Which scenario is one that shows a positive attitude

Assignment Help Basic Computer Science
Reference no: EM13823755

Part 1

1. (TCO 1) What is Google Chrome? 

  1. An ISP
  2. A provider of QoS
  3. A web browser
  4. A type of WiMAX

 

2. (TCO 2) How does POST know which hardware components to test?

  1. POST checks an installed hardware folder on the boot drive to determine what hardware is installed.
  2. A comprehensive list of all possible hardware components is stored in the BIOS.
  3. POST obtains the list of hardware that is supposed to be in the computer from the settings stored in CMOS.
  4. On startup, all installed hardware sends a status signal to the BIOS to verify operability.

 

3. (TCO 2) _____ is (are) (a) measure(s) taken to prolong the life of the computer. 

  1. EMI
  2. ESD
  3. Utilities
  4. Preventive maintenance

 

4. (TCO 2) What statement is true regarding a cold boot? 

  1. A cold boot occurs when the PC boots from an internal hard drive.
  2. A cold boot occurs when the PC boots from an external hard drive.
  3. A cold boot occurs when you first turn on a computer.
  4. A cold boot occurs when you press Ctrl+Alt+Del.

 

5. (TCO 2) What is true about USB devices? 

  1. A particular USB device is specific to the Windows operating system version.
  2. A charging USB port can provide power even if the computer containing the USB port is powered off.
  3. All USB devices require you to load the device driver before connecting the device to the computer.
  4. Use the Safely Remove Hardware icon to remove USB devices without damaging them.

 

6. (TCO 3) Examine the figure. This port is commonly called a 

  1. video port.
  2. network port.
  3. serial port.
  4. keyboard port.

 

7. (TCO 3) Which of the following devices commonly mount on top of the CPU to cool it? 

  1. Surge protector
  2. Capacitor
  3. Heat sink
  4. Surge resistor 

 

8. (TCO 3) Which of the following memory types has the slowest access? 

  1. RAM
  2. BIOS
  3. Cache
  4. Virtual memory

 

9. (TCO 3) What is the difference between a SATA 2 and a SATA 3 hard drive? 

  1. SATA 3 will always be a larger capacity drive.
  2. The SATA 3 has a different power connector.
  3. The SATA 3 device will be physically smaller.
  4. The SATA 3 device transmits data faster.

 

10. (TCO 3) In the figure, item C is pointing to the 

  1. internal data bus.
  2. external data bus or FSB.
  3. internal data path.
  4. processor memory.

 

11. (TCO 4) Which component of Windows 7 prompts the user for credentials or permission to minimize the dangers of unintended software installations? (Points : 5)

  1. Defender
  2. Firewall
  3. Sidebar
  4. User Account Control (UAC)

 

12. (TCO 4) Mary is not sure what the disk in the current drive contains. Her computer is on and the command prompt is displayed. To discover what is on the disk, she must first(Points : 5)

  1. enter the TYPE command.
  2. enter the DIR command.
  3. format the disk.
  4. run the programs.

 

13. (TCO 4) What is the UID in the line from the Linux /etc/passwd file listed here?

dmerriwald:x:682:670:Deb Merriwald:/home/dmerriwald:/bin/bash

 

  1. 682
  2. x
  3. dmerriwald
  4. 670

 

 

14. (TCO 4) What technology would allow having Windows XP, Windows 7, and CentOS on a host computer where each of these operating systems are in a separate machine?

 

  1. Compression
  2.  Encryption
  3.  Virtualization
  4. Defragmentation

 

 

15. (TCO 4) A Windows 7 computer just had an incident that caused a blue screen of death (BSOD) event. The user rebooted the computer and got it working. What tool should be used by the technician to find the STOP error code for the BSOD? 

  1. The error code cannot be found on the computer now that a reboot has occurred.
  2.  Event Viewer
  3. Task Manager
  4. Device Manager

 

16. (TCO 4) Describe the steps to set or remove a file attribute. 

  1. Open Device manager, select the Properties option, and the Properties window opens. Toward the bottom of the window is an Attributes section. Click inside one or more of the attribute checkboxes to enable or disable an attribute.
  2. Use Windows Explorer to locate the file or folder. Right-click the file or folder name. Click the Properties option and the Properties window opens. Toward the bottom of the window is an Attributes section. Click inside one or more of the attribute checkboxes to enable or disable an attribute.
  3. Use Windows Explorer to locate the file or folder. Left-click the file or folder name. Click the Properties option and the Properties window opens. Toward the bottom of the window is an Attributes section. Click inside one or more of the attribute checkboxes to enable or disable an attribute.
  4. Use the Network option within Windows Explorer to locate the file or folder. Double-click the file or folder name. Click the Properties option and select File Attribute. Click inside one or more of the attribute checkboxes to enable or disable an attribute.

 

17. (TCO 4) You are working at the Linux command line and need to start a new Bourne-again shell (bash) session. What should you type? 

  1. bash
  2. shell –N
  3. start bash
  4. start shell-bash

 

18. (TCO 5) You manage a Windows 7 system. You need to create a user account that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. This user should be a member of which group? 

  1. Guests
  2. Administrators
  3. Power Users
  4. Users

 

19. (TCO 6) What normally connects to an orange speaker port? 

  1. Center speaker or subwoofer
  2. Left speaker
  3. Microphone
  4. Analog input

 

20. (TCO 6) Which of the following is an advantage of networking a printer? 

  1. Faster printing
  2. Less problem for the users because the printer is closer
  3. Reduced costs
  4. Less technical support experience required

 

21. (TCO 6) Which of the following technologies is used in modern flat-panel color monitors?

  1. Component/RGB
  2. Multiscanning
  3. DLP
  4. Digital

 

Question 22.22. (TCO 7) The function of the router is found at which level in the OSI model? 

  1. Transport
  2. Data link
  3. Network
  4. Session

 

23. (TCO 7) A business is located in two buildings in the same town. The accounting computers are connected to each other in the same office space; however, management is located in another building. Management can access the data on the accounting side through a connection installed between the two buildings. What type of network does this exemplify? 

  1. MAN
  2. WON
  3. SAN
  4. PAN

 

24. (TCO 7) What type of fiber optic cable enables only one light signal to be sent along the cable?

  1. Mono-filament
  2. Single-mode
  3. Multimode
  4. Single line

 

25. (TCO 7) UTP cable that supports Gigabit Ethernet is 

  1. CAT 5.
  2. CAT 6.
  3. single-mode fiber.
  4. multimode fiber.

 

26. (TCO 7) How many nonoverlapping frequencies does an 802.11b or g wireless network have? 

  1. Two
  2. Three
  3. Five
  4. Six

 

27. (TCO 8) Which of the following viruses pretends to be a normal application? 

  1. Boot sector
  2. Trojan horse
  3.  Worm
  4.  Stealth

 

28. (TCO 8) To protect data so they cannot be easily read, what technology is used? 

  1. Authentication
  2. Encryption
  3. Authorization
  4. Firewalling

 

29. (TCO 9) Which statement is true when comparing a laptop component with a desktop component? 

  1. Laptop processors are typically not as fast as desktop processors.
  2. Laptop 802.11 wireless has a shorter distance range than a desktop computer’s 802.11 wireless capability.
  3. Laptop memory is typically slower than desktop memory.
  4. Laptop power supplies are typically proprietary, whereas desktop power supplies are not.

 

30. (TCO 10) Of the items shown, which one would be the most critical when specifying components for a thin client PC? 

  1. Extended amount of disk storage
  2. Multiple ODDs
  3. Multiple processors
  4. Minimum OS requirements

 

31. (TCO 10) What is the last and most important step in resolving a computer problem? 

  1. Test the solution.
  2. Divide and conquer.
  3. Document findings, actions, and outcomes
  4. Reboot.

 

32. (TCO 11) Who is responsible for ensuring that a newly deployed computer has an antivirus application installed and configured as well as educating the customer about what to do if the computer contracts a virus? 

  1. The user
  2. The user's boss
  3. The company helpdesk
  4. The technician

 

33. (TCO 11) Which scenario is one that shows a positive attitude? 

  1. A technician returns a borrowed disc to a team member after having the disc more than 6 months.
  2. A technician leaves documentation for a newly installed optical drive with the customer even though the customer treated the technician poorly during the installation.
  3. A technician eagerly helps reorganize a wiring closet for the company.
  4. A technician smiles when an angry customer is taking out her computer problems on the technician.


Part 2

Question 1.1. (TCO 2) Match the term to the definition.

Potential Matches:

1 : Primarily used in laptops

2 : A 64-bit standard

3 : The oldest expansion slot type

4 : Has x1, x2, x4, x8, and x16 slots

    Answer

     : ISA

     : ExpressCard

     : PCI

     : PCIe

 

Question 2.2. (TCO 2) List three tasks commonly performed during preventive maintenance. 

Question 3.3. (TCO 2) Using good grammar (complete sentences), describe a drawback to using an infrared wireless keyboard. Now, describe a benefit.

Question 4.4. (TCO 7) Using good grammar, describe two benefits of using a layered model approach to networking. 

Question 5.5. (TCO 4) List two methods of accessing a command prompt when Windows 7 is operational. 

Question 6.6. (TCO 7) Using good grammar, name, describe, and contrast two major types of wireless antenna classification.

Reference no: EM13823755

Questions Cloud

Write compare paper on online classes vs traditional classes : Write a compare and contrast paper on online classes vs traditional classes. I prefer 5 paragraphs including thesis and conclusion.
Still completely answer the requirements : Write an autobiography in complete sentences with proper grammar and spelling. Following the structure provided below, your autobiography should contain 3 paragraphs (minimum of 5-7 sentences each). This assignment needs to be concise but still compl..
Relationship between anxiety for an examine : A student wants to examine the relationship between anxiety for an examine and the number of hours studied. The data is as follows:
How you will use foundational concepts of differentiated : how you will use foundational concepts of differentiated instruction
Which scenario is one that shows a positive attitude : List three tasks commonly performed during preventive maintenance. Using good grammar (complete sentences), describe a drawback to using an infrared wireless keyboard. Now, describe a benefit. Using good grammar, describe two benefits of using a laye..
How you represent social justice issues in your curriculum : How will you represent social justice issues in your curriculum? What "ground rules" do you think you will need in order to guard against an oppressive atmosphere in your classroom?
Complete the training plan task : Complete the Training Plan task as described in the Email from Traci on the Atwood and Allen Consulting page.Work together again. Like last time, I'll need you to select, as a group, one client to work with. You'll need to check my communication with..
The setting for ethan frome is : The setting for Ethan Frome is
The routine accounting of the factories : Though much of your efforts will be in the routine accounting of the factories' operations, you will also be involved with departments where large capital expenditures are made. In the past, the firm has not seen the expected returns from a new inves..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Develop a two-page brief on email or phishing scams

Develop a two-page brief on email or phishing scams reported within the past six months. Indicate who they were directed to, who might be behind these attacks and why. Also address any similarities/differences between similar previous attacks.

  What is primary security risk users acknowledge using macros

Write a 200- to 300-word response that answers the following question: Based on the article by Lenning (2005), what is a primary security risk that users should acknowledge when using macros?

  A current business problem or area for improvement

A current business problem or area for improvement.

  Analyze the class performances

Design a data warehouse for a university's gradebook data to analyze the class performances. Suppose the data warehouse  consisting of the following dimensions: department, semester, course, student, instructor, and gradebook; and a set of measures y..

  Show using a state diagram the maca protocol

Show using a state diagram the MACA Protocol

  Preferred storage method for vsphere

For this discussion, select your preferred storage method for vSphere and explain why this is your preferred method.•Is one storage method easier to configure and support than another? If so, which one do you feel is easier? Explain what separates th..

  Describe the different parts of the cia triad

Describe the different parts of the C.I.A. triad and how each can be used to improve the overall security of an information system.

  Design the redo log groups

Discuss the thought process of DBAs as they design the redo log groups and members for a database. Analyze and comment on the different factors that will affect their decision.

  Evaluate the range of numbers

Evaluate the range of numbers that can be represented in 2's complement, 1's complement and Sign and Magnitude using the given size registers:

  Explain how the report structure and organization help

Explain how the report structure and organization could help the overall recovery efforts in a disaster, and determine whether or not you believe the organization of large plans is a key consideration for plan creators and management.

  Write a function that convert any angles outside of interval

Suppose that an array contains angles in degrees. Write a function that converts any angles outside of the interval [0,360] to an equivalent angle in that interval. For example, an angle of 380.5 degrees should be converted to 20.5 degrees.

  Different types of digital modulation schemes

How can we compare the performance of two or more different types of digital modulation schemes?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd