Networking
Hardware & Storage Devices
Cables & Connectors
Green IT
Thumbs up d(^.^d)
100
Which of the following programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited?
A. Malware
B. Spyware
C. Honeypot
D. Worm
B. Spyware
100
Which of the following can be installed in an AGP slot?
A. Video card
B. RAM
C. Microprocessor
D. Modem card
A. Video card
100
Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?
A. DVI
B. S-Video
C. SVGA
D. HDMI
D. HDMI
100
Which of the following statements is true about a brownout?
A. It is the situation of voltage drop in power supply.
B. It supplies power to the devices in case of a power failure.
C. It is a brief decrease in voltage at the power source.
D. It is a device used to filter out the effects of voltage spikes and surges
A. It is the situation of voltage drop in power supply.
100
You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?
A. 128 Megabytes
B. 64 Megabytes
C. 2 Gigabytes
D. 1 Gigabyte
B. 64 Megabytes
200
Which of the following statements is true about modem?
A. It amplifies the digital signals.
B. It converts digital signals into analog signals and vice versa.
C. It reduces the noise in analog signal.
D. It converts AC current to DC current and vice versa.
B. It converts digital signals into analog signals and vice versa.
200
Which of the following devices contains no moving parts and stores data in a digital format?
A. Solid-state drive
B. Cartridge tape drive
C. Floppy disk drive
D. Hard disk drive
A. Solid-state drive
200
Which of the following types of connectors is used by 1000BASE-TX gigabit ethernet?
A. RJ-45
B. RJ-59
C. BNC
D. LC
A. RJ-45
200
Which of the following is the most common laptop battery found today?
A. NiMH
B. Lithium-Ion
C. Energizer
D. NiCad
B. Lithium-Ion
200
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
A. Man-in-the-middle attack
B. Denial-of-Service (DoS) attack
C. Buffer-overflow attack
D. Shoulder surfing attack
D. Shoulder surfing attack
300
What is the maximum data transmission speed of IEEE 802.11b wireless networks?
A. 54 Mbps
B. 600 Mbps
C. 600 Gbps
D. 11 Mbps
D. 11 Mbps
300
At what voltage does a USB host supply power to the USB bus?
A. 15 volts
B. 5 volts
C. 50 volts
D. 3 volts
B. 5 volts
300
What is the difference between the USB 2.0 and IEEE 1394 bus standards?
A. IEEE 1394 is faster than USB 2.0.
B. IEEE 1394 supports hot swapping.
C. IEEE 1394 is slower than USB 2.0.
D. USB 2.0 supports Plug and Play feature.
C. IEEE 1394 is slower than USB 2.0.
300
Which of the following is an international standard for energy efficient consumer products?
A. Energy Star rating
B. Standby mode
C. Trusted Computer System Evaluation Criteria (TCSEC)
D. Advanced Configuration and Power Interface (ACPI)
A. Energy Star rating
300
Which of the following software displays advertisements, whether or not the user has consented?
A. Trojan horse
B. Honeypot
C. Spyware
D. Adware
D. Adware
400
Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computers, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend?
A. A Firewall
B. WPA encryption
C. Mac Filtering
D. WEP encryption
C. Mac Filtering
400
Which of the following buses has a maximum data transfer rate of 2400 Mbps?
A. FireWire 800
B. eSATA
C. USB 1.1
D. USB 2.0
B. eSATA
400
What is the maximum cable length that FireWire 800 supports?
A. 2 meters
B. 2.5 meters
C. 4.5 meters
D. 8 meters
C. 4.5 meters
400
Which of the following aims to restrict certain dangerous substances commonly used in electronics and electronic equipment?
A. RoHS directive
B. IEEE standards
C. IETF standards
D. W3C standards
A. RoHS directive
400
Which of the following devices has its own BIOS?
A. Hard disk drive
B. Sound card
C. Network interface card
D. Video adapter
D. Video adapter
500
You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?
A. WEP
B. WPA
C. TKIP
D. WPA 2
D. WPA 2
500
Mark has a computer with a CD-ROM drive. He is unable to open the CD-ROM drive tray by pushing the Eject button on the front panel of the drive. What else can he do to open the tray?
A. Open the tray by holding it through pliers.
B. Insert a pin into the eject hole on the drive.
C. Push the Eject button for 2 minutes.
D. Open the CD-ROM cover.
B. Insert a pin into the eject hole on the drive.
500
Which of the following ports is also known as PS/2?
A. 6-pin Mini-DIN connector
B. 5-pin DIN connector
C. 4-pin Mini-DIN connector
D. USB connector
A. 6-pin Mini-DIN connector
500
Which of the following defines power management for various types of computers and peripherals?
A. PCIe
B. HDMI
C. ACPI
D. PCI
C. ACPI
500
Which of the following enables third-party developers to create capabilities to extend an application?
A. Plug-in
B. Virtual machine
C. Hotfix
D. JavaScript
A. Plug-in
M
e
n
u