Section 1: Introduction Flashcards

1
Q

Which type of computer is a stationary device used at a desk?

A) Workstation
B) Server
C) Laptop
D) Tablet
E) Smartphone
F) Smart Device

A

A) Workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of computer hosts file and print sharing services?

A) Workstation
B) Server
C) Laptop
D) Tablet
E) Smartphone
F) Smart Device

A

B) Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which computer is a portable version of a workstation?

A) Workstation
B) Server
C) Laptop
D) Tablet
E) Smartphone
F) Smart Device

A

C) Laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which computer has a touchscreen interface and is portable?

A) Workstation
B) Server
C) Laptop
D) Tablet
E) Smartphone
F) Smart Device

A

D) Tablet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of computer is a mobile device with computing capabilities?

A) Workstation
B) Server
C) Laptop
D) Tablet
E) Smartphone
F) Smart Device

A

E) Smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which category includes any device capable of computing?

A) Workstation
B) Server
C) Laptop
D) Tablet
E) Smartphone
F) Smart Device

A

F) Smart Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does hardware refer to in computing?

A) Software
B) Instructions for hardware
C) Physically tangible parts of the computer
D) Storage devices

A

C) Physically tangible parts of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which component provides instructions for hardware to execute tasks?

A) Hardware
B) Operating System
C) Storage
D) Software

A

D) Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary function of storage in computing?

A) Providing instructions for hardware
B) Managing information handling
C) Storing data for future use
D) Translating OS commands for hardware

A

C) Storing data for future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which component manages the handling of information in a computer?

A) Application System
B) Operating System
C) Firmware
D) Driver

A

B) Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the term “application system” refer to in computing?

A) Physically tangible parts of the computer
B) Saving data for future use
C) Specialized software on a chip
D) Used to create, modify, and view data

A

D) Used to create, modify, and view data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What role does a driver play in computing?

A) Physically tangible parts of the computer
B) Saving data for future use
C) Provides instructions for hardware
D) Translates OS (Operating system) commands for hardware

A

D) Translates OS commands for hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is firmware in computing?

A) Physically tangible parts of the computer
B) Specialized software on a chip
C) Provides instructions for hardware
D) Translates OS commands for hardware

A

B) Specialized software on a chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does personal safety refer to in computer safety procedures?

A) Avoiding hazards
B) Preventing obstacles in walking paths
C) Methods to avoid injury during lifting
D) Preventing damage to computer parts

A

A) Avoiding hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is trip hazard avoidance defined in computer safety procedures?

A) Avoiding hazards
B) Preventing obstacles in walking paths
C) Methods to avoid injury during lifting
D) Preventing damage from static electricity

A

B) Preventing obstacles in walking paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary focus of proper lifting techniques in computer safety?

A) Avoiding hazards
B) Preventing obstacles in walking paths
C) Methods to avoid injury during lifting
D) Preventing damage to computer parts

A

C) Methods to avoid injury during lifting

17
Q

When is safety gear usage recommended in computer safety procedures?

A) Avoiding hazards
B) Preventing obstacles in walking paths
C) Methods to avoid injury during lifting
D) Protective equipment when necessary

A

D) Protective equipment when necessary

18
Q

What does component safety involve in computer safety procedures?

A) Avoiding hazards
B) Preventing obstacles in walking paths
C) Methods to avoid injury during lifting
D) Preventing damage to computer parts

A

D) Preventing damage to computer parts

19
Q

What does ESD (Electro static discharge) prevention aim to mitigate in computer safety procedures?

A) Avoiding hazards
B) Preventing obstacles in walking paths
C) Methods to avoid injury during lifting
D) Preventing damage from static electricity

A

D) Preventing damage from static electricity

20
Q

What is the primary function of an Antistatic Bag in computer safety?

A) Grounds static charge from the body
B) Prevents ESD damage during storage
C) Provides grounded workspace to prevent ESD
D) Prevents electrical accidents

A

B) Prevents ESD damage during storage

21
Q

How does an ESD Wrist Strap contribute to computer safety?

A) Grounds static charge from the body
B) Prevents ESD damage during storage
C) Provides grounded workspace to prevent ESD
D) Prevents electrical accidents

A

A) Grounds static charge from the body

22
Q

What is the purpose of an ESD Mat in computer safety procedures?

A) Grounds static charge from the body
B) Prevents ESD damage during storage
C) Provides grounded workspace to prevent ESD
D) Prevents electrical accidents

A

C) Provides grounded workspace to prevent ESD

23
Q

What does electrical safety encompass in computer safety measures?

A) Grounds static charge from the body
B) Prevents ESD damage during storage
C) Provides grounded workspace to prevent ESD
D) Practices to prevent electrical accidents

A

D) Practices to prevent electrical accidents

24
Q

What does chemical safety involve in computer safety protocols?

A) Grounds static charge from the body
B) Prevents ESD damage during storage
C) Provides grounded workspace to prevent ESD
D) Handling and disposal of hazardous materials

A

D) Handling and disposal of hazardous materials

25
Q

What is the first step in troubleshooting methodology?

A) Test the Theory
B) Establish a Plan of Action
C) Identify the Problem
D) Document the Findings

A

C) Identify the Problem

26
Q

What does the “Establish a Theory of Probable Cause” step in troubleshooting involve?

A) Testing the hypothesis
B) Developing a solution strategy
C) Recognizing the issue
D) Formulating a hypothesis

A

D) Formulating a hypothesis

27
Q

What is the purpose of “Testing the Theory” in troubleshooting?

A) Recognizing the issue
B) Confirming or refuting the hypothesis
C) Developing a solution strategy
D) Ensuring the problem is resolved

A

B) Confirming or refuting the hypothesis

28
Q

What does “Establishing a Plan of Action” involve in troubleshooting?

A) Testing the hypothesis
B) Recognizing the issue
C) Documenting the findings
D) Developing a solution strategy

A

D) Developing a solution strategy

29
Q

When should you “Verify Full System Functionality” during troubleshooting?

A) Before identifying the problem
B) After establishing a plan of action
C) Before documenting the findings
D) After developing a solution strategy

A

D) After developing a solution strategy

30
Q

What is the final step in troubleshooting methodology?

A) Testing the theory
B) Establishing a plan of action
C) Documenting the findings
D) Verifying full system functionality

A

C) Documenting the findings

31
Q

What does “flashing” typically refer to in the IT industry?

A) Updating or reprogramming firmware or BIOS
B) Rapid development and deployment of software updates
C) Enhancing hardware components like motherboards
D) Improving network security and compatibility

A

A) Updating or reprogramming firmware or BIOS.