET---offset is the absolute file position (an offset from the beginning of the file) desired. offset must be positive. SEEK_CUR---offset is relative to the current file position. offset can meaningfully be either positive or negative. SEEK_END---offset is relative to the current end of file. offset can meaningfully be either positive (to increase the size of the file) or negative. See ftell/ftello to determine the current file position. RETURNS fseek/fseeko return 0 when successful. On failure, the result is EOF. The reason for failure is indicated in errno: either ESPIPE (the stream identified by fp doesn't support repositioning) or EINVAL (invalid file position).

What are two ways to initialize every element of a 2x4 array in a single line?

int twoDimArray[2][4] = { 6, 0, 9, 6, 2, 0, 1, 1 }; int twoDimArray[2][4] = { { 6, 0, 9, 6 } , { 2, 0, 1, 1 } };

"What is displayed? std::string x1 = ""Second""; int main() {

int x1 = 1; std::cout << x1 << "" world"" << std::endl; return 0; }" 1 world

Integer division yields an ________ quotient.

integer

The modulus operator, %, can only be used with i_____ operands.

integer

ISDN

integrated services digital network

IPP

internet printing protocol

IPCONFIG

internet protocol configuration

IPSEC

internet protocol security

IRQ

interrupt request

what header file is necessary to support keyboard input and console output?

iostream #include <iostream>

cmd to show TCP/IP and network adapter info

ipconfig

switch to add to ipconfig to show more detailed info

ipconfig /all

cmd to flush the DNS resolver cache

ipconfig /flshdns

cmd to release the DHCP lease

ipconfig /release

cmd to renew the DHCP lease

ipconfig /renew

A

is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers. It contains information about your identity and access privileges. smart card

copy backup

is identical to a normal backup, with the important distinction being that the archive bits are not changed. This is used (although not often) for making extra copies of a previously completed backup.

workload

is the amount of processing that the computer has been given to do at a given time. The workload consists of some amount of application programming running in the computer and usually some number of users connected to and interacting with the computer's applications.

the predefined object cin is an instance of i_______ class

istream

what does the statement typedef int inches do

it tells the compiler that inches is another name for int example: the following declaration tells the compiler that inches is another name for int : typedef int inches ;; // you can now use inches to define inches distance ; // as data type int.

segmentation fault

it tried to access an area of memory outside of its allowed range

what happens if you omit the equal sign when declaring an array: int numbers[5] { 1, 2, 3, 4, 5}

it will be valid. The equal sign is optional

The 3 fundamental data types In C++ are I_____, f_____, v_____

itegral floating void Integral types are capable of handling whole numers. Floating types are cabable of specifying values that may have fractional parts. The void type describes an empty set of values. No variable of type void can be specified -- it is used primarily to delare functions that return no values or to declare generic pointers to untyped or arbitraily typed data.

"what does the following code do

j = 1 ; do { cout << ""*"" ; j++ ; } while ( j <= n ) ;" it print a single line consisting of n asterisks. Thus if n contains 5, five asterisks will be printed.

A variable name is any valid identifier that is not a k_______.

keyword

Kb

kilobit

An identifier is a series of characters consisting of l_______ , d_______ , u_______ that does not begin with a d_______

letters digits underscores digit

State the rules of precedence for parenthesis, multiplication, subtraction, division, addition, modulus

level 1 parenthesis level 2 multiplication, division, modulus level 3 addition, subtraction operations on the same level of precedence are just evaluated from left to right as they occur.

LPT

line printer terminal

ftell

long ftell(FILE *fp); off_t ftello(FILE *fp); long _ftell_r(struct _reent *ptr, FILE *fp); off_t _ftello_r(struct _reent *ptr, FILE *fp); DESCRIPTION Objects of type FILE can have a ``position'' that records how much of the file your program has already read. Many of the stdio functions depend on this position, and many change it as a side effect. The result of ftell/ftello is the current position for a file identified by fp. If you record this result, you can later use it with fseek/fseeko to return the file to this position. The difference between ftell and ftello is that ftell returns long and ftello returns off_t. In the current implementation, ftell/ftello simply uses a character count to represent the file position; this is the same number that would be recorded by fgetpos. RETURNS ftell/ftello return the file position, if possible. If they cannot do this, they return -1L. Failure occurs on streams that do not support positioning; the global errno indicates this condition with the value ESPIPE.

capital to assests

lowered when banks took over assets

macro virus

macro virus A software exploitation virus that works by using the macro feature included in many applications.

Name the three sections and what they designate:

main.o : main.c gcc -c main.c Anyway, in this example rule there are three parts: The target, the dependencies, and the commands (well, command). The target is the thing that we want to make. In this case, we want to make the file main.o. Next, after the target (and the colon, which separates targets from dependencies), we list the depenencies - the files that the target depends on. In this case, main.o needs to be rebuilt whenever main.c changes, so we list main.c as a dependency. The last part of the rule is the command that make should run in order to make the target from the depenencies. In this case, we list the gcc command to compile main.c into main.o. Note that you may list as many commands as required, as long as you don't leave a blank line and all commands start with a tab.

two ways to compile a c file, disregarding official correctness

make name.c gcc name.c

How do you create a new folder in the command line?

md [folder name]

Dereferencing a pointer

means getting the value that is stored in the memory location pointed by the pointer.

NAC

network access control When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy; including anti-virus protection level, system update level and configuration. While the computer is being checked by a pre-installed software agent, it can only access resources that can remediate (resolve or update) any issues. Once the policy is met, the computer is able to access network resources and the Internet, within the policies defined within the NAC system. NAC is mainly used for endpoint health checks, but it is often tied to Role based Access. Access to the network will be given according to profile of the person and the results of a posture/health check. For example, in an enterprise, the HR department could access only HR department files if both the role and the endpoint meets anti-virus minimums.

conduits

off balance sheet, hold securities

OEM

original equipment manufacturer

The predefined object cerr is an instance of which class

ostream class

C++ allows you to specify more than one definition for a function name in the same scope. this is called o__________ a function.

overloading if you define two function with the identical name. say, one takes a double argument and the other takes an int argument. if you call the function name and pass an int argument the int version will be executed. if you call the function name and pass a double argument the double version will be executed.

ppm

pages per minute

DSL

paste-2838973382660.jpg

broadband cable

paste-2976412336132.jpg

2G, 3G, 4G

paste-3397319131140.jpg

Ideally, you should maintain the relative humidity at around

percent in your computer room. 50

cmd for continuous ping and how to stop it

ping -t (ip address) ctrl-c to stop

printErrorDescription is a function that accepts one int parameter and returns no value. Write a statement that calls the function printErrorDescription , passing it the value 14.

printErrorDescription(14);

Write a statement that declares a prototype for a function printTodaysDate:

printTodaysDate has no parameters and doesn't return anything. void printTodaysDate( ) ;

size of a type or variable

sizeof

what function returns the size of a variable

sizeof( ) sizeof (a)

snapshot printers

small, specialized printers used specifically to print small photos

a block is a set of logically connected s________ that are surronded by opening and closing b_______

statements braces { statement 1 ; statement 2; statement 3; }

objects have s_____ and b_____

states and behaviors Example: A dog has states - color, name, breed as well as behaviors - wag g ing , barking , eating . An object is an instance of a class.

What does namespace mean in C++?

std is an abbreviation of standard. std is the standard namespace. cout, cin and a lot of other things are defined in it. ( This means that one way to call them is by using std::cout and std::cin.) The keyword using technically means, use this whenever you can.Sep 3, 2011

What are differences in functioning between following two programs? a) int main(void) {

string s; while(getline(cin, s)) { cout << s << '|' << s.size() << endl; } } b) int main(void) { string s; while(cin >> s) { cout << s << '|' << s.size() << endl; } } Program a) writes everything from input except for newlines, Program b) ignores leading and trailing whilespaces when reading characters from input.

What are the values in the following variables? string str1[10]; int str2[10]; int main() {

string str3[10]; int str4[10]; } "str1 - empty string """" str2 - ten zeros str3 - empty string """" str4 - ten indetermined values"

How to initialize and declare a point struct (in one statement)

struct point p={10,20};

How to define a new datatype that represents a point

struct twovar { int one; int two; };

Given that two int variables, total and amount , have been declared, write a sequence of statements that: initializes total to 0 reads three values into amount , one at a time. After each value is read in to amount , it is added to the value in total (that is, total is incremented by the value in amount ).

total = 0 ; for ( int i = 1 ; i <=3 ; i++ ) { cin >> amount ; total += amount ; }

what does the following code do

total = 0 ; k = 1 ; do { total += k * k ; k++; } while ( k <= 50 ) ; it compute the sum of the squares of the first 50 counting numbers, and store the value in total . it puts 1*1 + 2*2 + 3*3 +... + 49*49 + 50*50 into total.

John needs to find the route taken from his workstation to a remote machine that he constantly accesses. What utility is best for this purpose?

tracert is a command that enables you to verify the route to a remote host.


संबंधित स्टडी सेट्स

Quiz 2: Chromosome Basis of Heredity

View Set