0 of 75 questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 75 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?
You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?
What is the maximum data transmission speed of IEEE 802.11b wireless networks?
Which of the following types of parental controls is used to limit access to the Internet contents?
Andrew has a personal computer. One morning, he starts his computer and finds the following error message: “CMOS checksum failure.”What are the most likely causes of this error? Each correct. Answer represents a complete solution. Choose two.
What are the benefits of using Universal Serial Bus (USB) 2.0 over legacy communication ports such as RS-232 and parallel ports? Each correct Answer represents a complete solution. Choose all that apply.
Which of the following sleep modes is also known as Hibernation in Windows operating systems?
Which of the following can occur if the power cable runs along with the computer network cable?
Which of the following are types of social engineering attacks? Each correct Answer represents a complete solution. Choose two.
Your customers Windows XP machine has become unusable due to some unknown cause. You want to put the computer into a working state again. What is the best way to do this?
Which of the following terms refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability or convenience?
Which of the following buses has a maximum data transfer rate of 2400 Mbps?
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?
Which of the following can be installed in an AGP slot?
At what voltage does a USB host supply power to the USB bus?
Which of the following enables third-party developers to create capabilities to extend an application?
Which of the following statements about multi-factor authentication is true?
What is the difference between the USB 2.0 and IEEE 1394 bus standards?
Which of the following devices provides input by analyzing printed text, handwriting, or an object?
Which of the following substances are restricted under Restriction of Hazardous Substances (RoHS)? Each correct Answer represents a complete solution. Choose all that apply.
Which of the following bus interfaces are used by the video capture cards? Each correct Answer represents a complete solution. Choose two.
Which of the following methods is based on the user’s roles and responsibilities?
Mark has purchased a new working USB webcam. He connects the webcam to a USB port on his computer and finds that the computer does not detect it. He connects other working USB devices to the port and discovers that the USB port is not functioning. What should Mark do first to resolve the issue?
Which of the following defines power management for various types of computers and peripherals?
You want to add broadband wireless access to a laptop. What type of card will you use to accomplish this?
You are responsible for the wireless network at your company. You have been asked to create SSID’s for wireless routers. What are the limits on an SSID? Each correct Answer represents a complete solution. Choose two.
Which of the following devices allows television signals to be received by a computer?
Which of the following term is used for any small mobile hand-held device that provides computing, information storage and retrieval capabilities for business or personal use?
You are responsible for assigning equipment in your company. An employee has requested a docking station. Which of the following would NOT be a valid reason for the employee to request a docking station?
Which of the following processors have 64-bit data bus width? Each correct Answer represents a complete solution. Choose three.
You are using infrared devices in your network. You want to improve the quality of connections and achieve better communication between infrared devices. What will you do to achieve this? Each correct answer represents a complete solution. Choose three.
Which of the following is a software program that collects email addresses of users and creates a mailing list to send unwanted emails to the users?
You work as a Network Administrator for McNeil Inc. The company has a Windows-based network. You want to upgrade a client computer from Windows 98 SE to Windows 2000 Professional. Which of the following steps will you take before the upgrade?Each correct answer represents a part of the solution. Choose two.
What are the differences between the microprocessor of a desktop and that of a laptop? Each correct answer represents a complete solution. Choose two.
You have a customer who wants to move files and settings from an old PC to a new one she is buying. What tool do you recommend?
Mark has a computer with a CD-ROM drive. He is unable to open the CD-ROM drive tray by pushing the Eject button on the front panel of the drive. What else can he do to open the tray?
Identify the DVI-D dual link male connector in the image given below.
Which of the following are Internet standard protocols for email retrieval? Each correct answer represents a complete solution. Choose two.
Which of the following statements about expansion bus is true?
Which of the following precautions should be taken to minimize the risk of damage to add-on cards and motherboard? Each correct answer represents a complete solution. Choose three.
Which of the following processor states does not save power?
Which of the following provides only block-based storage and leaves file system concerns on the client side?
Which of the following are the advantages of Standby mode over Hibernate mode? Each correct answer represents a complete solution. Choose two.
Which of the following devices has an acoustic sensor that provides input by converting sound into electrical signals?
What is the difference between SRAM and DRAM? Each correct answer represents a complete solution. Choose two.
You have just taken over network support for a small company. They are currently using MAC filtering to secure their wireless network. Is this adequate or not and why or why not?
You work as a Network Administrator for NetTech Inc. The company has a wireless local area network (WLAN). You want to prevent your wireless access point from being accessed by intruders. What will you do to accomplish the task?
Which of the following switches of the ATTRIB command clears the attributes of a file?
In what order are SCSI ID numbers prioritized? Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of connectors is used by 1000BASE-TX gigabit ethernet?
Which of the following virus is a script that attaches itself to a file or template?
Which of the following are types of Single Inline Memory Modules (SIMMs)? Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a block of data stored on a client computer by a web browser?
Mark works as a Network Administrator for Net Tech Inc. The company has a Windows 2000 domain-based network. A user working on a Windows 2000 Professional client computer reports that he is unable to access some files on the hard disk. However, he is able to successfully log on and access other files. What should Mark do to resolve the issue?
You are selecting memory for a new computer. You need to use DDR2 memory. However, the catalog from which you are ordering has incomplete information. Which of the following types of RAM does DDR2 come under?
Which of the following resolutions is supported by the SVGA video technology?
Which of the following program is used to collect personal information stored in the computer and send it to a third party without the permission of the user?
Which of the following connectors are used to connect a keyboard to the computer?Each correct answer represents a complete solution. Choose three.
Which of the following encryption algorithm is used by Wired Equivalent Privacy (WEP)?
Identify the PS/2 connector in the image.
Which of the following types of batteries has shortest life?
Which of the following items are configured on a user workstation for wireless networking? Each correct answer represents a complete solution. Choose two.
Which of the following is generally defined as the difference between the brightest color (white) and the darkest color (black)?
Andrew purchases a laptop that has the Windows 2000 Professional operating system. He wants to know about the BIOS version of the computer. Which of the following steps will he take to determine the version of the BIOS? Each correct answer represents a part of the solution. Choose two.
Which of the following switches of the XCOPY command continues to copy files even if errors occur?
You are responsible for technical support at a company. An employee complains that they cannot open a particular file. When you see the file in Windows Explorer you note that it is in green. What is causing their problem?
Which of the following is a case sensitive text string used in wireless network and having a maximum length of 32 characters?
Which of the following PCMCIA cards is 3.3mm thick?
You are selecting upgrade components for a PC. What sort of memory will you find specifically used in video?
Which of the following term is used for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web?
How many pins are used in HDMI Type A and Type B connectors?
Which of the following ports does not support hot plugging?
Which of the following refers to the process of verifying the identity of a person, network host, or system process?
Which of the following techniques are used to secure wireless networks? Each correct answer represents a complete solution. Choose three.
You work as a Network Administrator for Infonet Inc. The company’s office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure laptop to connect to the wireless network. What will you configure on the laptop to accomplish he task?