Вы находитесь на странице: 1из 48

1. How many kilobytes (KB) make a megabyte (MB)?

a. 8
b. 1024
c. 2
d. 2^10
2. Which of the following ports is used to connect legacy modems to the system unit?
a. PS/2
b. Serial
c. Parallel
d. RCA
3. Which of the following connectors carries digital data for surround sound speaker
systems?
a. PS/2
b. Serial
c. RCA
d. Parallel
4. Which of the following adapter cards is used for connecting additional storage
devices, such as CD drives and hard drives, to a computer?
a. SCSI card
b. NIC
c. Wi-Fi adapter card
d. I/O
5. Which of the following cards is used to add expansion slots in parallel to the main
part of the NLX motherboard?
a. Riser card
b. AGP card
c. PCI card
d. Adapter card
6. Which of the following connectors is used to connect 3.5” floppy disk drives to a
computer?
a. Molex Connector
b. Mini-Molex Connector
c. SATA
d. PATA
7. Which of the following options converts Alternative Current (AC), supplied from the
national power system, to Direct Current (DC)?
a. SATA
b. SFF
c. PATA
d. PSU
8. Which of the following options can execute multiple instructions in the same clock
cycle?
a. SMT
b. SMP
c. RISC
d. PSU
9. Which of the following options determines software compatibility?
a. System bus
b. Register size
c. Packaging
d. Instruction sets
10. Which of the following options allows the CPU to reduce its performance if the
thermal sensor in the CPU detects an unacceptable level of heat?
a. Overclocking
b. Processor cache
c. Throttling
d. Instruction sets
11. How many memory chips does a single-sided memory contain?
a. 8
b. 16
c. 6
d. 12
12. Which of the following Intel Pentium processors introduced the NetBurst
architecture?
a. Intel legacy processor
b. Intel Pentium II processor
c. Intel Pentium III processor
d. Intel Pentium 4 processor
13. Which of the following Intel processors does not support HT or EM64T?
a. Intel Celeron processor
b. Intel Pentium M processor
c. Intel Pentium Core Duo processor
d. Intel Pentium 4 processor
14. Which type of RAM stores data in an electronic circuit called a flip-flop?
a. DDR SDRAM
b. SRAM
c. RDRAM
d. DDR2
15. Which of the following refers to an expansion bus technology used for connecting
internal and external devices?
a. DMA
b. SCSI
c. CMOS
d. SMART
16. Which of the following refers to the protocol that enables devices other than hard
disks to connect to an EIDE interface?
a. ATAPI
b. SMART
c. CMOS
d. SCSI
17. Which of the following option is used to select device-specific parameters when a
new device is not recognized and the auto-detect option is not available?
a. CMOS setup utility
b. SCSI
c. IDE
d. NTFS
18. When using cable select cables to determine which device is master and which is
slave, which of the following connectors is used to connect to the motherboard?
a. Grey connector
b. Black connector
c. Blue connector
d. Pink connector
19. Which of the following prepares a partition for use with an operating system and
creates a file system on the disk partition?
a. High-Level formatting
b. Low-Level formatting
c. Partitioning
d. Imaging
20. Which of the following option is the smallest unit of storage in a hard disk?
a. Sector
b. Track
c. Platter
d. Cylinder
21. Which of the following qualities of LCD refers to the brightness of display?
a. Contrast ratio
b. Luminance
c. Response rate
d. Viewing angle
22. Which of the following Windows licenses refers to the preinstalled versions of
Windows sold with new PCs?
a. Retail
b. OEM
c. Volume
d. Server
23. Which of the following does not use a magnetic disk drive to store the operating
system and user data?
a. Notebook
b. Tablet PC
c. PDA
d. Desktop PC
24. Which of the following option refers to a port replicator that supports add-in cards or
drives through a media bay?
a. Docking station
b. PCMCIA
c. Express Card
d. DVI connector
25. Which of the following maintains a multimaster database called Active Directory and
stores user, group, and computer objects?
a. Member server
b. Domain controller
c. Windows Registry
d. Security
26. Which of the following stores configuration information about the computer?
a. Windows Registry
b. File systems
c. Domain Controller
d. Member Server
27. Which of the following represents the distance between the centers of adjacent triads?
a. Vertical frequency
b. Dot pitch
c. Resolution
d. Viewable size
28. Which of the following refers to the number of pixels used create image?
a. Vertical frequency
b. Viewable size
c. Contrast ratio
d. Resolution
29. Which of the following refers to the number of bits available to form colors?
a. Interface
b. Color depth
c. Resolution
d. Contrast ratio
30. Which of the following uses infrared lasers and photodiodes to transfer data at a
reasonable rate at close range?
a. IrDA ports
b. Bluetooth
c. Wi-Fi(802.11) ports
d. Port replicator
31. Which of the following refers to the process whereby the contents of a disk are moved
around to optimize the disk access time?
a. Disk defragmentation
b. Disk Formatting
c. Driver Signing
d. Rollback Driver
32. Which NTFS feature creates a catalog of file and folder locations and properties?
a. Compression
b. Encryption
c. Indexing
d. Quota management
33. Which of the following file system is supported by Windows for compatibility with
removable media such as CDs and DVDs?
a. FAT
b. FAT32
c. UDF
d. NTFS
34. Which of the following Core boot files is located in the Documents and Settings
folder?
a. ntuser.dat
b. NTBOOTDD.SYS
c. NTOSKRNL.EXE
d. NTLDR
35. Which of the following switches specifies the amount of RAM that windows will use?
a. /maxmem:m
b. /hal
c. /bootlog
d. /basevideo
36. Which ARC is used if the drive is either IDE or if it is a SCSI drive that has BIOS
enabled?
a. multi
b. scsi
c. disk
d. rdisk
37. Which of the following provides hierarchical access to system objects, drives, folders,
and files stored on the computer?
a. My Network Places
b. My Documents
c. Windows Explorer
d. Desktop
38. The Disk Defragmenter utility:
a. Checks the integrity of disks and repairs any problems detected
b. Reorgannizes a drive to store information relating to each file in the
contiguous sectors of the disk.
c. Provides a means for deleting unwanted temporary files created by installing
programs, applications, and cached Internet files.
d. Runs automatically if the system detects file system errors.
39. A partition refers to:
a. The actual hardware installed in your computer.
b. The installer that utilizes all available space on the disk.
c. An area on the disk formatted to contain an operating system or some data.
d. A drive that can be formatted with a different file system.
40. Windows allows file names or folder names to contain up to:
a. 256 characters
b. 255 characters
c. 250 characters
d. 245 characters
41. If Power-On Self Test (POST) is not running properly, which of the following
troubleshooting technique is followed?
a. try another power cable because there may be a problem with the plug or fuse
b. check chip seating. Some chips can work loose from their socket over a period
of time
c. check the voltage from the PSU
d. check if there is a blackout
42. If new processor has just been installed, which check ensures that the processor is
supported by the motherboard?
a. Configuration
b. Orientation
c. Compatibility
d. Swap
43. How will you determine that a system has no power supply?
a. The PSU fan does not work.
b. The is no sound of the hard drive spinning.
c. The LEDs on the front panel of the system case are lit up.
d. The fuse has zero Ohms of resistance
44. Which of the following protocols provides reliable, connection-oriented transfer of
packets?
a. Transmission Control Protocol
b. User Datagram Protocol
c. Application Protocol
d. Internet Protocol
45. Which of the following network devices creates a temporary virtual circuit between
two devices that are attempting to communicate
a. Network adapter
b. Hub
c. Switch
d. Router
46. Which of the following protocols finds the MAC address belonging to an IP address?
a. Use Datagram Protocol
b. Internet Protocol
c. Application protocols
d. Address Resolution Protocol
47. Which of the following connectors is frequently used in telephone systems?
a. RJ-45 connector
b. RJ-11 connector
c. MT-RJ connector
d. Local connector
48. Which of the following allows a computer to boot from a server and not from a disk?
a. PXE card
b. Network Interface Card
c. Network Adapter
d. Network Card
49. Which of the following options is a low-cost small from factor (SFF) connector?
a. RJ-45
b. Local connector (LC)
c. ST( Straight Tip)
d. SC( Subscriber Connector)
50. Which of the following connectors use a bayonet type connection
a. ST (Straight Tip)
b. SC (subscriber Connector)
c. Local connector (LC)
d. Transfer Regustered Jack (MT –RJ)
51. Which of the following refers to the deliberate damage done to systems or data?
a. Vandalism
b. Espionage
c. Theft
d. Disaster
52. Which of the following refers to creating one or more barriers around the resource
such that only authenticated users can gain access?
a. Authorization
b. Authentication
c. Accounting
d. Firewall
53. Which of the following terms refres to undestanding the situation and reacting
accordingly?
a. Inflection
b. Empathy
c. Escalation
d. compromise
54. Which of the components uses TCP/IP to access internet services?
a. Physical adapter
b. Cabling
c. Network protocol
d. Dia-up networking
55. Class A fires are caused by:
a. Flammable gas
b. Ordinary combustible materials
c. Flammable or combustible liquids and solids
d. Combustible metals
56. Which of the following statements is correct about storage of components?
a. Motherboards and other circuit boards with on-board batteries should be
stacked in a pile
b. High-voltage capacitors, such as those in PC switch mode power supplies,
should be stored unpacked on metal shelves.
c. batteries and cells should not be stored in their original packaging
d. Delicate electronic assemblies, such as hard disks and CD-ROM drives,
should be stored in a moisture-controlled environment
57. Which of the following rules is NOT applied during dispasal of solvents and cans?
a. Burn waste solvents, cans, or aerosols
b. Do not pour solvents into household waste water system
c. Use only licensed waste disposal companies
d. Do not punctue cans even when they are empty
58. The default period given to users to change their passwords is:
a. 30 days
b. 42 days
c. 60 days
d. 90 days
59. In Discretionary Access Control:
a. The administrator can analyze security against a desired template and
determine what actions need to be taken to bolster the security of the system.
b. The administrator can configure the desired level of auditing, including logon
attempts, file and object access, and the exercise of rights
c. Each file can be assigned permissions on a per user basic to ensure that only
authorized persons can access files and folders
d. Windows supports the ability to encrypt traffic between hosts on local and/or
renote networks in a highly configurable manner
60. The technique of combing through an organization‘s or indvidual’s refuse in order to
find useful documents is known as:
a. Social en
b. gineering
c. Hackingc.Cracking
d. Dumpster diving

Вам также может понравиться