Practice Exam 1: CompTIA A+ 220-701

The 100 multiple-choice questions provided here help you to determine how prepared you are for the actual exam and which topics you need to review further. Write down your answers on a separate sheet of paper so that you can take this exam again if necessary. Compare your answers against the answer key that follows this exam.

1. Which of the following are the most common expansion busses on today’s motherboards? (Select all that apply.)

image A. PCI

image B. PCIe

image C. AMR

image D. AGP

2. Which adapter card slot has a 32-bit wide data path or “bus”?

image A. USB

image B. PCI

image C. PCIe

image D. ISA

3. While you are working at a customer site, a friend calls you on your cell phone. What should you do?

image A. Ignore the call for now.

image B. Go outside and take the call.

image C. Answer the phone as quietly as possible.

image D. Text your friend.

4. You spill an unknown chemical on your hands. What should you do?

image A. Call 911.

image B. Call the building supervisor.

image C. Consult the MSDS for the chemical.

image D. Ignore it.

5. You would normally plug speakers into what type of port?

image A. Parallel

image B. VGA

image C. 1/8-inch TRS

image D. 1/4-inch TRS

6. At the beginning of the workday, Susan informs you that her computer is not working. When you examine the computer, you notice that nothing is on the display. What should you check first?

image A. Check whether the monitor is connected to the computer.

image B. Check whether the monitor is on.

image C. Check whether the computer is plugged in.

image D. Reinstall the video driver.

7. A user complains that his NIC (network interface card) is not functioning and has no link lights. The weather has been changing drastically over the past few days, and humidity and temperature have been rising and falling every day. What could be the direct cause of this problem? Select the best answer.

image A. Thermal expansion and contraction

image B. Thermal sublimation

image C. Chip creep

image D. POST errors

8. Beep codes are generated by what?

image A. CMOS

image B. RTC

image C. POST

image D. Windows

9. How should you apply spray cleaner to a monitor?

image A. Spray the cleaner directly on the monitor screen.

image B. Spray the cleaner on the top of the monitor and wipe down.

image C. Spray evenly on the monitor.

image D. Spray the cleaner on a clean, lint-free cloth first.

10. What is the second step of the A+ troubleshooting methodology?

image A. Identify the problem.

image B. Establish a probable cause.

image C. Test the theory.

image D. Document.

11. This is the most common type of RAM architecture used by laptops.

image A. DIMM

image B. RIMM

image C. SODIMM

image D. SDRAM

12. Where are the Registry hives stored?

image A. \%systemroot%Windows

image B. \%systemroot%WindowsSystem32Config

image C. \%systemroot%System32

image D. \%systemroot%System32Config

13. Where is the system tray located in Windows XP?

image A. In System Tools

image B. In the System32 folder

image C. On the taskbar

image D. Within the Start menu

14. What is the proper order for installing Windows XP?

image A. Start installation, partition, format drive

image B. Start installation, format, partition drive

image C. Start installation, initialize, format, partition drive

15. Bob is having an issue with his display. He guesses that a problem exists with the video driver. How should he boot his Windows XP system to bypass the video driver? (Select all that apply.)

image A. Press F8, and then select Safe Mode.

image B. Press F6.

image C. Press Ctrl, and then select Safe Mode.

image D. Press F1.

16. Windows service packs are ___________.

image A. A new version of the operating system

image B. Resource Kit utilities

image C. Compilations of software updates and patches

image D. Driver updates

17. In Windows Vista, an MMC is blank by default. What would you add to the MMC?

image A. Applets

image B. Files

image C. Directories

image D. Snap-ins

18. What is the minimum amount of RAM needed to install Windows Vista?

image A. 128MB

image B. 256MB

image C. 512MB

image D. 1GB

19. This type of printer uses a toner cartridge.

image A. Ink jet

image B. Laser

image C. Dot matrix

image D. Daisy wheel

20. Which of the following indicate a network-ready printer?

image A. An RJ-11 jack

image B. A USB connector

image C. An RJ-45 jack

image D. A SCSI connector

21. Which device stores data even when the computer is off?

image A. RAM

image B. Processor

image C. Hard drive

image D. Power supply

22. If you were to connect an ATX power supply to a compatible ATX motherboard, what type of connector would you use?

image A. P8/P9

image B. P1

image C. Molex

image D. Berg

23. Which of the following connectors can you use to connect a keyboard? Select all that apply.

image A. PS2

image B. USB

image C. PCI

image D. Parallel

24. What type of RAM stick is PC3200?

image A. SDRAM

image B. RIMM

image C. DDR

image D. EEPROM

25. To which type of expansion slot would you install a x16 card?

image A. PCI

image B. PCIe

image C. AGP

image D. PCI-X

26. Where is the memory controller located in a Core 2 Duo system?

image A. On the CPU

image B. On memory

image C. Within the chipset

image D. Within the PCIe controller

27. Russ’s computer has a 60GB IDE hard drive that contains his operating system. He wants to add a second IDE hard drive to his computer. How should he configure the two drives?

image A. Russ should configure the new drive as master and set the old drive as slave.

image B. Russ should configure both drives as slaves.

image C. Russ should configure both drives as master.

image D. Russ should configure the new drive as slave and the old drive as master.

28. What is the most common output on today’s new video cards?

image A. VGA

image B. DVI

image C. HDMI

image D. Component Video

29. Which would be the fastest connection for your external hard drive?

image A. USB

image B. Parallel

image C. PS2

image D. IDE

30. Stuart wants to format his IDE hard drive in such a way so that it can accept a 300GB partition for the installation of Windows XP. What’s the best type of file system for him to choose?

image A. FAT

image B. FAT16

image C. FAT32

image D. NTFS

31. A user hands you her laptop in the hopes that you can repair it. What should you do first before making any changes?

image A. Back up the important data.

image B. Reinstall the operating system.

image C. Open the laptop and analyze the components inside.

image D. Modify the Registry.

32. You successfully modified the Registry on a customer’s PC. Now the customer’s system gets onto the Internet normally. What should you do next?

image A. Bill the customer.

image B. Move on to the next computer.

image C. Document your solution.

image D. Run Disk Defrag.

33. What part of the computer checks all your components during boot?

image A. CMOS

image B. POST

image C. BIOS

image D. EEPROM

34. You just built a PC, and when it first boots you hear some beep codes. If you don’t have the codes memorized, what are the best devices to examine first? (Select all that apply.)

image A. RAM

image B. CD-ROM

image C. Video card

image D. CPU

35. Although not used as often as a Phillips screwdriver, this tool is sometimes used to remove screws from the outside of a computer case or from within a laptop.

image A. Monkey wrench

image B. Torx wrench

image C. Channel lock

image D. Pliers

36. To move your CPU’s speed beyond its normal operating range is called _____________.

image A. Overclocking

image B. Overdriving

image C. Overpowering

image D. Overspeeding

37. Tim installs a new CPU in a computer. After a few hours, the processor starts to overheat. Which of the following might be the cause?

image A. The CPU is not locked down.

image B. The CPU is not properly seated.

image C. Thermal compound was not applied.

image D. The CPU is not compatible with the motherboard.

38. What tool should always be used when working on the inside of the computer?

image A. Cordless drill

image B. Antistatic strap

image C. Multimeter

image D. Screwdriver

39. Which password is used in the BIOS (CMOS) to prevent end users from accessing the BIOS contents?

image A. Supervisor

image B. User

image C. Administrator

image D. Local

40. On a laptop, which of these would least likely be a pointing device?

image A. Serial mouse

image B. PS/2 mouse

image C. USB mouse

image D. Touchpad

41. Ben’s laptop has two Type II expansion slots. Which of the following would not work with his laptop?

image A. One Type III PC Card and one Type I PC Card

image B. One Type II PC Card

image C. Two Type I PC Cards

image D. One Type III PC Card

42. Most laptops use what kind of hard drive interface?

image A. SCSI

image B. ATA

image C. ATAPI

image D. PCIe

43. Which key on a laptop aids in switching to an external monitor?

image A. Fn

image B. Ctrl

image C. Alt

image D. Shift

44. Which file is the boot loader in Windows XP?

image A. NTDETECT.COM

image B. Boot.ini

image C. ntldr

image D. NTOSKRNL.EXE

45. What tool enables you to create a partition in Windows Vista/XP?

image A. Disk Administrator

image B. Disk Management

image C. Computer Management

image D. Disk Cleanup

46. Which type of partition should an operating system be installed to?

image A. Primary

image B. Extended

image C. Volume

image D. Logical drive

47. What is the minimum requirement of RAM for Windows XP?

image A. 64MB

image B. 128MB

image C. 256MB

image D. 32MB

48. What should you do first before performing an upgrade to an operating system?

image A. FDISK the drive.

image B. Back up critical data.

image C. Back up the old OS.

image D. Format the drive.

49. Where can you find and manage system resources allocated to devices?

image A. In System Settings

image B. In the Performance Console

image C. In the Device Manager

image D. In the Command Prompt

50. What is the default initial size of virtual memory in Windows XP?

image A. 1.5 times RAM

image B. 3 times RAM

image C. 6 times RAM

image D. The same as the amount of RAM on the system

51. What is the boot loader file in Windows Vista called?

image A. ntldr

image B. BOOTMGR

image C. Boot.ini

image D. BCD

52. What tool enables you to find out how much memory a particular application is using?

image A. MSCONFIG

image B. Task Manager

image C. CHKDSK

image D. System Information

53. Which utility verifies the files on a disk?

image A. CHKDSK

image B. DEFRAG

image C. Disk Cleanup

image D. ATTRIB

54. How can you restart the Print Spooler service. Select all that apply.

image A. Enter net stop spooler and then net start spooler in the command line.

image B. Enter net stop print spooler and then net start print spooler in the command line.

image C. Go to Computer Management > Services and restart the Print Spooler service.

image D. Go to Computer Management > Services and Applications > Services and restart the Print Spooler service.

55. Where is the Windows Update feature located in Windows XP?

image A. Start > All Programs > Accessories

image B. Start > All Programs

image C. Start > All Programs > Control Panel

image D. Start > All Programs > Administrative Tools

56. What tool would you be using if you were setting the computer to boot with the Selective Startup feature?

image A. Task Manager

image B. Recovery Console

image C. Safe mode

image D. MSCONFIG

57. Which of the following should not be connected to a UPS?

image A. PC

image B. Monitor

image C. Laser printer

image D. Speakers

58. Which of these is not a connector you might find on a printer?

image A. RJ-45

image B. USB

image C. PCIe

image D. Centronics

59. Dan finishes installing a printer for a customer. What should he do next?

image A. Verify that the printer prints in Microsoft Word.

image B. Print a test page.

image C. Restart the spooler.

image D. Set up a separator page.

60. A client brings in a printer that is giving a paper-feed error. What is the most likely cause?

image A. The compression rollers

image B. The developing rollers

image C. The paper tray

image D. The pickup rollers

61. The IP address 192.168.1.1 uses what addressing scheme?

image A. 64-bit

image B. 32-bit

image C. 128-bit

image D. 40-bit

62. This is the most commonly used protocol suite on local area networks.

image A. DLC

image B. IPX/SPX

image C. NETBEUI

image D. TCP/IP

63. When running cable through drop ceilings, what type of cable do you need?

image A. PVC

image B. Category 5

image C. Strong cable

image D. Plenum

64. What is the maximum distance at which a Class 2 Bluetooth device can receive signals from a Bluetooth access point?

image A. 300 feet (approx. 100 meters)

image B. 30 feet (approx. 10 meters)

image C. 3 feet (approx. 1 meter)

image D. 15 feet (approx. 5 meters)

65. The wireless protocol 802.11g has a maximum data transfer rate of what?

image A. 11Mbps

image B. 600Mbps

image C. 480Mbps

image D. 54Mbps

66. This type of virus propagates itself by tunneling through the Internet and networks.

image A. Macro

image B. Phish

image C. Trojan

image D. Worm

67. What user account permissions are needed to install device drivers on Windows Vista?

image A. User

image B. Guest

image C. Administrator

image D. Power user

68. Which component of Windows Vista enables users to perform common tasks as nonadministrators, and when necessary, as administrators, without having to switch users, log off, or use Run As?

image A. USMT

image B. UAC

image C. USB

image D. VNC

69. What can you do to secure your WAP/router? (Select all that apply.)

image A. Change the default SSID name.

image B. Turn off SSID broadcasting.

image C. Enable DHCP.

image D. Disable DHCP.

70. You have been given the task of installing a new hard drive on a server for a customer. The customer will be supervising your work. What should you ask the customer first?

image A. What is the administrator password?

image B. Are there any current backups?

image C. Do you want me to shut down the server?

image D. Which version of Windows Server is this?

71. Clinton needs a more secure partition on his hard drive. Currently, the only partition on the drive (C:) is formatted as FAT32. He cannot lose the data on the drive but must have a higher level of security, so he is asking you to change the drive to NTFS. What is the proper syntax for this procedure?

image A. Change C: /FS:NTFS

image B. Change C: NTFS /FS

image C. Convert C: /FS:NTFS

image D. Convert C: NTFS /FS

72. You work in an Internet cafe. The computers there need to be accessible by anyone. What type of password should you set in the BIOS?

image A. User

image B. Administrator

image C. Supervisor

image D. Guest

73. When you connect to a website to make a purchase by credit card, you want to make sure the website is secure. You are using Internet Explorer. What are two ways you can tell whether a site is secure?

image A. Look for the padlock (in the locked position) toward the top or bottom of the screen.

image B. Look for the padlock (in the unlocked position) toward the top or bottom of the screen.

image C. Look for the protocol HTTP in the address or URL bar.

image D. Look for the protocol HTTPS in the address or URL bar.

74. Which type of software helps protect against viruses that are attached to email?

image A. Firewall software

image B. Antivirus software

image C. Windows Defender

image D. Hardware firewall

75. When is the one time you should not use an antistatic strap?

image A. When replacing a hard drive

image B. When upgrading a processor

image C. When working on a CRT

image D. When opening a power supply

76. You are running some cable from an office to a warehouse space. As you are working in the warehouse, a 55-gallon drum falls from a pallet and spills what smells like ammonia. What should you do first?

image A. Call 911.

image B. Call the building supervisor.

image C. Get out of the area.

image D. Save the computer.

77. You are working just outside a server room that is being built and you hear a loud popping sound from inside. As you enter the server room, you notice an electrician lying on the floor with an electrical cord in his hand. What should you do first?

image A. Call 911.

image B. Call the building supervisor.

image C. Pull the electrician away from the cord.

image D. Turn off the electrical power at the source.

78. While you are upgrading a customer’s server hard drives, you notice looped network cables lying all over the server room floor. What should you do?

image A. Ignore the problem.

image B. Call the building supervisor.

image C. Tell the customer about safer alternatives.

image D. Notify the administrator.

79. You and a co-worker are running network cables above the drop ceiling. The co-worker accidentally touches a live AC power line and is thrown off the ladder and onto the ground. He is dazed and can’t stand. He is no longer near the AC power line. What should you do first?

image A. Cut the power at the breaker.

image B. Move the co-worker farther down the hall.

image C. Apply CPR.

image D. Call 911.

80. What should be done with a lithium-ion battery that won’t hold a charge any longer?

image A. Throw it in the trash.

image B. Return it to the battery manufacturer.

image C. Contact the local municipality and inquire as to their disposal methods.

image D. Open the battery and remove the deposits.

81. Which of the following is not assertive communication?

image A. I know how bad it is when data is lost!

image B. Could you explain again exactly what you would like done?

image C. Do your employees always cause issues on computers like these?

image D. What can I do to help you?

82. After removing malware/spyware from a customer’s PC for the third time, what should you do?

image A. Tell him you can’t fix the system again.

image B. Do nothing; the customer pays every time.

image C. Show him how to avoid the problem.

image D. Change his user permissions.

83. Active communication includes which of the following?

image A. Filtering out unnecessary information

image B. Declaring that the customer doesn’t know what he or she is doing

image C. Clarifying the customer’s statements

image D. Mouthing off

84. A customer has a malfunctioning PC, and as you are about to begin repairing it, the customer proceeds to tell you about the problems with the server. What should you say to the customer?

image A. Wait until I finish with the PC.

image B. I’m sorry, but I don’t know how to fix servers!

image C. Is the server problem related to the PC problem?

image D. I have to call my supervisor.

85. This device can store a maximum of 1.44MB on a removable disk.

image A. Floppy drive

image B. CD-ROM

image C. ROM

image D. Compact Flash

86. If you have a flat-panel monitor, what type of technology is most likely being used? Select the best answer.

image A. LCD

image B. CRT

image C. RGB

image D. DVI

87. What is the PC equivalent of FireWire?

image A. IEEE 1284

image B. USB

image C. IEEE 1394

image D. ISA

88. A user calls and complains that he cannot get onto the Internet, although he could just minutes before. What should you say to the user?

image A. What is your IP address?

image B. Wait 10 minutes, and then try it again.

image C. Do you remember the last thing that you did?

image D. Let me get my supervisor.

89. Which of the following could cause the POST to fail?

image A. CPU

image B. Power supply

image C. CD-ROM

image D. Memory

image E. Hard drive

90. Which of these is part of step five of the CompTIA A+ troubleshooting process?

image A. Identify the problem.

image B. Document findings.

image C. Establish a new theory.

image D. Implement preventative measures.

91. Which expansion bus uses lanes to transfer data?

image A. PCI

image B. PCI-X

image C. PCIe

image D. PCIa

92. Which of the following are 64-bit CPUs? (Select all that apply.)

image A. Core 2 Duo

image B. Phenom II

image C. Pentium III

image D. Celeron

93. Which kind of socket incorporates “lands” to ensure connectivity to a CPU?

image A. PGA

image B. Chipset

image C. LGA

image D. Copper

94. What is a possible symptom of a failing CPU?

image A. CPU is beyond the recommended voltage range.

image B. Computer won’t boot.

image C. BIOS reports low temperatures within the case.

image D. Spyware is installed into the browser.

95. What is the transfer rate of DDR2-800?

image A. 6,400MB/s

image B. 8,533MB/s

image C. 5,333MB/s

image D. 800MHz

96. How should you hold RAM when installing it?

image A. By the edges

image B. By the front and back

image C. With tweezers

image D. With an IC puller

97. Which device should you use to protect against power outages?

image A. Multimeter

image B. UPS

image C. Fedex

image D. Surge protector

98. Which of the following uses a 24-pin main motherboard power connector?

image A. ATX

image B. ATX 12V 1.3

image C. ATX 12V 2.0

image D. ATX 5V 2.0

99. What is the maximum data transfer rate of SATA 1.5?

image A. 1.5Mbps

image B. 300MB/s

image C. 150MB/s

image D. 1.5GB/s

100. What does the X refer to in Compact Disc technology?

image A. 150KB/s

image B. 1.32MB/s

image C. 133MB/s

image D. 4.5MB/s

Answers at a Glance

1. A and B

2. B

3. A

4. C

5. C

6. B

7. A

8. C

9. D

10. B

11. C

12. D

13. C

14. A

15. A and C

16. C

17. D

18. C

19. B

20. C

21. C

22. B

23. A and B

24. C

25. B

26. C

27. D

28. B

29. A

30. D

31. A

32. C

33. B

34. A and C

35. B

36. A

37. C

38. B

39. A

40. A

41. A

42. B

43. A

44. C

45. B

46. A

47. A

48. B

49. C

50. A

51. B

52. B

53. A

54. A and D

55. B

56. D

57. C

58. C

59. B

60. D

61. B

62. D

63. D

64. B

65. D

66. D

67. C

68. B

69. A, B, and D

70. B

71. C

72. C

73. A and D

74. B

75. C

76. C

77. D

78. C

79. D

80. C

81. C

82. C

83. C

84. C

85. A

86. A

87. C

88. C

89. A and D

90. D

91. C

92. A and B

93. C

94. A

95. A

96. A

97. B

98. C

99. C

100. A

Answers with Explanations

1. A and B. Peripheral Component Interconnect (PCI) and PCI Express (PCIe) are the most common expansion busses on today’s motherboards. Audio Modem Riser (AMR) was phased out years ago, and Accelerated Graphics Port (AGP) has been succeeded by PCIe x16 expansion bus slots, although you will still see some AGP devices in the field. See the section titled “Motherboard Components and Form Factors” in Chapter 2, “Motherboards,” for more information.

2. B. Standard PCI has a 32-bit data path, allowing it to send 32 bits of data simultaneously across the bus. USB sends only 1 bit at a time (serially) and does not work with adapter cards. PCIe is much faster than PCI and behaves in a serial fashion. ISA is an older legacy bus architecture that sends data at 16 bits max. See the section titled “Motherboard Components and Form Factors” in Chapter 2, “Motherboards,” for more information.

3. A. While on the job site, limit phone calls to emergencies or if your employer calls you about another customer. See the section titled “Professionalism and Communication Skills” in Chapter 16, “Safety and Professionalism,” for more information.

4. C. If it is not life threatening, consult the MSDS to determine the proper first aid (if any). See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

5. C. 1/8” TRS jacks (also known as mini-jacks) are the most common for speaker connections. Parallel ports are normally used for printers or scanners. VGA is a type of video port. The larger ¼-inch TRS connections are for instrument cables or full-size stereo connections. See the section titled “The Audio Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

6. B. When troubleshooting a computer system, always look for the most likely and simplest solutions first. The fact that Susan might not have turned her monitor on when she first came in is a likely scenario. Afterward, you could check whether the computer is on, if the computer and monitor are plugged into the AC outlet, and whether the monitor is plugged into the computer. Reinstalling the video driver is much further down the list. See the section titled “The Video Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

7. A. Thermal expansion and contraction happens when humidity changes quickly. This can lead to what some technicians refer to as “chip creep” or “card creep.” Although there might have been chip creep, the direct cause of the problem was most likely thermal expansion/contraction. POST errors would not be the cause of the error but in some cases could give you diagnostic information leading to the cause. Thermal sublimation deals with a specific type of printing process and is not involved in the problem. While in the computer, you might want to check other adapter cards in the case that they were affected by this phenomenon as well. See the section titled “Networking Fundamentals” within Chapter 14, “Networking,” for more information.

8. C. As the POST checks all the components of the computer, it may present its findings on the screen or in the form of beep codes. See the section titled “The BIOS” within Chapter 2, “Motherboards,” for more information.

9. D. Never spray any cleaner directly on a display. Spray on a lint free cloth first, and then wipe the display gently. Try not to get any liquid in the cracks at the edge of the screen. See the section titled “The Video Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

10. B. The second step is to establish a theory of probable cause. You are looking for the obvious or most probable cause for the problem. See the section titled “Troubleshooting Theory” within Chapter 1, “Introduction to Troubleshooting,” for more information.

11. C. SODIMM (small outline dual in-line memory module) is the most commonly used RAM by laptops. Regular DIMMs are normally used in desktop computers, some of those types include SDRAM, DDR, and RIMMs or RDRAM. See the section titled “Installing, Configuring, and Troubleshooting Internal Laptop Components” in Chapter 11, “Laptops,” for more information.

12. D. Remember that %systemroot% is a variable. It takes the place of whatever folder contains the operating system. This will usually be Windows (for Windows Vista/XP) and Winnt (for Windows 2000). For example, if you were to run a default installation of Windows XP, the path to the Registry hives would be C:WindowsSystem32Config. See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

13. C. The system tray is the area toward the bottom-right of your screen. It contains the time, and any applications (shown as icons) currently running in memory. See the section titled “Windows User Interfaces” in Chapter 8, “Configuring Windows,” for more information.

14. A. To properly install Windows XP (and virtually any operating system), you must start the installation from your media (CD, USB, or network image) and then partition the drive so that there is, at minimum, a primary partition of at least 2GB (2048MB). Then, you format the partition and copy files. See the section titled “Installing and Upgrading Windows XP” within Chapter 7, “Installing and Upgrading Windows,” for more information.

15. A and C. When Windows XP is first starting, pressing F8 brings up the Windows Advanced Boot Options menu, which includes several options for Safe mode (among other options). Ctrl brings up a special menu that contains only the Safe mode options (not available in Windows Vista). When you enter Safe mode, the video driver is bypassed and only a simple VGA driver is loaded, allowing Bob to troubleshoot his video driver. (F5 also brings up the Windows Advanced Boot Options menu on some systems.) See the section titled “Repair Environments and Boot Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

16. C. Microsoft releases many patches for its operating system and normally bundles these bug fixes together as service packs. See the section titled “Updating Windows” in Chapter 9, “Maintaining Windows,” for more information.

17. D. The MMC (Microsoft Management Console) is a blank shell until you add snap-ins (such as Computer Management) for functionality. See the section titled “Windows User Interfaces” in Chapter 9, “Maintaining Windows,” for more information.

18. C. Windows Vista requires a minimum of 512MB of RAM for installation. Microsoft recommends 1GB of RAM. See the section titled “Installing and Upgrading Windows Vista” in Chapter 7, “Installing and Upgrading Windows,” for more information.

19. B. Laser printers use toner cartridges. Inkjet printers use ink cartridges. Dot matrix printers and Daisy Wheel printers use a ribbon. See the section titled “Printer Types and Technologies” in Chapter 13, “Printers,” for more information.

20. C. The RJ-45 jack enables a connection to a twisted-pair (most likely Ethernet) network. See the section titled “Printer Types and Technologies” in Chapter 13, “Printers,” for more information.

21. C. The hard disk drive (HDD) stores data permanently on a magnetic disk even when the computer is off. When the computer is turned off, the RAM and processor are both cleared of data. The power supply has no data storage capabilities. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices,” for more information.

22. B. P1 is the connector used to connect an ATX power supply to an ATX motherboard. The P1 connector might be 20-pin or 24-pin depending on the version of ATX. P8/P9 is an older standard used primarily with AT boards. Molex is a four-pin standard used to power such devices as hard drives. And Berg (also called mini) is commonly known as a floppy drive connector. See the section titled “Power Supplies” in Chapter 5, “Power,” for more information.

23. A and B. Keyboards can connect to PS2 or USB ports. Peripheral Component Interconnect (PCI) slots are used by adapter cards such as video cards. Parallel connections are legacy connections used by devices such as printers. See the section titled “Input/Output, Input Devices, and Peripherals” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

24. C. PC3200 is an example of Double Data Rate (DDR) RAM. SDRAM is an older, slower type of RAM (for example PC100 or PC133). RIMM is another name for RDRAM by the Rambus Corporation, which is uncommon. EEPROM is the chip that stores the BIOS on your motherboard. See the section titled “RAM Basics and Types of RAM” in Chapter 4, “RAM,” for more information.

25. B. PCI Express (PCIe) slots accept x1, x4, and x16 cards (pronounced “by sixteen”). PCI is an older expansion bus that can accept video cards but they have no particular designation like PCIe. AGP works with video cards but the cards are normally numbered as 1x, 2x, 4x, and 8x (pronounced eight x). PCI-X is used mostly in servers, for example with network adapters. See the section titled “The Video Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” and the section titled “Motherboard Components and Form Factors” in Chapter 2, “Motherboards,” for more information.

26. C. On Core 2 Duo, Quad, and Extreme systems, the memory controller is located within the chipset and is known as the Memory Controller Hub (MCH). On AMD systems and newer Intel systems, the memory controller is located “on-die” meaning on the CPU. See the section titled “Motherboard Components and Form Factors” in Chapter 2, “Motherboards,” for more information.

27. D. The operating system should be contained within the master drive. By setting the jumper to master on the old drive and setting the jumper to slave on the new drive, Russ will accomplish that. Selecting any other setting listed above might result in problems booting to the operating system. Another option is to use the cable select jumper setting that will attempt to automatically configure the new drive as a slave. Note that this can only be done if the drive is equipped with that jumper setting. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices,” for more information.

28. B. During the writing of this book DVI (Digital Visual Interface) is the most common type of video connector on new video cards. VGA was the most common for many years previous to DVI. HDMI is more common on televisions, and Component Video is the least common. See the section titled “The Video Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

29. A. USB would be the fastest connection for the external drive. Parallel external hard drives transmit data at a 10th of the speed. IDE is an internal technology (whereas EIDE would be external). To date, there are no PS2 hard drives. See the section titled “Input/Output, Input Devices, and Peripherals” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

30. D. NTFS offers partition sizes of up to 2TB (with a theoretical maximum of 256TB). FAT32 is limited in the partition sizes it can accept; this amount is 32GB during installation, and 137GB otherwise. FAT and FAT16 are essentially the same thing and are limited to 2GB and 4GB partitions. See the section titled “Files, File Systems, and Disks” in Chapter 9, “Configuring Windows,” for more information.

31. A. Back up data before making any changes to the computer. This way, if your changes affect the functionality of the system, you can always restore the data later. You should do this before making any changes to the software or OS and before opening the computer. See the section titled “Maintaining Hard Disks” in Chapter 8, “Maintaining Windows,” for more information.

32. C. Documentation is the final step in the troubleshooting process. This helps you to better understand and articulate exactly what the problem (and solution) was. If you see this problem in the future, you can consult your documentation for the solution. Plus, others on your team can do the same. In addition, it is common company policy to document all findings as part of a trouble ticket. See the sections titled “Troubleshooting Theory” and “Troubleshooting Examples” in Chapter 1, “Introduction to Troubleshooting,” for more information.

33. B. The POST (Power-On Self-Test) is part of the Basic Input Output System (BIOS). It runs a self-check of the computer system during boot and stores many of the parameters of the components within the CMOS. EEPROM is a type of ROM chip on which the BIOS might reside. BIOS is known as firmware. See the section titled “The BIOS” within Chapter 2, “Motherboards,” for more information.

34. A and C. It is common to have an unseated RAM stick or video card. These are the most common culprits of beep codes during the POST. If the CPU is not installed properly, you might not even get any beep codes at all. And the CD-ROM’s functionality has little bearing on the POST. See the section titled “Troubleshooting Examples” within Chapter 1, “Introduction to Troubleshooting,” for more information.

35. B. The Torx wrench is a special tool used to remove screws from the outside of a case; often, proprietary companies such as Compaq use these screws. It can also be used to remove screws (albeit smaller ones) from a laptop. The standard is the size T-10 Torx wrench. See the section titled “Installing, Configuring, and Troubleshooting Internal Laptop Components” in Chapter 11, “Laptops,” for more information.

36. A. Overclocking is the act of increasing your CPU’s operating speed beyond its normal rated speed. See the section titled “CPU 101” in Chapter 3, “The CPU,” for more information.

37. C. Without the thermal compound applied, the processor might overheat after a few hours. If the CPU is not locked down, or is not properly seated, the PC will simply fail to boot. If the CPU is not compatible with the motherboard, either it will not fit the socket or the PC will not boot. See the section titled “Installing and Troubleshooting CPUs” in Chapter 3, “The CPU,” for more information.

38. B. Always use an antistatic strap to avoid ESD (electrostatic discharge). Power tools and battery-operated tools such as cordless drills should be avoided. Although multimeters and screwdrivers are tools you might use, they might not always be necessary, whereas the antistatic strap should always be worn. See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

39. A. The supervisor (or system) password is used so that only the technician can get into the BIOS (CMOS). The user password is used to password protect whatever operating system is running on the computer, but it does it from the firmware level. An “administrator” password is something used in Windows, and a local password is something used in software. See the section titled “The BIOS” in Chapter 2, “Motherboards,” and the section titled “Authentication” in Chapter 15, “Security,” for more information.

40. A. Serial devices (and the port in general) are found less and less often on laptops. (They are extinct on new laptops.) As these are the slowest (and bulkiest) devices, they have given way to external USB mice and the touchpad. Even PS/2 mice are becoming increasingly rare. See the section titled “Installing, Configuring, and Troubleshooting Visible Laptop Components” in Chapter 11, “Laptops,” for more information.

41. A. There is not enough room for a Type III PC Card and a Type I PC Card. However, a single Type III PC Card will work in a laptop with two Type II PC Card slots. See the section titled “Installing, Configuring, and Troubleshooting Visible Laptop Components” in Chapter 11, “Laptops,” for more information.

42. B. Most laptops either use PATA or SATA hard drive interfaces, which are collectively known as ATA devices. See the section titled “Installing, Configuring, and Troubleshooting Internal Laptop Components” in Chapter 11, “Laptops,” for more information.

43. A. The Fn (Function) key is used for a variety of things, including toggling between the built-in LCD screen and an external monitor/TV. The Fn key is usually blue and offers a sort of “second” usage for keys on the laptop. See the section titled “Installing, Configuring, and Troubleshooting Visible Laptop Components” in Chapter 11, “Laptops,” for more information.

44. C. ntldr is the first file to be loaded from the hard drive when the computer is started, it is known as the boot loader. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

45. B. Disk Management is a tool found in Computer Management and allows for the creation, deletion, and formatting of partitions and logical drives. To view this application, right-click My Computer and select Manage. Then click the Disk Management icon. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

46. A. Primary partitions are the first partitions created on a disk. An OS should always be installed to a primary partition, but before installing the OS, the primary partition should be set to active. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

47. A. Windows XP needs only 64MB to be installed. Microsoft recommends more, but 64 is the bare minimum needed to run the system. See the section titled “Installing and Upgrading Windows XP” in Chapter 7, “Installing and Upgrading Windows,” for more information.

48. B. Upgrades can cause issues, worst of which is a loss of data. To protect against this, be sure to back up the important files before proceeding with the OS upgrade. See the section titled “Installing and Upgrading Windows Vista” in Chapter 7, “Installing and Upgrading Windows,” for more information.

49. C. System resources such as IRQ settings and input/output address ranges are located in the Device Manager. See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

50. A. By default, Windows XP (when first installed) analyzes the amount of RAM in the computer and sets the hard drive’s initial virtual memory size to 1.5 times that amount. Maximum size is set to 3 times RAM. So, for example, if a user has 1GB of RAM (1024MB), the initial virtual memory file (PAGEFILE.SYS) is 1.5GB (1536MB), and the maximum file size is 3GB (3072MB). See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

51. B. the BOOTMGR file (Boot Manager) is the boot loader file for Windows Vista. NTLDR is the boot loader for Windows XP. Boot.ini contains the menu of operating systems for Windows XP. BCD is the Windows Vista Boot Configuration Data store, which takes the place of boot.ini. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

52. B. The Task Manager enables you, via a click of the Processes tab, to view all current processes that are running and how much memory each of them uses. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

53. A. CHKDSK is the only utility that verifies files on the hard drive. DEFRAG defragments files, Disk Cleanup removes old and temporary files, and ATTRIB changes the attributes of a file. See the section titled “Command-Line Tools” in Chapter 10, “Troubleshooting Windows,” for more information.

54. A and D. In the command line, this service is simply known as Spooler. Type net stop spooler and net start spooler to restart the service. In Computer Management, the Print Spooler service is found inside the Services applet, which is inside of Services and Applications in Computer Management. See the section titled “Installing, Configuring, and Troubleshooting Printers” in Chapter 13, “Printers,” for more information.

55. B. Windows Update is simply located in Start > All Programs; it is at the top of the list before the first divider. See the section titled “Updating Windows” in Chapter 9, “Maintaining Windows,” for more information.

56. D. MSCONFIG enables you to modify the startup selection. See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

57. C. Laser printers use large amounts of electricity, which in turn could quickly drain the battery of the UPS. See the section titled “Installing, Configuring, and Troubleshooting Printers” in Chapter 13, “Printers,” for more information.

58. C. Printers might connect via RJ-45, USB, or Centronics. However, PCIe is an internal expansion bus that printers do not use. See the section titled “Installing, Configuring, and Troubleshooting Printers” in Chapter 13, “Printers,” for more information.

59. B. If the test page prints properly, it should be unnecessary to print a page in Word. Restarting the spooler is not needed if the printer has just been installed. The spooler should be running. See the section titled “Installing, Configuring, and Troubleshooting Printers” in Chapter 13, “Printers,” for more information.

60. D. Paper-feed errors are often caused by the pickup rollers, which are in charge of feeding the paper into the printer. See the section titled “Installing, Configuring, and Troubleshooting Printers” in Chapter 13, “Printers,” for more information.

61. B. There are 32 bits in a standard IPv4 address. In this case, the binary equivalent of the IP numbers would be 192 = 11000000, 168 = 10101000, 1 = 00000001, and 1 = 00000001. If you count all the binary bits up, you end up with 32 in total. Therefore, the address is a 32-bit dotted-decimal address. See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

62. D. TCP/IP (Transmission Control Protocol/Internet Protocol) is the most commonly used protocol suite on local area networks (LANs). See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

63. D. Plenum-rated cable needs to be installed wherever a sprinkler system cannot get to. This includes ceilings, walls, and plenums. The reason for this is that the PVCs in regular cable give off toxic fumes in the case of a fire. Plenum rated cable has a protective covering which burns slower and gives off less toxic fumes. See the section titled “Network Cabling and Connectors” in Chapter 14, “Networking,” for more information.

64. B. Class 2 Bluetooth devices have a maximum range of 30 feet (approximately 10 meters). Class 2 devices are the most common (for example, Bluetooth headsets). Class 1 is 30 feet (approx. 100 meters), and Class 3 is 3 feet (approx. 1 meter). The maximum length of a standard USB cable is 15 feet (approx. 5 meters). See the section titled “Installing and Configuring a SOHO Network” in Chapter 14, “Networking,” for more information.

65. D. 802.11g has a maximum DTR of 54Mbps. 802.11b runs at a maximum of 11Mbps. 802.11n draft runs at a maximum of 600Mbps (300 Mbps typical). USB 2.0 Hi-Speed runs at a maximum of 480Mbps. See the section titled “Installing and Configuring a SOHO Network” in Chapter 14, “Networking,” for more information.

66. D. Worms travel through the Internet and through LANs. Macros are viruses that attach to programs like Microsoft Word. Trojans are viruses that look like programs and phishing is an attempt to fraudulently acquire information. See the section titled “Malicious Software” in Chapter 15, “Security,” for more information.

67. C. The administrator is the only account level that can install device drivers. See the section titled “Authentication” in Chapter 15, “Security,” for more information.

68. B. With UAC (User Account Control) enabled, users perform common tasks as nonadministrators, and when necessary, as administrators, without having to switch users, log off, or use Run As. See the section titled “Authentication” in Chapter 15, “Security,” for more information.

69. A, B, and D. WAP/router devices come with a standard, default SSID name (that everyone knows). It is a good idea to change it. After PCs and laptops have been associated with the wireless network, turn off SSID broadcasting so that no one else can find your WAP. Disabling DHCP and instead using static IP addresses remove one of the types of packets that are broadcast from the WAP. See the section titled “Installing and Configuring a SOHO Network” in Chapter 14, “Networking,” for more information.

70. B. Always check whether there are backups and physically inspect and verify the backup before changing out any drives. See the section titled “File Security” in Chapter 15, “Security,” for more information.

71. C. The convert command turns a FAT32 drive into a NTFS drive without data loss, allowing for a higher level of data security. The proper syntax is convert volume /FS:NTFS. See the section titled “Command-Line Tools” in Chapter 10, “Troubleshooting Windows,” for more information.

72. C. The BIOS has several password types including: user and supervisor. The supervisor password is the password needed to actually access the BIOS. The user password is what acts as a safeguard from anyone getting into the operating system. Because these computers can be used by anyone, the user password is not necessary. However, the supervisor password is important to thwart end users from accessing the BIOS (and possibly changing important settings). Administrator is an account type in the operating system, as is guest. See the section titled “Authentication” in Chapter 15, “Security,” for more information.

73. A and D. The padlock in the locked position tells you that the website is using a secure certificate to protect your session. HTTPS (Hypertext Transfer Protocol Secure) also defines this in the Secure Sockets Layer (SSL) protocol. See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

74. B. Antivirus software (such as McAfee or Norton) updates automatically so as to protect you against the latest viruses. Firewalls protect against intrusion but not viruses. Windows Defender protects against spyware/malware. See the section titled “Malicious Software” in Chapter 15, “Security,” for more information.

75. C. When opening a CRT, there is a special procedure for discharging and working on the unit. When replacing items such as CPUs, RAM, and hard drives, always use an antistatic strap. However, you should never open a power supply (and so a trick answer). See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

76. C. If there is something that is immediately hazardous to you, you must leave the area. See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

77. D. If the electrician is being electrocuted, you do not want to touch him. Because it appears that the power is still on, turn it off at the source (if it is not near the sparking wire). This will usually be the circuit breaker, cut the power from there. Then call 911. Do not move the cord or the electrician; you could be next. See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

78. C. You need to explain to the customer that there is a safer way. See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

79. D. Because the immediate danger is gone, call 911 right away. The next call would be to the building supervisor to shut the power off. See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

80. C. Every municipality has their own way of recycling batteries. See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

81. C. Asking a customer something like this is just plain rude; this type of communication should be avoided. See the section titled “Professionalism and Communications Skills” in Chapter 16, “Safety and Professionalism,” for more information.

82. C. Teach the user how to avoid this problem. The customer will then be more likely to come back to you with other computer problems. See the section titled “Professionlism and Communications Skills” in Chapter 16, “Safety and Professionalism,” for more information.

83. C. For instance, if you are unsure exactly what the customer wants, always clarify the information or repeat it back to the customer so that everyone is on the same page. See the section titled “Professionlism and Communications Skills” in Chapter 16, “Safety and Professionalism,” for more information.

84. C. Try to understand the customer before making any judgments about the problems. Make sure it isn’t a bigger problem than you realize, before making repairs that could be futile. See the section titled “Professionlism and Communications Skills” in Chapter 16, “Safety and Professionalism,” for more information.

85. A. The floppy disk drive (FDD) stores a maximum of 1.44MB on a removable disk (1.38MB of which is actual data). CD-ROM drives use removable discs; however, the maximum they can store is much greater. The acronym ROM usually refers to a chip on a circuit board that is not removable. Compact Flash comes in varying sizes (all greater than 1.44MB) and is considered a card, not a disk. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices” for more information.

86. A. Liquid Crystal Display (LCD) is most commonly the type of technology that a flat panel monitor uses. Cathode Ray Tube (CRT) is an older type of tube technology resulting in a much bulkier monitor. RGB simply stands for red, green, blue (the three primary colors of a CRT monitor). And DVI is short for Digital Video Input, a port you would find on a video card. See the section titled “The Video Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

87. C. IEEE 1394 is the PC equivalent of FireWire. FireWire was originally developed by Apple, and although the two names are often used interchangeably, the PC standard is IEEE 1394. USB is the Universal Serial Bus, a similar standard but with a different architecture and data transfer rate. IEEE 1284 is a PC standard for printer cables. ISA is the Industry Standard Architecture, a legacy 16-bit adapter card slot. See the section titled “Input/Output, Input Devices, and Peripherals” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

88. C. Questioning the user can often lead to what caused the issue. Of course, you do not want to accuse the user of anything; instead, just ask what the user did for his or her last steps taken on the computer. See the section titled “Professionlism and Communications Skills” in Chapter 16, “Safety and Professionalism,” for more information.

89. A and D. The CPU and memory need to be installed properly for the POST to run (and to pass). The hard drive and CD-ROM might or might not be installed properly, but they are not necessary for the POST to complete. If the power supply is defective, the system will simply not boot and will not even get to the POST. See the section titled “The BIOS” in Chapter 2, “Motherboards,” for more information.

90. D. Implement preventative measures as part of step 5 to ensure that the problem will not happen again. See the section titled “Troubleshooting Theory” in Chapter 1, “Introduction to Troubleshooting,” for more information.

91. C. PCIe (PCI Express) uses serial lanes to send and receive data. PCI and PCI-X are parallel technologies, and PCIa is not a known technology. See the section titled “Motherboard Components and Form Factors” in Chapter 2, “Motherboards,” for more information.

92. A and B. Intel’s Core 2 Duo and AMD’s Phenom II are both 64-bit CPUs. The Pentium III and Celeron are 32-bit CPUs. See the section titled “CPU 101” in Chapter 3, “The CPU,” for more information.

93. C. LGA (Land Grid Array) is the type of socket that uses “lands” to connect the socket to the CPU. PGA sockets have pinholes that make for connectivity to the CPU’s copper pins. See the section titled “CPU 101” in Chapter 3, “The CPU,” for more information.

94. A. If the CPU is running beyond the recommended voltage range for extended periods of time, it can be a sign of a failing CPU. If the computer won’t boot at all, another problem might have occurred, or the CPU might have already failed. Low case temperatures are a good thing (if they aren’t below freezing!) and spyware is unrelated. See the section titled “Installing and Troubleshooting CPUs” in Chapter 3, “The CPU,” for more information.

95. A. DDR2-800 can transfer 6,400MB/s. 800MHz is the doubled clock rate or speed. It has an original clock speed of 400MHz, but doubles that output, so it is often referred to as 800MHz. See the section titled “RAM Basics and Types of RAM” in Chapter 4, “RAM,” for more information.

96. A. Hold RAM by the edges to avoid contact with the pins, chips, and circuitry. See the section titled “Installing and Troubleshooting RAM” in Chapter 4, “RAM,” for more information.

97. B. The UPS is the only item listed that protects the computer from power outages like blackouts and brownouts. See the section titled “Power Devices” in Chapter 5, “Power,” for more information.

98. C. ATX 12V 2.0 combined the 20-pin and 4-pin connectors used in ATX 12V 1.3 into one 24-pin connector. See the section titled “Power Supplies” in Chapter 5, “Power,” for more information.

99. C. SATA 1.5 can transfer a maximum of 150MB/s, though most devices won’t ever attain that maximum. The standard specifies the transmission of 1.5Gbps. (Notice the lowercase “b” for bits.) 300 MB/s is the data transfer rate of SATA 3.0. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices,” for more information.

100. A. The X in CD technology is equal to 150 KB/s. A 1X drive can read or write 150KB/s, a 2X drive can read or write 300KB/s, and so on. 1.32 MB/s is the 1X speed of a DVD. 133MB/s is the maximum data transfer rate of an Ultra ATA-7 connection, and 4.5MB/s is the 1X speed of a Blu-Ray disc. See the section titled “Optical Storage Media” in Chapter 6, “Storage Devices,” for more information.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset