List three tasks commonly performed during preventive


Part 1

1. (TCO 1) What is Google Chrome? 

  1. An ISP
  2. A provider of QoS
  3. A web browser
  4. A type of WiMAX

 

2. (TCO 2) How does POST know which hardware components to test?

  1. POST checks an installed hardware folder on the boot drive to determine what hardware is installed.
  2. A comprehensive list of all possible hardware components is stored in the BIOS.
  3. POST obtains the list of hardware that is supposed to be in the computer from the settings stored in CMOS.
  4. On startup, all installed hardware sends a status signal to the BIOS to verify operability.

 

3. (TCO 2) _____ is (are) (a) measure(s) taken to prolong the life of the computer. 

  1. EMI
  2. ESD
  3. Utilities
  4. Preventive maintenance

 

4. (TCO 2) What statement is true regarding a cold boot? 

  1. A cold boot occurs when the PC boots from an internal hard drive.
  2. A cold boot occurs when the PC boots from an external hard drive.
  3. A cold boot occurs when you first turn on a computer.
  4. A cold boot occurs when you press Ctrl+Alt+Del.

 

5. (TCO 2) What is true about USB devices? 

  1. A particular USB device is specific to the Windows operating system version.
  2. A charging USB port can provide power even if the computer containing the USB port is powered off.
  3. All USB devices require you to load the device driver before connecting the device to the computer.
  4. Use the Safely Remove Hardware icon to remove USB devices without damaging them.

 

6. (TCO 3) Examine the figure. This port is commonly called a 

  1. video port.
  2. network port.
  3. serial port.
  4. keyboard port.

 

7. (TCO 3) Which of the following devices commonly mount on top of the CPU to cool it? 

  1. Surge protector
  2. Capacitor
  3. Heat sink
  4. Surge resistor 

 

8. (TCO 3) Which of the following memory types has the slowest access? 

  1. RAM
  2. BIOS
  3. Cache
  4. Virtual memory

 

9. (TCO 3) What is the difference between a SATA 2 and a SATA 3 hard drive? 

  1. SATA 3 will always be a larger capacity drive.
  2. The SATA 3 has a different power connector.
  3. The SATA 3 device will be physically smaller.
  4. The SATA 3 device transmits data faster.

 

10. (TCO 3) In the figure, item C is pointing to the 

  1. internal data bus.
  2. external data bus or FSB.
  3. internal data path.
  4. processor memory.

 

11. (TCO 4) Which component of Windows 7 prompts the user for credentials or permission to minimize the dangers of unintended software installations? (Points : 5)

  1. Defender
  2. Firewall
  3. Sidebar
  4. User Account Control (UAC)

 

12. (TCO 4) Mary is not sure what the disk in the current drive contains. Her computer is on and the command prompt is displayed. To discover what is on the disk, she must first(Points : 5)

  1. enter the TYPE command.
  2. enter the DIR command.
  3. format the disk.
  4. run the programs.

 

13. (TCO 4) What is the UID in the line from the Linux /etc/passwd file listed here?

dmerriwald:x:682:670:Deb Merriwald:/home/dmerriwald:/bin/bash

 

  1. 682
  2. x
  3. dmerriwald
  4. 670

 

 

14. (TCO 4) What technology would allow having Windows XP, Windows 7, and CentOS on a host computer where each of these operating systems are in a separate machine?

 

  1. Compression
  2.  Encryption
  3.  Virtualization
  4. Defragmentation

 

 

15. (TCO 4) A Windows 7 computer just had an incident that caused a blue screen of death (BSOD) event. The user rebooted the computer and got it working. What tool should be used by the technician to find the STOP error code for the BSOD? 

  1. The error code cannot be found on the computer now that a reboot has occurred.
  2.  Event Viewer
  3. Task Manager
  4. Device Manager

 

16. (TCO 4) Describe the steps to set or remove a file attribute. 

  1. Open Device manager, select the Properties option, and the Properties window opens. Toward the bottom of the window is an Attributes section. Click inside one or more of the attribute checkboxes to enable or disable an attribute.
  2. Use Windows Explorer to locate the file or folder. Right-click the file or folder name. Click the Properties option and the Properties window opens. Toward the bottom of the window is an Attributes section. Click inside one or more of the attribute checkboxes to enable or disable an attribute.
  3. Use Windows Explorer to locate the file or folder. Left-click the file or folder name. Click the Properties option and the Properties window opens. Toward the bottom of the window is an Attributes section. Click inside one or more of the attribute checkboxes to enable or disable an attribute.
  4. Use the Network option within Windows Explorer to locate the file or folder. Double-click the file or folder name. Click the Properties option and select File Attribute. Click inside one or more of the attribute checkboxes to enable or disable an attribute.

 

17. (TCO 4) You are working at the Linux command line and need to start a new Bourne-again shell (bash) session. What should you type? 

  1. bash
  2. shell –N
  3. start bash
  4. start shell-bash

 

18. (TCO 5) You manage a Windows 7 system. You need to create a user account that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. This user should be a member of which group? 

  1. Guests
  2. Administrators
  3. Power Users
  4. Users

 

19. (TCO 6) What normally connects to an orange speaker port? 

  1. Center speaker or subwoofer
  2. Left speaker
  3. Microphone
  4. Analog input

 

20. (TCO 6) Which of the following is an advantage of networking a printer? 

  1. Faster printing
  2. Less problem for the users because the printer is closer
  3. Reduced costs
  4. Less technical support experience required

 

21. (TCO 6) Which of the following technologies is used in modern flat-panel color monitors?

  1. Component/RGB
  2. Multiscanning
  3. DLP
  4. Digital

 

Question 22.22. (TCO 7) The function of the router is found at which level in the OSI model? 

  1. Transport
  2. Data link
  3. Network
  4. Session

 

23. (TCO 7) A business is located in two buildings in the same town. The accounting computers are connected to each other in the same office space; however, management is located in another building. Management can access the data on the accounting side through a connection installed between the two buildings. What type of network does this exemplify? 

  1. MAN
  2. WON
  3. SAN
  4. PAN

 

24. (TCO 7) What type of fiber optic cable enables only one light signal to be sent along the cable?

  1. Mono-filament
  2. Single-mode
  3. Multimode
  4. Single line

 

25. (TCO 7) UTP cable that supports Gigabit Ethernet is 

  1. CAT 5.
  2. CAT 6.
  3. single-mode fiber.
  4. multimode fiber.

 

26. (TCO 7) How many nonoverlapping frequencies does an 802.11b or g wireless network have? 

  1. Two
  2. Three
  3. Five
  4. Six

 

27. (TCO 8) Which of the following viruses pretends to be a normal application? 

  1. Boot sector
  2. Trojan horse
  3.  Worm
  4.  Stealth

 

28. (TCO 8) To protect data so they cannot be easily read, what technology is used? 

  1. Authentication
  2. Encryption
  3. Authorization
  4. Firewalling

 

29. (TCO 9) Which statement is true when comparing a laptop component with a desktop component? 

  1. Laptop processors are typically not as fast as desktop processors.
  2. Laptop 802.11 wireless has a shorter distance range than a desktop computer’s 802.11 wireless capability.
  3. Laptop memory is typically slower than desktop memory.
  4. Laptop power supplies are typically proprietary, whereas desktop power supplies are not.

 

30. (TCO 10) Of the items shown, which one would be the most critical when specifying components for a thin client PC? 

  1. Extended amount of disk storage
  2. Multiple ODDs
  3. Multiple processors
  4. Minimum OS requirements

 

31. (TCO 10) What is the last and most important step in resolving a computer problem? 

  1. Test the solution.
  2. Divide and conquer.
  3. Document findings, actions, and outcomes
  4. Reboot.

 

32. (TCO 11) Who is responsible for ensuring that a newly deployed computer has an antivirus application installed and configured as well as educating the customer about what to do if the computer contracts a virus? 

  1. The user
  2. The user's boss
  3. The company helpdesk
  4. The technician

 

33. (TCO 11) Which scenario is one that shows a positive attitude? 

  1. A technician returns a borrowed disc to a team member after having the disc more than 6 months.
  2. A technician leaves documentation for a newly installed optical drive with the customer even though the customer treated the technician poorly during the installation.
  3. A technician eagerly helps reorganize a wiring closet for the company.
  4. A technician smiles when an angry customer is taking out her computer problems on the technician.


Part 2

Question 1.1. (TCO 2) Match the term to the definition.

Potential Matches:

1 : Primarily used in laptops

2 : A 64-bit standard

3 : The oldest expansion slot type

4 : Has x1, x2, x4, x8, and x16 slots

    Answer

     : ISA

     : ExpressCard

     : PCI

     : PCIe

 

Question 2.2. (TCO 2) List three tasks commonly performed during preventive maintenance. 

Question 3.3. (TCO 2) Using good grammar (complete sentences), describe a drawback to using an infrared wireless keyboard. Now, describe a benefit.

Question 4.4. (TCO 7) Using good grammar, describe two benefits of using a layered model approach to networking. 

Question 5.5. (TCO 4) List two methods of accessing a command prompt when Windows 7 is operational. 

Question 6.6. (TCO 7) Using good grammar, name, describe, and contrast two major types of wireless antenna classification.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: List three tasks commonly performed during preventive
Reference No:- TGS01104043

Expected delivery within 24 Hours