Final Exam for Ch 11-16

Exam Results – Final Exam for Ch 11-16 – IT Essentials: PC Hardware and Software – Version 4.1  
1
What is one advantage of a solid state drive?
- less prone to failure than a traditional drive

2
A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)
- Replace the keyboard.
- Use an external keyboard until the laptop keyboard is replaced

3
A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?
- disk fragmentation

4
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
- biometrics

5
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?
- Preventive maintenance helps to protect the computer equipment against future problems.

6
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
- Avoid lifting the equipment using the strength in your back
- Lift the equipment using the strength in your legs and knees

7
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
- smart key

8
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
- Bluetooth
- Infrared

9
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
- Disabling SSID broadcasts.
- Configuring MAC address filtering.

10
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
- The drive has input/output errors, has a hardware failure, or is corrupt.

11
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
- Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.

12
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)
- Check and secure the cables.
- Set the printer to Resume Printing.
- Ensure that the printer is powered on.

13
A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)
- The laptop BIOS should be upgraded when installing the RAM.
- The new RAM is defective and must be replaced.

14
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
- phishing protection

15
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)
- Ensure that the correct drivers are installed.
- Check that the external ports are enabled in the BIOS settings.

16
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
- The user account has been disabled.
- The user is using an incorrect username or password.

17
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
- 330 ft (100 m)

18
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
- Change the settings of the Index service in the Advanced Options panel.

19
What is the purpose of the setupmgr.exe file?
- It helps prepare an answer file to automate the installation of Windows XP.

20
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
- Use the F8 key.

21
A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
-     The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel.

22
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
- IEEE 1394b (Firewire)

23
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
-     Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.

24
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
-     The monitor was damaged during cleaning.

25
What is different about the default location for user files in Windows Vista compared to Windows XP?
-     The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.

26
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.

28
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer

29
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.

30
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
-Remote Desktop Protocol

31
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.

32
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?

33
A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?
-RAID level 0 – data striping

34
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices

35
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets

36
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.

37
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify

38
A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?
-Reload TCP/IP on the computer.

5 responses to “Final Exam for Ch 11-16

    • Unless you meant key fob. and unless that is what it actually said on the test itself. The correct term would be key fob.

  1. I know this if off topic but I’m looking into starting my own weblog and was wondering what all is needed to get set up? I’m assuming having a blog like
    yours would cost a pretty penny? I’m not very web smart so I’m
    not 100% sure. Any suggestions or advice would be
    greatly appreciated. Cheers

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s