Top Banner
S No Question Option 1 1 1, Heat Sink m 2 1, Communication port m 3 Which one is NOT a type of bus? m 1, External m 4 1,+3.3 volts m 5 1,CMOS Battery m 6 7 1,3.3 Mbps m 8 1,Data bus m 9 1,Mid Tower case m 10 What does DIMM stands for? m 11 1,NIC m 12 1,33.3 Mbps m 13 What is the full form of ATAPI? m 14 1,ATA-1 m 15 1,Parallel Port m Which cooling system is used to cool the case, power supply, adapter cards, and CPUs? m in place with the help of clips and connecting the motherboard electrically to the processor, is known as____________. m Choose a DC voltage that power supply does NOT have? m Which device does the processor uses to interact with rest of the hardware? m System Lockup Errors can be best described as: m 1, System Lockup Error stop all processes and shut the system down without warning m What is the data transfer rate for IDE - ATA/2 PIO mode? m Which bus does the processor uses to communicate with other peripherals? m Which of the following computer case is generally used for Servers? m 1,Dual Interrupt Memory Module m of computers into analog signal, is known as? m mode at a rate of 33.3 MB per second. What is the transfer rate of Ultra DMA 100 standard? m 1,Advanced Technology Attachment Packing Interface m Which one of the following ATA standards introduced SMART? m Port COM1 is a type of _____________________ m
66
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A+

S No Question Option 1

1 1, Heat Sink m

2 1, Communication port m

3 Which one is NOT a type of bus? m 1, External m

4 1,+3.3 volts m

5 1,CMOS Battery m

6

7 1,3.3 Mbps m

8 1,Data bus m

9 1,Mid Tower case m

10 What does DIMM stands for? m

11 1,NIC m

12 1,33.3 Mbps m

13 What is the full form of ATAPI? m

14 1,ATA-1 m

15 1,Parallel Port m

16 1,FireWire connection m

Which cooling system is used to cool the case, power supply, adapter cards, and CPUs? m

The component used to hold the processor in place with the help of clips and connecting the motherboard electrically to the processor, is known as____________. m

Choose a DC voltage that power supply does NOT have? m

Which device does the processor uses to interact with rest of the hardware? m

System Lockup Errors can be best described as: m

1, System Lockup Error stop all processes and shut the system down without warning m

What is the data transfer rate for IDE - ATA/2 PIO mode? m

Which bus does the processor uses to communicate with other peripherals? m

Which of the following computer case is generally used for Servers? m

1,Dual Interrupt Memory Module m

A device that translates digital signal of computers into analog signal, is known as? m

The Ultra DMA transfers data in burst mode at a rate of 33.3 MB per second. What is the transfer rate of Ultra DMA 100 standard? m

1,Advanced Technology Attachment Packing Interface m

Which one of the following ATA standards introduced SMART? m

Port COM1 is a type of _____________________ m

A _________________is a personal computer connection that transfers data one bit at a time over a single wire. m

Page 2: A+

17 1,A Text file m

18 1,FireWire connection m

19 1,4 m

20

21 1,By configuring CMOS m

22 1,Parallel connection m

23 1,Parallel connection m

24 1,Input voltage was high m

25 1,Slow speed m

26

27 1,Drum m

28 1,Tracter feed, Wheel feed m

29 1,Stepper motor m

30 1,Printer gives a long beep m

31 1,Using a plastic blade m

____________ contains information about the location of tracks and sectors on the disk. m

A ____________________is a personal computer connection that transfers data eight bits at a time over eight wires and is typically used to connect a printer to a system unit. m

If you have controller installed on your SCSI drive, how many more devices can it support? m

Which one of the following statements is NOT true about SCSI devices? m

1,SCSI devices can be either internal or external to the computer m

How can you enable your system to recognize a SCSI device? m

A __________________is a personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration, and is used on most computers today. m

A ______________________is a personal computer connection that provides a high-speed interface for peripheral devices that are designed to use the IEEE 1394 standard. m

Sam was assembling his PC. After he installed floppy drive, he found that the indicator light of the floppy drive was constantly glowing. What could be the possible cause? m

What is the main disadvantage of dot-matrix printer? mConsider the following two statements Statement A: Thermal inkjet printer's printhead has about 300 to 600 nozzles.Statement B: The

1, Statement A is True, Statement B is False m

In the solid ink print process, during the Ink transfer process step the ink gets transferred to __________________ . m

Impact printers can use either ____________, when printing on continuous-roll paper, or _____________, when printing on individual cut sheets of paper. m

Many printers and scanners include built-in ____________ that provides the on-board device management interface. m

What happens when the printing gets complete using Dot Matrix Printer? m

How is Electrostatic Photographic drum is cleaned in laser printer? m

Page 3: A+

32 1,Clean the corona wire m

33 1,Ready m

34 1,Fault of paper m

35 1,Broken suction pump m

36

37

38 1,IRQ m

39

40 1,512 MB m

41

42

You are having laser printer and it doesn’t print the way the you expect it to. What will be the first step you will perform? m

You haven’t used your Inkjet printer for last two days. Which of the following cycle your printer needs to go through in order to come into ready state? m

You are having a laser printer and getting low quality images. Whereas the paper you are using is of good quality. What could have been the possible cause? m

A customer is having a inkjet printer that is not working properly. There is no output on the paper. What could have been the possible cause? m

A CD-ROM was installed on an ATX motherboard with its jumpers set to slave. Which one of the following scenarios may occur? m

1,The system will not detect the CD-ROM m

While installing expansion cards, it is recommended that the power cord should be removed from the system for a while as it helps in discharging the left over current. How does it help? m

1,Prevents user from having an electric shock m

An unknown hardware device is buffering its data in the memory, while the CPU is busy running some other application. Which technique would that device be using? m

While you were testing resistance of a component on you motherboard, you damaged another component. Amongst the following what could be the possible cause? m

1,The multimeter transmitted some current, thus damaging the component m

How much memory should you install in order to make your system run properly? m

A processor was found to stop working due to overheating. The 2-wire PC fan was found to be working and no report was given about its speed. What could be the most obvious reason for the CPU’s failure amongst the following? m

1,The room temperature may not be correct m

Overclocking can be used to increase the CPU speed. How does it possibly do that? m

1,By increasing CACHE memory m

Page 4: A+

43

44 1,Only a cable m

45 1,Change the hard drive m

46

47 1,Motherboard m

48

49

50

Mr. Dylan owned a laptop computer, which he used extensively in his office. Now his son, Wally, is insisting him to buy a desktop for he wants to hear his favorite mp3s on the system. Dylan does not want to spend too much money on a new system. Suggest h

1,Connect the laptop with the Internet m

You have a laptop with a CD-ROM drive and now want to attach floppy drive as one of your external device. Which of the following components you would need it? m

Your system is not working and you feel that it is a hardware problem. After troubleshooting you found that the hard drive is not working. You checked the cables and verified that everything is connected properly. What will be the next step you will follow?

Suppose, you bought a 256 MB RAM to replace with 128 MB RAM already installed on your system. After memory installation, during the POST process, you heard two short beeps. What is the possible cause and how to rectify it? m

1,Driver missing for RAM. You would need to install the device driver m

A user when switches on his computer, gets continuous beep and the system do not start up. Which of the following devices may not be working properly? m

Consider the following statements:

Statement A: The EISA (Extended Industry Standard Architecture) bus was a higher-speed bus designed for PCs starting with the Intel 80486 processor.Statement B: The registry is the central configuration database where

1,Statement A is True and Statement B is False m

John is planning to create a data processing-intensive crossword generator software. He had recently purchased a good quality processor with L1 and L2 caches but wants to increase its speed to allow his game to be tested well. Which of the following metho

1,Purchase another processor with L3 cache also m

John purchased a computer a few years back that used Socket 8 for the AMD processor. He now wants to switch to an Intel Pentium processor. Is this possible? How? m

1,Yes, it is possible because AMD and Intel have compatible designs for all sockets m

Page 5: A+

51 1,RAM is faulty m

52 1, IEEE 1394 m

53 1, Class A m

54 1, Centralized network m

55 1, DHCP m

56 1, ping m

57

58

59 SMTP protocol can be best described as: m

John finds that his computer looses settings such as date and time whenever he starts the computer. What problem in which hardware component should John check? m

Which media type have a shielded cable similar to STP with either four or six conductors that can be used to connect 63 devices from a small network? m

In which IP Address class, you can have 16,382 as the maximum number of networks and 65,534 as the maximum number of nodes per network? m

A network in which some nodes act as servers to provide special service on behalf of other nodes is called _____________________. m

_____________ is a network service that provides automatic assignment of IP address and TCP/IP configuration information on the network systems that are configured as it's client. m

A network utility that determine the route the computer use to send a packet its' destination is known as ____________________. m

Which of the following statements is NOT TRUE for Fiber Optic Cable Transmission? m

1, Fiber optic cables are the least sensitive of any cable type to electromagnetic interference. m

Cable Modem communication can be best described as: m

1, It transmits voice and data over phone lines hand has basic rate and primary rate service. m

1, A communication protocol to enable voice packet transfer. m

Page 6: A+

60 Which statement is TRUE about DNS Service? m

61

62 1, 255.255.255.76 m

63 1, SMA m

64 1, Class A m

65 1, 802.11a m

66 1, 3->4->2->1->5 m

1, DNS is a network service that provides automatic assignment of IP addresses and other TCP\IP configuration information on network systems that are configured as DHCP client. m

How can you best describe nslookup network tool? m

1, It verifies the configuration of TCP\IP and to release or renew DHCP IP address leases. m

For a node on a network following information are given:

IP Address is equal to 139.87.140.76 Subnet mask is equal to 255.255.255.0

What is the correct network id of this system? m

Samuel is a network administrator at Global Systems, needs to set up a LAN of 20 computers based on the bus topology using coaxial cables. Determine the type of connector that will be used to connect the computers. m

John want to apply for IP address for a small company having not more than 100 computers in their network. Which class of IP address he should apply for? m

Samuel a network administrator at Global System Inc. needs to set up a network for computers. The network needs to be set up based on Wi-Fi connectivity. Determine the LAN standard that will meet this requirement. m

John is required to manually configure network connection on a Windows XP professional system. By using 192.168.200.3 as IP address, 255.255.255.0 as the Subnet mask, and 192.168.200.200 as the preferred DNS server address. John can perform the same by th

Page 7: A+

67

68 1, Authentication m

69 1, Adware m

70 1, Adware m

71

72 1, 802.1x m

73

74

Samuel, a network administrator at GlobeTech Inc. During troubleshooting he finds that the Tom's machine can communicate on the local network but cannot reach Internet, while there is no problem with the ISP. What will be most probable cause of this probl

1, Their may be missing or incorrect IP address m

A security measure that give an administrator the ability to allow or deny access to resources, objects and data is called ____________________. m

An unwanted software that runs in the background to monitor system activities and send collected personal user data to a third party is called ______________. m

An unwanted software loaded in to system for the purpose of presenting commercial advertisement to the user is called ______________. m

A security measure that tracks user operating activities by recording selected type of event in a log is called ___________________________. m

1, Authentication

m

An IEEE standard used to provide a port based authentication mechanism for wireless communication using 802.11a and 802.11b protocols is ____________. m

Discretionary Access Control (DAC) measure can be best described as: m

1, In DAC, access is controlled by comparing an object's security designation and a user's security clearance. Objects, such as files and other resources, are assigned security labels of varying levels, depending on the object's sensitivity. m

What is the use of Public key policies available on Windows XP? m

1, Public key policies define password policy, account lockout policy, and Kerberos policy. m

Page 8: A+

75

76

77

78

79

Advanced Encryption Standard (AES) algorithm a symmetric algorithm for data encryption can be best described as: m

1, AES is a block-cipher symmetric encryption algorithm that encrypts data in 64-bit blocks using a 56-bit key with 8 bits used for parity. m

Secure Token (An Electronic Fob) used for Authentication can be best described as: m

1, In Secure token, A fob assigned to a specific user generates a series of numbers at predefined intervals. At the same time, this number is also generated at the secure system. The user attempting to gain access to the secure system will have a certain

Which of the following statement is NOT TRUE about software based firewall security issues? m

1, Disabling is firewall security issue, because it isn't integrated into a hardware device it can be disabled by mistake m

Simon Donnell is a network administrator at Global Soft Inc. Lately, he is getting complaints of data and program corruption from the network users. Simon finds out that this problem started after he installed some programs on their computer from the Inte

1, Worm

m

John a security consultant has been approached by GlobeMart Inc., a retail chain of stores for securing their warehouses. Since the warehouse is fully automated, the management is getting complaints of stealing and transfer of goods through manager's logi

1, He can implement username password authentication m

Page 9: A+

80

81 1, 1->2->3->4 m

82

83

84 1, Mixed Network m

85 1, 802.11d m

86

87 1, Inspect the hard drive m

88 1, Check the Hard Drive m

89 1, Sound card m

90 1, Motherboard m

John needs to access certain files on his computer from a computer in another lab. He shared the folder, but he cannot access the files from the other lab location. On close examining, he finds that although he can access the file in the same lab on any c

1, Share permissions might be more restrictive than the NTFS permissions m

If you need to set NTFS permission on a file or a folder. You can perform the activity by performing following steps in some manner:

1. Log on as user with Full Control to the file or folder object.2. To add permission entries, click Add. Enter or sea

You want to implement a security control on objects, such as files and other resources based on security labels of varying levels. User can access the object only if their clearance level correspond to object's security level. Which access control measure

1, Mandatory Access Control m

Samuel a network consultant has been hired by GlobeSurf Intl. to setup a fiber-optic network. On examining the environmental conditions of the locations where this network need to be set up, he would need to ensure that the network implementation should b

1, Sub Multi Assembly connector m

GlobeTrack Inc. is a new venture on to enable people share with each other files, software, movies and music. They need to decide on the type of network to implement where in which resource sharing, processing, and communications control are completely de

GlobeSurf Inc. is planning to expand its ISP operations by implementing the new wireless network. Although they had implemented a 802.11 wireless network for the corporates last year. They now want to use the cheapest and compatible wireless network which

GlobeSurf Inc. is a new ISP in town. Based on a recent survey of their users they are launching a new broadband service where they need to give the service that can guarantee at least 150 Kbps download speed, and support a modem access limit of 10 Mbps. H

1, Cable Broadband and Cable Modem m

What is the first step you will follow when repairing computer? m

What is the first step you will follow while troubleshooting any computer problems? m

You are facing a chip creep problem. Which device you need to check? m

A user when switches on his computer, gets continuous beep and the system do not start up. Which of the following devices may not be working properly? m

Page 10: A+

91

92

93 1, COM1 and COM3 m

94 1, COM1 and COM3 m

95 1, COM1 and COM3 m

96 1, Hard Drive Controller m

97 1, Hard Drive Controller m

98

99 1, Terminal m

100 1, PS/2 m

101

What type of error is indicated by a "This Program Has Performed an Illegal Operation..." message? m

1, A problem has occurred at the time of installing the operating system. m

You get an POST error during boot process on a PC. What could this mean? m

1, HIMEM.SYS is missing or incorrect m

IRQ3 is the 16-bit default port for _________________ . m

IRQ4 is the 16-bit default port for _________________ . m

IRQ1 is the 16-bit default port for _________________ . m

IRQ14 is the 16-bit default port for _________________ . m

IRQ13 is the 16-bit default port for _________________ . m

John need to attach an external CD-ROM drive, so what item needs to be checked when installing external drive which is not checked normally on installing a internal drive on a notebook PC and why? m

1, Verify that the Hard drive is disconnected m

When installing a parallel ATA (IDE) hard disk drive in a computer, which of the following jumper settings do not apply? m

John a technician needs to install digital camera on his computer. His main concern is that whether digital camera can connect to his workstation properly. Which of the following connections cannot be used to connect digital camera to his computer? m

What should you do before when removing a PCMCIA card from the Notebook PC? m

1, Begin with clicking the PC Card status indicator on the taskbar. Then, select the command to stop the operation of the PC Card you want to remove. When the operating system prompts you, physically remove the PC Card from the system m

Page 11: A+

102

103 1, Replace the motherboard m

104 1, Form factor and Wattage m

105 1, Use an IDE drive m

106

107

108 1, Leather insulated shoes m

109

110 Which of these items is supported by BIOS? m 1, Printer m

111

112 1, The printer is out of toner m

113

When a new card is installed on a computer, what does the PnP do? m

1, Is assigns the DMA interrupt to the device m

John a PC Technician needs to upgrade a old computer with the new microprocessor. On closing examining, he finds out that the existing BIOS is non-removable, non-flash ROM BIOS? m

John a PC Technician needs to replace old power supply with the new one. He wants to know which factors he should consider before selecting a new power supply? m

John a PC Technician has recently installed a 160 GB SCSI drive as the computer's primary drive, but the system cannot see it. What should you do? m

Identify which of the following is not a condition when adapter's icon shows an exclamation mark on a yellow background? m

1, The enabling of PC Card slots has been disabled in the CMOS m

Which of the following is not a function of fully Uninterruptible Power Supply system? m

1, Monitor the power input line m

When cleaning a monitor, which of the following tools should you never use? m

Until yesterday, your Windows based computer was working fine. But today, you received "Boot record Not Found" error message. What is first thing you should do? m

1, Run the FDISK program and reformat the hard drive m

What should be done if CMOS contains a password you don't know? m

1, Keep trying different password combinations m

John a PC technician has received compliant from Anna that, whenever she issues a print command her machine stops playing the music. What could be the problem? m

What is the order of operation of a laser printer? m

1, Cleaning, writing, developing, fusing, transferring, conditioning m

Page 12: A+

114

115 1, Getting the same version m

116 1, Heat sink failure m

117

118

119 1, Keyboard is unplugged m

120

121

122

123

124

125 1, Misaligned case m

126

A user complains that he is unable to find a cord or plug to connect his brand-new PDA to the workstation. Reading through the PDA manual, you note no mention of additional cords to interface with the PDA. All other functions of the PDA appear to be worki

1, The PDA uses wireless connections to transfer data m

When upgrading a BIOS, which of the following is an important consideration? m

In a laser printer, a thermal fuse is used to prevent ________________________________________________ . m

Which of the following options signify there is no image displayed on the monitor but the power indicator light is on? m

1, The power cable is disconnected m

Which of the following options signify there is all white image displayed on the monitor with the monitor on? m

1, The power cable is disconnected m

Which of the following options signify there is no input sent when keys of the keyboard are pressed? m

Which of the following options signify when the mouse works sometimes, but not others? m

1, IRQ conflict between the mouse and any other device m

Which of the following technique is used to troubleshoot if the monitor is flickering and the display is distorted in Windows operating system? m

1, Check the monitor cable for any bent pins and straighten them if necessary m

Which of the following technique is used to troubleshoot if the adapter card and its slots test fine, but services are unavailable? m

1, Visually inspect cards and cables and reconnect if necessary m

Which of the following technique is used to troubleshoot if no sound is coming out of the speakers that worked previously in the Windows multimedia computer? m

1, Check the volume settings within Windows using Control Panel or the Volume System Tray icon m

Which of the following problem is suspected when an error message at boot, Drive Not Ready-System Halted is displayed? m

1, Drive is not configured for Master or Cable Select as appropriate to the system. m

Which of the following problem is suspected when you can't hear sound or music while playing an audio CD? m

A user is complaining that her newly installed driver is not being recognized. As a PC technician what will be the first step to troubleshoot this problem? m

1, Check the CMOS settings of the drive m

Page 13: A+

127

128

129 1, 1->3->2->5->4 m

130 1, 1->2->3->4 m

131 1, Replace the hard drive. m

132

133

134 1, Scanner m

135 1, Solid Ink printer m

136 1, Battery m

137 1, Inkjet printer m

138 1, chkdsk.exe m

A user is complaining that she is not able to access her Word documents from D drive by typing the drive letter at the command prompt. As a PC technician what is the first step to troubleshoot this problem? m

1, Check the CMOS settings of the drive. m

A user is complaining that he is not able to copy files from the system to the floppy. As a PC technician what is the first step to troubleshoot this problem? m

1, Check the CMOS settings of the drive. m

A user complains that when he turns on the PC, it doesn't always come on and sometimes it just shuts itself down abruptly, with no warning. When he turns on the system again, there is no fan noise. He is using a legacy database application and the data is

A user is complaining that after installing additional memory on to his computer, it is not booting up. As a PC technician which sequence of steps will you follow to troubleshoot this problem?

1. Verify that the correct memory was installed in the system

When a user tries to access the hard drive containing his data, the system locks up and makes a clicking sound. From the DOS prompt, he can change to drive D, but when he tries to access a file or list the files on the drive, it locks up and begins clicki

The user needs to burn a CD and the drive keeps ejecting the CD media before he can write the disc. As a PC technician what will you first perform/suggest to troubleshoot the problem? m

1, Confirm that the user has a CD-R, CD-RW, DVD-R, or DVD-RW drive with CR-ROM or DVD-ROM. m

Which of the following problem is suspected when an error message at boot, Drive Not Ready-System Halted is displayed? m

1, Data cable is not connected or incorrectly connected to the drive m

A_________ is a device that creates a two-dimensional digitized image of a physical object. m

Which of the following printer prints fast and high-quality color printing in transparencies? m

Which of the following laptop devices should be regularly maintained? m

A ____________is a printer that forms images by spraying liquid ink from an ink cartridge out of nozzles aimed carefully on the paper. m

A command-line tool that enables you to manage disks and partitions by issuing direct commands, or by creating script files to automate disk operations is called____________________________ . m

Page 14: A+

139 1, Boot files. m

140 1, System Stop Error m

141

142 1, Boot.ini m

143

144

145 Differential Backup can be best described as: m

146

147

When we use Windows Backup utility to back up System State, It's data does not contain_______________________ . m

Missing NTLDR is a type of______________________________ . m

A process that uses backup data and the Windows installation source files to rebuild a failed computer system is known as _______________________ . m

1, Automated System Recovery m

Windows Boot Disk may not contain _______________________file for boot process. m

Which statement is NOT TRUE about Disk Management Tool? m

1, Disk Management Tool is used to display, create, and remove partitions on the drives m

Task manager on windows computer can be best described as: m

1, Task Manager is a basic system-diagnostic and performance monitoring tool. m

1, A back type that take back up of files modified the day the backup is performed, without marking them as backed up. m

Which statement is TRUE about Windows File Protection system service of Windows XP Professional? m

1, WFP automatically maintains backup copies of key system files. m

During the booting process a user hear one short beep and one long beep and no video output display on the screen. What this beep error code signifies? m

1, Not sufficient wall voltage in PC's power supply m

Page 15: A+

148

149

150 Last Known Good is a booting option in which: m

151

152

153 1, Application log m

Which statement is NOT TRUE when you diagnose and trouble shoot a desktop remotely using Remote Desktop Tool. m

1, With Remote Desktop you are allowed to operate the computer as if you were in front of it m

Program Name Installation is a type of restore point that is created: m

1, When Programs are installed with installer tools such as InstallShield and Windows XP Installer m

1, User can start the computer with a minimal set of drivers and services, including the mouse, keyboard, VGA display, and hard disk m

William, is an employee at NorthernWare Systems and is running complex application on the Windows XP. Afterwards his system performance slows down. He wants to check the statistics of CPU and Memory usage by that application. Which System Management Tool

1, Device Manager

m

A user is facing problem in opening, modifying and creating new files, as these processes have become very slow. Even with sufficient disk space, the disk performance has slowed down over a period of time. After enquiring with user it was found that a lot

1, Check the fragmentation status of your disk and run disk defragmenter m

A user is trying to start some application on his PC, but that application is failed to start. As a PC technician you want to check log records to see the error messages or warning generated during application startup process. Which log file may contain t

Page 16: A+

154 1, Take full system backup m

155 1, System Stop Error m

156

157

158

159 1, 1->2->3 m

160 1, Class 1 m

161 1, Class 1 m

162 1, Class 1 m

163 1, Class 1 m

164 1, System Board m

John, a user has Windows XP operating system installed on his computer. He wants a scheme that can reconstruct his computer as quickly as possible in the event of an operating system failure as his job is solely depend on his computer. As PC technician wh

A user is browsing a popular site using Internet Explorer. After logging on to the site as he tries to install some component on to the system to view the page correctly, he receives an Illegal operation message and the Internet Explorer window is forced

A user is trying to start the system. During the boot process he receives a message of type "Non bootable/Non accessible disk". As a PC technician what could not be the possible cause of the error? m

1, Hardware problem with the hard disk or hard disk controller m

John has reported a problem to the help desk that his system gets halted as soon as he starts the system. After examining it was identified that, John had Windows XP and Linux installed on his machine. The machine halts after the initial boot loader phase

1, Hardware problem with the hard disk or hard disk controller m

John figures out that every time his Windows boots, the system is not able to detect newly attached floppy drive. He has installed the requisite drivers and thus needs to detect the floppy drive manually after the system has started. What could be the iss

1, NTDETECT.COM is not able to detect the hardware m

The boot sequence is when the operating system is selected, and the hardware configuration is detected and loaded.Identify the correct boot sequence of Windows XP operating system from the following steps:

1) Ntldr switches the microprocessor from real

______________ lasers do not emit harmful levels of radiation and are exempt from control measures. m

______________ lasers are capable of creating eye damage through chronic, continuous exposure; this class includes barcode readers. m

______________ lasers pose severe eye hazards when viewed through optical instruments (for example, microscopes) or with the naked eye. m

______________ lasers pose danger to eyes and skin, as well as being fire hazards. m

Which of these computer components present the most danger from electrical shock? m

Page 17: A+

165 1, Materials Data Sheet m

166 1, Hard Drive m

167 1, Air Ionizers m

168 1, Chemical Hazard m

169 Where is the System BIOS stored? m 1, ROM Chip m

170

171

172 1, Windows XP Professional m

173 1, MAC OS X Tiger m

174 1, The taskbar m

175 1, The Taskbar m

176

177 1, Add /Remove Programs m

An ________________________ is a record of any instance where a person is injured or computer equipment is damaged due to environmental issues. m

Which of the following device produces ozone gas, which is considered as an environmental hazard? m

________________ can help minimize ESD in a computing environment. m

________________ occurs when a circuit is created that allows electrons to rush from a statically charged body to another with an unequal charge. m

Consider the following statements:

Statement A: The computer's power supply has a relatively high voltage, but the current is very low in relation to other components.Statement B: If you are using an anti-static floor mat, you do not need any other ESD

1, Statement A is False and Statement B is True m

Consider the following statements:

Statement A: Equipment storage is an example of situational hazard.Statement B: Laser is an example of electrical hazard.

Which of the following is correct with respect to above statements? m

1, Statement A is False and Statement B is True m

A ________________ is a desktop version, no longer supported, of Microsoft's enterprise server operating system software. m

Which of the following operating system runs on both Intel and PowerPC processors? m

Which of the following Windows components is a general term for the overall contents of the computer screen that displays whenever Windows is running? m

Which of the following Windows components contains the start button, quick launch toolbar, notification area, and buttons for any open programs? m

Which of the following statements is NOT true about My Computer in Windows XP? m

1, It is a graphical tool to manage files and folders on a computer m

Which of the following is NOT a control panel utility in Windows operating system? m

Page 18: A+

178

179 1, Archive m

180 1, Archive m

181 1, .txt m

182 1, FAT m

183

184

185

186 1, RAM should be 64 MB m

Which of the following statements is NOT true regarding MY Network Places in Windows operating system? m

1, It is used to display or add shortcuts to network locations m

Which of the following file attribute will you choose so that other users can only view the contents of the file but cannot modify or change its contents? m

Which of the following file attribute will you select when you back up your computer that is using Windows operating system? m

Using which file extension will you save your word-processing file so that it includes a limited amount of formatting but can be opened in various other applications? m

A user deals with very important strategic deals of the company. There is a chance of data theft from his computer system, so he wants to have a protected system. As an A+ professional which file system will to use to meet the user's requirement? m

How will you gather information about the user's selected color scheme and wallpaper used without checking up the display properties in the control panel utility? m

1, By using the registry sub tree HKEY_CLASSES_ROOT m

How will you gather information about the modems installed in the computer and the network configuration without checking up in the control panel utility? m

1, By using the registry sub tree HKEY_CLASSES_ROOT m

You have built a custom computer system for a client's home using individual hardware components. You now need to install an operating system. Because this client only needs the system for personnel use. Which Windows operating system will you consider? m

1, Windows XP Home Edition m

John wants to install Windows XP Professional on his computer. The system configuration of his computer are:Processor: 233 megahertz (MHz)RAM: 32 MB Hard disk: 2 GB

However, he is unable to install Windows XP Professional. Identify the problem? m

Page 19: A+

187 1, RAM should be 128 MB m

188 1, RAM should be 128 MB m

189 1, Type II PC card m

190

191

192

193

194

195

John wants to install Windows XP Professional on his computer. The system configuration of his computer are:Processor: 133 megahertz (MHz)RAM: 64 MB Hard disk: 2 GB

However, he is unable to install Windows XP Professional. Identify the problem? m

John wants to install Windows XP Home Edition on his computer. The system configuration of his computer are:Processor: 133 megahertz (MHz)RAM: 64 MB Hard disk: 2 GB

However, he is unable to install Windows XP Professional. Identify the problem? m

Which of the following will you use to connect your laptop with your digital camera? m

User complains that when he starts his computer it is showing "Invalid boot disk" error. As a PC technician, in a process of troubleshooting you didn't find the non-bootable disk in drive. Identify what may be the other possible reason of this problem? m

1, You will verify that CMOS is set to boot from the hard drive. m

Sam took a backup of downloaded document files in his floppy disk the previous day. Today when he starts his computer it is showing " Invalid boot disk error". As a PC technician what is the first step you will take to troubleshoot this problem? m

1, You will verify the CMOS settings m

John has built a custom computer using individual hardware components. When he starts up the computer one long beep and one short beep is produced. How will he troubleshoot this problem? m

1, He will check for monitor power, video cable and display adapter m

Sam has got a heavy laptop which he has to recharge every 12 hours. How will he reduce the weight of the laptop and simultaneously increase the life of the laptop? m

1, By replacing the present laptop battery with a lithium based battery m

You client complains that his laser printer is printing in correcting and is producing a garbling printout. How will you troubleshoot this problem? m

1, Right click the printer in the Printers And Faxes window and uncheck Pause Printing m

You have signed up for online banking at your financial institution. Just after signing up you receive a email requesting that you reconfirm your name, address, taxpayer identification information's, and account number. What should you do? m

1, Assume that your information was lost, and resubmit it by replying to the email m

Page 20: A+

196

197

198 1, Hashing m

199 1, Authentication m

200 1, CD-ROM m

Sam is working as a system administrator in a high-security defense organization. How will he protect the theft of data by third party organizations from his workstations? m

1, By installing antivirus software in all his network workstations m

John is upgrading the hard disk in his personnel computer. The old hard disk does not meet his current hardware standards so he will not reuse it. After transferring the data what is the appropriate step to dispose of the old disk? m

1, Throw the old hard disk in the trash. m

John is working in the government's defense organization. He wants to send a very secret information to his subordinate. So he sends a coded message, and before doing so he sends a copy of the mathematical formula he used to encrypt the message so that hi

John is working in the government's defense organization. He wants to send a very secret information to his subordinate through internet. What security mechanism he should apply to protect the contents while they are in transit? m

Your company needs to install new data back up medium on their central server. For this they require a daily backup technique so that data can be stored and retrieved easily. They also want that data should be stored in a sequential manner so that retriev

Page 21: A+

Option 2 Option 3 Option 4

2, Fans m 4, Liquid Cooling Systems m

2, Memory slot m 4, Chipset m

2, Memory m 3, Data m 4, Address m

2,+5 volts m 3,-3.3 volts m 4,-5 volts m

2,Expansion slot m 3,Memory slot m 4,BIOS chip m

2,5 Mbps m 3,8.3 Mbps m 4,1.3 Mbps m

2,System bus m 4,Memory bus m

2,Desktop case m 4,Full Tower case m

2,Sound card m 3,Modem m 4,Display devices m

2,66.6 Mbps m 3,100 Mbps m 4,333 Mbps m

2,ATA-2 m 3,ATA-3 m 4,ATAPI m

2,USB Port m 3,Serial Port m 4,PS/2 Port m

2,USB connection m 4,Serial connection m

3, Thermal Compound m

3, Processor sockets m

2, System Lockup Error is an error condition that causes the system or an application to stop responding to user input m

3, System Lock error occurs when an application is attempting to perform an action that Windows does not permit. Windows forces the application to close m

4, System Lockup Error is an error condition that occurs when you try to start an application that is not properly installed m

3,Address bus m

3,Micro Tower case m

2,Dual Inverse Memory Module m

3,Dual Inline Memory Module m

4,Dual Interactive Memory Module m

2,Advanced Technology Attachment Packet Interface m

3,Advanced Technology Attachment Packet Interrupt m

4,Advanced Technology Attachment Packing Interrelate m

3,Parallel connection m

Page 22: A+

2,File Allocation Table m 4,Clusters m

2,USB connection m 4,Serial connection m

2,5 m 3,6 m 4,7 m

2,Serial connection m 4,FireWire connection m

2,Serial connection m 4,FireWire connection m

2,Very noisy m 4,Very messy m

2,Paper m 3,Image m 4,Printer head m

4,Pin feed and Wheel feed m

2,Firmware m 3,Memory slot m 4,Printhead carriage m

4,Printhead is parked m

2,Using a rubber blade m 4,Either of the above m

3,Latency values m

3,Parallel connection m

2,SCSI is generally slower than an ATA hard disk m

3,SCSI-2 devices are backward compatible with SCSI-1 devices m

4,A SCSI can run on different systems like Mac, PC, Sun, and so on m

2,By reinstalling the operating system m

3,By setting SCSI card to be BIOS enabled m

4,System automatically recognizes SCSI devices m

3,USB connection m

3,USB connection m

2,The floppy drive was not mounted properly m

3,The floppy drive was not configured m

4,The floppy drive cable was not properly connected m

3,Poor image quality m

2, Both Statement A and B are True m

3, Statement A is False, Statement B is True m

4, Both Statement A and B are False m

2,Tracter feed, Friction feed m

3,Friction feed, Tractor feed m

2,Pickup stepper motor gets actuated m

3,Cleaning cycle process is performed m

3,Using a dry cloth m

Page 23: A+

2,Change the drive gear m

2,Charging m 3,Cleaning m 4,Heat up m

2,Dirty fuser roller m

2,Wrong type of paper m 4,Hole in an ink cartridge m

4,Will give an error code m

4,It doesn’t help anyway m

2,Memory Address m 3,DMA m 4,I/O Address m

3,Replace the corona roller m

4,Check Page Setup selections m

3,Damaged paper-feed roller m

4,Faulty primary corona or Power supply do not charge print drum m

3,Blocked nozzles m

2,The system will detect the CD-ROM m

3,The system will recognize the CD-ROM as primary disk and stop recognizing the HDD m

2,Prevents resource conflicts m

3,CPU cannot recognize expansion card, until all electricity is discharged m

2,The resistance of the component was less than that of the component being tested m

3,The resistance of the component was more than that of the component being tested m

4,The component was improperly aligned m

2,Amount of memory does not contribute to proper running of a system m

3,Depends on the programs you intend to use m

4,Depends upon the processor speed m

2,The speed of the fan may not be correct m

3,Faulty motherboard m

4,Less amount of thermal grease m

2,By increasing the bus speed m

3,By reserving some space in the hard disk to be used as RAM m

4,By making the CPU Fan run faster, thus increasing the processor speed m

Page 24: A+

2,Buy a docking station m 4,Upgrade his laptop m

2,Only a connector m

2,Check the power supply m 4,Reformat the hard drive m

2,Video card m 3,Floppy drive m 4,Controller m

2,Use overclocking m

3,Buy an MP3 player m

3,A cable and a RJ-45 connector m

4,A cable and a proprietary connector m

3,Check the hard disk on another computer m

2,All the RAM chips may not have been replaced, hence replace the RAM chips m

3,Check to see that the new RAM chip is seatedfirmly, swap out RAM chips to determine whichis defective, and replace the defective chip m

4,The hard disk space may have been too less. Clean some space from your system m

2,Statement A is False and Statement B is True m

3,Both Statement A and Statement B are False m

4,Both Statement A and Statement B are True m

3,Use throttling m

4,Buy a new processor that supports MMX m

2,No, because AMD and Intel have compatible designs for socket 9 onwards m

3,Yes, it is possible because socket 8 design of AMD is compatible with that of Intel m

4,No, because the designs were compatible only till socket 7 m

Page 25: A+

2,CMOS battery is weak m 4,Processor speed is altered m

2, Fiber optic m 4, Coaxial m

2, Class B m 3, Class C m 4, Class D m

2, Client /Server network m 4, Mixed mode network m

2, DNS m 3, ARP m 4, WINS m

2, Ipconfig m 3, tracert m 4, nslookup m

3,Hard Disk has bad sectors m

3, Twisted pair m

3, Peer to Peer network m

2, In single mode fiber, a laser, usually operating in the infrared portion of the spectrum, is modulated in amplitude (intensity) to transmit the signal through the fiber. m

3, In Step index multimode fiber, Light is sent down each of the multiple layers inside the core to carry an individual signal, allowing multiple signals to be sent down a single strand. m

4, Graded index multimode Fiber Has a longer maximum transmission distance than step index multimode fiber, but is more expensive. m

2, Transmit digital signals over existing telephone line. m

3, Transmit data over very long distance. m

4, A high speed way to transmit both data and TV signals on the same physical media. m

2, A communication protocol to retrieve e-mails from an mail server. m

3, A communication protocol to download web pages from the web server to the client browser. m

4, A communication protocol to send e-mails to a mail server. m

Page 26: A+

2, 139.87.140.255 m 4, 139.87.255.255 m

2, RJ-45 m 4, MT-RJ m

2, Class B m 3, Class C m 4, Class D m

2, 802.11.b m 3, 802.11.e m 4, 802.11.g m

2, 2->4->3->1->5 m 4, 2->1->4->3->5 m

2, DNS is the primary name resolution service on the internet as well as private IP networks. m

3, DNS is Microsoft's NetBIOS name resolution service which as develop to reduce the number of NetBIOS name resolution broadcast on networks that use NetBIOS naming. m

4, DNS is a terminal emulation protocol that enables a user at one site to simulate a session on a remote host. m

2, It Performs test for TCP\IP communication. m

3, It verifies that computer can connect to a DNS server an successfully find an IP address for a given computer. m

4, Determine the route the computer use to send a packet to it's destination. m

3, 139.87.140.0 m

3, T-Connectors m

3, 3->1->2->4->5 m

Page 27: A+

2, Access Control m 3, Auditing m 4, Password Management m

2, Worms m 3, Spyware m 4, Spam m

2, Worms m 3, Spyware m 4, Spam m

2, Access Control m 3, Auditing m 4, Password Management m

2, WLTS m 3, 802.11i m 4, WPA m

2, DNS configuration is incorrect or DNS server is down m

3, The default gateway address might be configured incorrectly m

4, The user might have insufficient permission m

2, In DAC, access to each object is controlled on a customized basis based on a user's identity. Objects are configured with an Access Control List (ACL) of subjects (users or other entities) who are allowed access to them. m

3, In DAC, users are assigned to pre-defined roles, and network objects are configured to allow access only to specific roles. Roles are created independently of user accounts. Access is controlled based on a user's assigned role. m

4, In DAC , access is controlled through Encryption/Decryption method. Only that user who knows the Decryption Key can access the object. m

2, Public key policies used to set an audit policy, user rights assignments, and machine specific security options. m

3, Public key policies used to set policies for the use of public-key certificates for users and the file system. m

4, Public key policies used in configuring rules that identify types of software and determine what software can run on your system. m

Page 28: A+

2, Trojan horse m 3, Virus m 4, Spam m

2, AES is a symmetric encryption algorithm that encrypts data by processing each block of data three times using a different key each time. It first encrypts plain text into ciphertext using one key, it then encrypts that ciphertext with another key, and

3, AES is a symmetric 128-bit block cipher developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. Government as its encryption standard to replace DES. m

4, AES is a freely available 64-bit block cipher algorithm that uses a variable key length and a block size of 64 bits. It was developed by Bruce Schneier to replace DES. m

2, Secure token is a chip with a transmitter is embedded in a card, button, tag, or other device. The chip is detected by the receiver as soon as it comes into its detection range for authentication of the user. m

3, A Secure token is a flash drive containing software that allows it to hold a password or code that will be used for authentication. Once the Secure token is inserted into the computer, the user will be able to type a code to gain access to the system.

4, Secure Token analyzes the physical features of the face, comparing it to stored data obtained during a previous scan for authentication purpose. m

2, Open ports is firewall security issue, As it's sometimes difficult to configure FTP or other internetwork communication through a firewall m

3, Outgoing traffic is a firewall security issue because firewall controls only incoming traffic m

4, Browser used for communication is firewall security issue in software based firewall as some browser bypass software base firewall m

2, He can implement data encryption mechanism for authentication m

3, He can implement Windows authentication m

4, He can implement multi-factor authentication m

Page 29: A+

2, 1->3->2->4 m 3, 1->4->3->2 m 4, 1->4->3->2 m

2, Biconic Connector m 4, Mini-BNC m

2, Client/Server Network m 4, Centralized Network m

2, 802.11a m 3, 802.11f m 4, 802.11b m

2, Switch off the computer m 4, Inspect the floppy drive m

4, Check the motherboard m

2, Power Supply m 3, Video Card m 4, All socketed devices m

2, Hard Disk m 4, Floppy Drive m

2, Proper authentication is not provided m

3, Firewall is preventing the acceding of file m

4, Some malicious Trojan horse preventing the access m

2, Discretionary Access Control m

3, Role Based Access Control m

4, Role Set based Access Control m

3, Local connector m

3, Peer-to-peer network m

2, DSL Broadband and DSL modem m

3, Satellite Broadband and Satellite Modem m

4, Dial-up and Dial-up modem m

3, Remove the case m

2, Check the Power Cables m

3, Check the processor m

3, Power Supply m

Page 30: A+

2, COM2 and COM4 m 4, COM1 and COM4 m

2, COM2 and COM4 m 4, COM1 and COM4 m

2, COM2 and COM4 m 3, Keyboard m 4, Floppy Drive Controller m

2, Math Coprocessor m 3, Keyboard m 4, Floppy Drive Controller m

2, Math Coprocessor m 3, Keyboard m 4, Floppy Drive Controller m

2, Master m 3, Slave m 4, Cable select m

2, USB m 3, Serial m 4, Parallel m

2, A problem has occurred at the time of loading the system files for booting purposes. m

3, A problem has occurred at the time of installing new hardware or software. m

4, A problem has occurred when an application is attempting to perform an action that Windows OS does not permit. m

2, There may be a hardware or power failure m

3, The Windows file system is generating an error m

4, The drivers for the device are incorrect m

3, COM2 and COM3 m

3, COM2 and COM3 m

2, Close the screen of the notebook PC m

3, Verify that proper device drivers are installed m

4, Verify that the power switch, or power supply, is turned off m

2, Physically remove the PC Card from the system m

3, Begin with Control Panel, select Add/Remove hardware, uninstall the PC Card driver, When the operating system prompts you, physically remove the PC Card from the system m

4, Begin with Control Panel, select Add/Remove hardware, uninstall the PC Card driver. Then, select the command to stop the operation of the PC Card you want to remove. When the operating system prompts you, physically remove the PC Card from the system m

Page 31: A+

2, Replace the CPU m 4, Install a larger hard drive m

2, Form factor and Voltage m 4, Noise and total BTUs m

2, The card may be faulty m

4, Long term power backup m

2, High-voltage regulator m 4, Surge suppressor m

2, Scanner m 3, IDE Drive m 4, Mouse m

4, The motherboard is bad m

2, It handles interrupt requests from the device m

3, Checks to see what resources are required and available, and then reallocates the system's resources as necessary m

4, It assigns the available IRQ and I/O Address m

3, Install more RAM m

3, Total BTUs and amperage m

2, Check the jumpers settings m

3, Install another SCSI drive m

4, Enable large drives in SCSI BIOS m

3, The PC card controller in the PC may be faulty m

4, The operating system may not support the device in question m

2, Switch to output of battery power when a loss in power is detected m

3, Keeping the batteries online m

3, Ground strap m

2, Run the FDISK program with /MBR option m

3, Replace the hard drive m

4, Create an emergency boot disk m

2, Find a machine that does not use password protection m

3, Enter the CMOS program and reset or erase the password m

4, Install the CMOS shorting jumper to erase the CMOS data m

2, The LPT printer cable is bad m

3, There is a IRQ conflict between the printer and the sound card m

2, Cleaning, developing, writing, transferring, fusing, conditioning m

3, Cleaning, conditioning, writing, developing, transferring, fusing m

4, Cleaning, conditioning, developing, transferring, fusing, writing m

Page 32: A+

2, The PDA is defective m

4, Bad sectors on the drive. m

4, Replace the driver m

3, The PDA is missing cabling m

4, The PDA does not have batteries m

2, Erasing the existing ROM BIOS m

3, Getting the latest version m

4, Writing the new ROM BIOS m

2, A fuser from overheating m

3, A high-voltage power supply from overheating m

4, A low-voltage power supply from overheating m

2, The data cable to the VGA port on the PC is disconnected m

3, Incorrect display adapter and monitor device drivers are in use m

4, Monitor cable is not securely connected to the video port m

2, The data cable to the VGA port on the PC is disconnected m

3, Incorrect display adapter and monitor device drivers are in use m

4, There is multiple bent or broken pins of the VGA connector m

2, Foreign matter has settled under the keys m

3, Keyboard is plugged into mouse port m

4, Keyboard interface on the computer is damaged m

2, Mouse ball or rollers are dirty m

3, Mouse settings are incorrect m

4, Mouse is plugged in to the keyboard port m

2, Adjust the contrast using the buttons on the monitor m

3, Swap the monitor with a known good monitor m

4, Change the power scheme settings within Windows m

2, Resolve hardware resource conflicts m

3, Replace adapter card that is physically damaged m

4, Replace adapter card that is electronically damaged m

2, Make sure the CD/DVD drive is balanced m

3, Install or reinstall the most current drivers for the sound card and Windows m

4, Verify that the sound card is properly configured within Windows m

2, Hard drive adapter is not found. m

3, IRQ conflicts. m

2, The wires from the CD drive to the sound card are disconnected m

3, Corrupted or outdated drives m

4, A wobble has been created on the disc m

2, Verify that the drive has been properly partitioned and formatted m

3, Update the BIOS m

Page 33: A+

4, Replace the driver m

4, Replace the driver m

2, 1->2->3->4->5 m 4, 1->3->4->2->5 m

2, 1->2->4->3 m 3, 1->4->3->2 m 4, 1->4->2->3 m

4, Reformat the hard drive m

4, Bad sectors on the drive m

2, Printer m 4, Webcam m

2, Laser printer m 4, Impact printer m

2, Power cord m 3, Keyboard m 4, LCD monitor m

2, Solid ink printer m 4, Thermal printer m

2, format.exe m 4, defrag.exe m

2, Use Windows utilities to verify that the drive has been properly partitioned and formatted. m

3, Update the BIOS. m

2, Use Windows utilities to verify that the drive has been properly partitioned and formatted. m

3, Update the BIOS. m

3, 1->3->2->4->5 m

2, Run the antivirus software. m

3, Update the BIOS m

2, Test if there is any drive letter conflict. m

3, Replace the drive as it is not compatible with the operating system. m

4, Reinstall the CD-ROM or DVD-ROM on the system. m

2, Hard drive adapter is not found. m

3, IRQ conflicts. m

3, Fax machine m

3, Thermal printer m

3, Impact printer m

3, diskpart.exe m

Page 34: A+

4, Device Drivers m

2, System Lockup Error m 4, Boot Error m

4, Remote Booting m

2, Command.com m 3, Ntldr m 4, Ntdetect.com m

2, System files protected by Windows File Protection. m

3, The Registry.

m

3, Application Error m

2, Booting Using Safe Mode m

3, System restore using restore point m

2, Disk Management Tool is used to determine the amount of free space on a partition m

3, Disk Management Tool is used to convert partitions from the FAT or FAT32 file system to NTFS m

4, Disk Management Tool is used to view file and folder properties stored on the disk m

2, Task manager is the primary tool you will use to manage and configure system devices in a hardware profile. m

3, Task manager is a primary tool that verifies the logical integrity of a file system. m

4, Task Manager is a comprehensive graphical tool that you can use to manage disk drives themselves as well as the partitions the drives contain. m

2, A back type that take back up of files changed since the last normal or incremental backup, marking them as backed up. m

3, A backup type that takes backup of files changed since the last normal or incremental backup, without marking them as backed up. m

4, A back type that take back up of selected files, marking them as backed up. m

2, WFP enables you to scan all protected operating system files and replace any incorrect files with the correct Microsoft versions. m

3, WFP enables you to prevent operating system files from any virus attack or any accidental over writing. m

4, WFP prevents unauthorized access to the system files. m

2, Problem with monitor power or video cable or display adapter m

3,A device driver or related file might be missing or damaged m

4, Problem of defective speaker m

Page 35: A+

2, Task Manager m 4, Event Viewer m

2, Security Log m 4, Registry Log m

2, With Remote Desktop you are capable of accessing multiple machines at once or hopping to multiple machines in a chain, by running remote desktop on each machine on the daisy chain m

3, With Remote Desktop you may have full access to all resources, including printers, storage drives, and the network that machine is attached to, provided necessary permissions are defined m

4, With remote desktop more than one person can be logged on to the machine at once m

2, When Windows XP is installed. It can be used to roll the system back to its state just after installation m

3, After every 24 hours. If the computer is off for more than 24 hours, one is created at the next reboot m

4, Before installing any update from the Microsoft website that is automatically downloaded with the Auto Update feature m

2, User can boot using a command-line interface to manage the system even if Windows will not start normally and can correct boot problems m

3, User can use to revert the system to the state it was in on the last successful startup and user logon m

4, User can boot with a floppy disk to start the system and bypass damaged or missing Windows startup files m

3, System Information Utility m

2, Use chkdsk to find any bad sectors m

3, Convert partitions from the FAT or FAT32 file system to NTFS m

4, Create one more disk partitions and ask user to use new partitions for new files m

3, System Log m

Page 36: A+

2, System Lockup Error m 4, Boot Error m

2, 3->2->1 m 3, 2->1->3 m 4, 1->3->2 m

2, Class 2 m 3, Class 3 m 4, Class 4 m

2, Class 2 m 3, Class 3 m 4, Class 4 m

2, Class 2 m 3, Class 3 m 4, Class 4 m

2, Class 2 m 3, Class 3 m 4, Class 4 m

2, Chassis m 3, Hard Drives m 4, Power Supplies m

2, Take backup of crucial data file m

3, Take backup of system state Data m

4, Use latest antivirus system m

3, Application Error m

2, CMOS boot sequence is not correct m

3, There is a disk in floppy disk drive m

4, NTLDR file might be missing or corrupt. Application Error m

2, CMOS boot sequence is not correct m

3, Boot.ini file is not available m

4, NTLDR file might be missing or corrupt m

2, CMOS boot sequence is not correct m

3, Boot.ini file is not available m

4, NTLDR file might be missing or corrupt m

Page 37: A+

2, Incident report m

2, Power Supply m 3, CPU Fan m 4, Laser Printer m

2, Batteries m 4, Surge suppressor m

2, ESD m 4, Electrical Hazard m

2, Standard RAM m 4, Hard Disk m

4, Windows 98 m

2, MAC OS X m 4, Linux m

2, The start menu m 4, The control panel m

2, The Desktop m 4, The My Computer m

4, It is a two-pane view m

2, Add Hardware m 3, Search m 4, Mouse m

3, Hazardous Material Data Report m

4, Hazardous Incident Data Report m

3, Insulated rubber floor mat m

3, Physical Hazard m

3, CMOS RAM m

2, Statement A is True and Statement B is False m

3, Both, Statement A and Statement B are False m

4, Both, Statement A and Statement B are True m

2, Statement A is True and Statement B is False m

3, Both, Statement A and Statement B are False m

4, Both, Statement A and Statement B are True m

2, Windows 2000 Professional m

3, Windows Server 2000 m

3, Microsoft XP Professional m

3, The desktop m

3, The Control Panel m

2, It is available as a shortcut icon on the Windows desktop m

3, It is a single-pane view m

Page 38: A+

2, Hidden m 3, Read-Only m 4, System m

2, Hidden m 3, Read-Only m 4, System m

2, .rtf m 3, .doc m 4, .bat m

2, FAT32 m 3, NTFS m 4, CDFS m

2, View and connect to other computers on the network m

3, Add and remove programs to a host computer m

4, Add and remove programs to a remote computer m

2, By using the registry sub tree HKEY_CURRENT_USER m

3, By using the registry sub tree HKEY_LOCAL_MACHINE m

4, By using the registry sub tree HKEY_USERS m

2, By using the registry sub tree HKEY_CURRENT_USER m

3, By using the registry sub tree HKEY_LOCAL_MACHINE m

4, By using the registry sub tree HKEY_USERS m

2, Windows XP Professional m

3, Windows Server 2000 m

4, Windows XP Media Centre m

2, Hard disk should be 2.5 GB m

3, Processor should be of 300 MHz m

4, Video adapter should be Super VGA 800x600 resolution m

Page 39: A+

2, Type I PC card m 4, Type I Mini-PCI card m

4, Reconnect the printer m

2, Processor should be of minimum 233 MHz m

3, Hard disk should be 2.5 GB m

4, Video adapter should be Super VGA 800x600 resolution m

2, Hard disk should be 2.5 GB m

3, Processor should be of minimum 233 MHz m

4, Video adapter should be Super VGA 800x600 resolution m

3, Type III Mini-PCI card m

2, You will check the floppy disk drive. m

3, You will restart the computer again. m

4, You will uninstall the new software. m

2, You will verify that the floppy disk has been removed from the drive or not m

3, You will replace the hard disk m

4, You will restart the system again m

2, he will check if all RAM chips are seated firmly m

3, He will swap the RAM chips m

4, He will replace the hard disk m

2, By replacing the processor m

3, By charging the battery for longer time m

4, By not plugging in the laptop to the AC power supply when not portable m

2, Update or replace the printer driver m

3, Check the page setup options in the applications or the properties of the printer m

2, Assume that your information was lost, and resubmit using different email address m

3, Cancel the online account, and don't create a new one. m

4, Assume it is a fraud email and report to the company m

Page 40: A+

4, By using pop-up blockers m

2, Symmetric encryption m 4, Block cipher m

2, File system permissions m 3, Encryption m 4, A firewall m

2, DVD-ROM m 3, Tape drive m 4, Floppy Disk m

2, By installing Spyware detectors in all his workstations m

3, By installing firewalls in all his workstations m

2, Reformat the old hard disk one time. m

3, Bulk erase the old hard disk m

4, Dispose of the old hard disk with computer hardware recycling contractor. m

3, Asymmetric encryption m

Page 41: A+

Solution

2

3

1

3

4

2

3

2

4

3

3

3

2

3

3

4

Page 42: A+

2

3

4

2

3

3

4

4

3

2

1

2

2

4

2

Page 43: A+

4

3

4

3

2

1

3

1

3

2

2

Page 44: A+

2

4

3

3

1

3

2

4

Page 45: A+

2

1

2

2

1

3

3

4

4

Page 46: A+

2

3

3

3

3

2

2

Page 47: A+

3

2

3

1

3

1

2

3

Page 48: A+

3

1

4

2

4

Page 49: A+

1

2

1

1

3

4

1

2

2

4

3

Page 50: A+

4

2

2

1

3

1

2

4

1

2

1

Page 51: A+

3

1

1

4

1

4

3

1

3

4

3

3

Page 52: A+

1

3

2

2

4

1

1

1

1

1

1

2

1

Page 53: A+

2

1

1

3

1

1

1

1

1

1

1

3

Page 54: A+

4

4

1

2

4

1

3

1

2

Page 55: A+

4

1

3

2

1

1

Page 56: A+

3

3

4

3

1

1

1

2

3

4

4

Page 57: A+

2

4

1

2

1

3

2

2

1

3

1

4

3

Page 58: A+

3

3

1

2

3

2

3

1

1

Page 59: A+

2

3

1

1

2

1

1

2

4

Page 60: A+

2

4

1

3

3