HCSD / Homepage



1. What is the name of the pre–CompTIA A+ certification?A. CompTIA Network Security+B. CompTIA IC3 certificationC. CompTIA Certified Network Associate (CCNA)D. CompTIA IT Fundamentals2. What should you avoid learning at all costs?A. DependabilityB. Customer passwordsC. VersatilityD. Responsibility3. To show that you are dependable, you should always be _______________.A. versatileB. on timeC. adaptableD. reciprocal4. How do you show users the error of their ways without creating anger or conflict?A. Using a stern tone of voiceB. Electrical potentialC. Doing their job for themD. Assertive communication5. Which one of the following is not an assertive fact-seeking question?A. When did it last work?B. Has software or hardware changed recently?C. What did you do to cause the problem?D. What applications were running when it locked up?6. Which phrase best describes the process of asking questions once a person has described a situation?A. Respectful communicationB. Sensitivity awarenessC. Eliciting answersD. Showing versatility7. What is the most important thing you should do at the completion of any work?A. Document your work.B. Ask to be paid.C. Elicit solutions.D. Elicit answers.8. What is the first step of the troubleshooting theory?A. Identify the problem.B. Establish theory of probable cause.C. Test the theory.D. Verify full system functionality.9. Which term describes an operating system’s software parts with which you can interact?A. Aero GlassB. User interface (UI)C. DesktopD. Charms10. Which port on the back of a PC’s system unit is used for external hard drives?A. eSATAB. NICC. PS/2 or mini-DIND. HDMI11. Which port on the back of a PC’s system unit is used for output to a monitor?A. eSATAB. NICC. PS/2 or mini-DIND. HDMI12. In Windows Vista/7, what is another name for the notification area that shows programs running in the background?A. Control PanelB. TaskbarC. System trayD. Desktop13. Intel’s Pentium and Celeron series of CPUs are intended for which target market?A. Mobile devicesB. Budget Desktop PCsC. ServersD. Mainstream/enthusiast desktop 14. How much RAM can 32-bit processors access?A. Up to 16 EBB. Up to 16 GBC. Up to 4 GBD. Up to 4 EB15. Which component is a mass storage device?A. CPUB. CacheC. Hard driveD. RAM16. When you load a program in Windows, the PC copies the program from the mass storage device to _______________ and then runs it.A. BIOSB. Hard driveC. RAMD. ROM17. What is another name for a stick of RDRAM?A. RIMMB. DIPPC. SIMMD. STRAM18. Where are device drivers stored?A. BIOSB. CMOSC. DRAMD. hard disk19. What is POST?A. Post-operative self testB. PC operating system testC. Power-on self testD. Personal overall starter test20. The computer is beeping constantly after you have booted it. What is the likely cause of the problem?A. CPUB. RegistryC. RAMD. Power supply21. Which port is considered to be a newer video port?A. DINB. USBC. HDMID. VGA22. The acronym RAID stands for _______________.A. radical array for indirect drivesB. redundant array of independent disksC. responsible application of interconnected disksD. reliable application of independent data23. The motherboard mounts to the case via small connectors called _______________.A. fire wiresB. standoutsC. nylon boltsD. standoffs24. _______________, which are included on the motherboard, are lights that have positive and negative sides.A. Power buttonsB. Reset buttonsC. LEDsD. Chips25. A brand new system failing due to manufacturing defects is often called a(n) _______________ failure.A. burn-outB. burn-inC. ESDD. system26. What type of voltage does a PC use?A. ACB. DCC. GroundD. LC27. A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him?A. Rest assured that there are no issues with computer use overseas.B. Prepare for the fact that his PC will not work overseas.C. Make sure he switches the power supply to 230AC.D. Make sure he switches the power supply to 115AC.28. Large sags in electricity are also known as _______________.A. brownoutsB. blackoutsC. spikesD. surges29. What occurs when power cuts out completely?A. SagB. BrownoutC. BlackoutD. Spike30. Empty expansion bays must be covered by a _______________ to maintain proper airflow inside the case.A. case sheathB. case coverC. slot lidD. slot cover31. What is the maximum SATA device cable length?A. 18 inchesB. 1 meterC. 2 metersD. 3 meters32. The most important advance in SATA involves _______________.A. platter oxidationB. ohm ratingsC. magnetic interferenceD. data throughput33. Which term refers to the mirroring technique in which each drive has its own controller?A. Disk duplexingB. Disk stripingC. Disk striping with parityD. Super-disk mirroring34. _______________ (without parity) means spreading the data among multiple (at least two) drives.A. Disk stripingB. Disk mirroringC. Disk duplexingD. Parity35. What is the minimum number of drives needed to implement RAID 5?A. OneB. TwoC. ThreeD. Four36. How many failures can RAID 0 withstand and remain functional?A. ZeroB. OneC. TwoD. Up to three37. What is the default primary partition for Windows?A. C:C. E:B. D:D. F:38. In Windows, each _______________ is assigned a drive letter from C: to Z:.A. cylinderB. fileC. sectorD. partition39. How many master boot records can exist on an MBR disk?A. OneB. FourC. One per drive letterD. One per primary partition40. How many devices can a single USB host controller theoretically support?A. 63B. 127C. 255D. 25641. What is the maximum data transfer speed that USB 2.0 can handle?A. 5 MbpsB. 5 GbpsC. 480 MbpsD. 480 Gbps42. What type of USB cable is especially popular on smartphones?A. FireWire connectionsB. CODEC connectionsC. Macro connectionsD. Micro connections43. Which type of system is designed to handle only very basic applications that require a minimum amount of hardware?A. Video workstationB. Virtualization workstationC. Thick clientD. Thin client44. What technology enables you to run more than one operating system at the same time on a single computer?A. Boot integrationB. SimulationC. EmulationD. Virtualization45. What is the most important hardware component in virtualization?A. RAMB. Disk storageC. VideoD. Sound46. How many root keys are in the Registry?A. SevenB. FourC. SixD. Five47. Which Registry root key contains all the data for a system’s non-user-specific configurations?A. HKEY_CURRENT_CONFIGB. HKEY_USERSC. HKEY_CLASSES_ROOTD. HKEY_LOCAL_MACHINE48. What process identifies and grants access to a user who is trying to access a system?A. CredibilityB. AuthorizationC. AuthenticationD. Honesty49. What process determines what a legitimate user can and cannot do on a system?A. AccessibilityB. AuthorizationC. Permission propagationD. Inheritance50. Your system can automatically contact Microsoft’s Web sites and download critical updates through ________________.A. Windows UpdateB. Control PanelC. Service PackD. Driver ReleaseNetworking Portion of Exam51. You have a key network administrator leave a company. Therefore, what does the company depend on to continue to use the network?a) the user’s passwordb) Active Directoryc) master network switchd) network documentation52. What is the most common central device used today to connect computers to a network?a) hubb) switchc) SOHO routerd) VPN router53. What is the most common adapter or connector used to connect a computer to a wired network?a) RG6b) RG58c) RJ45d) RJ854. What do you use to isolate a group of computers within your organization?a) WLANb) WANc) VLANd) Internet55. What zone is used to publish external websites for an organization?a) intranetb) exanetc) internetworkd) DMZ56. What model is used to describe how data communication occurs between hosts?a) server-centric modelb) workgroup modelc) peer-to-peer modeld) OSI reference model57. Which layer in the OSI model covers routing between networks?a) Physicalb) Data Linkc) Networkd) Transport58. Which layer of the OSI model is used to create a connection so that a host can transfer files?a) Physicalb) Sessionc) Applicationd) Presentation59. What is the most common cable used today?a) UTPb) STPc) Coaxiald) Fiber60. If you are making a crossover cable and one end is 568A, what should the other end be?a) 568Ab) 568Bc) 568Cd) BOGB61. When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem?a) EMIb) RFIc) network adapter failured) cable failure62. What type of address is 169.254.32.23?a) APIPAb) multicast addressc) anycast addressd) broadcast address63. What is used to remap private addresses to public addresses and back?a) DNSb) DHCPc) WINSd) NAT64. What server is used to translate host names to IP addresses?a) DNSb) WINSc) HOSTSd) DHCP65. How many bits is an IPv6 address?a) 32b) 48c) 64d) 12866. What command displays the IP address, subnet mask, and default gateway of the system you are currently on?a) ipconfigb) pingc) tracertd) nslookup67. What command tests network connectivity while showing you each hop along the way?a) pingb) nslookupc) nbtstatd) tracert68. What command do you use to connect to a remote computer so that you can execute commands?a) ftpb) nslookupc) telnetd) nbtstat69. What protocol automatically configures IP configuration for a client?a) DNSb) DHCPc) WINSd) FTP70. What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses?a) DNSb) WINSc) DHCPd) LDAP71. What port does Remote Desktop Services use?a) 443b) 501c) 389d) 338972. What technology takes data and breaks them into packets and sends them over a network, sometimes using different routes for each packet?a) circuit switchingb) connection switchingc) packet switchingd) network switching73. What technology uses wires from the telephone company to provide broadband Internet connection?a) cableb) DSLc) FDDId) Frame Relay74. What technology can you use temporarily to connect networks from two different companies?a) VPNb) HTTPc) DHCPd) passive router75. What stage is the World Wide Web in?a) 1.0b) 1.1c) 2.0d) 3.0 ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download

To fulfill the demand for quickly locating and searching documents.

It is intelligent file search solution for home and business.

Literature Lottery

Related download
Related searches