220-901 B Flashcards
(81 cards)
- Which of the following IP addresses would a technician see if a computer running Windows is connected to a multifunction network device and is attempting to obtain an IP address automatically but is not receiving an IP address from the DHCP server?
A) 172.16.10.10
B) 192.168.0.10
C) 169.254.10.10
D) 192.168.10.10
C) 169.254.10.10
If the computer fails to obtain an IP address from a DHCP server, Windows will take over and apply an Automatic Private IP Address (APIPA). This address will be on the 169.254.0.0 network. All of the other addresses could possibly be obtained from a DHCP server. 172.16.10.10 is a Class B private IP address. 192.168.0.10 and 192.168.10.10 are Class C private IP addresses.
80 mm and 120 mm are common sizes for which type of PC component?
A) Case Fans
B) CPUs
C) Heat Sinks
D) Memory Modules
A) Case Fans
What is the maximum number of devices that can be daisy chained to USB?
A) 127
B) 63
C) 24
D) 255
A) 127
USB can handle up to 127 devices, though this number is outside the realm of normalcy for most individuals! An IEEE 1394 (FireWire) chain can have up to 63 devices. 24 is the number associated with the ATX 12 V 2.0 (and higher) power connection to a motherboard. It is also one of the amounts of pins you might find on a dot matrix printhead. 255 is a commonly used number when it comes to maximums (for example, the highest number of an octet in an IPv4 address), but it doesn’t apply to USB in this case.
An exclamation point next to a device in the Device Manager indicates which of the following?
A) A driver is not properly installed for this device
B) The Device is disabled
C) The driver is not digitally signed
D) The device driver needs to be upgraded
A) A driver is not properly installed for this device
If you see an exclamation point in the Device Manager, this indicates that the device does not have a proper driver. If the device is disabled, it will have a down arrow. If a driver was not digitally signed, the device might show up in the Unknown Devices category until it is installed properly. If a device has a working driver, then upgrading it will be up to you, but you won’t necessarily be notified that the driver needs to be upgraded.
.
Beep Codes are generated by which of the following?
A) CMOS
B) RTC
C) POST
D) Windows
C) Post
As the power-on self-test (POST) checks all the components of the computer, it may present its findings on the screen or in the form of beep codes. The complementary metal-oxide semiconductor (CMOS) stores information such as time and date and BIOS/UEFI passwords. RTC stands for real-time clock; it is the device that keeps time on the motherboard. Windows generates all kinds of error codes but not beep codes. The beep codes come from the POST, which happens before Windows boots.
A laptop you are troubleshooting will not display any video through the laptop’s screen or through external monitors. Which of the following should be replaced?
A) Inverter
B) Video Card
C) LCD
D) Drivers
B) Video Card
If the laptop can’t display on the LCD or on an external monitor, that tells you that the video card is most likely faulty. The laptop would need to be opened to replace this. In some cases, it is integrated to the motherboard, requiring an entire motherboard replacement. If the inverter fails you would still see a dim display (which can be aided by using a flashlight) and the external monitor should work fine. If the LCD fails, you would not see anything on the display, but the external monitor again would function fine. Incorrect drivers can give a variety of problems, such as unattainable maximum resolutions or a garbled screen. However, the display should show something in that case, and should work fine in Safe Mode, in which new drivers could be installed.
Which of the following indicates that a printer is network ready?
A) An Rj11
B) A usb connector
C) RJ45
D) An SCSI connector
C) RJ45
The RJ45 jack enables a connection to a twisted-pair (most likely Ethernet) network. Printers with a built-in RJ45 connector are network-ready. So are printers that are Wi-Fi enabled. RJ11 ports are used by modems and dial-up Internet connections. If a printer has this, then it is a multifunction printer acting as a fax machine. USB is the standard port for a printer. This allows it to connect to a PC or to a print server. SCSI connectors are not often found on today’s printers; regardless, they would indicate a local connection, not a network connection.
You just turned off a printer to maintenance it. Which of the following should you be careful of when removing the fuser?
A) Fuser being hot
B) Fuser being wet
C) Fuser being fragile
D) Fuser releasing toner
A) Fuser being hot
The fuser heats paper to around 400° Fahrenheit (204° Celsius). That’s like an oven. If you need to replace the fuser, let the printer sit for 10 or 15 minutes after shutting it down, and before maintenance. The fuser is not wet or fragile, and it does not contain toner—that is contained by the cartridge.
Which of the Following Connectors is used for musical equipment?
A) MIDI
B) HDMI
C) DVI
D) Display Port
A) MIDI
Musical Instrument Digital Interface: MIDI is used to create a clocking signal that all devices can synchronize to.
Which of the following tools is not used as often as a Phillips screwdriver but is sometimes used to remove screws from the outside of a computer case or from within a laptop?
A) Monkey Wrench
B) Torx Screwdriver
C) Channel Lock
D) Pliers
B) Torx Screwdriver
The Torx screwdriver (also known as a Torx wrench) is a special tool used to remove screws from the outside of a case; often, proprietary computer manufacturers use these screws. It can also be used to remove screws (albeit smaller ones) from a laptop. The standard is the size T-10 Torx screwdriver. But you might also use a T-8 and even a T-6 on laptops.
Which of the following is the primary advantage of selecting a 64-bit operating system over a 32-bit operating system?
A) The ability to use software based Data Execution Prevention (DEP)
B) The ability to use unsigned drivers
C) The ability to access more than 4gb of RAM
D) The ability to run multiple 16-bit programs in separate memory spaces
C) Access more than 4 gb of RAM
If you want to access more than 4 GB of RAM, you will need a 64-bit operating system. 32-bit OSes are limited to 4 GB of RAM, and in some cases 3.25 GB. Many computers today, especially custom computers such as virtualization systems and gaming computers, require more than 4 GB of RAM so a 64-bit operating system is the only choice. Data Execution Prevention (DEP) is a security feature in today’s operating systems; it stops a program from executing code in a forbidden area of memory. Most of today’s 32-bit or 64-bit systems offer this. Unsigned drivers are based on the operating system itself; whether that particular OS is 32-bit or 64-bit will not be a factor. You must be an administrator to allow the use of unsigned drivers. 32-bit operating systems can run older 16-bit programs, but 64-bit operating systems will have problems running 16-bit programs even in compatibility mode.
Moving you’r CPU’s speed beyond its normal operating range is called?
Overclocking
Which of the following is the most important piece of information needed to connect to a specific wireless network?
A) Channel
B) SSID
C) MAC address
D) Admin password
B) SSID
The service set identifier (SSID) is the most important piece of information required to connect to a wireless network; it is the name of the wireless network. The wireless channel number isn’t necessarily needed; the wireless access point (WAP) might auto-negotiate the channel. Also, MAC address filtering is not enabled by default, so the MAC address might not be needed. (In fact, this would be entered by the admin at the wireless access point, not from the client computer.) The administrator password is needed only if you wanted to make configuration changes to the wireless access point. For example, if you wanted to implement MAC filtering, you would have to log in to the WAP with an admin password to configure it.
Which of the following statements describes why the display on a laptop gets dimmer when the power supply from the AC outlet is disconnected?
A) Laptop cannot use full brightness when on battery power
B) Power management settings on the laptop are configured for power saving
C) To operate properly, laptop displays require an alternating current power source
D) Security settings on the laptop are configured to dim the display
B)
The power management settings on the laptop can cause the display to automatically dim when the AC adapter is unplugged. In fact, this is the default on many laptops in order to conserve battery power. These can be configured within Power Options in Windows. You can certainly set the display to full brightness when on battery power—it just isn’t recommended. Laptops can operate properly when connected to the AC power adapter or when using the battery only. The display brightness of a laptop isn’t affected by any security settings.
Which of the following statements describe advantages of using the Dynamic Host Configuration Protocol (DHCP)? (Select the two best answers.)
A) IP addresses can be managed from a central location.
B) The network speed can automatically adjust based on the type of traffic being generated.
C) The hosts file on the computer can be validated for proper entries.
D) Media access control addresses can be changed.
E) Computers can automatically get new addressing when moved to a different network segment.
A) and E)
Advantages of using DHCP include: IP addresses can be managed from a central location and computers can automatically get new addressing when moved to a different network segment (perhaps one that uses a different DHCP server). Quality of service (QoS) adjusts the network speed based on the type of traffic generated. DHCP has nothing to do with the Hosts.txt file; that file contains static entries of hostname to IP address conversions. Media access control addresses are usually not changed on a network adapter, although they can be masked. MAC filtering maintains a list of MAC addresses that are allowed to access a network, but once again, this is a different concept from DHCP.
Which of the following storage technologies is used by hard disk drives?
A. Magnetic
B. Optical
C. Impact
D. Solid-state
A.
Hard disk drives are magnetic disks. There are optical hard drives, but they are rare; optical disc drives are commonly implemented as CD, DVD, or Blu-ray drives. Impact refers to a type of printer, such as the dot matrix or the daisy wheel printer. Solid-state hard drives do not have a disk and therefore have no moving parts, are quiet, and work as fast as (if not faster than) traditional magnetic hard drives. However, they are far more expensive than the magnetic-based hard disk drive.
On which type of computer is RAM the most important?
A. Gaming PC
B. Virtualization workstation
C. AV workstation
D. HTPC
B.
RAM is more essential to the virtualization workstation than any of the other types of custom PCs listed. Virtual operating systems (virtual machines or VMs) require a lot of RAM to run, much more than any other application. Plus, a virtualization workstation will often have more than one virtual machine running, increasing its need for RAM even further. A gaming PCs biggest requirements are the CPU and the video card. Audio/video workstations require specialized audio and video cards, fast hard drives, and dual monitors. Home theater PCs (HTPCs) require an HDMI output, surround sound, a small form factor, and possibly a TV tuner.
A client brings in a printer that is giving a paper-feed error. Which of the following is the most likely cause? A. The separation pad
B. The developing rollers
C. The paper tray
D. The pickup rollers
D.
Paper-feed errors are often caused by the pickup rollers, which are in charge of feeding the paper into the printer. If a separation pad fails, it might cause more than one sheet of paper to be entered into the printer. The developing rollers transfer ink to the imaging drum. The paper tray simply holds the paper. It should not cause paper-feed errors unless the constraining tabs are too tight.
Which of the following is the default port for HTTPS?
A. Port 25
B. Port 80
C. Port 143
D. Port 443
D.
Port 443 is the default port for Hypertext Transfer Protocol Secure (HTTPS). This is the protocol used during online banking sessions, or if you go to checkout when shopping online. Port 25 is the default port for Simple Mail Transfer Protocol (SMTP). Port 80 is Hypertext Transfer Protocol (HTTP). Port 143 is the Internet Message Access Protocol (IMAP); it’s similar to Post Office Protocol Version 3 (POP3) but offers offline operation, and multiple clients can access the same mailbox.
What is the maximum distance at which a Class 2 Bluetooth device can receive signals from a Bluetooth access point?
A. 100 meters
B. 10 meters
C. 5 meters
D. 1 meter
B.
Class 2 Bluetooth devices have a maximum range of approximately 10 meters. Class 2 devices (such as, for example, Bluetooth headsets) are the most common. Class 1 has a 100-meter range, and Class 3’s range is approximately 1 meter. The maximum length of a standard USB 2.0 cable is 5 meters.
Which of the following wireless networking standards operates at 5 GHz only? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
A.
802.11a operates at 5 GHz only. 802.11b and g operate at 2.4 GHz. 802.11n operates at either 2.4 or 5 GHz. The IEEE 802.11 wireless standards are collectively known as 802.11x. There is no actual 802.11x standard; it was not used in order to avoid confusion. 802.11x is instead a variable that you will sometimes see that refers to two or more 802.11 technologies. 802.11ac also uses the 5 GHz frequency spectrum.
Which of the following types of RAM has a peak transfer of 12,800 MB/s?
A. DDR3-800
B. DDR2-1600
C. DDR3-1600
D. DDR2-800
C.
DDR3-1600 has a peak transfer rate of 12,800 MB/s. It runs at an I/O bus clock speed of 800 MHz and can send 1600 megatransfers per second (MT/s). It is also known as PC3-12800. To figure out the data transfer rate of DDR3 from the name “DDR3-1600,” simply multiply the 1600 by 8 (bytes) and solve for megabytes: 12,800 MB/s. To figure out the data transfer rate of DDR3 by the consumer name “PC3-12800,” just look at the number within the name and add “MB/s” to the end. To figure out the data transfer rate when given only the I/O bus clock speed (for example, 800 MHz), multiply the clock speed by 2 and then multiply that number by 8 and solve for megabytes: 800 MHz × 2 × 8 = 12,800 MB/s. DDR3-800 has a peak transfer rate of 6,400 MB/s; it is also known as PC3-6400. There is no DDR2-1600. The fastest DDR2 standard is DDR2-1066, which has a peak transfer rate of 8,533 MB/s. DDR2-800 (like DDR3-800) has a peak transfer rate of 6,400 MB/s. It is commonly sold as PC2-6400.
Which of the following types of printers uses a print head, ribbon, and tractor feed?
A. Laser
B. Impact
C. Inkjet
D. Thermal
B.
The impact printer uses a print head, ribbon, and tractor feed. An example of an impact printer is the dot matrix. Laser printers are much more complex and use more parts. Inkjet printers use a print head but use an ink cartridge instead of a ribbon and don’t use a tractor feed. Thermal printers use a print head and a special heating element.
Which of the following is a possible symptom of a failing CPU?
A. CPU is beyond the recommended voltage range.
B. Computer won’t boot.
C. BIOS reports low temperatures within the case.
D. Spyware is installed into the browser.
A.
If the CPU is running beyond the recommended voltage range for extended periods of time, it can be a sign of a failing CPU. It could also be caused by overclocking. Check in the BIOS to see if the CPU is overclocked or not. If the computer won’t boot at all, another problem might have occurred, or the CPU might have already failed. Low case temperatures are a good thing (if they aren’t below freezing!), and spyware is unrelated to this issue.