2.28.2011

IT essential 4.1 chapter 16

1
A computer user cannot access the Internet. A technician, attempting to resolve the problem, can ping the proxy server, but Internet access is still denied. What is the problem?
#The computer browser proxy server settings are wrong.

2
What are two features of Windows Vista Backup? (Choose two.)
#The backup files can be saved to another connected computer or server.
#The backup files have an extension of .bkf and a maximum uncompressed file size of 200 MB.

3
On a computer in the lab, a student can access e-mail. However, from a laptop that is owned by the student, the wireless connection to the e-mail server fails. What is the problem?
#Windows Firewall is blocking the port that is used by the e-mail application.

4
A network administrator has noticed that users without administrative rights are installing unauthorized applications on the Windows Vista computers. What could the administrator do to prevent the installation of these applications?
#Reinstall the operating system and use the 64-bit version.

5
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
#Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

6
Which encryption technology provides secure tunnels?
#VPN

7
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
#Audit the event logs on the server to check for unauthorized network access.

8
A business has a policy to automatically update and run the antivirus software on all computers each day. When is the best time to perform this security maintenance?
#when the computers are not being used

9
Refer to the exhibit. Which Firewall Settings tab would be used to allow an FTP connection through a Vista-based computer?
#Advanced

10
Which simple wireless configuration technique can make the network invisible to unauthorized users?
#Disable SSID broadcasting.

11
Which two file-level permissions allow a user to delete a file? (Choose two.)

#modify
#full control

12
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
#ports
#protocols

13
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
#All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

14
Which Windows XP command initiates a backup from the command line?
#ntbackup


15
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
#It does not impact the processing performance of the equipment it protects.
#It is designed to protect more than one computer.

16
What is the result of changing the default username and password on a wireless access point?
#It reduces the chance of someone accessing the device and changing settings.

17
A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
#NTFS

18
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
#the manufacturer FAQ for network devices
#technical websites

19
What is the default setting for Windows XP operating system updates?
#automatic

20
On a Windows Vista computer, which CLI command is used to repair the master boot record that has been damaged by a virus?
#bootrec.exe/fixmbr

21
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
#The computer has been infected with spyware.

22
Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
#conduit
#card key
#security guard

23
The ABC Company network designers are designing the new corporate WiFi network. Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
#Disable broadcast of the SSID.
#Configure WPA on access points.

24
A student has a Windows XP laptop firewall set with the Don't Allow Exceptions option enabled. What is the consequence of setting this option?
#No applications on an outside network are allowed access to the laptop.

25
Which method can a technician use to make sure that only specific computers connect to a wireless router?
#MAC address filtering

26
A network administrator has moved encrypted files from one computer to another computer on the network and now the files are not encrypted. What does the administrator need to do to correct the problem?
#Convert the destination computer partition to NTFS.

27
A network administrator is trying to allow everyone access to a data folder while limiting access to individual subfolders to individuals. The administrator is having problems with all users being able to view and edit all files and folders. What should the administrator look at to solve the problem?
#Check to see if the subfolders have inherited rights from the main folder.

28
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
#security key fob

29
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
#The administrator does not have the correct permissions to make the change.

IT essential 4.1 chapter 15

1.When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
*Cat5e
2.The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
*Configure the device drivers.
*Configure the NICs with addressing information.
3.A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers performed with applications that require the transfer of data over the network. What should the company technicians do?
*Check if the network interface cards in the computers are limited to 10 Mb/s.
4.ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
*site survey
5.Which protocol provides secure transport of data from the company web server to remote users?
*HTTPS
6.n Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
*Security
7.Which two methods can be used to connect IP phones to a network? (Choose two.)
*Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
*Establish an Internet connection then use an Analog Telephone Adapter.
8. technician is working on a host computer that fails to obtain an IP address. Which three actions could the technician perform to determine the cause of the problem? (Choose three.)
-Check the PC firewall settings to make sure that DHCP is allowed.
- Check that the DCHP server is operational.
- Check that the network cable is connected
9.Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
*25
*110
*143
10.Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously provided by a DHCP server? (Choose two.)
*release
*renew
11.The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
*Start > Control Panel > Printers and Faxes > File > Add Printer
12.Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
*read
13.Which two hazards exist when working with fiber optic cabling? (Choose two.)
*chemicals
*glass splinters
14.A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which protocol could be used to resolve this issue?
*DHCP
15.Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
*Delete the temporary Internet files.
16.A computer user cannot access a bank using HTTPS. What is one recommended solution?
*Enable SSL through the web browser application.
17.What is the purpose of an analog telephone adapter in the application of VoIP services?
*to convert IP phone digital voice data to analog signals
18.Which safety precaution should be used when working with any type of cable?
*Wear safety glasses when working any type of cable.
19.Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the highlighted line of the tracert command output displayed in the exhibit?
*default gateway for the local computer
20.After booting a computer running Windows 2000, the following message displays: “The IP address already exists on another computer”. Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
*run ipconfig /release
*run ipconfig /renew
21.A technician is configuring a network device for remote access. Which protocol is commonly used as a secure alternative to Telnet?
*SSH
22.What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11n protocol standard?
*Older, legacy wireless devices may be unable to connect to the wireless network.
23.What are two possible causes of e-mail attachments not being received with e-mail messages? (Choose two.)
*The e-mail attachments could be too large.
*The e-mail server could not be receiving e-mail messages that are using POP.
24.What are two ways to assign an IP address to a wireless NIC? (Choose two.)
*Assign a static address.
*Use DHCP.
25.While using nslookup, a student sees the following message: “Can’t find server name for address 127.0.0.0: timed out.” What is one possible problem?
*The computer does not have at least one entry for a DNS server configured.
26.A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
*Ask the IT department to permit port 25 through the firewall.
27.A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
*An incorrect port number is configured in the FTP client.
28.A textbook author needs to upload a chapter from a home computer to the FTP server of the publisher. The author uses the correct username and password, but the transfer fails. What is the most likely cause of the problem?
*Port 21 should be enabled on the home firewall.
29.While troubleshooting a computer, the technician releases and renews the IP address. A message appears: “No operation can be performed on the adapter while its media is disconnected.” What is a probable cause of the message?
*The network cable is unplugged.
30.The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
*availability
*reliability
*speed

IT essential 4.1 chapter 14

1.Which two parts, one in a laser printer and one in a dot matrix printer, should be allowed to cool before attempting any repairs? (Choose two.)
fuser assembly
print head
2.Which two pieces of software are included with most new printers and are installed by the user? (Choose two.)
configuration software
printer driver
3.Which Windows component allows the Windows operating system to output graphics to a computer screen or print device?
GDI
4.A user reports that whenever he needs to print a document, the print job process is automatically sent to the wrong network printer. Which path should the user follow to resolve this problem in Windows XP?
Start > Control Panel > Printers and Faxes, right-click the printer, and then select Set as Default Printer
5.A technician is installing a new inkjet printer. The printer has successfully printed test pages. Which task also verifies the functionality of an inkjet printer after installing the printer driver?
using different types of paper trays for special paper sizes
6.Which two methods are often used to connect a lower-cost printer to a Windows XP network? (Choose two.)
Use a separate print server.
Connect to a networked computer and share the printer.
7.Which two issues should be considered when purchasing RAM for a new printer? (Choose two.)
physical type of memory
number of memory slots available
8.Which scanner option considerably affects the size of the output file?
resolution settings
9.A technician has completed the routine maintenance service for all the printers in the accounting department. Which action helps ensure that the next routine maintenance service is performed at the correct time?
Reset the counters.
10.Users working in humid environments notice that documents printed by a laser printer are of poor quality. It is discovered that the printer is unable to attach toner to the paper. What is the most likely cause of the problem?
The paper absorbed moisture from the air and is damp.
11.Which two printer parts should be cleaned with a damp cloth? (Choose two.)
roller surfaces in dot matrix printers
print head in inkjet printers
12.As a part of the maintenance process for a laser printer, a technician should remove all the small particles of toner inside the printer. What is the recommended method to perform this task?
Use a vacuum cleaner with HEPA filtration.
13.Which two items can help extend the life of an inkjet printer? (Choose two.)
type of ink
paper type
14.Which type of printing option should be implemented to allow a user to change settings for each document sent to the printer?
per-document
15.Users in the accounting department are having trouble digitizing documents with a scanner. What should the technician do to resolve the problem?
Calibrate the scanner.
16.Which type of port is used for low-speed dot matrix printers?
Serial
17.Which path will allow a user to add a printer in Windows XP?
Start > Control Panel > Printers and Faxes > Add a Printer
18.A technician is installing network printer software and drivers on a Windows Vista computer. At the Select a Printer stage the technician wants to install a printer that is not listed. Which two methods are available to identify and select the required printer? (Choose two.)
name
IP address
19.What two solutions would fix the problem that occurs when every page that is printed by a laser printer produces lines or streaks? (Choose two.)
Replace the drum.
Use the cleaning utility to clean the cartridge nozzles.
20.What could be a result of printing with paper that has become damp because of high humidity?
Paper jams are more frequent

IT essential 4.1 chapter 13

1
Which portable connection provides the user with the possibility of high-speed Internet connectivity?
#cellular

2
Which standard does Bluetooth incorporate to reduce the chance of interference when multiple Bluetooth devices are present?
#AFH

3
What wireless technology has a range limited to 3 feet (1 m) and cannot penetrate ceilings and walls?
#infrared

4
Which wireless technology is a low-power, short-range technology that uses LEDs to transmit data and uses photodiodes to receive data?
#infrared

5
Some keys on a laptop work intermittently. They sometimes type the letter and sometimes do not. What should a technician do to fix this problem?
#Clean the keyboard.

6
A student unpacks a new laptop, attaches the AC adapter, and powers it up. However, the laptop power LED is off. What is the probable cause of the problem?
#The AC adapter is not securely connected.

7
Refer to the exhibit. Which type of connection is being established between the PDA and the infrared keyboard?
#line-of-sight

8
A technician is working on a laptop that has excessive hard drive activity. Which two actions can the technician take to resolve the problem? (Choose two.)
#Delete files and programs on the hard drive.
#Install Additional RAM.

9
What are two steps a technician should take before repairing a laptop? (Choose two.)
#Backup all data stored on the laptop.
#Check the warranty to see if repairs must be done by an authorized service center.

10
A laptop that worked fine previously now fails to emit sound. A technician finds that the sound is still enabled through the control panel. What could be causing the problem?
#The sound could have been disabled through a slide switch commonly located below the sound port.

11
Which wireless technology offers a maximum data rate of 540 Mbps?
#802.11n

12
Which two sources can be used to determine the amount of currently installed RAM on a computer? (Choose two.)
#Administrative Tools utility
#System Properties dialog box

13
The design department recently doubled the RAM capacity in all of the laptops. After the upgrade, the laptop users reported experiencing improved performance. Which operational benefit have the users noticed after the RAM increase?
#The hard disk swap file is read less frequently.

14
A laptop that previously worked now fails to boot. The cursor fails to appear on the screen. When a bootable DVD is inserted, the system still fails to boot even though it is set to boot from CD/DVD. The fan turns, so power is applied and the power light is on. The technician installs the hard drive in another laptop and it works there. What is the probable cause of the problem?
#The CD/DVD drive has failed.

15
Which two types of batteries should be completely discharged and then fully recharged to remove the charge memory? (Choose two.)
#Ni-Cad
#NiMH

16
Which attribute of a solid state drive would be an advantage when being used in a laptop?
#Solid state drives reduce power usage.

17
A laptop fails to start after a new hard drive has been installed. What are two possible causes of this problem? (Choose two.)
#The hard drive was not connected properly.
#The BIOS does not recognize the new hard drive.

18
Which Wi-fi standard uses the 5.0 GHz frequency band?
#802.11a

19
Which type of infrared network bounces the signal off ceilings and walls?
#scatter

20
Which two types of ports can be used to attach an external hard drive to a laptop computer? (Choose two.)
#USB
#Firewire

21
Manufacturers often offer devices in two versions, one with all the necessary manuals and drivers and one without. Which two names are given to these versions? (Choose two.)
#OEM
#retail

22
Which three standard procedures must always be included in a preventive maintenance schedule? (Choose three.)
#physical cleaning
#hard drive maintenance
#software updates

23
Which IEEE 802.11 standard uses only 5 GHz technology?
#802.11a

24
The accounting department has received a new laser printer. According to the printer technical specification, the printer complies with the Bluetooth Class 2 specification. What is the maximum distance that any device could be expected to successfully send print jobs?
#33 ft (10 m)


25
Why should care be taken when charging and handling a laptop battery?
#Laptop batteries can explode if mishandled or improperly charged.

26
Which two methods can be used to provide security for a Bluetooth connection? (Choose two.)
#PIN authentication
#Service Set Identifier (SSID)

27
Which type of encryption key should be enabled on WPA-compliant devices?
#128-bit

28
Which three laptop components should be cleaned during routine maintenance? (Choose three.)
#exterior case
#cooling vents
#keyboard

29
A laptop will only work on AC power. What should be done to fix the problem?
#Replace the battery.

IT essential 4.1 chapter 12

1
Which virtual memory attribute is the only one a technician should change?
#location

2
Which Windows XP utility is used to partition and format hard drives?
#Disk Management

3
A technician boots a Windows XP computer that has an incorrect driver loaded for the video adapter card. How can the technician revert to a previous driver?
#Select the video adapter card in Device Manager, select the Driver tab, and click Roll back driver from Properties.

4
A user wishes to dual boot Windows XP and Windows Vista on a computer with a single hard drive. Which advice should the technician provide the user?
#It is necessary to create a second partition and install Vista into the second partition.

5
A technician is setting up an e-mail client for a customer. Which two protocols can the technician select to retrieve e-mails from the e-mail server? (Choose two.)
#IMAP
#POP

6
What are two reasons for creating two partitions? (Choose two.)
#separate data files and operating system
#allow the computer to be dual booted

7
Which information is backed up when a restore point is created?
#system and Registry information only

8
What is a common cause of the Invalid Boot Disk error?
#There is a non-bootable floppy disk in the floppy drive.

9
A technician is having trouble repairing a difficult Windows XP problem. The usual quick-fix solutions did not work and there are no obvious clues found in either Device Manager or Event Viewer. What two actions should the technician try next? (Choose two.)
#Check any manuals relating to the hardware and software.
#Check the Internet for possible solutions.

10
Which action should be taken to start the defragment utility when using the Windows XP Category View?
#Double-click My Computer, right-click the disk to defragment, and choose Properties > Tools > Defragment Now.

11
In Windows XP which file determines the prompt that a user sees during the boot process when multiple operating systems are present?
#BOOT.INI

12
Which action configures Windows Explorer to display file extensions?
#Choose Start > Control Panel > Folder Options > View, uncheck the Hide extensions for known file types check box.

13
A video-file editor defragments the hard drive on his computer every month to ensure continuing optimal performance. How can the editor ensure that the defragmentation occurs every month?
#Add Defrag to Scheduled Tasks in System Tools.

14
Which two pieces of information are required when configuring Automatic Updates for Windows XP? (Choose two.)
#day
#time

15
When configuring Windows XP, which setting configures a service to run every time a computer is started?
#automatic

16
Which two locations are commonly used in Windows for temporary files? (Choose two.)
#C:\temp
#C:\Windows\temp

17
What is the most common cause of blue screen errors?
#device driver errors

18
A user has observed that the performance of the hard disk has degraded over time. What is the first thing a user should do to improve performance?
#Defragment the hard disk.

19
Which Windows XP Professional installation uses a Sysprep file?
#image-based installation

20
What is a feature that Internet browsers provide to improve performance when accessing recently visited websites?
#caching recently accessed pages

21
While attempting to run an application, a user receives an error message indicating that a required RPC service is unavailable. The user determined that the RPC server is functioning properly. Which action should be tried next by the user?
#Restart the service.

IT essential 4.1 chapter 11

1.A technician suspects that a hard drive is beginning to fail. Which two conditions would support this suspicion? (Choose two.)

*The hard drive is making unusual noises.
*The hard drive has a gradual increase in the number of bad sectors.
2.Which two problems are caused by inadequate CPU cooling and ventilation? (Choose two.)
*The computer locks up.
*The computer does not boot.
3.A technician fails to successfully boot a computer into Safe Mode. The technician then successfully boots the computer using a Windows boot disk. What is the most likely cause of the problem?
*hard drive failure
4.A technician is concerned that a computer is overheating. The computer reboots without warning. What can the technician do to improve the circulation of air through the computer?
* Add one or more case fans.
5.A customer needs help selecting a new power supply for an existing computer. Which two questions should a salesperson ask to help the customer? (Choose two.)
*What is the size of the case, and which type of motherboard is in the computer?
*Which components are currently being used on the computer, and what new components may be added to the computer?
6.Which three computer system capabilities should a technician consider when installing a video capture card? (Choose three.)
*processor speed
*amount of RAM
*VGA adapter specification
7.A customer is interested in video editing and has purchased a FireWire hard drive for storage of videos. However, no FireWire ports are available on the motherboard. What type of adapter will the customer be interested in obtaining?
*I/O
8.Which tool would be the best to use to test the voltage output on every pin of a SATA connector?
*multimeter
9.When a computer boots, the hard disk is not recognized. What are two possible causes of the problem? (Choose two.)
*The power cable is not attached properly to the drive.
*The data cable is loose or disconnected.
10.A computer system keeps losing the date and time or requesting to go into the Setup program during the boot process. What are two possible solutions? (Choose two.)
*Replace the motherboard battery.
*Verify that the motherboard battery is secure.
11.A technician is upgrading a computer motherboard and has successfully replaced a single core CPU with a dual core CPU. What should be checked to ensure that the dual core CPU now operates correctly?
*Confirm that the BIOS firmware supports the dual core CPU.
12.When testing the 6-pin PCIe connector with a multimeter, what should the voltage read?
*12 V
13.Why is a solid state drive more reliable than a traditional drive?
*It has fewer moving parts.
14.A motherboard flash BIOS has been updated. After the update, the computer restarts, but does not boot. The technician examines the motherboard documentation and discovers the motherboard has only one BIOS chip. What will the technician have to do to fix this problem?
*Obtain a replacement BIOS chip.
15.Which two ports are used to connect external media readers to a computer? (Choose two.)
*FireWire
*USB
16.A technician begins gathering data from a customer by asking open-ended questions. Which question is a proper open-ended question?
*What happens when the PC is powered on?
17.What type of motherboard bus carries memory locations?
*address
18.A technician needs to retrieve a DVD from an optical drive that is jammed and fails to open. What is the best method the technician could use to retrieve the DVD?
*Insert a pin in the small hole next to the eject button.
19.What is the purpose of the copper or aluminum between a processor and the fan on a computer motherboard?
*It conducts heat from the processor so that the fan can disperse the heat.
20.Which two motherboard features must be compatible when selecting a new CPU? (Choose two.)
*chip set
*socket type
21.You are monitoring a new technician installing a device driver on a Windows-based PC. The technician asks why the company requires the use of signed drivers. What would be the best response to give?
*A signed driver has passed Microsoft’s quality lab test and prevents a system from being compromised.
22.What manufacturing process makes a multicore processor operate faster than a single-core processor on the same motherboard?
*The multicore processors are designed with multiple processors integrated into the same circuit.
23. A technician is helping a client select additional RAM for a computer. Which three items should be considered when updating RAM? (Choose three.)
*The memory must be compatible with the video card.
*The memory must be compatible with the motherboard.
24.On what media is information stored when an SSD is installed?
*static RAM
25.What are two probable causes of a computer failing to recognize a newly installed storage device? (Choose two.)
*The device jumpers are set incorrectly.
*The system BIOS settings are incorrect.
26.A new sound card has just been installed, but no sound reaches the speakers. What are two common solutions a technician might implement? (Choose two.)
*Connect the speakers to the correct port.
*Unmute the sound through the operating system.
27.A motherboard has a 64-bit bus. What does this mean?
*The processor can transmit 64 bits at a time to a motherboard component

IT essential 4.1 chapter 10

1.Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
*your name
*ticket number
*customer name
2.The technician begins diagnosing a problem by asking an experienced customer to visit a troubleshooting Web site. The customer becomes angry because she feels this could be done without calling the technician. What should the technician do?
*Explain how the Web site can be used by both of them during the call to quickly eliminate problems.
3.Which two approaches are recommended when dealing with customers on the telephone? (Choose two.)
Be positive.
*Look for alternative ways to help the customer.
4.Which two guidelines demonstrate proper netiquette? (Choose two.)
*Begin each e-mail with an appropriate greeting.
*Avoid replying to “flames”.
5.A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
*Listen to the complaint, apologize for the incident, and then offer to help the customer..
6.While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed?
*Wait until the customer has finished speaking, and then explain the possible solution.
7.A technician is talking on the telephone to an angry customer who is unhappy with previous service. How should the technician calm the customer?
*Listen carefully and attempt to solve the customer’s problem.
8.Which three techniques should be used to successfully deal with a talkative customer? (Choose three.)
*Politely interrupt to refocus the customer.
*Gather as much information as possible while the customer is talking.
*Allow the customer to talk for one minute and then ask closed-ended question to regain control of call.
9.Which three items are commonly parts of a service level agreement (SLA)? (Choose three.)
*supported software
*diagnostic procedures
*service location
10.Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
*Use simple step-by-step instructions.
*Speak in plain terms.
11.When dealing with an angry customer, which two things can a technician do to resolve the problem? (Choose two.)
*Allow the customer to explain the problem, possibly dispelling some of the anger.
*Sympathize with the customer’s problem.
12.A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer? (Choose two.)
*Allow the customer to speak without interruption.
*Refer to the customer by name whenever possible.
13.A technician is trying to calm an angry customer. What is the best approach?
*Maintain a positive tone of voice and offer to help solve the problem.
14.Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.)
*Go for a quick walk.
*Listen to soothing sounds.
*Practice relaxed breathing.
15.What is the recommended way to place customers on hold?
*Ask and wait for permission before placing customers on hold.
16.What are three guidelines for beginning a call with a customer? (Choose three.)
*Determine the level of knowledge that the customer possesses about computers.
*Use brief communication to establish a one-to-one connection with the customer.
*Call the customer by name.
17.A technician receives a call from a customer who is too talkative. How should the technician handle the call?
*Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.
18.Which issue is an example of an exception to an SLA that should be escalated to a manager?
*A customer wants two new computers added to the existing SLA without additional cost.
19.Which three tasks are commonly carried out by a level-one technician? (Choose three.)
*document all information on the work order
*prioritize the problem
*gather information from the customer
20.A technician wants to apply for a job in a call center for a computer repair service. Which two characteristics are desirable for this type of position? (Choose two.)
*possess good listening skills
*display professional behavior at all times

IT essential 4.1 chapter 9

1. What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
*Download the latest signature files on a regular basis.
2. Which type of software is downloaded onto the computer of a user without the knowledge of the user and causes information about various products to be displayed on the user’s monitor?
*adware
3. Which threat to security uses traffic from zombie computers to overwhelm servers?
*DDoS
4. Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.)
*service packs
*security patches
5. Which two characteristics describe a worm? (Choose two.)
*Is self-replicating.
*Travels to new computers without any intervention or knowledge of the user.
6. What is the best method for a company to secure data being transmitted across the Internet between remote sites?
*Use a VPN connection.
7. What is the preferred wireless encryption technique if the wireless clients support it?
*WPA
8. A fingerprint reader is an example of which security technology?
*biometric
9. Which type of authentication is evidenced by the use of a small chip on a card that contains user identification data such as bank account numbers and digital signatures?
*smart card
10. Which type of program causes banners and ads to appear on the desktop without any user intervention?
*adware
11. A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
*Create a restore point.
12. An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the technician for securing the network?
*Upgrade to the LEAP wireless security protocol.
13. An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?
*social engineering
14. Where is the safest place to store backups?
*locked server room
15. A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data?
*Destroy the hard drives with a hammer.
16. Which two statements are true about username and password standards? (Choose two.)
*The username naming convention should be kept simple.
*Rules about password expiration and lockout should be defined.
17. When setting up a new wireless access point, which basic security measure should be taken?
*Disable SSID broadcast.
18. Which three suggestions are good security password policies that a company or individual should follow? (Choose three.)
*Password length should be limited to five characters.
*Passwords should have an expiration period.
*A mix of letters, numbers, and other characters should be used.
19. An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented?
*phishing
20. A network administrator is looking for a technology that includes both hardware and software authentication. Which technology could the administrator use?
*Trusted Platform Module (TPM)
21. Which statement accurately describes the WEP standard?
*WEP is a first generation security standard for wireless communication.
22. What are two examples of malware? (Choose two.)
*spyware
*grayware
23. Which three security storage features are supported by the TPM hardware module? (Choose three.)
*encryption keys
*digital certificates
*passwords
24. A financial organization is donating computers to a local charity. What is the best method to remove all data from the hard drives in the computers?
*Use data wiping software and delete any hard drive partitions.
25. Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?
*LEAP
26. Which best practice should be included in a password protection policy?
*Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
27. Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
*Place the laptop in a locked security cage designed to store computer equipment.

IT essential 4.1 chapter 8

1
Refer to the exhibit. Which type of network cable is shown?
#fiber-optic

2
Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
#encapsulation

3
When purchasing Cisco components for a network installation, what are three warning signs that the equipment may be counterfeit? (Choose three.)
#The price is much less than expected.
#The equipment appears to be performing at a substandard level.
#The packaging appears to be substandard compared to the packaging of other Cisco purchases.

4
Which protocol is used to automatically configure network devices?
#DHCP

5
Which protocol lacks support for encryption and can be initiated from a computer command prompt?
#Telnet

6
Which broadband technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
#cellular

7
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
#The number of twists in the wires inside the cable.
#The number of wires inside the cable.

8
Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
#mesh

9
Which software must be installed and working correctly on a computer to successfully enable a VPN connection to a remote site?
#VPN client

10
A college student is confused. To use online banking, the student types https://www.banking.com, whereas to access the college web page, the student types http://www.college.edu. Why would the two institutions use different protocols?
#The bank encrypts the web page information that is sent and received.

11
What is the purpose of the device that uses the 198.133.219.43 address?
#It is the device that translates domain names to IP addresses.

12
Which Cisco team can be contacted to help when Cisco equipment is suspected to be counterfeit?
#Cisco Brand Protection Team

13
Which digital technology provides an upstream speed that is typically less than the downstream speed?
#ADSL

14
Which utility can be used to determine end-to-end connectivity between source and destination?
#Ping

15
Which Windows XP command displays the route taken by packets crossing an IP network?
#tracert

16
Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
#Attach a cable that has an RJ-45 connector

17
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
#the available wireless networks within range

18
Which device enables computers to be attached to a network without segmenting the network?
#hub

19
Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks?
#star

20
Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
#Data Link

21
Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps?
#802.11g

22
A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform?
#carry the data stream

23
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
#328 ft (100 m)

24
A technician is configuring a computer to send print jobs to a network printer. When the technician sends a test print to the printer, the print job fails. The technician tries to ping the network printer, but the technician suddenly remembers a change in Windows that is hampering the troubleshooting process. What change might this be?
#The Windows firewall stops pings.

25
What is one difference between a network domain and a workgroup?
#A domain provides centralized control.

26
Which three protocols are associated with e-mail? (Choose three.)
#IMAP
#POP3
#SMTP

27
A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose?
#fiber optic

28
Which two characteristics describe Ethernet technology? (Choose two.)
#supported by IEEE 802.3 standards
#uses a bus logical topology

29
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
#The company network requires secure access to confidential information.
#The users need a central database to store inventory and sales information.
#The data gathered by the employees is critical and should be backed up on a regular basis.

30
Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network?
#Computers listen to the network for clearance to send data.

IT essential 4.1 chapter 7

1. Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
*piezoelectric
2. Which printer technology is used in low-cost, photo-quality printers?
*inkjet
3. What laser printer component could cause streaking?
*drum
4. Which step of the laser printing process involves scanning the photosensitive drum with a laser?
*writing
5. Which software, embedded in a printer, controls how the printer operates and can be upgraded?
*firmware
6. What is a common disadvantage of inkjet printers?
*The nozzles can get obstructed.
7. What is the best source for a Windows-compatible scanner driver?
*website for scanner manufacturer
8. What are two advantages of using impact printers? (Choose two.)
*carbon-copy printing ability
*inexpensive consumables
9. Which standard governs the use of parallel printer ports?
*IEEE 1284
10. Which technology is used by laser printers?
*electrophotographic
11. Which Windows XP command sends a file named example.txt to the default printer?
*print example.txt
12. Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
*Send the print job again. If that fails to work, turn the printer off and back on, then resend the print job. If the problem still exists, reinstall or upgrade the print driver
13. Which type of printer is commonly used in stores to produce cash register receipts?
*thermal
14. Which two names refer to the IEEE 1394 standard? (Choose two.)
*FireWire
*i.Link
15. Which three functions are commonly included in the all-in-one devices? (Choose three.)
*fax
*printer
*scanne
16. A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
*drum
17. Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
*ECP
*EPP
18. Which unit is commonly used to measure the print quality of an inkjet printer?
*DPI
19. Which step of the laser printing process is the last step performed by a laser printer when printing a document?
*fusing
20. Which software converts scanned pages into text?
*Optical Character Recognition
21. What is typical of a network printer installation?
*the use of Ethernet or wireless
22. What is the maximum number of devices that can be connected to a single FireWire interface?
*63
23. What is an advantage of using a solid-ink printer instead of an inkjet printer?
*It produces vivid color prints.
24. Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
*802.11b
*802.11g
25. Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
*drum

IT essential 4.1 chapter 6

1. What is meant by a laptop device being hot-swappable?
*The laptop does not need to be powered off to install or remove the device.
2. Where can a technician change the power schemes on a laptop running Windows XP?
*Select Power Options from within the Control Panel.
3. What is the proper way to clean optical drives?
*Use a cleaning disc for optical drives.
4. Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
*third
5. Which name is given to the collection of settings that control the power settings of a laptop?
*power schemes
6. Refer to the exhibit. What is the correct order of steps to remove a laptop battery?
*2, 3, 4, 1
7. A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
*change to native resolution.
8. Which three components are interchangeable between desktop and laptop computers? (Choose three.)
*printer
*scanner
*USB flash drive
9. Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which key would be used in conjunction with the Fn key to connect a laptop to an external monitor?
*F8
10. What power mode is commonly known in the Windows environment as suspend mode?
*S3
11. Which Windows XP or Vista control panel is used to reduce power when the computer has not been used by anyone for an hour?
*Power Options
12. Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
*mobility
*size
13. During the set up of a network connection, which option can be double-clicked to configure an IP address on an Ethernet NIC?
*TCP/IP or TCP/IPv4
14. Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
*PC ExpressCard
15. Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
*Use a lint-free cotton cloth.
*Wipe the disc from the center outward.
16. Which two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
*disk drive
*monitor
17. A technician is replacing a laptop SODIMM. With what component is the technician working?
*RAM
18. Which internal laptop component may be designed as a hot-swappable device?
*optical drive
19. Which two devices are commonly hot-swappable on laptops? (Choose two.)
*PC Card
*USB Drive
20. How should a hot-swappable device normally be removed from a laptop?
*Use the Safely Remove Hardware systray icon.
21. Which option within the Windows Control Panel is used to install a modem?
*Phone and Modem Options
22. Which display technology is most commonly found in modern laptop computers?
*LCD
23. Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
*Ethernet
*modem
24. What feature is provided by an auto-switching power supply on a laptop?
*laptop can be used in different countries.
25. A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do next?
*Attach the AC adapter.
26.What is the major difference between desktop and laptop motherboards?
*Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.
27. Which three components commonly connect to USB or FireWire ports? (Choose three.)
*camera
*printer
*scanner
28. Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
*34mm wide
*54mm wide

IT essential 4.1 chapter 5

1. Refer to the exhibit. During a Windows Vista installation, the Select Your Computer’s Current Location screen fails to display. What could be a possible reason for the absence of this screen?
*The network card driver was incorrectly installed.
2. When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this issue?
*Roll back the driver.
3. Which three settings are available to personalize the appearance of the desktop on a Windows Vista computer? (Choose three.)
*Theme
*Screensaver
*Mouse Printer
4. In which two situations should a technician create a restore point? (Choose two.)
*before an operating system update
*before installing a new device driver
5 .A user is running Windows Vista and has an application that runs in Windows XP but the application fails to run in Vista. In which Vista mode should the user try running the application?
*compatibility mode
6. A user in a large manufacturing company uses a PC that is connected to the company network. Where should the user look to find a server attached to the network?
*My Network Places
7. Refer to the exhibit. During the installation of Windows Vista, you are prompted with a screen that asks for a username and password. What type of account is created when you select Next after entering a username and password?
*The user account that can change security settings, install software, and make changes to other user accounts
8. A technician has a computer that is unable to boot Windows XP properly. The technician has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair XP from the XP boot disk?
*Recovery Console
9. When a computer boots from the Windows Vista disc, which three functions are performed if the Custom (advanced) option is selected? (Choose three.)
*Changes to disk partitions can be made.
*A clean copy of Windows Vista is installed.
*The location of the Windows installation can be selected.
10. What are two features of upgrading Windows 2000 to Windows XP? (Choose two.)
*Upgrading to Windows XP is quicker than a new installation of Windows XP
*Windows 2000 applications and settings are kept.
11. Which set of guidelines is used to ensure that programmers develop applications that are compatible with an operating system?
*API
12. A user decides to install a new version of Windows Vista but needs to retain the configurations and customizations of the current Windows XP operating system. Which software can be used to achieve this?
*Windows User State Migration Tool
13. A technician has finished installing Windows XP. What should the technician do to verify that all hardware has been installed correctly?
*Use the Device Manager utility to ensure that all the devices are operational.
14. A technician has many new computers to set up. The technician completely configures one master computer and makes an image of the hard drive. This image is then installed on the other computers. What is this process called?
*disk cloning
15. A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP utility will check the file system for errors?
*Chkdsk
16. While performing preventive maintenance, a technician notices that the operating system is missing updates. How can the technician enable automatic updates?
*Run the Automatic Updates utility from the Control Panel.
17. Windows Vista has a feature called the Sidebar. Which three types of items can be contained within the Sidebar? (Choose three.)
*games
*sticky notes
*clock
18. A technician is attempting to create multiple partitions on a hard disk. This will allow for storing the operating system and data files on separate partitions. What is the maximum number of primary partitions per hard drive that is supported by Windows XP?
*4
19. A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS?
*Run the Microsoft Convert utility.
20. A user reports that a Windows XP system is unable to boot properly. How can the technician advise the user to boot into Safe Mode?
*Reboot the system, press and hold F8 until a menu is displayed, and then select Safe Mode.
21. A technician installing Windows Vista has come to the point where the product activation key is requested. What occurs if a product key is unavailable?
*The user will be asked for a product key, but the installation can continue without a key.
22. Once minimum hardware requirements are satisfied, where should a technician look to determine if the computer hardware has been tested with Windows XP?
*the Windows XP Hardware Compatibility List
23. A company with 40 computers needs to reduce repair costs, decrease downtime, and improve reliability. Which task will meet these needs?
*Develop a preventive maintenance plan.
24. Which operating mode is used by Windows XP to run a DOS application?
*virtual real mode
25. What would be the result of having a corrupt Master Boot Record?
*The operating system will fail to start.
26. What are three features of the Microsoft Management Console (MMC)? (Choose three.)
*It can be used to create customized MMCs
*It organizes operating system snap-ins.
*It requires administrative privileges to access.
27. As a user attempts to boot the computer, the message “NTLDR is missing” is observed on the screen. What will result from this situation?
*The operating system will fail to load.
28. A user installs a new sound card driver in a computer that is working properly. After installing the driver for the new sound card the computer fails to boot. Which quick fix can the user implement to return to the previous working state?
*boot to Last Known Good Configuration
29. A technician needs to upgrade the operating system on a computer from Windows 2000 Professional to Windows XP Professional. When the technician inserts the XP disc in the computer, the setup wizard fails to start. Which command can be used to start the upgrade?
*winnt32
30. A technician has installed new video drivers on a Windows XP computer and now the monitor shows distorted images. What startup mode can the technician use to access a new driver on the network?
*Safe Mode

IT essential 4.1 chapter 3

1.A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a PATA hard drive?
#molex

2.Refer to the exhibit. Which type of port is shown?
#USB

3.After a technician has assembled a new computer, it is necessary to configure the BIOS. At which point must a key be pressed to start the BIOS setup program?
#during the POST

4.A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a floppy drive?
#Berg

5.Which solution should be used to clean a CPU and a heat sink?
#isopropyl alcohol

19. How many pins are in a SATA data cable connector?
#7

7.A technician is troubleshooting a computer that has a malfunctioning floppy drive. The technician observes that the floppy drive light remains lit constantly. How should the technician attempt to repair the problem?
#Connect the data cable making sure that the colored stripe on the cable is aligned with pin 1 on the drive and the motherboard.

8.Which type of drive is installed in a 5.25-inch bay?
#optical drive

9.Which additional 4-pin or 6-pin power connector is required by some motherboards?
#AUX

10.A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case? (Choose two.)
#CPU
#Memory

11.When building a computer, which two components are normally installed in 3.5-inch drive bays? (Choose two.)
#hard drive
#floppy drive

12.Which port is typically used for external wireless NICs?
#USB

13.A technician is installing a new CPU in a ZIF socket on a motherboard. What is the primary way of securing the CPU in place?
#load lever

14.Which action is recommended to prevent the motherboard from contacting the metal base of the case?
#Use standoffs to keep the motherboard above the metal base.

15.A field technician has been asked to install a wireless 802.11g NIC in a computer, but is unsure about the expansion slots available. Which two types of wireless NICs should the technician have available? (Choose two.)
#PCI
#PCIe

16.What is the most reliable way for users to buy the correct RAM to upgrade a computer?
#Check the motherboard manual or manufacturer's website.

17.Refer to the exhibit. Which type of hard drive uses the power connector shown?
#SATA

18.A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
#It issues a number of short beeps.

19.What is a convenient way that a technician can tell whether a ribbon cable is for an IDE hard drive or a floppy drive?
#The floppy cable has a twist in the cable.

20.Which internal component of a computer uses a 3-pin power connector?
#fan


IT essential 4.1 chapter 2

1 Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.)
*batteries
*monitors
*printer toner cartridges
2 A technician accidentally spills a cleaning solution on the floor of the workshop. Where would the technician find instructions on how to properly clean up and dispose of the product?
*the material safety data sheet
3 Which two tools can help protect against ESD? (Choose two.)
*antistatic wrist strap
*antistatic mat
4 Refer to the exhibit. Which type of tool is presented in the graphic?
*Phillips-head screwdriver
5 Which precaution should be taken when working around electronic devices?
*Avoid using magnetized tools.
6 Which step should be performed first when servicing computer equipment?
*Turn off and remove the power source.
7 Which condition refers to a sudden increase in voltage, which is usually caused by lightning?
*spike
8 A technician has a room of computers which are running very hot. The technician discovers that the heat sinks in the computers are very dusty. What should the technician use to clean the heat sinks?
*compressed air
9 Which tool in Windows XP gives a technician access to initialize disks and create partitions?
*Disk Management
10 The performance of a computer is reduced after it has been using the Internet. Which three tools could be run to try to improve the performance of the computer? (Choose three.)
*Spyware Remover
*Defrag
*Disk Cleanup
11 Which two types of tools can help protect a computer from malicious attacks? (Choose two.)
*Anti-virus software
*Spyware Remover
12 Which Windows XP command-line utility scans the critical files of the operating system and replaces any files that have been corrupted?
*System File Checker
13 Which characteristic defines EMI?
*interference that is caused by motors
14 Which computer components must a technician never try to work on when wearing an antistatic wrist strap?
*CRT monitor
15 Which condition refers to a reduced voltage level of AC power that lasts for a period of time?
*brownout
16. What is recommended to remove dust from inside a computer case?
*can of compressed air
17. Refer to the exhibit. Which type of tool is shown in the graphic?
*digital multimeter
18 Which tool should be used if a user needs to optimize space on a hard drive?
*Defrag
19 What are two significant sources of EMI? (Choose two.)
*power lines
*electrical storms
20 A technician wants to limit the chances of ESD affecting his workspace. Which three precautions should be taken? (Choose three.)
*Ensure antistatic mats are on the workbench and floor.
*Wear an antistatic wrist strap.
*Keep all components in antistatic bags.
21 What is the proper way to dispose of outdated CRTs?
*All of the components should be disposed of in compliances with local environmental regulations.

IT essential 4.1 chapter 1

1.Which type of ROM can be reprogrammed with software while it is still physically installed in the computer?

*ROM
2.Why are solid state drives reliable and therefore suitable to be installed in computers used in harsh industrial workplaces?
*They consume less power and have no moving parts.
3.Which three devices are considered output devices? (Choose three.)
*headphones
*monitor
*printer
4.Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)
*IRQ
*DMA
*I/O address
5.Which two activities are normally controlled by the Northbridge part of the chip set? (Choose two.)
*access to the RAM
*access to the video card
6.Which expansion slot would be used to install a video capture card in a new computer?
*Peripheral Component Interconnect-Express
7.A technician needs to back up 4 GB of data using a single storage medium. Which medium can hold the entire 4 GB on a single disc?
*DVD+/-R
8.Which type of memory is primarily used as cache memory?
*SRAM
9.Which type of RAM chip has the fastest clock rate but consumes the least power and generates the least heat?
*DDR3 SDRAM
10.PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.)
*40
*80
11.Which two characteristics are determined by the chip set on a motherboard? (Choose two.)
*maximum amount of memory that can be installed
*type of connectors that will be on the motherboard
12.A technician is helping a customer compare two hard drives. Which unit of measurement is used for the hard drive speed?
*revolutions per minute
13.Which important feature is offered by the USB standard?
*It can supply power from the computer to devices.
14.Which CPU architecture uses a small set of instructions that are designed to be executed rapidly?
*RISC
15.Which type of memory is unable to have the contents modified?
*ROM
16.Which two devices are considered input devices? (Choose two.)
*biometric authentication device
*digital camera
17.Which technology would be best to use for drive redundancy and data protection?
*RAID
18.Which two characteristics of a motherboard can be determined by the form factor? (Choose two.)
*size
*shape
19.What is the function of a capture card?
*enables a video signal to be recorded to the computer hard drive
20.Which two form factors are commonly used to build a new computer? (Choose two.)
*BTX
*ATX
21.Which type of computer resources are direct lines to the processor used by computer components to request information from the CPU?
*IRQs

22.

Refer to the exhibit. Which type of cable is shown in the graphic?
*Serial
23.Which two categories are used to classify CPU architecture? (Choose two.)
*CISC
*RISC
24.What are the two connector types for the 1394a interface? (Choose two.)
*4-pin
*8-pin
25.A company employee has very important data on a computer. What RAID level should be used if the criteria include that data be written and read simultaneously and that all data be duplicated using a minimum of three drives?
*5
26.

Refer to the exhibit. Based on the advertisement that is shown, what is the native resolution of this computer system?
*1280 x 800
27.How many conductors are found in a SATA data cable?
*7
28.A customer orders a new computer and specifies an internal read-write, non-volatile storage device that uses low power, has fast access to data, and is reliable. What is a suitable storage device that meets these requirements?
*solid state drive