Вы находитесь на странице: 1из 84

S No

Question Which cooling system is used to cool the case, 1 power supply, adapter cards, and CPUs? m The component used to hold the processor in place with the help of clips and connecting the motherboard electrically to the processor, is 2 known as____________. m

Option 1

1, Heat Sink m

1, Communication port m

3 Which one is NOT a type of bus? m 1, External m Choose a DC voltage that power supply does 4 NOT have? m 1,+3.3 volts m Which device does the processor uses to interact 5 with rest of the hardware? m 1,CMOS Battery m

6 7 8 9

System Lockup Errors can be best described as: m What is the data transfer rate for IDE - ATA/2 PIO mode? m Which bus does the processor uses to communicate with other peripherals? m Which of the following computer case is generally used for Servers? m

1, System Lockup Error stop all processes and shut the system down without warning m 1,3.3 Mbps m 1,Data bus m 1,Mid Tower case m 1,Dual Interrupt Memory Module m 1,NIC m

10 What does DIMM stands for? m A device that translates digital signal of 11 computers into analog signal, is known as? m The Ultra DMA transfers data in burst mode at a rate of 33.3 MB per second. What is the transfer 12 rate of Ultra DMA 100 standard? m

1,33.3 Mbps m

13 What is the full form of ATAPI? m Which one of the following ATA standards 14 introduced SMART? m 1,ATA-1 m Port COM1 is a type of _____________________ 15 m 1,Parallel Port m

1,Advanced Technology Attachment Packing Interface m

A _________________is a personal computer connection that transfers data one bit at a time 16 over a single wire. m 1,FireWire connection m ____________ contains information about the 17 location of tracks and sectors on the disk. m 1,A Text file m A ____________________is a personal computer connection that transfers data eight bits at a time over eight wires and is typically used to connect a 18 printer to a system unit. m 1,FireWire connection m If you have controller installed on your SCSI drive, 19 how many more devices can it support? m 1,4 m

Which one of the following statements is NOT 20 true about SCSI devices? m

1,SCSI devices can be either internal or external to the computer m

How can you enable your system to recognize a 21 SCSI device? m 1,By configuring CMOS m A __________________is a personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration, and is used on 22 most computers today. m 1,Parallel connection m A ______________________is a personal computer connection that provides a high-speed interface for peripheral devices that are designed 23 to use the IEEE 1394 standard. m 1,Parallel connection m Sam was assembling his PC. After he installed floppy drive, he found that the indicator light of the floppy drive was constantly glowing. What could be the possible cause? m What is the main disadvantage of dot-matrix printer? m Consider the following two statements Statement A: Thermal inkjet printer's printhead has about 300 to 600 nozzles. Statement B: The In the solid ink print process, during the Ink transfer process step the ink gets transferred to __________________ . m Impact printers can use either ____________, when printing on continuous-roll paper, or _____________, when printing on individual cut sheets of paper. m Many printers and scanners include built-in ____________ that provides the on-board device management interface. m

24 25

1,Input voltage was high m 1,Slow speed m

26

1, Statement A is True, Statement B is False m

27

1,Drum m

28

1,Tracter feed, Wheel feed m

29

1,Stepper motor m

What happens when the printing gets complete 30 using Dot Matrix Printer? m How is Electrostatic Photographic drum is 31 cleaned in laser printer? m You are having laser printer and it doesnt print the way the you expect it to. What will be the first 32 step you will perform? m You havent used your Inkjet printer for last two days. Which of the following cycle your printer needs to go through in order to come into ready 33 state? m You are having a laser printer and getting low quality images. Whereas the paper you are using is of good quality. What could have been the 34 possible cause? m

1,Printer gives a long beep m 1,Using a plastic blade m

1,Clean the corona wire m

1,Ready m

1,Fault of paper m

A customer is having a inkjet printer that is not working properly. There is no output on the paper. 35 What could have been the possible cause? m 1,Broken suction pump m

A CD-ROM was installed on an ATX motherboard with its jumpers set to slave. Which one of the 1,The system will not detect 36 following scenarios may occur? m the CD-ROM m While installing expansion cards, it is recommended that the power cord should be removed from the system for a while as it helps in discharging the left over current. How does it 1,Prevents user from having 37 help? m an electric shock m An unknown hardware device is buffering its data in the memory, while the CPU is busy running some other application. Which technique would 38 that device be using? m 1,IRQ m

While you were testing resistance of a component on you motherboard, you damaged another 1,The multimeter transmitted component. Amongst the following what could be some current, thus damaging 39 the possible cause? m the component m

How much memory should you install in order to 40 make your system run properly? m

1,512 MB m

A processor was found to stop working due to overheating. The 2-wire PC fan was found to be working and no report was given about its speed. What could be the most obvious reason for the 1,The room temperature may 41 CPUs failure amongst the following? m not be correct m

Overclocking can be used to increase the CPU 42 speed. How does it possibly do that? m Mr. Dylan owned a laptop computer, which he used extensively in his office. Now his son, Wally, is insisting him to buy a desktop for he wants to hear his favorite mp3s on the system. Dylan does not want to spend too much money on a new 43 system. Suggest h You have a laptop with a CD-ROM drive and now want to attach floppy drive as one of your external device. Which of the following components you 44 would need it? m Your system is not working and you feel that it is a hardware problem. After troubleshooting you found that the hard drive is not working. You checked the cables and verified that everything is connected properly. What will be the next step 45 you will follow?

1,By increasing CACHE memory m

1,Connect the laptop with the Internet m

1,Only a cable m

1,Change the hard drive m

Suppose, you bought a 256 MB RAM to replace with 128 MB RAM already installed on your system. After memory installation, during the POST process, you heard two short beeps. What 46 is the possible cause and how to rectify it? m A user when switches on his computer, gets continuous beep and the system do not start up. Which of the following devices may not be 47 working properly? m Consider the following statements:

1,Driver missing for RAM. You would need to install the device driver m

1,Motherboard m

Statement A: The EISA (Extended Industry Standard Architecture) bus was a higher-speed bus designed for PCs starting with the Intel 80486 processor. Statement B: The registry is the central 1,Statement A is True and 48 configuration database where Statement B is False m

John is planning to create a data processingintensive crossword generator software. He had recently purchased a good quality processor with L1 and L2 caches but wants to increase its speed to allow his game to be tested well. Which of the 1,Purchase another processor 49 following metho with L3 cache also m

50

51

52

53

54

John purchased a computer a few years back that used Socket 8 for the AMD processor. He now wants to switch to an Intel Pentium processor. Is this possible? How? m John finds that his computer looses settings such as date and time whenever he starts the computer. What problem in which hardware component should John check? m Which media type have a shielded cable similar to STP with either four or six conductors that can be used to connect 63 devices from a small network? m In which IP Address class, you can have 16,382 as the maximum number of networks and 65,534 as the maximum number of nodes per network? m A network in which some nodes act as servers to provide special service on behalf of other nodes is called _____________________. m

1,Yes, it is possible because AMD and Intel have compatible designs for all sockets m

1,RAM is faulty m

1, IEEE 1394 m

1, Class A m

1, Centralized network m

_____________ is a network service that provides automatic assignment of IP address and TCP/IP configuration information on the network 55 systems that are configured as it's client. m 1, DHCP m A network utility that determine the route the computer use to send a packet its' destination is 56 known as ____________________. m 1, ping m

Which of the following statements is NOT TRUE 57 for Fiber Optic Cable Transmission? m

1, Fiber optic cables are the least sensitive of any cable type to electromagnetic interference. m

Cable Modem communication can be best 58 described as: m

1, It transmits voice and data over phone lines hand has basic rate and primary rate service. m

59 SMTP protocol can be best described as: m

1, A communication protocol to enable voice packet transfer. m

1, DNS is a network service that provides automatic assignment of IP addresses and other TCP\IP configuration information on network systems that are configured as 60 Which statement is TRUE about DNS Service? m DHCP client. m

How can you best describe nslookup network 61 tool? m For a node on a network following information are given: IP Address is equal to 139.87.140.76 Subnet mask is equal to 255.255.255.0 62 What is the correct network id of this system? m

1, It verifies the configuration of TCP\IP and to release or renew DHCP IP address leases. m

1, 255.255.255.76 m

Samuel is a network administrator at Global Systems, needs to set up a LAN of 20 computers based on the bus topology using coaxial cables. Determine the type of connector that will be used 63 to connect the computers. m 1, SMA m

John want to apply for IP address for a small company having not more than 100 computers in their network. Which class of IP address he 64 should apply for? m 1, Class A m Samuel a network administrator at Global System Inc. needs to set up a network for computers. The network needs to be set up based on Wi-Fi connectivity. Determine the LAN standard that will 65 meet this requirement. m 1, 802.11a m John is required to manually configure network connection on a Windows XP professional system. By using 192.168.200.3 as IP address, 255.255.255.0 as the Subnet mask, and 192.168.200.200 as the preferred DNS server address. John can perform the same by th Samuel, a network administrator at GlobeTech Inc. During troubleshooting he finds that the Tom's machine can communicate on the local network but cannot reach Internet, while there is no problem with the ISP. What will be most probable cause of this probl A security measure that give an administrator the ability to allow or deny access to resources, objects and data is called ____________________. m An unwanted software that runs in the background to monitor system activities and send collected personal user data to a third party is called ______________. m

66

1, 3->4->2->1->5 m

67

1, Their may be missing or incorrect IP address m

68

1, Authentication m

69

1, Adware m

An unwanted software loaded in to system for the purpose of presenting commercial advertisement 70 to the user is called ______________. m 1, Adware m A security measure that tracks user operating 1, Authentication activities by recording selected type of event in a 71 log is called ___________________________. m m An IEEE standard used to provide a port based authentication mechanism for wireless communication using 802.11a and 802.11b 72 protocols is ____________. m 1, 802.1x m

1, In DAC, access is controlled by comparing an object's security designation and a user's security clearance. Objects, such as files and other resources, are assigned security labels of varying Discretionary Access Control (DAC) measure can levels, depending on the 73 be best described as: m object's sensitivity. m

1, Public key policies define password policy, account What is the use of Public key policies available on lockout policy, and Kerberos 74 Windows XP? m policy. m

1, AES is a block-cipher symmetric encryption algorithm Advanced Encryption Standard (AES) algorithm a that encrypts data in 64-bit symmetric algorithm for data encryption can be blocks using a 56-bit key with 8 75 best described as: m bits used for parity. m

Secure Token (An Electronic Fob) used for 76 Authentication can be best described as: m

1, In Secure token, A fob assigned to a specific user generates a series of numbers at predefined intervals. At the same time, this number is also generated at the secure system. The user attempting to gain access to the secure system will have a certain

Which of the following statement is NOT TRUE 77 about software based firewall security issues? m Simon Donnell is a network administrator at Global Soft Inc. Lately, he is getting complaints of data and program corruption from the network users. Simon finds out that this problem started after he installed some programs on their 78 computer from the Inte John a security consultant has been approached by GlobeMart Inc., a retail chain of stores for securing their warehouses. Since the warehouse is fully automated, the management is getting complaints of stealing and transfer of goods 79 through manager's logi John needs to access certain files on his computer from a computer in another lab. He shared the folder, but he cannot access the files from the other lab location. On close examining, he finds that although he can access the file in the 80 same lab on any c If you need to set NTFS permission on a file or a folder. You can perform the activity by performing following steps in some manner:

1, Disabling is firewall security issue, because it isn't integrated into a hardware device it can be disabled by mistake m

1, Worm m

1, He can implement username password authentication m

1, Share permissions might be more restrictive than the NTFS permissions m

1. Log on as user with Full Control to the file or folder object. 2. To add permission entries, click Add. Enter or 81 sea 1, 1->2->3->4 m

82

83

84

85

86 87 88 89

90

You want to implement a security control on objects, such as files and other resources based on security labels of varying levels. User can access the object only if their clearance level correspond to object's security level. Which access control measure Samuel a network consultant has been hired by GlobeSurf Intl. to setup a fiber-optic network. On examining the environmental conditions of the locations where this network need to be set up, he would need to ensure that the network implementation should b GlobeTrack Inc. is a new venture on to enable people share with each other files, software, movies and music. They need to decide on the type of network to implement where in which resource sharing, processing, and communications control are completely de GlobeSurf Inc. is planning to expand its ISP operations by implementing the new wireless network. Although they had implemented a 802.11 wireless network for the corporates last year. They now want to use the cheapest and compatible wireless network which GlobeSurf Inc. is a new ISP in town. Based on a recent survey of their users they are launching a new broadband service where they need to give the service that can guarantee at least 150 Kbps download speed, and support a modem access limit of 10 Mbps. H What is the first step you will follow when repairing computer? m What is the first step you will follow while troubleshooting any computer problems? m You are facing a chip creep problem. Which device you need to check? m A user when switches on his computer, gets continuous beep and the system do not start up. Which of the following devices may not be working properly? m

1, Mandatory Access Control m

1, Sub Multi Assembly connector m

1, Mixed Network m

1, 802.11d m

1, Cable Broadband and Cable Modem m 1, Inspect the hard drive m 1, Check the Hard Drive m 1, Sound card m

1, Motherboard m

What type of error is indicated by a "This Program 1, A problem has occurred at Has Performed an Illegal Operation..." message? the time of installing the 91 m operating system. m

You get an POST error during boot process on a 92 PC. What could this mean? m

1, HIMEM.SYS is missing or incorrect m

IRQ3 is the 16-bit default port for 93 _________________ . m IRQ4 is the 16-bit default port for 94 _________________ . m IRQ1 is the 16-bit default port for 95 _________________ . m IRQ14 is the 16-bit default port for 96 _________________ . m IRQ13 is the 16-bit default port for 97 _________________ . m John need to attach an external CD-ROM drive, so what item needs to be checked when installing external drive which is not checked normally on installing a internal drive on a notebook PC and 98 why? m When installing a parallel ATA (IDE) hard disk drive in a computer, which of the following jumper 99 settings do not apply? m John a technician needs to install digital camera on his computer. His main concern is that whether digital camera can connect to his workstation properly. Which of the following connections cannot be used to connect digital camera to his 100 computer? m

1, COM1 and COM3 m 1, COM1 and COM3 m 1, COM1 and COM3 m 1, Hard Drive Controller m 1, Hard Drive Controller m

1, Verify that the Hard drive is disconnected m

1, Terminal m

1, PS/2 m

What should you do before when removing a 101 PCMCIA card from the Notebook PC? m

1, Begin with clicking the PC Card status indicator on the taskbar. Then, select the command to stop the operation of the PC Card you want to remove. When the operating system prompts you, physically remove the PC Card from the system m

When a new card is installed on a computer, what 1, Is assigns the DMA interrupt 102 does the PnP do? m to the device m

John a PC Technician needs to upgrade a old computer with the new microprocessor. On closing examining, he finds out that the existing 103 BIOS is non-removable, non-flash ROM BIOS? m 1, Replace the motherboard m John a PC Technician needs to replace old power supply with the new one. He wants to know which factors he should consider before selecting a new 104 power supply? m 1, Form factor and Wattage m John a PC Technician has recently installed a 160 GB SCSI drive as the computer's primary drive, but the system cannot see it. What should you 105 do? m 1, Use an IDE drive m Identify which of the following is not a condition when adapter's icon shows an exclamation mark 106 on a yellow background? m Which of the following is not a function of fully 107 Uninterruptible Power Supply system? m When cleaning a monitor, which of the following 108 tools should you never use? m Until yesterday, your Windows based computer was working fine. But today, you received "Boot record Not Found" error message. What is first 109 thing you should do? m 110 Which of these items is supported by BIOS? m 1, The enabling of PC Card slots has been disabled in the CMOS m 1, Monitor the power input line m 1, Leather insulated shoes m

1, Run the FDISK program and reformat the hard drive m 1, Printer m

What should be done if CMOS contains a 111 password you don't know? m John a PC technician has received compliant from Anna that, whenever she issues a print command her machine stops playing the music. 112 What could be the problem? m

1, Keep trying different password combinations m

1, The printer is out of toner m

What is the order of operation of a laser printer? 113 m A user complains that he is unable to find a cord or plug to connect his brand-new PDA to the workstation. Reading through the PDA manual, you note no mention of additional cords to interface with the PDA. All other functions of the 114 PDA appear to be worki When upgrading a BIOS, which of the following is 115 an important consideration? m

1, Cleaning, writing, developing, fusing, transferring, conditioning m

1, The PDA uses wireless connections to transfer data m 1, Getting the same version m

In a laser printer, a thermal fuse is used to prevent ________________________________________ 116 ________ . m 1, Heat sink failure m

Which of the following options signify there is no image displayed on the monitor but the power 117 indicator light is on? m

1, The power cable is disconnected m

Which of the following options signify there is all white image displayed on the monitor with the 118 monitor on? m Which of the following options signify there is no input sent when keys of the keyboard are 119 pressed? m Which of the following options signify when the 120 mouse works sometimes, but not others? m Which of the following technique is used to troubleshoot if the monitor is flickering and the display is distorted in Windows operating system? 121 m

1, The power cable is disconnected m

1, Keyboard is unplugged m 1, IRQ conflict between the mouse and any other device m 1, Check the monitor cable for any bent pins and straighten them if necessary m

Which of the following technique is used to troubleshoot if the adapter card and its slots test 122 fine, but services are unavailable? m

1, Visually inspect cards and cables and reconnect if necessary m

123

124

125

126

127

Which of the following technique is used to troubleshoot if no sound is coming out of the speakers that worked previously in the Windows multimedia computer? m Which of the following problem is suspected when an error message at boot, Drive Not ReadySystem Halted is displayed? m Which of the following problem is suspected when you can't hear sound or music while playing an audio CD? m A user is complaining that her newly installed driver is not being recognized. As a PC technician what will be the first step to troubleshoot this problem? m A user is complaining that she is not able to access her Word documents from D drive by typing the drive letter at the command prompt. As a PC technician what is the first step to troubleshoot this problem? m

1, Check the volume settings within Windows using Control Panel or the Volume System Tray icon m 1, Drive is not configured for Master or Cable Select as appropriate to the system. m

1, Misaligned case m

1, Check the CMOS settings of the drive m

1, Check the CMOS settings of the drive. m

A user is complaining that he is not able to copy files from the system to the floppy. As a PC technician what is the first step to troubleshoot 1, Check the CMOS settings of 128 this problem? m the drive. m A user complains that when he turns on the PC, it doesn't always come on and sometimes it just shuts itself down abruptly, with no warning. When he turns on the system again, there is no fan noise. He is using a legacy database application 129 and the data is 1, 1->3->2->5->4 m A user is complaining that after installing additional memory on to his computer, it is not booting up. As a PC technician which sequence of steps will you follow to troubleshoot this problem? 1. Verify that the correct memory was installed in 130 the system When a user tries to access the hard drive containing his data, the system locks up and makes a clicking sound. From the DOS prompt, he can change to drive D, but when he tries to access a file or list the files on the drive, it locks 131 up and begins clicki The user needs to burn a CD and the drive keeps ejecting the CD media before he can write the disc. As a PC technician what will you first perform/suggest to troubleshoot the problem? m Which of the following problem is suspected when an error message at boot, Drive Not ReadySystem Halted is displayed? m A_________ is a device that creates a twodimensional digitized image of a physical object. m Which of the following printer prints fast and highquality color printing in transparencies? m Which of the following laptop devices should be regularly maintained? m A ____________is a printer that forms images by spraying liquid ink from an ink cartridge out of nozzles aimed carefully on the paper. m A command-line tool that enables you to manage disks and partitions by issuing direct commands, or by creating script files to automate disk operations is called____________________________ . m When we use Windows Backup utility to back up System State, It's data does not contain_______________________ . m Missing NTLDR is a type of______________________________ . m

1, 1->2->3->4 m

1, Replace the hard drive. m 1, Confirm that the user has a CD-R, CD-RW, DVD-R, or DVD-RW drive with CR-ROM or DVD-ROM. m 1, Data cable is not connected or incorrectly connected to the drive m

132

133

134 135 136

1, Scanner m 1, Solid Ink printer m 1, Battery m

137

1, Inkjet printer m

138

1, chkdsk.exe m

139 140

1, Boot files. m 1, System Stop Error m

A process that uses backup data and the Windows installation source files to rebuild a failed computer system is known as 1, Automated System 141 _______________________ . m Recovery m Windows Boot Disk may not contain _______________________file for boot process. 142 m 1, Boot.ini m

Which statement is NOT TRUE about Disk 143 Management Tool? m

1, Disk Management Tool is used to display, create, and remove partitions on the drives m

1, Task Manager is a basic Task manager on windows computer can be best system-diagnostic and 144 described as: m performance monitoring tool. m

145 Differential Backup can be best described as: m

1, A back type that take back up of files modified the day the backup is performed, without marking them as backed up. m

Which statement is TRUE about Windows File Protection system service of Windows XP 146 Professional? m

1, WFP automatically maintains backup copies of key system files. m

During the booting process a user hear one short beep and one long beep and no video output display on the screen. What this beep error code 1, Not sufficient wall voltage in 147 signifies? m PC's power supply m

Which statement is NOT TRUE when you diagnose and trouble shoot a desktop remotely 148 using Remote Desktop Tool. m

1, With Remote Desktop you are allowed to operate the computer as if you were in front of it m

Program Name Installation is a type of restore 149 point that is created: m

1, When Programs are installed with installer tools such as InstallShield and Windows XP Installer m

150 Last Known Good is a booting option in which: m William, is an employee at NorthernWare Systems and is running complex application on the Windows XP. Afterwards his system performance slows down. He wants to check the statistics of CPU and Memory usage by that 151 application. Which System Management Tool A user is facing problem in opening, modifying and creating new files, as these processes have become very slow. Even with sufficient disk space, the disk performance has slowed down over a period of time. After enquiring with user it 152 was found that a lot A user is trying to start some application on his PC, but that application is failed to start. As a PC technician you want to check log records to see the error messages or warning generated during application startup process. Which log file may 153 contain t

1, User can start the computer with a minimal set of drivers and services, including the mouse, keyboard, VGA display, and hard disk m

1, Device Manager m

1, Check the fragmentation status of your disk and run disk defragmenter m

1, Application log m

154

155

156

157

158

John, a user has Windows XP operating system installed on his computer. He wants a scheme that can reconstruct his computer as quickly as possible in the event of an operating system failure as his job is solely depend on his computer. As PC technician wh A user is browsing a popular site using Internet Explorer. After logging on to the site as he tries to install some component on to the system to view the page correctly, he receives an Illegal operation message and the Internet Explorer window is forced A user is trying to start the system. During the boot process he receives a message of type "Non bootable/Non accessible disk". As a PC technician what could not be the possible cause of the error? m John has reported a problem to the help desk that his system gets halted as soon as he starts the system. After examining it was identified that, John had Windows XP and Linux installed on his machine. The machine halts after the initial boot loader phase John figures out that every time his Windows boots, the system is not able to detect newly attached floppy drive. He has installed the requisite drivers and thus needs to detect the floppy drive manually after the system has started. What could be the iss The boot sequence is when the operating system is selected, and the hardware configuration is detected and loaded. Identify the correct boot sequence of Windows XP operating system from the following steps:

1, Take full system backup m

1, System Stop Error m

1, Hardware problem with the hard disk or hard disk controller m

1, Hardware problem with the hard disk or hard disk controller m

1, NTDETECT.COM is not able to detect the hardware m

159 1) Ntldr switches the microprocessor from real ______________ lasers do not emit harmful levels of radiation and are exempt from control 160 measures. m

1, 1->2->3 m

1, Class 1 m

______________ lasers are capable of creating eye damage through chronic, continuous 161 exposure; this class includes barcode readers. m 1, Class 1 m ______________ lasers pose severe eye hazards when viewed through optical instruments (for 162 example, microscopes) or with the naked eye. m 1, Class 1 m ______________ lasers pose danger to eyes and 163 skin, as well as being fire hazards. m 1, Class 1 m Which of these computer components present the 164 most danger from electrical shock? m 1, System Board m

An ________________________ is a record of any instance where a person is injured or computer equipment is damaged due to 165 environmental issues. m Which of the following device produces ozone gas, which is considered as an environmental 166 hazard? m

1, Materials Data Sheet m

1, Hard Drive m

________________ can help minimize ESD in a 167 computing environment. m 1, Air Ionizers m ________________ occurs when a circuit is created that allows electrons to rush from a statically charged body to another with an unequal 168 charge. m 1, Chemical Hazard m 169 Where is the System BIOS stored? m Consider the following statements: 1, ROM Chip m

Statement A: The computer's power supply has a relatively high voltage, but the current is very low in relation to other components. Statement B: If you are using an anti-static floor 1, Statement A is False and 170 mat, you do not need any other ESD Statement B is True m Consider the following statements: Statement A: Equipment storage is an example of situational hazard. Statement B: Laser is an example of electrical hazard. Which of the following is correct with respect to 171 above statements? m A ________________ is a desktop version, no longer supported, of Microsoft's enterprise server 172 operating system software. m Which of the following operating system runs on 173 both Intel and PowerPC processors? m Which of the following Windows components is a general term for the overall contents of the computer screen that displays whenever 174 Windows is running? m Which of the following Windows components contains the start button, quick launch toolbar, notification area, and buttons for any open 175 programs? m Which of the following statements is NOT true 176 about My Computer in Windows XP? m Which of the following is NOT a control panel 177 utility in Windows operating system? m 1, Statement A is False and Statement B is True m

1, Windows XP Professional m 1, MAC OS X Tiger m

1, The taskbar m

1, The Taskbar m 1, It is a graphical tool to manage files and folders on a computer m 1, Add /Remove Programs m

178

179

180

181

182

Which of the following statements is NOT true 1, It is used to display or add regarding MY Network Places in Windows shortcuts to network locations operating system? m m Which of the following file attribute will you choose so that other users can only view the contents of the file but cannot modify or change its contents? m 1, Archive m Which of the following file attribute will you select when you back up your computer that is using Windows operating system? m 1, Archive m Using which file extension will you save your wordprocessing file so that it includes a limited amount of formatting but can be opened in various other applications? m 1, .txt m A user deals with very important strategic deals of the company. There is a chance of data theft from his computer system, so he wants to have a protected system. As an A+ professional which file system will to use to meet the user's requirement? m 1, FAT m

How will you gather information about the user's selected color scheme and wallpaper used without checking up the display properties in the 183 control panel utility? m How will you gather information about the modems installed in the computer and the network configuration without checking up in the 184 control panel utility? m

1, By using the registry sub tree HKEY_CLASSES_ROOT m

1, By using the registry sub tree HKEY_CLASSES_ROOT m

You have built a custom computer system for a client's home using individual hardware components. You now need to install an operating system. Because this client only needs the system for personnel use. Which Windows 1, Windows XP Home Edition 185 operating system will you consider? m m John wants to install Windows XP Professional on his computer. The system configuration of his computer are: Processor: 233 megahertz (MHz) RAM: 32 MB Hard disk: 2 GB However, he is unable to install Windows XP 186 Professional. Identify the problem? m

1, RAM should be 64 MB m

John wants to install Windows XP Professional on his computer. The system configuration of his computer are: Processor: 133 megahertz (MHz) RAM: 64 MB Hard disk: 2 GB However, he is unable to install Windows XP 187 Professional. Identify the problem? m John wants to install Windows XP Home Edition on his computer. The system configuration of his computer are: Processor: 133 megahertz (MHz) RAM: 64 MB Hard disk: 2 GB However, he is unable to install Windows XP 188 Professional. Identify the problem? m Which of the following will you use to connect 189 your laptop with your digital camera? m User complains that when he starts his computer it is showing "Invalid boot disk" error. As a PC technician, in a process of troubleshooting you didn't find the non-bootable disk in drive. Identify what may be the other possible reason of this 190 problem? m Sam took a backup of downloaded document files in his floppy disk the previous day. Today when he starts his computer it is showing " Invalid boot disk error". As a PC technician what is the first 191 step you will take to troubleshoot this problem? m John has built a custom computer using individual hardware components. When he starts up the computer one long beep and one short beep is produced. How will he troubleshoot this problem? 192 m Sam has got a heavy laptop which he has to recharge every 12 hours. How will he reduce the weight of the laptop and simultaneously increase 193 the life of the laptop? m

1, RAM should be 128 MB m

1, RAM should be 128 MB m 1, Type II PC card m

1, You will verify that CMOS is set to boot from the hard drive. m

1, You will verify the CMOS settings m

1, He will check for monitor power, video cable and display adapter m 1, By replacing the present laptop battery with a lithium based battery m

You client complains that his laser printer is printing in correcting and is producing a garbling printout. How will you troubleshoot this problem? 194 m

1, Right click the printer in the Printers And Faxes window and uncheck Pause Printing m

You have signed up for online banking at your financial institution. Just after signing up you receive a email requesting that you reconfirm your name, address, taxpayer identification information's, and account number. What should 195 you do? m Sam is working as a system administrator in a high-security defense organization. How will he protect the theft of data by third party 196 organizations from his workstations? m

1, Assume that your information was lost, and resubmit it by replying to the email m 1, By installing antivirus software in all his network workstations m

John is upgrading the hard disk in his personnel computer. The old hard disk does not meet his current hardware standards so he will not reuse it. After transferring the data what is the appropriate 1, Throw the old hard disk in 197 step to dispose of the old disk? m the trash. m John is working in the government's defense organization. He wants to send a very secret information to his subordinate. So he sends a coded message, and before doing so he sends a copy of the mathematical formula he used to 198 encrypt the message so that hi 1, Hashing m John is working in the government's defense organization. He wants to send a very secret information to his subordinate through internet. What security mechanism he should apply to 199 protect the contents while they are in transit? m 1, Authentication m Your company needs to install new data back up medium on their central server. For this they require a daily backup technique so that data can be stored and retrieved easily. They also want that data should be stored in a sequential manner 200 so that retriev 1, CD-ROM m

Option 2

Option 3 3, Thermal Compound m

Option 4

2, Fans m

4, Liquid Cooling Systems m

2, Memory slot m 2, Memory m 2,+5 volts m 2,Expansion slot m

3, Processor sockets m 3, Data m 3,-3.3 volts m

4, Chipset m 4, Address m 4,-5 volts m 4,BIOS chip m

3,Memory slot m 3, System Lock error occurs when an application is attempting to perform an action that 2, System Lockup Error is an Windows does error condition that causes not permit. the system or an application Windows forces to stop responding to user the application to input m close m 2,5 Mbps m 2,System bus m 2,Desktop case m 2,Dual Inverse Memory Module m 2,Sound card m 3,8.3 Mbps m 3,Address bus m 3,Micro Tower case m 3,Dual Inline Memory Module m 3,Modem m

4, System Lockup Error is an error condition that occurs when you try to start an application that is not properly installed m 4,1.3 Mbps m 4,Memory bus m 4,Full Tower case m 4,Dual Interactive Memory Module m 4,Display devices m

2,66.6 Mbps m

3,100 Mbps m 3,Advanced Technology 2,Advanced Technology Attachment Attachment Packet Interface Packet Interrupt m m 2,ATA-2 m 2,USB Port m 3,ATA-3 m 3,Serial Port m

4,333 Mbps m

4,Advanced Technology Attachment Packing Interrelate m 4,ATAPI m 4,PS/2 Port m

2,USB connection m 2,File Allocation Table m

3,Parallel connection m 4,Serial connection m 3,Latency values m 4,Clusters m

2,USB connection m

3,Parallel connection m

4,Serial connection m

2,5 m

2,SCSI is generally slower than an ATA hard disk m

3,6 m 3,SCSI-2 devices are backward compatible with SCSI-1 devices m

4,7 m

4,A SCSI can run on different systems like Mac, PC, Sun, and so on m

3,By setting 2,By reinstalling the operating SCSI card to be 4,System automatically system m BIOS enabled m recognizes SCSI devices m

2,Serial connection m

3,USB connection m

4,FireWire connection m

2,Serial connection m

3,USB connection m

4,FireWire connection m

2,The floppy drive was not mounted properly m 2,Very noisy m

2, Both Statement A and B are True m

3,The floppy drive was not configured m 3,Poor image quality m 3, Statement A is False, Statement B is True m

4,The floppy drive cable was not properly connected m 4,Very messy m

4, Both Statement A and B are False m

2,Paper m

3,Image m

4,Printer head m

2,Tracter feed, Friction feed m

3,Friction feed, Tractor feed m

4,Pin feed and Wheel feed m

2,Firmware m

3,Memory slot m 4,Printhead carriage m

3,Cleaning cycle 2,Pickup stepper motor gets process is actuated m performed m 4,Printhead is parked m 3,Using a dry 2,Using a rubber blade m cloth m 4,Either of the above m 3,Replace the corona roller m 4,Check Page Setup selections m

2,Change the drive gear m

2,Charging m

3,Cleaning m

4,Heat up m

2,Dirty fuser roller m

3,Damaged 4,Faulty primary corona or paper-feed roller Power supply do not charge m print drum m

2,Wrong type of paper m

3,Blocked nozzles m

4,Hole in an ink cartridge m

2,The system will detect the CD-ROM m

3,The system will recognize the CD-ROM as primary disk and stop recognizing the HDD m 4,Will give an error code m

3,CPU cannot recognize expansion card, 2,Prevents resource conflicts until all electricity m is discharged m 4,It doesnt help anyway m

2,Memory Address m

2,The resistance of the component was less than that of the component being tested m 2,Amount of memory does not contribute to proper running of a system m

3,DMA m 3,The resistance of the component was more than that of the component being tested m 3,Depends on the programs you intend to use m

4,I/O Address m

4,The component was improperly aligned m

4,Depends upon the processor speed m

2,The speed of the fan may not be correct m

2,By increasing the bus speed m

3,Faulty motherboard m 3,By reserving some space in the hard disk to be used as RAM m

4,Less amount of thermal grease m

4,By making the CPU Fan run faster, thus increasing the processor speed m

2,Buy a docking station m

3,Buy an MP3 player m

4,Upgrade his laptop m

2,Only a connector m

3,A cable and a RJ-45 connector 4,A cable and a proprietary m connector m

3,Check the hard disk on another 2,Check the power supply m computer m

4,Reformat the hard drive m

3,Check to see that the new RAM chip is seated firmly, swap out RAM chips to determine which 2,All the RAM chips may not is defective, and have been replaced, hence replace the replace the RAM chips m defective chip m

4,The hard disk space may have been too less. Clean some space from your system m

2,Video card m

3,Floppy drive m 4,Controller m

2,Statement A is False and Statement B is True m

3,Both Statement A and Statement B are 4,Both Statement A and False m Statement B are True m

3,Use throttling m 3,Yes, it is possible because socket 8 design of AMD 2,No, because AMD and Intel is compatible have compatible designs for with that of Intel socket 9 onwards m m 2,Use overclocking m

4,Buy a new processor that supports MMX m

4,No, because the designs were compatible only till socket 7m

2,CMOS battery is weak m

3,Hard Disk has bad sectors m 4,Processor speed is altered m

2, Fiber optic m

3, Twisted pair m

4, Coaxial m

2, Class B m

3, Class C m 3, Peer to Peer network m

4, Class D m

2, Client /Server network m

4, Mixed mode network m

2, DNS m

3, ARP m

4, WINS m

2, Ipconfig m

3, tracert m

4, nslookup m

3, In Step index multimode fiber, Light is sent down each of the multiple 2, In single mode fiber, a layers inside the laser, usually operating in the core to carry an infrared portion of the individual signal, spectrum, is modulated in allowing multiple amplitude (intensity) to signals to be transmit the signal through sent down a the fiber. m single strand. m

4, Graded index multimode Fiber Has a longer maximum transmission distance than step index multimode fiber, but is more expensive. m

2, Transmit digital signals over existing telephone line. m

3, Transmit data over very long distance. m 3, A communication protocol to download web pages from the 2, A communication protocol web server to to retrieve e-mails from an the client mail server. m browser. m 3, DNS is Microsoft's NetBIOS name resolution service which as develop to reduce the number of NetBIOS name resolution 2, DNS is the primary name broadcast on resolution service on the networks that internet as well as private IP use NetBIOS networks. m naming. m

4, A high speed way to transmit both data and TV signals on the same physical media. m

4, A communication protocol to send e-mails to a mail server. m

4, DNS is a terminal emulation protocol that enables a user at one site to simulate a session on a remote host. m

3, It verifies that computer can connect to a DNS server an successfully find an IP address 4, Determine the route the 2, It Performs test for TCP\IP for a given computer use to send a packet communication. m computer. m to it's destination. m

2, 139.87.140.255 m

3, 139.87.140.0 m 4, 139.87.255.255 m

2, RJ-45 m

3, T-Connectors m 4, MT-RJ m

2, Class B m

3, Class C m

4, Class D m

2, 802.11.b m

3, 802.11.e m

4, 802.11.g m

2, 2->4->3->1->5 m

3, 3->1->2->4->5 m 4, 2->1->4->3->5 m 3, The default gateway address might be configured 4, The user might have incorrectly m insufficient permission m

2, DNS configuration is incorrect or DNS server is down m

2, Access Control m

3, Auditing m

4, Password Management m

2, Worms m

3, Spyware m

4, Spam m

2, Worms m

3, Spyware m

4, Spam m

2, Access Control m

3, Auditing m

4, Password Management m

2, WLTS m

3, 802.11i m

4, WPA m

3, In DAC, users are assigned to pre-defined roles, and network objects are configured to allow access 2, In DAC, access to each only to specific object is controlled on a roles. Roles are customized basis based on a created user's identity. Objects are independently of configured with an Access user accounts. Control List (ACL) of subjects Access is (users or other entities) who controlled based are allowed access to them. on a user's m assigned role. m 3, Public key policies used to 2, Public key policies used to set policies for set an audit policy, user the use of publicrights assignments, and key certificates machine specific security for users and the options. m file system. m 3, AES is a symmetric 128bit block cipher developed by Belgian 2, AES is a symmetric cryptographers encryption algorithm that Joan Daemen encrypts data by processing and Vincent each block of data three Rijmen and times using a different key adopted by the each time. It first encrypts U.S. plain text into ciphertext Government as using one key, it then its encryption encrypts that ciphertext with standard to another key, and replace DES. m

4, In DAC , access is controlled through Encryption/Decryption method. Only that user who knows the Decryption Key can access the object. m

4, Public key policies used in configuring rules that identify types of software and determine what software can run on your system. m

4, AES is a freely available 64bit block cipher algorithm that uses a variable key length and a block size of 64 bits. It was developed by Bruce Schneier to replace DES. m

2, Secure token is a chip with a transmitter is embedded in a card, button, tag, or other device. The chip is detected by the receiver as soon as it comes into its detection range for authentication of the user. m 2, Open ports is firewall security issue, As it's sometimes difficult to configure FTP or other internetwork communication through a firewall m

3, A Secure token is a flash drive containing software that allows it to hold a password or code that will be used for authentication. Once the Secure token is inserted into the computer, the user will be able to type a code to gain access to the system. 3, Outgoing traffic is a firewall security issue because firewall controls only incoming traffic m

4, Secure Token analyzes the physical features of the face, comparing it to stored data obtained during a previous scan for authentication purpose. m 4, Browser used for communication is firewall security issue in software based firewall as some browser bypass software base firewall m

2, Trojan horse m

3, Virus m

4, Spam m

2, He can implement data encryption mechanism for authentication m

3, He can implement Windows 4, He can implement multiauthentication m factor authentication m

2, Proper authentication is not provided m

3, Firewall is preventing the acceding of file m

4, Some malicious Trojan horse preventing the access m

2, 1->3->2->4 m

3, 1->4->3->2 m 4, 1->4->3->2 m

2, Discretionary Access Control m

3, Role Based Access Control m

4, Role Set based Access Control m

2, Biconic Connector m

3, Local connector m

4, Mini-BNC m

2, Client/Server Network m

3, Peer-to-peer network m

4, Centralized Network m

2, 802.11a m

3, 802.11f m

4, 802.11b m

3, Satellite Broadband and 2, DSL Broadband and DSL Satellite Modem modem m m 3, Remove the 2, Switch off the computer m case m 2, Check the Power Cables 3, Check the m processor m 2, Power Supply m

4, Dial-up and Dial-up modem m 4, Inspect the floppy drive m 4, Check the motherboard m

3, Video Card m 4, All socketed devices m

3, Power Supply m 3, A problem has occurred at 2, A problem has occurred at the time of the time of loading the installing new system files for booting hardware or purposes. m software. m 2, Hard Disk m

4, Floppy Drive m 4, A problem has occurred when an application is attempting to perform an action that Windows OS does not permit. m

3, The Windows file system is 2, There may be a hardware generating an 4, The drivers for the device or power failure m error m are incorrect m

2, COM2 and COM4 m 2, COM2 and COM4 m 2, COM2 and COM4 m 2, Math Coprocessor m 2, Math Coprocessor m

3, COM2 and COM3 m 3, COM2 and COM3 m 3, Keyboard m 3, Keyboard m 3, Keyboard m 3, Verify that proper device drivers are installed m

4, COM1 and COM4 m 4, COM1 and COM4 m 4, Floppy Drive Controller m 4, Floppy Drive Controller m 4, Floppy Drive Controller m

2, Close the screen of the notebook PC m

4, Verify that the power switch, or power supply, is turned off m

2, Master m

3, Slave m

4, Cable select m

2, USB m

3, Serial m 3, Begin with Control Panel, select Add/Remove hardware, uninstall the PC Card driver, When the operating system prompts you, physically remove the PC Card from the system m

4, Parallel m

2, Physically remove the PC Card from the system m

4, Begin with Control Panel, select Add/Remove hardware, uninstall the PC Card driver. Then, select the command to stop the operation of the PC Card you want to remove. When the operating system prompts you, physically remove the PC Card from the system m

2, It handles interrupt requests from the device m

3, Checks to see what resources are required and available, and then reallocates the system's resources as 4, It assigns the available IRQ necessary m and I/O Address m

2, Replace the CPU m

3, Install more RAM m

4, Install a larger hard drive m

3, Total BTUs and amperage 2, Form factor and Voltage m m

4, Noise and total BTUs m

2, Check the jumpers settings m

3, Install another SCSI drive m 3, The PC card controller in the PC may be 2, The card may be faulty m faulty m 2, Switch to output of battery 3, Keeping the power when a loss in power batteries online is detected m m 3, Ground strap 2, High-voltage regulator m m

4, Enable large drives in SCSI BIOS m 4, The operating system may not support the device in question m

4, Long term power backup m 4, Surge suppressor m

2, Run the FDISK program with /MBR option m 2, Scanner m

3, Replace the hard drive m

4, Create an emergency boot disk m 4, Mouse m

3, IDE Drive m 3, Enter the CMOS program 2, Find a machine that does and reset or not use password protection erase the m password m 3, There is a IRQ conflict between the 2, The LPT printer cable is printer and the bad m sound card m 3, Cleaning, conditioning, writing, 2, Cleaning, developing, developing, writing, transferring, fusing, transferring, conditioning m fusing m

4, Install the CMOS shorting jumper to erase the CMOS data m

4, The motherboard is bad m

4, Cleaning, conditioning, developing, transferring, fusing, writing m

2, The PDA is defective m 2, Erasing the existing ROM BIOS m

3, The PDA is missing cabling m 3, Getting the latest version m

4, The PDA does not have batteries m 4, Writing the new ROM BIOS m

2, A fuser from overheating m

2, The data cable to the VGA port on the PC is disconnected m

2, The data cable to the VGA port on the PC is disconnected m 2, Foreign matter has settled under the keys m 2, Mouse ball or rollers are dirty m

2, Adjust the contrast using the buttons on the monitor m

3, A high-voltage power supply from overheating m 3, Incorrect display adapter and monitor device drivers are in use m 3, Incorrect display adapter and monitor device drivers are in use m 3, Keyboard is plugged into mouse port m 3, Mouse settings are incorrect m 3, Swap the monitor with a known good monitor m 3, Replace adapter card that is physically damaged m 3, Install or reinstall the most current drivers for the sound card and Windows m

4, A low-voltage power supply from overheating m

4, Monitor cable is not securely connected to the video port m

4, There is multiple bent or broken pins of the VGA connector m 4, Keyboard interface on the computer is damaged m 4, Mouse is plugged in to the keyboard port m

4, Change the power scheme settings within Windows m

2, Resolve hardware resource conflicts m

4, Replace adapter card that is electronically damaged m

2, Make sure the CD/DVD drive is balanced m 2, Hard drive adapter is not found. m 2, The wires from the CD drive to the sound card are disconnected m

4, Verify that the sound card is properly configured within Windows m

3, IRQ conflicts. m 4, Bad sectors on the drive. m 3, Corrupted or outdated drives 4, A wobble has been created m on the disc m

2, Verify that the drive has been properly partitioned and 3, Update the formatted m BIOS m 2, Use Windows utilities to verify that the drive has been properly partitioned and 3, Update the formatted. m BIOS. m

4, Replace the driver m

4, Replace the driver m

2, Use Windows utilities to verify that the drive has been properly partitioned and 3, Update the formatted. m BIOS. m

4, Replace the driver m

2, 1->2->3->4->5 m

3, 1->3->2->4->5 m 4, 1->3->4->2->5 m

2, 1->2->4->3 m

3, 1->4->3->2 m 4, 1->4->2->3 m

2, Run the antivirus software. 3, Update the m BIOS m 4, Reformat the hard drive m 3, Replace the drive as it is not compatible with 2, Test if there is any drive the operating 4, Reinstall the CD-ROM or letter conflict. m system. m DVD-ROM on the system. m 2, Hard drive adapter is not found. m 3, IRQ conflicts. m 4, Bad sectors on the drive m 3, Fax machine m 3, Thermal printer m 3, Keyboard m

2, Printer m 2, Laser printer m 2, Power cord m

4, Webcam m 4, Impact printer m 4, LCD monitor m

2, Solid ink printer m

3, Impact printer m 4, Thermal printer m

2, format.exe m 2, System files protected by Windows File Protection. m 2, System Lockup Error m

3, diskpart.exe m 4, defrag.exe m 3, The Registry. m 3, Application Error m 4, Device Drivers m 4, Boot Error m

2, Booting Using Safe Mode m

3, System restore using restore point m

4, Remote Booting m

2, Command.com m

2, Disk Management Tool is used to determine the amount of free space on a partition m

3, Ntldr m 3, Disk Management Tool is used to convert partitions from the FAT or FAT32 file system to NTFS m 3, Task manager is a primary tool that verifies the logical integrity of a file system. m

4, Ntdetect.com m

4, Disk Management Tool is used to view file and folder properties stored on the disk m 4, Task Manager is a comprehensive graphical tool that you can use to manage disk drives themselves as well as the partitions the drives contain. m

2, Task manager is the primary tool you will use to manage and configure system devices in a hardware profile. m

3, A backup type that takes backup of files changed since 2, A back type that take back the last normal up of files changed since the or incremental last normal or incremental backup, without 4, A back type that take back backup, marking them as marking them as up of selected files, marking backed up. m backed up. m them as backed up. m

3, WFP enables you to prevent 2, WFP enables you to scan operating all protected operating system files from system files and replace any any virus attack incorrect files with the correct or any accidental 4, WFP prevents unauthorized Microsoft versions. m over writing. m access to the system files. m 3,A device driver or related file might be missing 4, Problem of defective or damaged m speaker m

2, Problem with monitor power or video cable or display adapter m

2, With Remote Desktop you are capable of accessing multiple machines at once or hopping to multiple machines in a chain, by running remote desktop on each machine on the daisy chain m

3, With Remote Desktop you may have full access to all resources, including printers, storage drives, and the network that machine is attached to, provided necessary 4, With remote desktop more permissions are than one person can be logged defined m on to the machine at once m 3, After every 24 hours. If the computer is off for more than 24 hours, one is created at the next reboot m 3, User can use to revert the system to the state it was in on the last successful startup and user logon m

2, When Windows XP is installed. It can be used to roll the system back to its state just after installation m

4, Before installing any update from the Microsoft website that is automatically downloaded with the Auto Update feature m

2, User can boot using a command-line interface to manage the system even if Windows will not start normally and can correct boot problems m

4, User can boot with a floppy disk to start the system and bypass damaged or missing Windows startup files m

2, Task Manager m

2, Use chkdsk to find any bad sectors m

3, System Information Utility m 3, Convert partitions from the FAT or FAT32 file system to NTFS m

4, Event Viewer m

4, Create one more disk partitions and ask user to use new partitions for new files m

2, Security Log m

3, System Log m 4, Registry Log m

2, Take backup of crucial data file m

3, Take backup of system state Data m

4, Use latest antivirus system m

2, System Lockup Error m

3, Application Error m

4, Boot Error m

2, CMOS boot sequence is not correct m

3, There is a disk in floppy disk drive m

4, NTLDR file might be missing or corrupt. Application Error m

2, CMOS boot sequence is not correct m

3, Boot.ini file is 4, NTLDR file might be missing not available m or corrupt m

2, CMOS boot sequence is not correct m

3, Boot.ini file is 4, NTLDR file might be missing not available m or corrupt m

2, 3->2->1 m

3, 2->1->3 m

4, 1->3->2 m

2, Class 2 m

3, Class 3 m

4, Class 4 m

2, Class 2 m

3, Class 3 m

4, Class 4 m

2, Class 2 m 2, Class 2 m 2, Chassis m

3, Class 3 m 3, Class 3 m

4, Class 4 m 4, Class 4 m

3, Hard Drives m 4, Power Supplies m

2, Incident report m

3, Hazardous Material Data Report m

4, Hazardous Incident Data Report m

2, Power Supply m

2, Batteries m

3, CPU Fan m 4, Laser Printer m 3, Insulated rubber floor mat m 4, Surge suppressor m

2, ESD m 2, Standard RAM m

3, Physical Hazard m 3, CMOS RAM m

4, Electrical Hazard m 4, Hard Disk m

2, Statement A is True and Statement B is False m

3, Both, Statement A and Statement B are 4, Both, Statement A and False m Statement B are True m

2, Statement A is True and Statement B is False m 2, Windows 2000 Professional m 2, MAC OS X m

3, Both, Statement A and Statement B are 4, Both, Statement A and False m Statement B are True m 3, Windows Server 2000 m 3, Microsoft XP Professional m

4, Windows 98 m 4, Linux m

2, The start menu m

3, The desktop m

4, The control panel m

3, The Control 2, The Desktop m Panel m 2, It is available as a shortcut icon on the Windows desktop 3, It is a singlem pane view m 2, Add Hardware m 3, Search m

4, The My Computer m

4, It is a two-pane view m 4, Mouse m

3, Add and remove 2, View and connect to other programs to a 4, Add and remove programs computers on the network m host computer m to a remote computer m

2, Hidden m

3, Read-Only m 4, System m

2, Hidden m

3, Read-Only m 4, System m

2, .rtf m

3, .doc m

4, .bat m

2, FAT32 m

3, NTFS m

4, CDFS m

3, By using the 2, By using the registry sub registry sub tree tree HKEY_LOCAL_ 4, By using the registry sub HKEY_CURRENT_USER m MACHINE m tree HKEY_USERS m 3, By using the 2, By using the registry sub registry sub tree tree HKEY_LOCAL_ 4, By using the registry sub HKEY_CURRENT_USER m MACHINE m tree HKEY_USERS m

2, Windows XP Professional 3, Windows m Server 2000 m

4, Windows XP Media Centre m

2, Hard disk should be 2.5 GB m

3, Processor 4, Video adapter should be should be of 300 Super VGA 800x600 resolution MHz m m

2, Processor should be of minimum 233 MHz m

3, Hard disk should be 2.5 GB m

4, Video adapter should be Super VGA 800x600 resolution m

2, Hard disk should be 2.5 GB m 2, Type I PC card m

3, Processor should be of minimum 233 MHz m 3, Type III MiniPCI card m

4, Video adapter should be Super VGA 800x600 resolution m 4, Type I Mini-PCI card m

2, You will check the floppy disk drive. m

3, You will restart the computer again. 4, You will uninstall the new m software. m

2, You will verify that the floppy disk has been removed from the drive or not m

3, You will replace the hard 4, You will restart the system disk m again m

2, he will check if all RAM chips are seated firmly m

3, He will swap the RAM chips m

4, He will replace the hard disk m 4, By not plugging in the laptop to the AC power supply when not portable m

3, By charging 2, By replacing the processor the battery for m longer time m 3, Check the page setup options in the applications or 2, Update or replace the the properties of printer driver m the printer m

4, Reconnect the printer m

2, Assume that your information was lost, and resubmit using different email address m 2, By installing Spyware detectors in all his workstations m

3, Cancel the online account, and don't create 4, Assume it is a fraud email a new one. m and report to the company m 3, By installing firewalls in all his workstations m 4, By using pop-up blockers m

4, Dispose of the old hard disk 2, Reformat the old hard disk 3, Bulk erase the with computer hardware one time. m old hard disk m recycling contractor. m

2, Symmetric encryption m

3, Asymmetric encryption m

4, Block cipher m

2, File system permissions m 3, Encryption m

4, A firewall m

2, DVD-ROM m

3, Tape drive m 4, Floppy Disk m

Solution

3 1 3 4

2 3 2 4

3 3

2 3 3

4 2

4 3

4 2

1 2 2 4

2 1 3 1 2

4 3

1 3

1 3

1 1 1

4 4

3 4 4

2 1

2 1

4 3

3 1

Вам также может понравиться