Home > Articles > Certification > CompTIA

This chapter is from the book

Answers and Explanations

  1. Answer: C. If the computer fails to obtain an IP address from a DHCP server, Windows will take over and apply an Automatic Private IP Address (APIPA). This address will be on the 169.254.0.0 network. All of the other addresses could possibly be obtained from a DHCP server. 172.16.10.10 is a Class B private IP. 192.168.0.10 and 192.168.10.10 are Class C private IP addresses.
  2. Answer: A. Case fans are measured in mm (millimeters). 80mm and especially 120mm are very common. They are used to exhaust heat out of the case. This aids in keeping the CPU and other devices cool. CPUs commonly use a heat sink/fan combination. However, the two are often connected together. Memory modules don’t use fans, but they can be equipped (or purchased) with heat sinks of their own.
  3. Answer: B. An IEEE 1394 (FireWire) chain can have up to 63 devices. USB can handle up to 127 devices, though both of these numbers are outside the realm of normalcy for most individuals! 15 is the maximum amount of devices that can be on a SCSI chain. Remember this doesn’t count the SCSI card. 255 is a commonly used number when it comes to maximums but doesn’t apply to IEEE 1394.
  4. Answer: A. If you see a yellow exclamation point in the Device Manager, this indicates that the device does not have a proper driver. If the device is disabled, it will have either a down arrow (for Windows 7/Vista) or a red x (Windows XP). If a driver was not digitally signed, the device might show up in the Unknown devices category until it is installed properly. If a device has a working driver, then upgrading it will be up to you, but you won’t necessarily be notified of this.
  5. Answer: C. As the POST checks all the components of the computer, it may present its findings on the screen or in the form of beep codes. The complementary metal-oxide semiconductor (CMOS) stores information such as time and date and BIOS passwords. RTC stands for real-time clock; it is the device that keeps time on the motherboard. Windows generates all kinds of error codes but not beep codes. The beep codes come from the POST, which happens before Windows boots.
  6. Answer: D. Never spray any cleaner directly on a display. Spray on a lint-free cloth first, and then wipe the display gently. Try not to get any liquid in the cracks at the edge of the screen. A lot of companies sell products that are half isopropyl alcohol and half water. You could also make this yourself. Again, remember to put the solution on a lint-free cloth first.
  7. Answer: D. PCI Express (PCIe) offers the highest video performance. A PCIe x16 version 3 card can transfer a maximum of 16 GB/s. Compare this to the closest competitor listed: AGP, which can do 2,133 MB/s, about 1/8 of PCIe. SCSI is used for hard drives and scanners among other things, but not for video. PCI is the predecessor to PCIe but is rarely used for video anymore; it is limited to 133 or 266 MB/s depending on the speed. Either way, it doesn’t hold a candle to PCIe.
  8. Answer: C. The RJ45 jack enables a connection to a twisted-pair (most likely Ethernet) network. Printers with a built-in RJ45 connector are network ready. RJ11 ports are used by modems and dial-up Internet connections. If a printer has this, then it is a multifunction printer acting as a fax machine. USB is the standard port for a printer. This allows it to connect to a PC or to a print server. SCSI connectors are not often found on today’s printers; regardless, they would indicate a local connection, not a network connection.
  9. Answer: A. The fuser heats paper to around 400° Fahrenheit (204° Celsius). That’s like an oven. If you need to replace the fuser, let the printer sit for 10 or 15 minutes after shutting it down, and before maintenance. The fuser is not wet or fragile, and it does not contain toner—that is contained by the cartridge.
  10. Answer: C. On Core 2 Duo, Quad, and Extreme systems, the memory controller is located within the chipset and is known as the Memory Controller Hub (MCH) by Intel, but it is also referred to as the northbridge. On AMD systems and newer Intel systems such as the Core i5 or i7, the memory controller is located “on-die,” meaning within the CPU.
  11. Answer: A. The Musical Instrument Digital Interface (MIDI) connector is used for musical equipment such as keyboards, synthesizers, and sequencers. MIDI is used to create a clocking signal that all devices can synchronize to. The other three connectors, HDMI, DVI, and DisplayPort, are all video connectors.
  12. Answer: B. The Torx wrench is a special tool used to remove screws from the outside of a case; often, proprietary computer manufacturers will use these screws. It can also be used to remove screws (albeit smaller ones) from a laptop. The standard is the size T-10 Torx wrench. But you might also use a T-8 and even a T-6 on laptops.
  13. Answer: C. If you want to access more than 4 GB of RAM, you will need a 64-bit operating system. 32-bit OSes are limited to 4 GB of RAM, and in some cases 3.25 GB. Many computers today, especially custom computers such as virtualization systems and gaming computers, require more than 4 GB of RAM so a 64-bit operating system is the only choice. Data Execution Prevention (DEP) is a security feature in today’s operating systems; it stops a program from executing code in a forbidden area of memory. Most of today’s 32-bit or 64-bit systems offer this. Unsigned drivers are based on the operating system itself; whether that particular OS is 32-bit or 64-bit will not be a factor. You must be an administrator to allow the use of unsigned drivers. 32-bit operating systems can run older 16-bit programs, but 64-bit operating systems will have problems running 16-bit programs even in compatibility mode.
  14. Answer: A. Overclocking is the act of increasing your CPU’s operating speed beyond its normal rated speed. The rest of the terms are not used in relation to this concept.
  15. Answer: B. COM1 (communications port 1) is a serial port; it sends or receives one bit at a time, up to 115,200 Kbps. A typical example is the 9-pin male DE9 port (inaccurately referred to also as the DB9). DVI is a video port. LPT1 is an older parallel printing port. SCSI is a parallel port used by hard drives and tape drives. The older COM port is used by dial-up modems. It is also used to program devices such as handheld terminals. You don’t see COM ports on PCs today, but you might still see them as an add-on card in the field, used to access networks as an administrator failsafe in case other Internet connectivity methods fail. In rural areas, people may still use internal or external dial-up modems. The external modem is what connects to the COM1 serial port. Though USB is also technically a “serial” port, most technicians and professionals refer to the serial port as COM1 or COM2.
  16. Answer: C. The SSID is the most important piece of information required to connect to a wireless network; it is the name of the wireless network. The wireless channel number isn’t necessarily needed; the wireless access point (WAP) might auto-negotiate the channel. Also, MAC address filtering is not enabled by default, so the MAC address might not be needed. (In fact, this would be entered by the admin at the wireless access point, not from the client computer.) The administrator password is needed only if you wanted to make configuration changes to the wireless access point. For example, if you wanted to implement MAC filtering, you would have to log in to the WAP with an admin password to configure it.
  17. Answer: A. The supervisor (or system) password is used so that only the technician can get into the BIOS (CMOS). The user password is used to password-protect whatever operating system is running on the computer, but it does it from the firmware level. An “administrator” password is something used in Windows or on a networking device, and a local password is something used in software.
  18. Answer: B. The power management settings on the laptop can cause the display to automatically dim when the AC adapter is unplugged. In fact, this is the default on many laptops in order to conserve battery power. These can be configured within Power Options in Windows. You can certainly set the display to full brightness when on battery power—it just isn’t recommended. Laptops can operate properly when connected to the AC power adapter or when using the battery only. The display brightness of a laptop isn’t affected by any security settings.
  19. Answer: B. Always use an antistatic strap to avoid ESD (electrostatic discharge). Power tools and battery-operated tools such as cordless drills should be avoided. Although multimeters and screwdrivers are tools you might use, they might not always be necessary, whereas the antistatic strap should always be worn.
  20. Answers: A and E. Advantages of using DHCP include: IP addresses can be managed from a central location and computers can automatically get new addressing when moved to a different network segment (perhaps one that uses a different DHCP server). Quality of Service (QoS) adjusts the network speed based on the type of traffic generated. DHCP has nothing to do with the Hosts.txt file; that file contains static entries of hostname to IP address conversions. Media Access Control addresses are usually not changed on a network adapter, although they can be masked. MAC filtering maintains a list of MAC addresses that are allowed to access a network, but once again, this is a different concept from DHCP.
  21. Answer: D. The touchpad is the most likely of the listed devices. Serial devices (and the port in general) are found less and less often on laptops. (They are extinct on new laptops.) PS/2 mice are also rare. Both of these have given way to the touchpad and external USB mice.
  22. Answer: A. The traditional hard drive is still the magnetic disk. This is because it is well known and has a low cost per MB of storage space. There are optical hard drives, but they are rare; optical drives are commonly implemented as CD, DVD, or Blu-ray drives. Impact refers to a type of printer, such as the dot matrix or the daisy wheel printer. Solid-state hard drives are gaining in popularity because they have no moving parts, are quiet, and work as fast as (if not faster than) traditional magnetic hard drives. However, they are far more expensive than the traditional drive, which slows their general acceptance.
  23. Answer: B. RAM is more essential to the virtualization workstation than any of the other types of custom PCs listed. Virtual operating systems (virtual machines or VMs) require a lot of RAM to run, much more than any other application. Plus, a virtualization workstation will often have more than one virtual machine running, increasing its need for RAM even further. Gaming PCs biggest requirements are CPU and video card. Audio/video workstations require specialized audio and video cards, fast hard drives, and dual monitors. Home theater PCs (HTPCs) require an HDMI output, surround sound, a small form factor, and possibly a TV tuner.
  24. Answer: D. Paper-feed errors are often caused by the pickup rollers, which are in charge of feeding the paper into the printer. If a separation tab fails, it might cause more than one sheet of paper to be entered into the printer. The developing rollers transfer ink to the imaging drum. The paper tray simply holds the paper. It should not cause paper-feed errors unless the constraining tabs are too tight.
  25. Answer: D. Port 443 is the default port for Hypertext Transfer Protocol Secure (HTTPS). This is the protocol used during online banking sessions, or if you go to checkout when shopping online. Port 25 is the default port for SMTP. Port 80 is HTTP. Port 143 is the Internet Message Access Protocol (IMAP); it’s similar to POP3 but offers offline operation, and multiple clients can access the same mailbox.
  26. Answer: B. Class 2 Bluetooth devices have a maximum range of approximately 10 meters. Class 2 devices are the most common (for example, Bluetooth headsets). Class 1 has a 100-meter range, and Class 3’s range is approximately 1 meter. The maximum length of a standard USB 2.0 cable is 5 meters.
  27. Answer: B. The VGA connector uses a D shell (also referred to as D-sub) 15-pin connector. It has three rows of five pins. The 8P8C is the technically correct name for an RJ45 networking plug. microATX is a motherboard form factor commonly used in smaller PCs and HTPCs. RG-6 is the connector used for cable TV and cable Internet connections.
  28. Answer: D. Because the immediate danger is gone, call 911 right away. Then apply first aid and CPR as necessary. The next step would be to shut the power off at the electrical panel or call the building supervisor to have the power shut off.
  29. Answer: A. You should first ask if anything has changed since the optical drive worked properly. Don’t blame the user by asking what “you” modified; it implies that you think the user caused the issue. Always ask if anything has changed first before any other questions. Try not to accuse a user of accessing inappropriate websites because this could be considered inflammatory and harassment. Think like a robot with the single purpose of fixing the problem, but act like a professional and courteous human being!
  30. Answer: A. The floppy disk drive (FDD) stores a maximum of 1.44 MB on a removable disk (1.38 MB of which is actual data). CD-ROM drives use removable discs; however, the maximum they can store is much greater. Note that magnetic disks are spelled with a k, while optical discs are spelled with a c. The acronym ROM usually refers to a chip on a circuit board that is not removable. Compact Flash comes in varying sizes (all greater than 1.44 MB) and is considered a card, not a disk.
  31. Answer: A. 802.11a operates at 5 GHz only. 802.11b and g operate at 2.4 GHz. 802.11n operates at either 2.4 or 5 GHz. The IEEE 802.11 wireless standards are collectively known as 802.11x. There is no actual 802.11x standard; it was not used in order to avoid confusion. 802.11x is instead a variable that you will sometimes see that refers to two or more 802.11 technologies.
  32. Answer: C. IEEE 1394 is the PC equivalent of FireWire. FireWire was originally developed by Apple, and although the two names are often used interchangeably, the PC standard is IEEE 1394. USB is the Universal Serial Bus, a similar standard but with a different architecture and data transfer rate. IEEE 1284 is an older parallel PC standard for printer cables and connections. ISA is the Industry Standard Architecture, a legacy 16-bit adapter card slot.
  33. Answer: C. DDR3-1600 has a peak transfer rate of 12,800 MB/s. It runs at an I/O bus clock speed of 800 MHz and can send 1600 megatransfers per second (MT/s). It is also known as PC3-12800. To figure out the data transfer rate of DDR3 from the name “DDR3-1600”, simply multiply the 1600 by 8 (bytes) and solve for megabytes: 12,800 MB/s. To figure out the data transfer rate of DDR3 by the consumer name “PC3-12800”, just look at the number within the name and add “MB/s” to the end. To figure out the data transfer rate when given only the I/O bus clock speed (for example, 800 MHz), multiply the clock speed by 2 and then multiply that number by 8 and solve for megabytes: 800 MHz×2×8 = 12,800 MB/s.

    DDR3-800 has a peak transfer rate of 6,400 MB/s; it is also known as PC3-6400. There is no DDR2-1600. The fastest DDR2 standard is DDR2-1066, which has a peak transfer rate of 8,533 MB/s. DDR2-800 (like DDR3-800) has a peak transfer rate of 6,400 MB/s. It is commonly sold as PC2-6400.

  34. Answer: B. The impact printer uses a print head, ribbon, and tractor feed. An example of an impact printer is the dot matrix. Laser printers are much more complex and use more parts. Inkjet printers use a print head but use an ink cartridge instead of a ribbon and don’t use a tractor feed. Thermal printers use a print head and a special heating element.
  35. Answer: A. If the CPU is running beyond the recommended voltage range for extended periods of time, it can be a sign of a failing CPU. It could also be caused by over-clocking. Check in the BIOS to see if the CPU is overclocked or not. If the computer won’t boot at all, another problem might have occurred, or the CPU might have already failed. Low case temperatures are a good thing (if they aren’t below freezing!), and spyware is unrelated to this issue.
  36. Answer: C. Fiber-optic cable is the only answer listed that is not affected by electromagnetic interference (EMI). This is because it does not use copper wire or electricity, but instead uses glass or plastic fibers and light. Any copper cable will be susceptible to EMI to a certain degree. Regular UTP cable such as Cat 5e or Cat 6 will be very susceptible. Coaxial slightly less, and shielded twisted-pair (STP) even less than that. STP is difficult to install and must be grounded; because of these things, it is found less commonly in networks. To truly protect from EMI, fiber-optic is the best way to go.
  37. Answer: D. Compressed air is safe. However, you might want to do this outside and vacuum up the left over residue. Never disassemble the power supply. It is called a field replaceable unit (FRU) for good reason. Do not stick a vacuum cleaner inside a computer; it could damage the components. Do not spray any kind of solutions inside the computer; this will damage the components.
  38. Answer: A. Setting an admin password in the BIOS prevents a user from rearranging the boot order. The idea behind this is to stop a person from attempting to boot off of an optical disc or USB flash drive. As an administrator, you should change the BIOS boot order to hard drive first. Then apply an administrative (also known as supervisory) password. That’ll stop ‘em right in their tracks! The admin password does not prevent any of the other listed answers. To prevent a user from reading e-mail, you would have to remove e-mail applications (such as Outlook) and probably take away the browser, too! (Doesn’t sound feasible.) To prevent a virus from infecting the MBR, you could turn on boot sector scanning in the BIOS (if the motherboard supports it). To prevent an attacker from opening the case, use a case lock. To find out if someone attempted to get into the computer itself, turn on the chassis intrusion alert in the BIOS.
  39. Answer: D. The external power supply of the laptop converts AC to DC for the system to use and for charging the battery. It is known as the power adapter, and it needs to run at a very specific voltage. In fact, different make and model power adapters will usually not work with different laptops, even if the voltages are only slightly different. The adapter does not store power; that is the responsibility of the laptop battery. It is also accomplished by a UPS, though you probably wouldn’t lug one of those around with your laptop while travelling.
  40. Answer: B. The plain-old telephone service (POTS) line has two twisted pairs of copper wire, for a total of four wires. It is used for telephone landlines. Unshielded twisted pair (UTP) has four pairs, eight wires total. Fiber-optic cable has a single glass or plastic core that sends light. Coaxial has a single core of copper.
  41. Answer: A. High-quality dot matrix printheads can come in 9, 18, or 24 pins, with 24 being the highest quality.
  42. Answer: B. The BTX form factor provides the most room for effective cooling in a computer case. BTX was designed as a replacement for ATX; it was expected to help cool devices that used a lot of power and created a lot of heat. However, CPUs, RAM, and video cards have new designs that allow them to use less voltage and therefore create less heat, making BTX less necessary. Still, BTX combines a large cooling area with smart design and positioning of devices that allows for more cooling than is possible with ATX and its derivatives, or the various ITX versions.
  43. Answer: D. Some power supplies have selectors for the United States and Europe (115 and 230 volts). However, your co-worker might need an adapter, too; otherwise, the plug may not fit. Newer power supplies might auto-sense the voltage. If the power supply doesn’t have one of those red switches, check the documentation to see if it can switch the voltage automatically. Line conditioners simply clean the power for a specific voltage. If your circuit has dirty power (for example, it is fluctuating between 113 and 130 volts), a line conditioner will keep it steady at 120 volts.
  44. Answer: C. LCD contrast ratio is the brightness of the brightest color (measured as white) compared to the darkest color (measured as black). Static contrast ratio measurements are static; this done as a test with a checkerboard pattern. But there is also the dynamic contrast ratio, a newer technology in LCD displays that adjusts dynamically during darker scenes in an attempt to give better black levels. It usually has a higher ratio, but it should be noted that there isn’t any real uniform standard for measuring contrast ratio.
  45. Answer: B. Most antistatic straps come with a 1 mega ohm resistor, which can protect against surges. However, the best way to avoid a surge is to 1) make sure the computer is unplugged before working on it; and 2) don’t touch any components that hold a charge. This means don’t open power supplies or CRT monitors, and don’t touch capacitors on any circuit boards such as motherboards. And, of course, stay away from any other electrical devices when working on computers.
  46. Answer: D. High-Definition Multimedia Interface (HDMI), as the word multimedia implies, can transmit video and audio signals. VGA, RGB, and DVI are video standards only, with DVI being the newest and most commonly used on PC monitors.
  47. Answer: C. Whenever you’re working in someone’s home, make sure that there is an adult available. It is not your responsibility to watch over children, nor should any company agree to have its consultants do this. If the person insists on leaving, and you can pack up your things before he goes, do so, and then call your supervisor to inform her of the event.
  48. Answer: D. A router can limit network broadcasts through segmenting and programmed routing of data. This is part of a router’s job when connecting two or more networks. It is also used with different media. For example, you might have a LAN that uses twisted-pair cable, but the router connects to the Internet via a fiber-optic connection. That one router will have ports for both types of connections. A switch connects multiple computers together on the LAN; it does not limit IP-based network broadcasts. However, the switch does not segment by IP address—it communicates with computers and segments the network, via MAC addresses. Also, the switch will normally use one type of media: twisted pair, connecting to RJ45 ports. However, it is possible that the switch might connect to another switch by way of a specialized fiber-optic connector. A wireless access point (WAP) connects the computers on the wireless LAN (WLAN). It often has only one connection, a single RJ45 port. A hardware-based firewall will usually connect to the network via RJ45; regardless, it will have only one or only a few connections. It doesn’t deal with routing, or broadcasts; instead it prevents intrusion to a network.
  49. Answer: D. The CPU could overheat if thermal compound has not been applied correctly (common) or if it is not seated properly (rare). As part of the boot process, power needs to verify the CPU. If the wrong voltage is running to the CPU, the system won’t even boot. If an incorrect CPU has been installed, the system will probably not boot, especially if the BIOS doesn’t recognize it. Finally, the CPU doesn’t use a driver; instead the BIOS recognizes it (or doesn’t, if it needs a BIOS update) and passes that information to the operating system.
  50. Answers: C and D. Molex power connectors are used by IDE drives. 15-pin power connectors are used for SATA drives. 8-pin power connectors are used by high-end PCI Express video cards. There are several types of 7-pin connectors, such as SATA data, and S-Video, but 7-pin power connections are less common. Berg is the power connector for floppy drives. Okay, we are halfway through the exam. Take a deep breath—then continue on with power! (Pun intended.)
  51. Answer: C. Of the answers listed, 172.17.58.254 is the only valid IPv4 address for a network host. A host on the network is any computer or network device that uses an IP address to communicate with other computers or devices (hosts). 172.17.58.254 is a Class B private IP address so it fits the description of a valid IPv4 address for a network host. 127.0.0.1 is the local loopback address. Every computer using TCP/IP gets this address; it is used for testing. It cannot be used to communicate with other hosts on the network. 169.254.0.0/16 means an IP address of 169.254.0.0 with a default subnet mask of 255.255.0.0, indicating the network number is 169.254. It is not a valid host IP address because it ends in 0.0. The first IP address of a network is always reserved for the network number; it can not be used by a host. Otherwise, if the address was, say, 169.254.0.1, the address would work, but because it is an APIPA address, it would be able to communicate only with other systems using APIPA addresses. 255.10.15.7 is not valid. That address is within the Class E reserved range. Normal host IP addresses’ first octet will either be between 1 and 126, or 128 and 223, but not between 224 and 255.
  52. Answer: B. When data is flowing through the activity light, it should blink or flash rapidly, in an erratic fashion. You see solid green (1000 Mbps or 100 Mbps) or yellow (10 Mbps) on the link light (if there is a separate link light). If it is unlit, the cable is not connected properly or the device is malfunctioning.
  53. Answer: C. Dynamic Random Access Memory (DRAM) is the modules (or sticks) of memory that you can install into a motherboard. SDRAM, DDR, DDR2, and DDR3 are all examples of DRAM. The complementary metal-oxide semiconductor (CMOS) is a chip that is soldered onto the motherboard that works in conjunction with the Basic Input/Output System, another chip soldered on to the motherboard. Static RAM (SRAM) is memory that is nonvolatile (as opposed to DRAM); it is also soldered to the circuit board. Read-Only Memory (ROM) is usually not serviceable. The BIOS resides on a ROM chip, more specifically an electrically erasable programmable ROM (EEP-ROM) chip.
  54. Answer: C. Turning the printer off might not be enough. It might be seriously malfunctioning, so pull the plug. Dialing 911 is not necessary unless a fire has started. Wait at least 15 minutes before opening the printer to see what caused the smoke. Printer power supplies can fail just like a PC’s power supply can. In fact, a laser printer power supply does more work because it needs to convert for high voltages in the 600 V range. If you have a maintenance contract with a printer company, and the printer is under warranty or contained in the service contract, you could call the maintenance company to fix the problem. Be ready to give a detailed account of exactly what happened. You could tell the printer that it is bad to smoke, but that would be belligerent and would probably show that you have been working too hard.
  55. Answer: D. Of the listed answers, 802.11n has the fastest data transfer rate at a maximum of 600 Mbps. However, to achieve this, you need to have the right wireless access point, configured properly, with client computers that are also compatible with the 802.11n standard. 802.11a and g have a maximum DTR of 54 Mbps. 802.11b has a maximum of 11 Mbps.
  56. Answer: D. Make sure that the customer has a path toward a solution before dismissing the issue. Do not try to fix the problem if the scope of work is outside your knowledge. Most PC technicians will not work on domain controllers because they are advanced Microsoft servers that are used in client/server networks.
  57. Answer: C. 172.31.1.1 is the only address listed that is private. It is within the Class B range of private addresses: 172.16.1.1–172.31.255.255. 11.58.254.169 is not private because it is on the Class A 11 network. The Class A private range is within the 10.0.0.0 network. 169.255.10.41 is not private either. Microsoft’s APIPA, however, uses the 169.254.0.0 network which is private. 192.169.0.1 is public because of the second octet: 169. The Class C private range is 192.168.0.0–192.168.255.255.
  58. Answer: C. Always have a positive outlook. The customer will have fewer concerns, and you will be more relaxed. If you appear to be wavering when problems occur, the customer will have less confidence in your skills (as will you). When you need to make a technical decision, be certain and decisive and implement the solution immediately.
  59. Answer: B. The IPv6 loopback address used for testing is ::1. This will determine if IPv6 is working correctly on the network card but will not generate network traffic. It exists on every computer that runs IPv6. 127.0.0.1 is the IPv4 loopback address. 192.168.0.0 is simply a private IP network number. FE80::/10 is the range of auto-assigned addresses in IPv6.
  60. Answer: C. The only statement that is correct concerning IPv6 is that it uses 128-bit addressing. This is compared to IPv4, which uses 32-bit addresses. IPv6 and IPv4 can co-habit a computer with no problems. IPv6 is not necessarily supported by all routers. Some routers still only support IPv4. IPv6 is a logical concept. The physical cable that connects to the computer has no bearing over which IP version is used.
  61. Answer: B. 60° Celsius is a typical operating temperature for CPUs such as the Core i5 or Phenom II. The operating range may be above or below that. However, 72° Celsius becomes less typical. 60° Fahrenheit is equal to 15.5° Celsius. A processor will not run that cold (but it would be pretty efficient if it did!). 72° Fahrenheit is excellent room temperature and is what you should set the room temperature for computers to run at their best.
  62. Answer: A. The impact printer technology is what you want. This strikes the ribbon, and consequently the paper with a printhead. The physical hammering action causes the carbon backing to take effect and apply text to the next layer of paper. Multipart forms such as these are commonly used for receipts. Laser printers can print to special multipart forms, but not ones with carbon backing.
  63. Answer: B. Dual channel memory combines two sticks of RAM into a bank that is 128-bit. Single channel memory is 64-bit. 256-bit is a common bit length used by the Advanced Encryption Standard (AES). 448-bit memory bus width is used by some video cards. These types of video cards have much faster RAM access than motherboards do.
  64. Answer: C. A hub broadcasts data to all network devices connected to it. Because of this inefficient method, switches are preferred. Switches send information to specific network devices based on their MAC addresses. A firewall will inspect traffic and allow or deny it access to the network. Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) can also do this, but in a more intelligent manner. A router will determine the best route for data.
  65. Answers: A and C. A receptacle tester and multimeter can be used (with caution) to test an AC outlet. A power supply (PSU) tester is used to test the main P1 power connection (and possibly other connections) of a power supply. There are various loopback plugs for testing ports on the back of a PC (for example, the RJ45 loopback plug), but these have nothing to do with testing an AC outlet.
  66. Answer: D. IEEE 1394b is capable of 800 Mbps. Newer versions of IEEE 1394b can support 3,200 Mbps, but an IEEE 1394b port on a computer will often allow only a maximum of 800 Mbps. 12 Mbps is the data transfer rate of USB 1.1 Full Speed. 400 Mbps is the speed of IEEE 1394a. 480 Mbps is the speed of USB 2.0. 5 Gbps is the speed of USB 3.0.
  67. Answer: D. You cannot install drivers to the BIOS. Drivers are software that allows the operating system to communicate with hardware; they can be configured in the Device Manager in Windows. The rest of the answers can be configured in the BIOS. The boot sequence (also known as boot priority or boot order) allows you to select which device will be booted off of first (hard drive is the most secure). Temperature thresholds allow you to set alerts and possibly shut down the system if the CPU runs too hot. Overclocking is when the CPU’s voltage is raised and the speed is increased. Overclocking is not recommended, but if you do configure it, you should set temperature thresholds. Intrusion detection can be enabled and will log if a person opened the computer case.
  68. Answer: A. POP3 is the protocol used by e-mail clients to receive e-mail. It makes use of Port 110. SMTP is used by e-mail clients to send e-mail. It uses port 25.
  69. Answers: C and D. The power cord carries 120 volts at 15 amps or 20 amps, and the telephone cord carries 80 volts when it rings. It is important to disconnect these before servicing a computer. Now, if you were opening the computer, you would disconnect everything. However, you might be fixing something that doesn’t require you to open the computer—for example, connecting a network cable. Remember to always disconnect any power, data, or telecommunications cables before working on the system.
  70. Answer: A. The northbridge takes care of the connections between the CPU and the PCI Express (PCIe) x16 expansion slot. On older Intel systems and AMD systems, the northbridge is the first of a pair of chips in the chipset (the other is the southbridge). On newer Intel systems, the northbridge functionality is combined with the CPU.
  71. Answer: D. Recycle toner cartridges according to your company’s policies and procedures, or according to municipality rules and regulations. Do not throw away or incinerate toner cartridges. Although it is possible to refill toner cartridges, it is not the recommended way to handle an empty cartridge because it is messy and time-consuming. Most companies simply purchase new toner cartridges.
  72. Answer: D. To connect one computer to another directly by way of network adapter cards, use a crossover cable. That cable is designed to connect like devices. It is wired as 568B on one end and 568A on the other. Those standards are ratified by the Telecommunications Industries Association/Electronics Industries Association (TIA/EIA). A regular (and more common) Cat 5e patch cable is known as a straight-through cable. It is used to connect unlike devices, such as a computer to a switch. Normally this is wired with the 568B standard on each end. A parallel cable might be used to connect an older printer to a computer or an external hard drive to a SCSI card. IEEE 1394 cables are not used to connect computers to each other; they are used to connect external hard drives to IEEE 1394 or FireWire ports.
  73. Answer: A. Stay calm and do the job as efficiently as possible. There isn’t much you can do when a customer is upset except fix the problem! I’d be interested to see what would happen if a person asked the owner of the server out for a cup of coffee, but I’m pretty sure the reaction would be negative. You don’t want to avoid the customer, but you don’t have to engage in anything except fixing the problem. The customer should be referred to your supervisor only if the person gets in the way of you doing your work.
  74. Answer: B. The laser printer uses toner. Impact printers use ribbon, inkjet printers use ink cartridges, and thermal printers use specially coated paper.
  75. Answer: B. There isn’t much you can do in a situation like this. The best thing is to ignore it and act as if it never happened. Technicians must be security-minded. In addition, the purported list might be real, but it might not be. It isn’t your call to make. However, before working at a customer site, you should ask that all confidential materials be removed before you begin work.
  76. Answer: A. Network installations require that the network card be configured for Preboot Execution Environment (PXE). This allows the network card to boot off of the network, locate a network installation server, and request that the installation begin. This configuration might be done in the BIOS of the computer (if the network adapter is integrated to the motherboard), within a special program in Windows, or one that boots from CD (if the network adapter is an adapter card). Peripheral Component Interconnect (PCI) is an expansion bus that accepts network adapter cards, sound cards, and so on. PCL stands for Printer Command Language, developed by HP so a computer can properly communicate with dot matrix or thermal printers. PnP stands for Plug ‘n Play, a Windows technology that allows devices to be located and installed automatically.
  77. Answer: C. Any card named with a number followed by an x is most likely an AGP card, (2x, 4x, 8x, 16x). AGP is the Accelerated Graphics Port, usually a brown slot on the motherboard. It is faster than PCI but slower than PCIe (PCI Express) video cards. PCIe cards place the x before the number (for example, x16—pronounced “by 16”). AMR stands for Audio-Modem Riser, a small expansion slot developed by Intel to be used with sound cards and modems.
  78. Answer: B. USB is the newest type of mouse connection. It replaces PS/2 as today’s standard. Serial mice were used in the early 1990s, and parallel was never really used for mice at all; it was used for printers and SCSI connections.
  79. Answers: A, B, and D. To reduce the chance of electrostatic discharge (ESD), use an antistatic wrist strap and mat. Also, consider raising the humidity. The more humidity there is, the less friction, and ultimately, less ESD. Raising the temperature will have no effect. Lowering the humidity increases the chances of ESD. Working in a carpeted area will also increase the chance of ESD; try to work in a non-carpeted area. You should also touch the chassis of the computer before handling any components. In addition, place components in antistatic bags when they are not in use.
  80. Answer: A. A dual-core processor has two cores, with separate caches, on the same physical chip. A processor with several cores would be known as multi-core (quad-core or hex-core). Dual-core processors are generally more efficient than older single-core processors and often use less voltage. A dual-core processor does not require more RAM than a single-core, but it usually requires more cache memory. Every core of a multi-core CPU has its own L1 and L2 cache.
  81. Answer: A. The CPU is the least likely to be replaced. You would probably need to replace other equipment, too, in this case. Just like PCs, though, the CPU should rarely fail. However, you might upgrade, replace, or add to RAM. PC Cards (PCMCIA) are commonly implemented as network adapters, modems, and more. It is common to install and remove PC Cards. Laptop keyboards fall victim to coffee, overuse, and other damage over time and sometimes need to be replaced.
  82. Answers: C and D. 1000 Mbps is 1000 megabits per second, otherwise notated as 1,000,000,000 bits per second, or 1 gigabit per second.
  83. Answer: A. Cable Internet is a broadband connection. It uses multiple “channels” to transmit and receive information. All the rest of the examples are technologies that are, or use, a baseband connection (one channel on the media). Ethernet (which was originally ratified by the IEEE as the 802.3 standard) is a shared technology by default; only one computer can communicate on the network at any given time. However, Ethernet switching alleviates this by segmenting computers and redirecting information to other systems via MAC address. Client/Server is less a networking technology and more of a way that computers communicate; it has a centralized server that controls the network.
  84. Answer: B. Single-mode fiber-optic cable can send data farther than any of the other answers—up to hundreds of kilometers. Multi-mode fiber-optic cable can send data about 600 meters. STP is a type of twisted pair; all twisted pair is limited to 100 meters or 328 feet. Coaxial cable is limited to 200 or 500 meters, depending on the type.
  85. Answer: C. You should install a USB add-on card. This will give you more ports than the computer already has for use with peripherals. Another option would be to purchase a USB hub. Modems, network adapters, and TV tuner cards all have their own purpose and do not allow additional peripherals.
  86. Answer: D. 7200 RPM is a typical speed of a hard drive—rotational speed, that is. Other common rotational speeds include 5400 RPM; 10,000 RPM; and 15,000 RPM. 1000 Mbps is a common network data transfer rate. SATA hard drives will commonly have a DTR of 3 Gb/s (300 MB/s) or 6 Gb/s (600 MB/s). 3.1 GHz is a common CPU frequency. 8 GB might be the amount of RAM you install in a computer or the size of a USB flash drive.
  87. Answer: C. If you are not sure about what to clean a screen with, use water. Water will most likely not damage the screen. However, if the user manual for the monitor calls for it, you might see that you can use a half-and-half mixture of water and isopropyl alcohol. Do not use detergents on a screen; they are okay for the outside of a computer case but not the display. And boric acid would just be plain silly (and dangerous).
  88. Answer: A. A switch interconnects devices on the same network so that they can communicate, whereas a router interconnects one or more networks. Remember that the switch is in charge of connecting devices on the LAN. But the router is in charge of connecting the LAN to another LAN, to the Internet, or to both. Multifunction network devices make matters confusing; they combine the functionality of a switch, a router, a wireless access point, and a firewall. Physically, the four-port section of the device is the switch portion and the single port that leads to the Internet is the router portion.
  89. Answers: A and D. Internal SATA drives connect to the motherboard (or SATA card) via a 7-pin data cable and a 15-pin power cable. PATA (IDE) hard drives use a 40-pin data cable and 4-pin (Molex) power cable. Who is Ray? He’s just another fictitious character in this book. You’ll hear more about him later.
  90. Answer: D. In a large corporation (or enterprise environment), tape backup such as the Digital Linear Tape (DLT) is the best media for backing up. DLTs and Super DLTs (SDLT) can have a capacity as high as 800 GB, allowing for a huge amount of backup as compared to DVD and dual-layer DVD (4.7–17 GB) and external USB hard drives (up to 64 GB or so, though this number will undoubtedly increase as time goes on).
  91. Answer: C. The MPEG Audio Layer III (.MP3) works best when dealing with multiple platforms. Advanced Audio Codec (.AAC) is used more commonly on Apple computers and devices and gaming consoles. Windows Media Audio (.WMA) is a Microsoft format developed especially for the Windows Media Player. .MOV is a QuickTime file format meant to be used with movies and other video.
  92. Answer: D. Smartphones typically use Secure Digital (SD) cards—more to the point, microSD cards. SSD stands for solid-state drive. This technology is implemented as flash-based hard drives or as adapter cards with DDR memory and a battery. CompactFlash (CF) cards are a bit bulkier and might be used in conjunction with PCs, laptops, and handheld computers. USB flash drives won’t fit inside a typical smartphone and so are relegated to hanging on people’s key chains and acting as mobile transporters of data.
  93. Answer: C. In this scenario, the organization probably has thin-client computers for its users. These have operating systems that are embedded in flash memory, and the rest of the information they require comes from a server. Thin clients normally have no hard drive; this is why they are referred to as diskless workstations. Virtualization workstations definitely need a hard drive and require lots of other resources; they are not as dependent on servers. Client/server is a type of networking organizational technique. However, thin clients will often log in to a server. Thick clients are for the most part PCs, the typical desktop computer.
  94. Answers: A and B. Know the six main steps of laser printing: Cleaning, charging, writing (also known as exposing), developing, transferring, and fusing. In the charging step, the drum is conditioned/charged by the primary corona wire (negatively charging it) and prepared for writing. In the transferring step, the paper is positively charged by the transfer corona wire, preparing it to accept the toner from the drum.
  95. Answer: A. The printer has RAM, which acts as a buffer if you or others send multiple documents to it. It prints them one at a time according to which job entered the queue first. Don’t confuse the printer’s buffer with the spooler that exists on the hard drive of the computer that controls the printer. The print driver is the software you install so that Windows can “talk” to the printer properly; it needs to be the exact driver. A printer pool is a group of printers (often identical) that share the duties of printing.
  96. Answer: B. Make the customer truly feel comfortable by sitting down next to her and taking the time to explain the technical concept from a simple and concise point of view. The less jargon, the better. Recommending a training class is tantamount to dismissing the customer off-hand. Telling the customer to read the manual is just downright rude. I know, I say this often to you the reader—however, you are a tech, so reading the manual is what you do. The customer is not supposed to be super-technically oriented. The acronym RTM should be kept within technical circles!
  97. Answer: A. Line filters are required for DSL modems to share phone lines with a phone. A line filter shields the phone line from digital noise and interference caused by telephone devices and makes DSL communications possible. If DSL is installed in a SOHO (small office/home office), devices such as telephones, fax machines, answering machines, dial-up modems, and security alarms should have line filters. But don’t install one where the DSL modem is located. A heat sink is used to disperse heat away from a CPU. A router allows access to another network or the Internet. A coaxial splitter is used to split the signal coming from a cable TV company, so that multiple TVs can be used at the same time.
  98. Answer: D. Hard drives run pretty hot; keeping an area of airflow around the drive can help to keep it cool. The key is to make sure the PC has proper airflow. This can be done by adding fans or using a liquid cooling system. It isn’t quite possible to add cache to a hard drive; the cache on most hard drives is hardwired, and there are no locations to add more. Increasing RAM does not necessarily increase the pagefile, and regardless, this won’t prevent problems with a hard drive over the short term, but it can make the hard drive work more efficiently. A second hard drive should be treated as a completely separate device. However, installing the OS to one drive and storing data on the second drive can go a long way to making both drives last longer.
  99. Answer: A. Power surges can cause the inverter to short out, after which the cold-cathode fluorescent lamps (CCFL) cannot get any power. You need to open the LCD panel to replace the inverter in this case.
  100. Answer: B. When testing the main 24-pin ATX power connector that leads from the power supply to the motherboard, use a multimeter. It can test each individual wire’s voltage. Better yet, use a power supply unit (PSU) tester. This tests them all in one shot. A Torx wrench is used to open computers and laptops that have special Torx screws; T-10 is a common size. A receptacle tester is used to test an AC outlet, although multimeters can be used for that as well. A tone and probe kit is used to test telephone and network connections for continuity. However, it can test only one pair of the wires in the cable. For better results when testing network cables, use a proper network cable testing kit. Testing tools are a key ingredient in a computer technician’s toolkit.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020