Term
1. How many drives can be supported with ATA-2 (sometimes called EIDE)?
A. Two
B. One
C. Four
D. Three |
|
Definition
|
|
Term
2. How many ATA devices can be connected to most modern PCs? A. Two B. Six C. Four D. One |
|
Definition
|
|
Term
3. Which of the following does NOT require jumper settings? A. SATA B. PATA C. AT D. ATA |
|
Definition
|
|
Term
4. What's the minimum number of drives needed for RAID 5? A. Two B. Three C. One D. Four |
|
Definition
|
|
Term
5. What is it called when you move data from one PC to a newer PC? A. A good day B. FAST C. Retiring D. Migration |
|
Definition
|
|
Term
6. What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside? A. Social engineering B. Internal virus C. Hacking D. Inside attack |
|
Definition
|
|
Term
7. Physical security, authentication, the file system, users and groups, and security policies combine to make what? A. Access control B. Authentication C. Secure servers D. Encryption |
|
Definition
|
|
Term
8. What command would you use to change a FAT32 partition into an NTFS partition? A. NTFSUP B. CONVERT C. CHANGE D. FAT32TONTFS |
|
Definition
|
|
Term
9. To lock down security settings on a single computer in a workgroup, what would you use? A. Password Policy B. Account Lockout Policy C. Group Policy D. Local Security Settings |
|
Definition
D. Local Security Settings |
|
|
Term
11. What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program? A. Spyware B. Trojan C. Worm D. Virus |
|
Definition
|
|
Term
12. What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)? A. Trojan B. Spyware C. Virus D. Worm |
|
Definition
|
|
Term
13. What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems? A. Worm B. Virus C. Spyware D. Trojan |
|
Definition
|
|
Term
14. The text-based, DOS-like user interface is also known as the ____ interface. A. Graphical user B. Windows C. Mouse D. Command-line |
|
Definition
|
|
Term
15. In older Windows versions, the filename was restricted to ____ characters. A. Ten B. Eight C. Two D. Six |
|
Definition
|
|
Term
16. Current versions of Windows allow filenames of up to ____ characters. A. 8 B. 355 C. 255 D. 155 |
|
Definition
|
|
Term
17. The ASCII standard defines ____ 8-bit characters. A. 257 B. 8 C. 255 D. 256 |
|
Definition
|
|
Term
18. Windows uses a ____ to organize the contents in drives. A. Hierarchical file tree B. Linear directory tree C. Hierarchical directory tree D. Folder system |
|
Definition
C. Hierarchical Directory tree |
|
|
Term
19. The location of a file is called its ____. A. Path B. Folder C. File D. Root |
|
Definition
|
|
Term
20. Which command shows the contents of the current directory? A. SHOW B. LIST C. DIR D. DIRECTORY |
|
Definition
|
|
Term
21. Which command always navigates the command-line interface back to the root directory? A. Cd\. B. Cd C. Cd\ D. Cd/ |
|
Definition
|
|
Term
22. Which command deletes a directory? A. Rd B. Celroot C. Deldir D. Delfile |
|
Definition
|
|
Term
23. Which attribute specifies that a file cannot be modified or deleted? A. System B. Read-only C. Hidden D. Read-write |
|
Definition
|
|
Term
24. To add an attribute to a file, the attribute letter is preceded by a(n) ____ sign. A. Asterisk (*) B. Minus (-) C. Plus (+) D. Percentage (%) |
|
Definition
|
|
Term
25. Which wildcard character replaces a single character in the command-line interface? A. * B. ? C. % D. + |
|
Definition
|
|
Term
26. What command can be used to copy entire directories including subdirectories? A. Xcomp B. Xcmd C. Xcopy D. Xcompact |
|
Definition
|
|
Term
27. In Windows XP, the ____ command displays or alters the encryption of directories on NTFS partitions. A. COMPACT B. CIPHER C. COLOR D. CONVERT |
|
Definition
|
|
Term
28. The CIPHER command works on ____. A. Attributes B. Directories C. Tables D. Disk drives |
|
Definition
|
|
Term
29. What command in Windows XP displays or alters the compression of files on NTFS partitions? A. CIPHER B. XPNTFS C. DOSKEY D. COMPACT |
|
Definition
|
|
Term
30. All files have ____ attributes that determine the behavior of the file in special situations. A. Five B. Three C. Four D. Six |
|
Definition
|
|
Term
31. What tool in the Windows operating system is used to monitor various log files? A. Drivers B. System Restore C. Device Manager D. Event Viewer |
|
Definition
|
|
Term
32. What tool is used to end programs that do NOT shut down normally? A. Event Viewer B. Control Panel C. Task Manager D. Device Manager |
|
Definition
|
|
Term
33. Which tool in Windows 2000 is used to save critical boot files and partition information? A. System Restore B. Automated System Recovery C. Emergency Repair Disk D. Recovery Console |
|
Definition
|
|
Term
34. By default, Windows XP creates a ____ every time new software is installed. A. Restore point B. Boot disk C. License D. Device driver |
|
Definition
|
|
Term
35. Which tool is used for restoring registries manually and for rebuilding partitions? A. Event Viewer B. Recovery Console C. Automated System Recovery D. System Restore |
|
Definition
|
|
Term
36. What is the default Driver Signing setting? A. Warn B. Cancel C. Block D. Ignore |
|
Definition
|
|
Term
37. Which of the following user accounts are created during a Windows 2000 and XP installation? A. Administrator and Power User B. Administrator and Guest C. Administrator and Local User D. Local User and Guest |
|
Definition
B. Administrator and Guest |
|
|
Term
38. On a Windows 2000 Professional desktop, a ____ user is a member of the local Power Users group and the local Users group. A. Local B. Restricted C. Standard D. Power |
|
Definition
|
|
Term
39. What key would you press during bootup to get to the Advanced Startup Options menu? A. F5 B. F1 C. F3 D. F8 |
|
Definition
|
|
Term
40. What recovery tool is available from the Windows installation CD? A. Automated System Recovery B. Last Known Good C. Recovery Console D. Safe Mode |
|
Definition
|
|
Term
41. Which Recovery Console command lists contents of the selected directory on the system partition? A. Del B. Disable C. Dir D. Diskpart |
|
Definition
|
|
Term
42. What is the ratio of the darkest to the lightest spots in a monitor? A. Pixel B. Brightness C. Depth D. Contrast |
|
Definition
|
|
Term
43. What is the name of the special built-in circuit in a monitor that can be used to eliminate magnetic buildup? A. Degaussing magnet B. Degaussing tube C. Degaussing coil D. Degaussing circuit |
|
Definition
|
|
Term
44. What is the process for capturing sound waves in an electronic format? A. Recording B. Media C. Downloading D. Sampling |
|
Definition
|
|
Term
45. What's the minimum number of connections most sound cards come with? A. Three B. Five C. Four D. Two |
|
Definition
|
|
Term
46. What is the line out connector used for? A. External device B. MIDI input C. Speaker D. Microphone |
|
Definition
|
|
Term
47. What kind of printer creates an image on paper by physically striking an ink ribbon against the paper's surface? A. Dot-matrix B. Laser C. Impact D. Thermal |
|
Definition
|
|
Term
48. How is laser printer resolution measured? A. Bits per inch B. Dots per inch C. Color per inch D. Pixels per inch |
|
Definition
|
|
Term
49. What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period? A. Inkjet B. Laser C. Dot-matrix D. Color |
|
Definition
|
|
Term
50. What will typically cause a laser printer to print the same mark on every page? A. A damaged head B. A damaged laser C. A damaged drum D. A damaged toner |
|
Definition
|
|
Term
What identifies a PC on a network? A. Default gateway B. DNS C. IP address D. Subnet mas |
|
Definition
|
|
Term
What kind of printer creates an image on paper by physically striking an ink ribbon against the paper's surface? A. Laser B. Dot-matrix C. Thermal D. Impact |
|
Definition
|
|
Term
What should be added to a laser printer to resolve a memory overflow problem? A. RET B. RIP C. ROM D. RAM |
|
Definition
|
|
Term
Of the following, which standard uses UTP cabling? A. 10*BaseT B. 10Base2 C. 10Base5 D. 10Base7 |
|
Definition
|
|
Term
Where do most USB devices get their power? A. Self-powered by AC B. Self-powered by DC C. USB devices don't need power D. USB bus |
|
Definition
|
|
Term
Which of the following devices would be fastest for a printer? A. Bluetooth B. Serial C. Parallel D. USB 2.0 |
|
Definition
|
|
Term
The term sublimation means to cause something to change from a solid into a ____ form and then back into a solid. A. Vapor B. Viscous C. Liquid D. Crystal |
|
Definition
|
|
Term
What is the maximum length of a USB cable? A. 1 meter B. 3 meters C. 5 meters D. 10 meters |
|
Definition
|
|
Term
Which of the following utilities shows the route that a packet takes to get to its destination? A. IPCONFIG B. NSLOOKUP C. Ping D. TRACERT |
|
Definition
|
|
Term
In a USB connection, what connects to the host controller? A. Device B. Root hub C. USB port D. Child controller |
|
Definition
|
|
Term
Which of the following utilities enables a machine to check whether or not it can communicate with another machine? A. IPCONFIG B. Ping C. Sys D. TELNET |
|
Definition
|
|
Term
What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period? A. Color B. Laser C. Inkjet D. Dot-matrix |
|
Definition
|
|
Term
Most WAPs support filtering in which data packets that do not contain the appropriate address are rejected. What kind of address is filtered? A. MAC B. SSID C. WEP D. WPA |
|
Definition
|
|
Term
You are printing from a dot-matrix printer and notice the characters look chopped off at the top. What should you try adjusting? A. Toner B. Printhead C. Cartridge D. Drum |
|
Definition
|
|
Term
What will typically cause a laser printer to print the same mark on every page? A. A damaged laser B. A damaged toner C. A damaged head D. A damaged drum |
|
Definition
|
|