Social Icons

Senin, 06 Mei 2013

Take Assessment - Final Exam for ch 1-10 - IT Essentials: PC Hardware and Software (Version 4.1)






 

1


Refer to the exhibit. A technician is troubleshooting a problem where a teacher is unable to connect a laptop to a wireless network. The wireless NIC is enabled and the wireless network configuration settings are correct. Which key would be used in conjunction with the Fn key to enable the wireless connection?
F5
F6
F7
F8

2
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
Administrative Tools
BIOS
Command Prompt
Safe mode
System Registry

3
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
The peripherals can be plugged in and out without turning the laptop off.
Data transfer is more controlled than using the parallel or serial ports.
The peripherals do not need drivers to communicate with the OS.
Connections are much more reliable.

4
Where in Windows XP can the shutdown, hibernate, and standby modes be configured?
Start > Control Panel > Power Options *
Start > Control Panel > Administrative Tools
Start > Control Panel > Power Modes
Start > Control Panel > System

5
A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as large posters. However, the quality of the images printed as posters is poor. What should the user do?
Replace the flatbed scanner with an all-in-one device.
Use OCR software when scanning the photographs.
Save the scanned file in JPEG not TIFF format.
Increase the resolution of the scanner.

6
A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
Scandisk
Disk Management
Chkdsk
Defrag
Device Manager

7
A technician needs to free some hard disk space in a computer. Which management tool can help find files that can be safely deleted?
chkdsk
defrag
disk cleanup
disk management
fdisk
scandisk

8
What is the purpose of an IRQ?
Perform input/output between the CPU and peripherals.
Establish peer-to-peer communication between devices and software.
Request information from the CPU.
Access the computer RAM for reading and writing.

9
Which Windows tool should be run before upgrading the operating system?
Convert
Fdisk
Msconfig
Ntbackup

10
A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the room upgraded the equipment but then found that when all the devices are powered up they become unreliable, with some PCs shutting down. What may cause this power problem?
The printer is creating electrical noise when it is printing, which causes the computers to shut off.
The power consumption of all devices is too much for the electrical circuit that is provided.
The power consumption of all the computers and printers operating simultaneously is causing a power surge.
The power requirements of the printer warm-up cycle cause a spike, which results in the computers shutting down.

11
Which two items are required to configure a laptop for 100 Mb/s full-duplex Ethernet communications? (Choose two.)
an antenna
twisted-pair cable
a phone cable
a port that has been enabled in BIOS
an ExpressBus expansion card
IP address and subnet mask

12


Refer to the exhibit. Which two port types are shown in the graphic? (Choose two.)
modem
network
parallel
serial
USB

13
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
Ethernet and Star
FDDI and Ring
Token Ring and Double Ring
Wireless and Ring

14
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
aspect ratio
dot pitch
HVC
refresh rate

15
A workstation is experiencing an error that is caused by suspected dirty RAM contacts. Which two materials should be used to clean the RAM module? (Choose two.)
cotton cloth
distilled water
home vacuum cleaner
isopropyl alcohol
lint-free swab
mild cleaning solution




16
A user cannot log in to the network with a computer that worked yesterday. Other computers on the same network are working fine. Which troubleshooting process would be most logical to try first?
Look at the NIC lights.
Use a cable tester to check the network cable.
Use Device Manager to check for a resource conflict.
Verify the status of the Windows firewall ports that are enabled.
Activate the drive error checking tool to check for damaged areas on the hard disk.

17
A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?
Avoid performing maintenance operations on plug and play devices that are controlled by the operating system.
Only clean equipment that is requested by the customer.
Omit performing maintenance operations on components until the equipment malfunction.
Schedule and document routine maintenance tasks.

18
A newly purchased scanner is not functioning as efficiently as expected. Which step should a technician take to improve performance?
Download drivers and utilities from a user forum on the Internet.
Download drivers and utilities from the manufacturer web site.
Reinstall the software that came with the scanner.
Buy a different scanner.

19
A customer wants to produce video recordings to sell to the public. Which two types of media should be used to accomplish this type of recording? (Choose two.)
DVD+/-RW
DVD+/-R
CD-RW
BD-RE
BD-R

20
Which motherboard feature controls the amount of data that a CPU transfers at one time?
pin grid array
front side bus
MMX instructions
read-only memory

21
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
Run convertFAT32.exe.
Restore the data files that were backed up in preparation for the conversion.
Reset the file attribute to show hidden files.
Restart the computer after updating the hard drive to FAT32.

22
A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?
Defrag
CHKDSK
MSCONFIG
REGEDIT.EXE

23
A newly hired technician is attaching a computer to the network. Upon examining the network configuration, the technician recognizes that the computer is configured with a protocol stack that is used for Internet communication. What protocol stack is installed on the computer?
AppleTalk
IPX/SPX
NetBEUI
TCP/IP

24
What is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point?
Anyone with the default SSID can gain access to the access point and change the configuration.
Disabling SSID broadcasting frees up radio frequency bandwidth and increases the data throughput of the access point.
The access point stops broadcasting its own MAC address, thus preventing unauthorized wireless clients from connecting to the network.
Wireless clients must then have the SSID manually configured to connect to the wireless network.

25
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
drum
ink cartridge
ink ribbon
paper
toner

26
To provide complete multimedia output via the use of a motherboard without multimedia capabilities, what additional adapter card would need to be installed if a video adapter and a TV tuner have already been installed?
capture card
sound adapter
wireless NIC
SCSI adapter

27
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
APIPA
DHCP
DIPS
ICMP

28
An administrator gets an e-mail message from what looks like the company bank. The e-mail asks for account information. The administrator determines the e-mail is not from the bank. What type of security threat has the administrator prevented?
spyware
grayware
Trojan
worm
phishing

29


Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?
Check the printer for status messages.
Restart the computer.
Upgrade the printer driver.
Reinstall the printer driver.
Check the printer cabling and power.

30
A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
Shut down the computer.
Click on the Safely Remove Hardware icon in the system tray then on the device.
Right-click on the drive in My Computer, then click on Remove Drive .
Remove the power to the drive.








 

31
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
server
administrator
root
unlimited

32
What deficiency is associated with RAID 0 compared with RAID 1?
RAID 0 is more expensive to implement.
RAID 0 requires at least one additional hard drive.
RAID 0 does not provide any protection for the data that is located on a hard drive.
RAID 0 requires a minimum of two hard drives and two controllers.

33
Which Windows XP startup mode or utility would be used to repair the master boot record?
Safe Mode
Event Viewer
Recovery Console
System File Checker

34
A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?
FTP
HTTP
SSH
Telnet

35


Refer to the exhibit. What command was typed to produce the output that is shown?
ipconfig
ipconfig /all**
ping
telnet

36
Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?
spoofing
man-in-the-middle
SYN flooding
DNS poisoning

37
Which two components normally require a laptop to be powered down and the battery removed before removing the components? (Choose two.)
ExpressCard
flash drive
internal hard drive
optical drive
RAM

38
What is the purpose of SCSI and RAID adapters?
to allow obsolete EISA technology expansion slots to be used
to provide enhanced audio and graphic capabilities
to connect storage devices such as hard disk drives to a PC
to connect peripheral devices to a PC to improve performance

39
A customer requests advice about the type of storage device to use for 20 new computers. For which two conditions should SSDs be recommended as replacements for magnetic hard drives? (Choose two.)
locations that require low power usage
workplaces that use Blu-ray storage media
external flash drives that are required to be connected by USB
workplaces with harsh workplace conditions where the computers are subject to dust and vibration
locations where redundant disks are required to appear as one logical disk to the operating system

40
Employees in the financial department have reported that an unknown technician has been asking questions about the network. Which type of attack might the employees be observing?
phishing
social engineering
spoofing
spamming

41
A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?
FTP
peer-to-peer
Telnet
DHCP
DNS

42
A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.

What is the best quick solution to this problem?
Remove all the peripherals except the hard drive and observe the results.
Move the laptop to another location and observe the results.
Replace the power adapter and observe the results.
Replace the USB hub and observe the results.
Flash the BIOS on the laptop and observe the results.

43
What is the minimum CPU speed that is required to install Windows Vista according to the Microsoft recommendation?
512 MHz
1 GHz
1.5 GHz
2 GHz

44
Which network device uses a MAC address table to segment the network?
concentrator
hub
PBX
router
switch

45
Which two file systems are available for selection during installation of Windows XP? (Choose two.)
FAT16
FAT32
HPFS
NTFS
CDFS

46
Which three tasks should a computer preventive maintenance plan contain? (Choose three.)
the defragmentation of the hard drive
the addition or removal of new applications
the identification of probable causes of the problem
an update of the operating system and applications
an update of antivirus and other protective software
an evaluation of the methods for gathering information about problems and the solutions to be implemented

47
All default Windows XP tools and utilities are installed on a computer. The technician discovered that a few other Windows components are still needed. Which procedure can accomplish this task?
Press Ctrl-Alt-Del. Choose Task Manager > Performance > Add/Remove Windows Components
Open the Windows XP CD. Locate the Windows Components folder. Right click on Component. Choose Install.
Right click on the Desk Top. Choose Properties > Settings > Add/Remove Windows Components
Choose Start > Control Panel > Add Remove Programs > Add/Remove Windows Components***

48
A help desk trainer is teaching a new help desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?
Ask the customer what the problem is and then introduce yourself.
Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.
Start by asking close-ended questions about what the customer understands of the problem and then direct the customer through the correction process.
Assess what the customer knows of the help desk process and then use close-ended questions to guide the customer through the correction process.

49
A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?
Explain to the customer that it is a simple task and ask the customer to try it again.
Ask the customer to find someone with more experience to perform the task.
Tell the customer that another technician will explain the task .
*..Determine whether the customer would prefer to receive the instructions in another form, such as e-mailed, illustrated written instructions....**

50
Under what circumstance would the Windows System Restore utility most likely be necessary?
A document has been accidentally erased.
A printer has been installed.
*A Windows update has failed.....*
A system has been compromised through the wireless network


2 komentar:

Anonim mengatakan...

These are in fact great ideas in concerning blogging.
You have touched some good things here. Any way keep up wrinting.


Feel free to visit my web site: paris 17

Anonim mengatakan...

Wow that was odd. I just wrote an incredibly long comment but after I clicked submit my comment didn't show up.
Grrrr... well I'm not writing all that over again.
Anyhow, just wanted to say superb blog!

Also visit my webpage :: fenetre pvc alsace

 
Twitter Facebook Google +