Senin, 21 Januari 2013

IT Essentials-all chapter: PC Hardware and Software (Version 4.1)


Chapter 1




jawaban
pertanyaan
63
How many FireWire devices can be supported by a single FireWire port?
Headphones 3- monitor2- 1- printer
Which three devices are considered output devices? (Choose three.)
EEPROM
Which type of ROM can be reprogrammed with software while it is still physically installed in the computer?
It can supply power from the computer to devices
Which important feature is offered by the USB standard?
1394
 Which IEEE standard defines the FireWire technology
1- biometric authentication device
2- digital camera
Which two devices are considered input devices? (Choose two.)
BTX و  ATX
Which two form factors are commonly used to build a new computer? (Choose two.)
4-pin ،  6-pin
What are the two connector types for the 1394a interface? (Choose two.)
IRQ 1-
2- DMA
3- I/O address
Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)
RAID
Which technology would be best to use for drive redundancy and data protection?
LCD
A technician receives a complaint of poor image quality after the user changes the native resolution. While investigating the complaint, the technician discovers there is a mismatch between native mode and the native resolution of the peripheral. Which item is configured incorrectly?
1280 x 800
Refer to the exhibit. Based on the advertisement that is shown, what is the native resolution of this computer system?
DDR-400
Which memory module has a front side bus speed of 200 MHz?
IRQs
Which type of computer resources are direct lines to the processor and are used by computer components to request attention from the CPU?
PC hardware and software technician
A student has passed the CompTIA A+ certification exam. Based on this passing score, for which job is the student now qualified?
It instructs the computer how to process information
What is a function of the operating system in a computer?
to move the heat away from the CPU
What is the function of a fan on top of a heat sink?
1- the number of external or internal drive locations
2- the size of the motherboard and the power supply
What are two factors that must be considered when choosing a computer case? (Choose two.)
I = P/V = 100W/9V = 11.11A
A technician creates a simple circuit that has a 9 V light bulb attached to a 9 V battery. The power output of the light bulb is 100 W. Which equation should be used to calculate how much current in amps is required to achieve the full 100 W output from the 9 V bulb?
provides capability to share a keyboard, a mouse, USB devices, and speakers with multiple computers
What is a function of a KVM switch?












Chapter 2






jawaban
pertanyaan
1- compressed air
2- soft cloth
Which two tools are recommended for cleaning a PC? (Choose two.) 
Defrag
Which tool should be used if a user needs to optimize space on a hard drive? 
1- Antivirus software
2- Spyware Remover
Which two types of tools can help protect a computer from malicious attacks? (Choose two.) 
Disk Management
Which tool in Windows XP gives a technician access to initialize disks and create partitions?
Phillips-head screwdriver
Refer to the exhibit. Which type of tool is presented in the graphic?
touching an unpainted part of the computer case
How does a technician discharge static buildup?
System File Checker
Which Windows XP command-line utility scans the critical files of the operating system and replaces any files that have been corrupted?
1- Spyware Remover
2- Defrag
3- Disk Cleanup
The performance of a computer is reduced after it has been using the Internet. Which three tools could be run to try to improve the performance of the computer? (Choose three.)
digital multimeter
Refer to the exhibit. Which type of tool is shown in the graphic?
spike
Which condition refers to a sudden and dramatic increase in voltage, which is usually caused by lightning?
Turn off and remove the power source.
Which step should be performed first when servicing computer equipment?
1- antistatic wrist strap
2- antistatic mat
Which two tools can help protect against ESD? (Choose two.)
1- wireless phones
2- microwaves
Which two devices commonly affect wireless LANs? (Choose two.)
1- electrical storms
2- power lines
What are two significant sources of EMI? (Choose two.) 
to equalize the electrical charge between a person and the equipment
Why should an antistatic wrist strap be worn when working on electronic equipment? 
It provides reference material for similar problems when such problems are encountered in the future
Why is documentation of all services and repairs an important organizational tool for a technician?
1- batteries
2- monitors
3- printer toner cartridges
Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.) 
Avoid using magnetized tools.
Which precaution should be taken when working around electronic devices?
compressed air
A technician has a room of computers which are running very hot. The technician discovers that the heat sinks in the computers are very dusty. What should the technician use to clean the heat sinks? 
CRT monitor
Which computer components must a technician never try to work on when wearing an antistatic wrist strap?














Chapter 3




jawaban
pertanyaan
20-pin connector
         A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to an ATX motherboard?
Pin 1 on the CPU is aligned with Pin 1 on the ZIF socket.
When installing a CPU in a ZIF socket, how should the technician align the pins to avoid damage?
1- hard drive
2- floppy drive
When building a computer, which two components are normally installed in 3.5-inch drive bays? (Choose two.)
1- PS/2
2- USB
Which two connectors are used to connect external peripherals? (Choose two.)
1- PCIe
2- PCI
A field technician has been asked to install a wireless 802.11g NIC in a computer, but is unsure about the expansion slots available. Which two types of wireless NICs should the technician have available? (Choose two.)
during the POST
After a technician has assembled a new computer, it is necessary to configure the BIOS. At which point must a key be pressed to start the BIOS setup program? 
It issues a number of short beeps.
A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
Use standoffs to keep the motherboard above the metal base.
Which action is recommended to prevent the motherboard from contacting the metal base of the case? 
The floppy cable has a twist in the cable.
What is a convenient way that a technician can tell whether a ribbon cable is for an IDE hard drive or a floppy drive? 
optical drive
Which type of drive is installed in a 5.25-inch bay?
Check the motherboard manual or manufacturer's website.
What is the most reliable way for users to buy the correct RAM to upgrade a computer? 
performs a check on all internal components
What is a function of the BIOS?
Reattach the side panels to the case.
What should be the next installation step after all the internal components of a PC have been installed and connected to 
Step 2
Refer to the exhibit. Which should be the last step when connecting external cables to a computer? 
provides an interface between a computer and a display monitor
What is a function of a video adapter card?
to provide functionality for external components to be connected to the computer
What is a function of the adapter cards that are installed in a computer?
1- a floppy data cable to connect the FDD to the motherboard
2- a cable from the power supply to the Berg power connector on the FDD
Which two connections should be provided to a floppy disk drive during installation? (Choose two.) 
in internal bays
Where should internal drives be installed in a computer? 
Steps 1, 4, 3
Refer to the exhibit. What is the order of steps that should be followed for a power supply installation in a computer? 
Consult the website of the manufacturer
What is the first step that a technician should take before physically opening a computer case?












Chapter 4



jawaban
pertanyaan
                        a network of networks that connects countries around the world
 which definition describes the term internet? 
 between an ISP and a home-based LAN
What type of connection point is a point of    presence
?(POP) 
Internet backbone
What is the term for the group of high-speed  data links that interconnect ISPS
ISR
Which device can act as a router, switch, and wireless access point in one package

extra web space

additional e-mail account

fast connectiont
What are three characteristics of business class ISP service? (Choose three
Upload speeds and download speeds are different. 
What is a major characteristic of asymmetric Internet service
an IP address

a network connection

access to an Internet
 service provider
Which three elements are required to successfully connect to the Internet? (Choose three
hop
What term describes each router through which a packet travels when moving between source and destination networks
the network path to a destination
What does the tracert command test
digital subscriber line technology
What type of end-user connectivity requires that an ISP have a DSLAM device in their network
to connect end users using cable technology 
Why would an ISP require a CMTS device on their network?
fiber
Refer to the graphic. What type of cabling is shown
UTP
Refer to the graphic. What type of cabling is shown
in a home office network

inside a school building
Which two places are most appropriate to use UTP cabling? (Choose two
reliable data communications
What does adherence to cabling standards ensure
 crossover 
Refer to the graphic. What type of cable is shown
   RJ-45
What connector is used to terminate Ethernet unshielded twisted pair (UTP) cabling
uses RJ-11 jacksuses RJ-45 jacksWhich two characteristics describe copper patch panels? (Choose two
aids in isolation of cabling problemsprotects cables from physical damage What are two advantages of cable management? (Choose two
having improper terminationusing low quality cables or connectors
What are two common causes of signal degradation when using UTP cabling? (Choose two
pinoutscable lengthsconnector types 
What are three commonly followed standards for constructing and installing cabling? (Choose three












chapter 5




jawaban
pertanyaan
the Windows XP Hardware Compatibility List
Once minimum hardware requirements are satisfied, where should a technician look to determine if the computer hardware has been tested with Windows XP?
Run the Microsoft Convert utility.
A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS? 
API
Which set of guidelines is used to ensure that programmers develop applications that are compatible with an operating system? 
Use the Device Manager utility to ensure that all the devices are operational.
A technician has finished installing Windows XP. What should the technician do to verify that all hardware has been installed correctly?
Chkdsk
A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP utility will check the file system for errors?
Recovery Console
A technician has a computer that is unable to boot Windows XP properly. The technician has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair XP from the XP boot disk? 
Windows User State Migration Tool
A user decides to install a new version of Windows Vista but needs to retain the configurations and customizations of the current Windows XP operating system. Which software can be used to achieve this?
virtual real mode
Which operating mode is used by Windows XP to run a DOS application?
1- It organizes operating system snap-ins.
2- It can be used to create customized MMCs.
3- It requires administrative privileges to access.
What are three features of the Microsoft Management Console (MMC)? (Choose three.)
Safe Mode with Networking Support
A technician has installed new video drivers on a Windows XP computer and now the monitor shows distorted images. What startup mode can the technician use to access a new driver on the network?
Develop a preventive maintenance plan.
A company with 40 computers needs to reduce repair costs, decrease downtime, and improve reliability. Which task will 
Roll back the driver.
When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this issue?
The operating system will fail to start.
What would be the result of having a corrupt Master Boot Record?
compatibility mode
Which mode allows applications that are not compatible with the current operating system to run in an environment that simulates an earlier operating system? 
C:\WINDOWS
Which directory contains Windows XP OS system files?
multitasking
What is the term for the ability of an operating system to run multiple applications at the same time? 
1- Windows XP Home
2- Windows XP Professional
Which two operating systems can function correctly on a system with 64 MB of RAM? (Choose two.)
128 GB or more
How much RAM can be addressed by a 64-bit operating system?
HKEY_LOCAL_MACHINE
Which registry file contains information about the hardware and software in the computer system?
1- Changes to disk partitions can be made
2- A clean copy of Windows Vista is installed.
                     3- The location of the Windows installation can be selected
When a computer boots from the Windows Vista disc, which three functions are performed if the Custom (advanced) option is selected? (Choose three.)











Chapter 6



jawaban
pertanyaan
1- Ethernet
2- modem
Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.
What is the major difference between desktop and laptop motherboards? 
1- mobility
2- size
Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
PC ExpressCard
Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
third
Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
Select Power Options from within the Control Panel.
Where can a technician change the power schemes on a laptop running Windows XP?
Use a cleaning disc for optical drives.
What is the proper way to clean optical drives? 
1- Use a lint-free cotton cloth.
2- Wipe the disc from the center outward.
Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
LCD
Which display technology is most commonly found in modern laptop computers?
1- camera
2- printer
3- scanner
Which three components commonly connect to USB or FireWire ports? (Choose three.)
1- disk drive
2- monitor
Which two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
1- 34mm wide
2- 54mm wide
Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
Fn
Refer to the exhibit. A laptop user realizes that the key that is shown in the exhibit is used when connecting a laptop to an external projector. What additional key on the laptop keyboard is normally required to make the image on the laptop screen display on the projector? 
RAM
A technician is replacing a laptop SODIMM. With what component is the technician working?
Attach the AC adapter.
A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do nex
Reset the display to its native resolution.
A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
Battery
Which component should be removed before cleaning a laptop?
1- What software has been installed?
2- How would you describe the problem you are experiencing?
Which two questions that a technician can ask during the troubleshooting process are considered open-ended? (Choose two.)
USB
Refer to the exhibit. Which laptop component port is circled?
The laptop can communicate with a Bluetooth wireless device.

Refer to the exhibit. What does this symbol indicate when illuminated on a laptop? 


Refer to the exhibit. A laptop touchpad is nonresponsive. What port can be used to attach an external pointing device as a quick fix until the touchpad issue can be 
resolved

port C














Chapter 7





jawaban 
pertanyaan
electrophotographic
Which technology is used by laser printers?
drum
Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material? 
firmware
Which software, embedded in a printer, controls how the printer operates and can be upgraded?
Optical Character Recognition
Which software converts scanned pages into text?
website for scanner manufacturer
What is the best source for a Windows-compatible scanner driver? 
print example.txt
Which Windows XP command sends a file named example.txt to the default printer? 
inkjet
Which printer technology is used in low-cost, photo-quality printers? 
the use of Ethernet or wireless
What is typical of a network printer installation?
Send the print job again. If that fails to work, turn the printer off and back on, then resend the print job. If the problem still exists, reinstall or upgrade the print driver.
Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
damage to the UPS
What problem might be encountered if a laser printer is plugged into a UPS?
1- Paper Type
2- Print Quality
Refer to the exhibit. Which two printer configuration settings should be modified when changing from standard paper to photo paper? (Choose two.)
1- USB
2- FireWire
Which two interface types can supply power to a scanner or printer? (Choose two.)
Remove power to the printer.
What is the recommended first step in performing printer maintenance? 
removing impurities collected on internal components
Which routine maintenance procedure can extend the life of a printer?
1- rebooting the computer
2- restarting the print spooler
Which two methods can restart a stopped print service? (Choose two.) 
Identify the symptoms.
What is the first step in troubleshooting a printing problem?
moving parts
What is a feature that causes printers to require higher levels of maintenance than other electrical devices require?
1- internal leaks
2- reduced life of the printer
What are two possible negative results from refilling ink cartridges on a printer? (Choose two.) 
1- wiping the glass with cloth
2- removing the glass during cleaning
What are two recommended procedures for proper scanner care and maintenance? (Choose two.)
drum
A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction? 














Chapter 8




jawaban 
pertanyaan   
WAN
The Internet is an example of which type of network?
TCP/IP
Which suite of protocols is used to transmit data across the Internet?
subnet mask
Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?
ADSL
What is the most commonly used DSL technology?
1- The company network requires secure access to confidential information.
2- The users need a central database to store inventory and sales information.
3- The data gathered by the employees is critical and should be backed up on a regular basis
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
1- The number of twists in the wires inside the cable
2- The number of wires inside the cable.
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
tracert
Which Windows XP command displays the route taken by packets crossing an IP network? 
328 ft (100 m)
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
1- supported by IEEE 802.3 standards
2- uses a bus logical topology
Which two characteristics describe Ethernet technology? (Choose two.) 
hub
Which device enables computers to be attached to a network without segmenting the network? 
a bad network cable
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
the available wireless networks within range
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
Attach a cable that has an RJ-45 connector.
Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
VPN
Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN? 
1- Fewer peripherals are needed
2- Centralized administration capabilities are enhanced.
Which two statements are true of network computing in contrast to non-network computing? (Choose two.)
It developed standards to replace proprietary standards after U.S. telephone industry deregulation.
What is true about the TIA/EIA?
1- faulty NIC
2- faulty patch cord
A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.) 
to save troubleshooting time
Why should network cables always be labeled? 
Purchase equipment only through manufacturer-authorized partners.
Which method is recommended in order to avoid problems with counterfeit network equipment? 
DNS
Which networking protocol translates a network name such as www.cisco.com to a unique IP address?















Chapter 9





jawaban
pertanyaan
1- spyware
2- grayware
What are two examples of malware? (Choose two.) 
1- Enable WEP.
2- Enable MAC filtering
Which two actions improve security on a wireless network? (Choose two.)
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Which best practice should be included in a password protection policy? 
1- What items need to be protected?
2- What is to be done in the case of a security breach?
3- What are the possible threats to the items?
Which three questions should be addressed by organizations developing a security policy? (Choose three.) 
Download the latest signature files on a regular basis
What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses? 
Create a restore point
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? 
The update will be installed as soon as the computer is powered on
A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown? 
guiding visitors within the premises and escorting them personally when they leave
Which precaution helps protect against social engineering in the workplace?
spam
A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail? 
replay
A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy? 
by installing unwanted programs on a computer
How can web tools, such as Java or ActiveX, be used for a malicious attack?
a biometric sensor
Which security device stores user physical characteristics to provide a user level of facility access?
poor wireless device security
What condition can allow unauthorized access to a network for users who are not physically connected to the network?
because everyone can be affected by computer and network security problems
Why should everyone in an organization give high priority to computer and network security?
1- keep equipment functioning
2- provide access only to authorized users
What are two important outcomes of good computer and network security? (Choose two.)
a programming code pattern
What is a signature as the term is used in antivirus and antispyware software development? 
2.5.4.3.6.1
Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?
1- What problems are you experiencing?
2- What websites have you visited recently?
Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)
Establish a plan of action for resolution.
For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined?
Identify the problem
At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?

















Chapter 10






jawaban
pertanyaan
Listen to the complaint, apologize for the incident, and then offer to help the customer.
A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
1- Check grammar and spelling before sending e-mail
2- Use mixed case in e-mail instead of all upper case or all lower case
Which two actions are examples of good netiquette? (Choose two.) 
Step away from the computer and ask the user to close the document
While servicing a computer, a technician notices that a document labeled "confidential" is open on the computer. What should the technician do? 
resolving computer problems that require opening up the computer
Which task would be the responsibility of a level-two technician?
1- Use simple step-by-step instructions.
2- Speak in plain terms.
Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
1- Go for a quick walk.
2- Listen to soothing sounds.
3- Practice relaxed breathing.
Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.) 
Ask and wait for permission before placing customers on hold
What is the recommended way to place customers on hold?
A customer wants two new computers added to the existing SLA without additional cost.
Which issue is an example of an exception to an SLA that should be escalated to a manager?
Wait until the customer has finished speaking, and then explain the possible solution
While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed? 
1- your name
2- ticket number
3- customer name
Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
speaking directly with the customer
For a computer technician, what is the first step in resolving a customer problem?
Reducing stress helps customers provide more useful information
Which statement is true about the role of stress when troubleshooting customer computer problems? 
It helps technicians learn important details from the customer.
Why is good communication a critical part of successfully troubleshooting customer problems?
1- sending chain letters
2- sending anonymous e-mails
What are two examples of technician interactions with a customer that are considered to be either unethical or illegal? (Choose two.) 
SLA
Where would legal details be found that describe proper handling of information for a specific customer?
to gather pertinent customer information
What is the primary responsibility of a level-one helpdesk technician?
1- The computer case must be opened.
2- The problem cannot be resolved in less than ten minutes.
What are two examples of situations where a helpdesk call should be escalated to a level-two technician? (Choose two.)
1- customer e-mails
2- hard copies of files on the customer desk
A technician works on a customer computer at the customer site after answering a support call. Which two items should the technician regard as being the property of the customer? (Choose two.) 
remote diagnostics utility
Which common feature of helpdesk software allows a technician to control a customer computer from a call center desk? 
Follow up with the customer to verify that the problem has been resolved.
A computer technician wants to make sure that a customer, who had been experiencing a problem with a hard drive, is satisfied that the problem has been resolved. Which of these rules would help accomplish this desire?


































cisco it essentials pc hardware and software v4.1 Final Exam 1-10


Terms

Definitions

firewire and usbWhich two interface types make it possible to attach different external components to laptops and desktops without powering the computer off? (Choose two.)
Passwords should be a combination of letters and numbers, Passwords should be changed by the user after specific periods of time, Password expiration and lockout policies should be clearly defined.Which three rules increase the level of password strength? (Choose three.)
Making data appear to come from a source other than the actual source.What characterizes spoofing?
isopropyl alcoholWhen installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts?
flash driveRefer to the exhibit. Which type of removable media is depicted?
DVD driveRefer to the exhibit. Which type of device uses the connector shown in the graphic
compressed air and a soft clothWhich two items are considered proper cleaning tools? (Choose two.)
drumWhich type of scanner generally has high costs but produces top-quality images?
equipment power, low-ink warning, and out of paperWhich three things should be investigated first when troubleshooting a printer? (Choose three.)
DHCPWhich protocol dynamically assigns IP addresses to network devices?
MolexWhich type of power connector is used to connect devices such as optical drives and hard drives?
IEEE 1394bWhich type of cable standard uses a 9-pin connector and supports data rates in excess of 800 Mbps?
DWhen analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
Automated System Recovery (ASR)In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system?
to conduct heat that is generated by the CPU to the heat sinkWhat is the purpose of using thermal compound when installing a CPU, a heat sink, and a fan assembly on a motherboard?
The technician interrupted a number of times to ask questions.A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
expansion slot typeA technician needs to purchase a new video adapter for a computer. Which factors should be considered when selecting the adapter?
NTDETECTWhich program checks for installed hardware during the Windows XP boot process?
F8Which key or key sequence pressed during the boot process will allow a user to restart a Windows PC using the last known good configuration?
msconfigAfter Windows XP has been installed, which program would a technician use to select the programs that will run at startup?
Create a complete system backup.A technician is planning to convert a file system from FAT32 to NTFS. What step should be taken before doing the conversion?
ACPIWhich power management method offers the most power management features?
Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheatingWhich environmental factor helps ensure optimal performance for laptops?
Uninstall and reinstall the printer driver.A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
Immediately after printing, the ink is wet.A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacked and packaged for shipping. What advice should a technician give the customer?
touch padRefer to the exhibit. What type of device is highlighted in white?
3 GHzA student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing?
DDoSThe IT department reported that the web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which attack characterizes this type of situation?
shattering the hard drive platters with a hammerWhat is the best way to fully ensure that data is unable to be recovered from a hard drive?
solid-inkA customer who owns a business that creates high-quality color graphic images wants a new printer. The customer already has an ink-jet printer. Which type of printer would be a good recommendation?
Replace the paper in the input tray with new paper.A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem?
Use a docking station.A laptop user has noticed that connecting an external monitor, keyboard, and speaker each day is causing damage to the laptop connectors. What can the user do to prolong the life of the connectors?
in Power Options PropertiesA Windows XP laptop user finds that the low battery alarm does not give enough warning. Where can the user adjust the alarm setting to issue an earlier warning?
Data is more secure in the event of hardware failures. and Data resources and access are centrally controlled.A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
fiber opticA network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network media should be recommended?
remove the batteryWhat must be done before a technician cleans a very dirty LCD screen on a laptop?
A password was not assigned to the default administrator account.A technician has been asked to find how a hacker keeps breaking in to a computer. Which security precaution was most likely missed when the operating system was first installed?
Task ManagerA technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to use correct this problem?
NTBOOTDDA technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation?
network accessAt which TCP/IP model layer would a MAC address be found?
establish secure VPN connections and manage VPN tunnelsWhat are two functions of a VPN gateway? (Choose two.)
Internet access and VPN clientWhat are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
The DSL filter is faulty or not connected.A customer reports poor telephone communications when using a copper telephone line that also has a DSL service. What is the most likely cause of the problem?
Close all other running programs before installing the new application.A new application fails to install from a CD known to be virus-free and compatible with the operating system. What is a possible solution to this problem?
virtual memory settings , automatic updates settings, and computer nameWhich three customizable properties are available when right-clicking the Windows XP My Computer desktop icon and selecting Properties? (Choose three.)
The computer emits a pattern of beeps indicating the failing device.A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
Each wire carries a different voltage.Why does the cable from the power supply to the motherboard have different colored wires?
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Double-click the NIC adapter. Click the Driver tab. Click the Roll Back Driver button.The driver for a network interface card has been updated on a Windows XP computer. All network access has been lost. Which steps in the Windows XP Classic View should be followed to roll back the network interface card driver?
fingerprint scannerWhich option is the most secure type of user authentication?

Making data appear to come from a source other than the actual source.
What characterizes spoofing?







Chapter 11


































chapter 11

1)Which two ports are used to connect external media readers to a computer? (Choose two.)
#FireWire
#USB

2)Why should you use an antistatic mat when working on the internal components of a computer?
#Reduce the chance of computer components being damaged by ESD

3)Under which circumstance would the use of an antistatic wrist strap be discouraged?
#When working with high voltage circuits

4)What is a critical step when installing a second PATA hard drive in a computer?
#Ensure that pin one of the PATA data cable is correctly aligned with the connector

5) A technician needs to retrieve a DVD from an optical drive that is jammed and fails to open. What is the best method the technician could use to retrieve the DVD?
#Insert a pin in the small hole next to the eject button.

6)Which method of disk writing does RAID 5 use?
#Parity

7) A customer is interested in video editing and has purchased a FireWire hard drive for storage of videos. However, no FireWire ports are available on the motherboard. What type of adapter will the customer be interested in obtaining?
#eSATA

8) When a computer boots, the hard disk is not recognized. What are two possible causes of the problem? (Choose two.)
#The power cable is not attached properly to the drive.
#The data cable is loose or disconnected.

9)What is the recommended procedure for cleaning a computer fan assembly?
#Hold the fan blades in place and clean them with compressed air

10)While performing routine maintenance, a user notices that the desk area around the computer is cluttered and dusty. After cleaning the desk area, what action should the user take to clean the computer?
#Remove all dust and debris from the computer using a can of compressed air.

11) What manufacturing process makes a multicore processor operate faster than a single-core processor on the same motherboard?
#The multicore processors are designed with multiple processors integradet into the same circuit.

12) You are monitoring a new technician installing a device driver on a Windows-based PC. The technician asks why the company requires the use of signed drivers. What would be the best response to give?
#A signed driver has passed Microsoft's quality lab test and prevents a system from being compromised.

13)When a technician is servicing a laser printer, which two dangers need to be avoided? (Choose two) #electrical shock
# burns

14)What is the recommended way to clean an optical drive?
#Use compressed air and lint-free cotton swabs

15)A technician has determined that a computer is failing to boot because of a power supply that is not supplying power to the hard drives. What is the correct course of action?
#No attempt should be made to repair the power supply. The power supply should be replaced with a power supply of equal or greater wattage

16)Which type of hard drive cable connects drives in a daisy chain series and requires manual termination at each end of the daisy chain to prevent data corruption?
#SCSI

17) A technician is concerned that a computer is overheating. The computer reboots without warning. What can the technician do to improve the circulation of air through the computer?
#Replace the case with one that has front air vents.

18)How should a floppy disk drive be cleaned.
#Use a drive cleaning kit

19)Why should a technician avoid using magnetized tools when repairing a computer?
#They store ESD and discharge on contact with computer components.

20) A technician begins gathering data from a customer by asking open-ended questions. Which question is a proper open-ended question?
#What happens when the PC is powered on?
















Chapter 12






1) Which two locations are commonly used in Windows for temporary files? (Choose two.)
#C:\temp #C:\Windows\temp

2)A new graphics card is installed in a computer. When the computer is powered on, the default drivers are loaded but some of the applications do not work properly. What should the user do to improve the graphics card performance?
#Check the website of the manufacturer of the latest drivers

3) A video-file editor defragments the hard drive on his computer every month to ensure continuing optimal performance. How can the editor ensure that the defragmentation occurs every month?
#Add Defrag to Scheduled Tasks in System Tools.

4) Which information is backed up when a restore point is created?
#System and Registry information only

5) Which two pieces of information are required when configuring Automatic Updates for Windows XP? (Choose two.)
#day
#time

6) A technician boots a Windows XP computer that has an incorrect driver loaded for the video adapter card. How can the technician revert to a previous driver?
#Select the video adapter card in Device Manager, select the Driver tab, and click Roll back driver from Properties.

7) What is a feature that Internet browsers provide to improve performance when accessing recently visited websites?
#Caching recently accessed pages

8) A technician is having trouble repairing a difficult Windows XP problem. The usual quick-fix solutions did not work and there are no obvious clues found in either Device Manager or Event Viewer. What two actions should the technician try next? (Choose two.)
#Check any manuals relating to the hardware and software.
#Check the Internet for possible solutions.

9) In Windows XP which file determines the prompt that a user sees during the boot process when multiple operating systems are present?
#BOOT.INI

10)What is the default location for system files in all versions of 32-bit Windows Vista?
#The Windows/System 32 subfolder

11)What is the issue if the status of a hard disk drive shows a „Not Initialized“ in the Disk Management utility?
#The drive does not contain a valid signature

12)What is the purpose of the chkdsk/ f command?
#It checks a hard drive for errors and fixes them if possible

13)Which command-line utility can be used to schedule a backup of Windows XP workstation?
#backup

14)What is the minimum amount of RAM that is required to install Mac OS X on an Intel-bassed Apple computer?
#256MB

15)Which protocol is used to resolve URLs to IP adresses?
#DNS

16)Which protocol automates assignment of IP addresses?
#DHCP

17)Which two operating systems can be upgraded to Windows XP Home? (Choose two)
#Windows 98 # Windows 98 SE

18)What information is contained in restore points in Windows XP?
#System and registry settings

19) A technician notices that a program that is listed in the registry is not found on a PC that is running Windows XP. What is a possible solution to the problem?
#Run chkdsk/F/R from the command prompt

20)A technician notices that a PC that is running Windows XP locks up without any error messages. What is a probable cause of the problem?
#The computer is overheating















Chapter 13








1)A technician is trying to repair a laptop where the images on the display can only be seen when looking at the screen from an angle. What needs to be done to fix the problem?
#Replace the LCD backlight

2) Why should care be taken when charging and handling a laptop battery?
#Laptop batteries can explode if mishandled or improperly charged.

3) Which three standard procedures must always be included in a preventive maintenance schedule? (Choose three.)
#physical cleaning
#hard drive maintenance
#software updates

4)Which IEEEspecification defines WPAN technology?
# 802.15.1

5)Which maintenance task can be performed to speed up file access on a laptop?
#Disk defragmentation

6) What are two steps a technician should take before repairing a laptop? (Choose two.)
#Backup all data stored on the laptop.
#Check the warranty to see if repairs must be done by an authorized service center.

7) Which attribute of a solid state drive would be an advantage when being used in a laptop?
#Solid state drives reduce power usage.

8)Which IEEE specification defines the FireWire standard?
#1394

9) Refer to the exhibit. Which type of connection is being established between the PDA and the infrared keyboard?
#line-of-sight

10)A customer is unable to use a laptop on battery power for more than 30 minutes. What would a technician suggest to this customer?
# Replace the laptop battery

11) Which two types of batteries should be completely discharged and then fully recharged to remove the charge memory? (Choose two.)
#Ni-Cad
#NiMH

12) A laptop that previously worked now fails to boot. The cursor fails to appear on the screen. When a bootable DVD is inserted, the system still fails to boot even though it is set to boot from CD/DVD. The fan turns, so power is applied and the power light is on. The technician installs the hard drive in another laptop and it works there. What is the probable cause of the problem?
#The CD/DVD drive has failed.

13) A laptop fails to start after a new hard drive has been installed. What are two possible causes of this problem? (Choose two.)
#The hard drive was not connected swappable
#The BIOS does not recognize the new hard drive.

14)Which acronym describes a laptop part that can be replaced by a customer?
#CRU

15) Which two sources can be used to determine the amount of currently installed RAM on a computer? (Choose two.)
#POST screen
#System Properties dialog box

16) Some keys on a laptop work intermittently. They sometimes type the letter and sometimes do not. What should a technician do to fix this problem?
#Clean the keyboard.

17)Which statement is true about version control of files that are transferred between a Windows laptop and Windows desktop PC?
#Windows does not allow files with the same name to exist in the same folder

18)Which laptop component is typically considered a CRU?
# RAM

19)Which Windows Vista tool is accurately described?
#Disk Defragmenter is meant to be used when a computer has files that are modified,added, or deleted often

20) Which type of encryption key should be enabled on WPA-compliant devices?
#128-bit




















Chapter 14








1)What can a technician do to reduce the time a user must wait when large print jobs are sent to the printer?
# Add more RAM to the printer

2)A technician needs to set up multiple printers in an office so that multiple users can access the printers without using the resources of any client computers. What is the best solution to meet these needs?
#A dedicated PC print server

3) A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost?
#Computer-shared printer

4) Which printer component can be upgraded to improve the buffering capabilities of the printer?
# Memory

5) What two solutions would fix the problem that occurs when every page that is printed by a laser printer produces lines or streaks? (Choose two.)
# Replace the drum.
#Use the cleaning utility to clean the cartridge nozzles.

6) For a user or technician performing maintenance on a dot matrix printer, what potential safety hazard does a print head present?
#Burns from hot surfaces

7) Which Windows component allows the Windows operating system to output graphics to a computer screen or print device
#GDI

8) Which two scanner options are used to improve document or image scans? (Choose two.)
# Resolution changes
# Output file format

9) A technician has completed the routine maintenance service for all the printers in the accounting department. Which action helps ensure that the next routine maintenance service is performed at the correct time?
#Reset the counters.

10) Which path will allow a user to add a printer in Windows XP?
#Start > Control Panel > Printers and Faxes > Add a Pointer

11) Which two items can help extend the life of an inkjet printer? (Choose two.)
#Type of ink
# Paper type

12) A technician is installing a new inkjet printer. The printer has successfully printed test pages. Which task also verifies the functionality of an inkjet printer after installing the printer driver?
# Using different types of paper trays for special paper sizes

13) A technician is installing network printer software and drivers on a Windows Vista computer. At the Select a Printer stage the technician wants to install a printer that is not listed. Which two methods are available to identify and select the required printer? (Choose two.)
# Printer type
# Manufacturer

14) Users from the art department are complaining that the inkjet printer is producing spotty and streaked printouts. What can be recommended to resolve this problem?
#Clean the print head by running the cleaning utility.

15) Which type of printing option should be implemented to allow a user to change settings for each document sent to the printer?
# Per-document

16) Which type of port is used for low-speed dot matrix printers?
#Seriál

17) Which two printer components can retain high voltages even after the printer has been unplugged?
# Corona wire
# Transfer roller

18) Which two scanning settings can significantly affect the size of the image file? (Choose two.)
#Resolution
#Output file format

19) Which two methods are often used to connect a lower-cost printer to a Windows XP network? (Choose two.)
# Use a separate print server
# Connect to a networked computer and share the printer.

20) Users working in humid environments notice that documents printed by a laser printer are of poor quality. It is discovered that the printer is unable to attach toner to the paper. What is the most likely cause of the problem?
# The paper absorbed moisture from the air and is damp.




















Chapter 15







1) A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
#Ask the IT department to permit port 25 through the firewall.

2)A technician is working on a workstation that has an IP address of 169.254.25.35. The technician found that the computer cannot connect to the Internet and the network cable to the computer had been disconnected.Which command can a technician use to get a new IP address once the cable is reconnected?
#ipconfig/renew

3) ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
#site survey

4) The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
#availability
#reliability
#speed

5)A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave.How can the technician accomplish this desired configuration?
#Use jumpers on the drive to configure the drive as slave

6) Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
#Delete the temporary Internet files.

7) When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
#Cat5e

8) Which protocol provides secure transport of data from the company web server to remote users?
#HTTPS

9) In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
#Security

10)A technician is concerned that a wireless router is missing current features. What action could be taken to address this issue? #Check for an updated firmware version
11) A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
#The employee is using an incorrect username or password.

12) Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
#read

13)A technician is troubleshooting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two actions should the technician perform?(Choose two)
#Verify the computer IP information
#Check activity on the routers

14)Which statement is true about network maintenance?
#Educating users on IT policies and procedures in an example of proactive network maintenance

15) Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
#25
#110
#143

16) What are two ways to assign an IP address to a wireless NIC? (Choose two.)
#Assign a static address
#Use DHCP.

17) Which two hazards exist when working with fiber optic cabling? (Choose two.)
#chemicals
#glass splinters

18)A company purchases several wireless NICs at a great price. After installing the NICs, they find that user cannot connect to the 2.4 GHz wireless network. What is a likely cause of the problem?
#The NICs are designed for the 802.11a standard

19)A user is reporting intermittent loss of connectivity to the network. No other users have reported similar issues.What preventive maintenance task would likely identify the problem?
#Check for a damaged network cable at the user workstation

20)Which two protocols are used to receive e-mail?(Choose two)
#IMAP
#POP3


















Chapter 16





1) Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
#Security key fob

2)Why would security application software be implemented on a network?
#To protect operating system

3)Thich two factors should management consider when developing a security policy?(Choose two) # Expense of the security protection
# The costs that are associated with data loss

4)After logging into a computer a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrators take to provide the user access to the folder?(Choose two)
#Give the person rights to the CIW folder
#Add the user to a group that has the rights to the CIW folder

5) After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.
)#the manufacturer FAQ for network devices
#technical websites

6) A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
#The administrator does not have the correct permissions to make the change.

7)Which important feature is offered by the USB standard?
#It can supply power from the computer to devices

8) A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
#The computer has been infected with spyware.

9)What are two interrelated aspects that would be involved in the physical security of an organizacion? (Choose two)
#Infrastructure #
Type of Layer 2 devices that are used within the network

10)Which two hasting algorithms are used to ensure that messages are unaltered during transmission?(Choose two)
# MD5
# SHA

11) Which Windows XP command initiates a backup from the command line?
#ntbackup

12)Which issue should be addressed in the detailed information thet is provieded by a local security policy?
#The types of intrusions that are covered by the policy

13) What are two features of Windows Vista Backup? (Choose two.)
#The backup files have the expension .zip.
#The backup files can be saved to another connected computer or server

14)What is a feature of the firewall capability when Windows Vista is the operating system?
#The firewall can be managed manually by permitting or allowing specific ports

15)Which physical security technology uses an embedded integrated circuit chip to store data safety and is commonly used in secure ID badges?
#Smart card

16)A customer has a web server for a small business. The bussiness uses both wired and wirelless networking. A linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?
#Port forwarding

17)What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?
# Disable SSID broadcast

18)Why should the default username and password be changed as soon as an access point is powered on and accessed?
#The change provides a minimum level of security to the access point

19) Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
#It does not impact the processing performance of the equipment it protects.
#It is designed to protect more than one computer.

20) Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
#Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.







2 komentar:

Anonim mengatakan...

For latest news you have to go to see world wide web and on world-wide-web I found this web page as a
most excellent site for most up-to-date updates.


Feel free to visit my web-site - serrurier paris 17

Anonim mengatakan...

I love your blog.. very nice colors & theme. Did you create this website yourself or did you hire someone to do it for you?
Plz reply as I'm looking to design my own blog and would like to know where u
got this from. cheers

Take a look at my web site - Serrurier Neuilly Sur Seine

 
Twitter Facebook Google +