Final 1-10 Study Guide Key

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Final 1-10 Study Guide Key as PDF for free.

More details

  • Words: 2,354
  • Pages: 10
FINAL EXAM CHAPTERS 1-10 IT Essentials August 2008 1.3.2 What type of power connector is used to connect optical devices and hard drives? Molex What type of connector is used to connect floppy drives?

Berg

1.4.1 In general, the Northbridge controls access to the RAM, video card, and the speeds at which the CPU can communicate with them. The Southbridge, in most cases, allows the CPU to communicate with the hard drives, sound card, USB ports, and other I/O ports. 1.4.5 What hardware device will allow multiple hard drives to be connected with Fault Tolerance? raid controller 1.4.6 Identify the following devices:

floppy disk

hard drive

CD-ROM

flash drive

1.4.7 What type of power connector is used to connect optical devices and hard drives? molex What type of connector is used to connect floppy drives? berg 1.5

Firewire and USB are two examples of devices that are hot-swappable, which means they may be plugged in and out without turning off power.

1.5

What are the data transfer rates of both 1394a and 1394b? 1394a 400Mbps 1394b in excess of 800Mbps

1.5

DVI has a 24-pin female connector or a 29-pin female connector and provides a compressed digital output to a monitor. DVI-I provides both analog and digital signals. DVI-D provides digital signals only.

1.8

IRQs are used by computer components to request information from the CPU. Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 1 of 10

2.1.2 Power conditions: Spike - sudden increase in voltage that lasts for a very short period and exceeds 100% of the normal voltage on a line. Power Surge- dramatic increase in voltage above the normal flow of electrical current. Brownout - reduced voltage level of AC power that lasts for a period of time; occurs when the power line voltage drops below 80% of the normal voltage level. Noise - interference from generators or electromagnetic influences resulting in unclean power. Blackout - complete loss of AC power. 2.2.2 The following are some software tools for use in maintaining disk drives: Fdisk or Disk Management – these are used to create and delete partitions on a hard drive. Format – this is used to prepare a hard drive partition to store information. System File Checker (SFC) – this is a command-line utility that scans the operating system critical files and replaces any files that are corrupted. Chkdsk or Scandisk – these are used to check the integrity of files and folders on a hard drive by scanning the disk surface for physical errors. Disk Cleanup – this is used to clear space on a hard drive by searching for files that can be safely deleted. Defrag – this is used to optimize space on a hard drive to allow faster access to programs and data. 2.3.4 What is the proper cleaning material for each of the following? Monitor Screen

distilled water and a soft cloth

Monitor Case

mild cleaning solution

LCD Screen

no ammoniated glass cleaners or harsh chemicals

Computer Case

mild cleaning solution

Component Contacts

isopropyl alcohol

Keyboard

compressed air

Mouse

compressed air inside, glass cleaner outside Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 2 of 10

3.7.2 Cables that connect hard, floppy and CD ROM drives are generically called ribbon cables because they are long and flat. To identify which side of the cable aligns with Pin 1 on a connector, a stripe is on the side of the cable designated for Pin-1. What indication will you have if you install the floppy cable backwards? The drive light stays on all the time. 3.8.2 Identify the two port types shown in this diagram:

USB

Ethernet

3.9.1 When a computer is first turned on, it performs a process called POST, which checks the hardware for functionality. If a faulty component is identified, the computer indicates which device failed by displaying an error or beep code. 3.9.2 The computer executes a series of commands as it ‘wakes up’ that are stored in a special chip called the CMOS. Through this same read-only chip, you may make changes to the boot order, system time, hardware interfaces and several other settings. The computer stores startup configuration in a special chip called CMOS, sometimes kept ‘alive’ with a battery. 5.4.1 When creating partitions on a hard drive, you have the option of creating: 4 primary partitions, 1 extended partition, and 23 logical partitions. So . . . if technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception? Create one primary partition and an extended partition with four logical drives within it. Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 3 of 10

5.4.2 DOS and early Windows systems used 16 bit and 32 bit file-indexing systems designated as FAT16 and FAT32. Starting with Windows ‘New Technology’, a more secure file system was introduced, NTFS. 5.4.7 When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence? BIOS reads the Master Boot Record (MBR) 5.5.5 NTBackup should be run before upgrading the operating system. 5.6.2

A user can set a system restore point that may be used to return the computer to that operational point in case of a later failure of a driver or program installation such as a Windows update.

5.6.2 Windows 2000 offers the ability to create an Emergency Repair Disk (ERD) that saves critical boot files and configuration information necessary to troubleshoot problems in Windows. Windows XP offers the same features with the Automated System Record (ASR) wizard. 5.7

The first step in trying to troubleshoot a computer hardware or software problem is to gather data from the customer. Use that information to verify obvious issues and implement quick fixes. If that is not successful, use the Device Manager to verify that each hardware component is functioning properly.

6.2.1 Describe the following indicators on the outside of a laptop:

Bluetooth

Battery Status

Standy

6.2.1 One of the most commonly used battery technology for use in laptops is Lithiumion; it is also used because it gives long lasting performance, is cost effective and has no ‘recharging memory’. Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 4 of 10

6.2.2

battery status

hard drive activity

wireless activity

6.2.3 A laptop may be placed into a device called a docking station that will allow it to utilize external monitors, keyboard, mouse, printers and networks without having to make each connection individually. 6.3.2 What device was specifically designed for use in laptops to use less power and generate less heat? CPU 6.3.3 The operating system can control power management through Advanced Configuration and Power Interface (ACPI), a feature that must be enabled within the system BIOS. 6.4.1 In Windows XP, there is a 3-step process to access the power settings section of the O/S. The steps are Start > Control Panel > Power Options. 6.4.1 What power management control can be used to improve battery life? Advanced Configuration and Power Interface (ACPI) 6.4.1 There are primarily two modes of minimizing power usage without shutting down the computer completely. These two modes are: Hibernate - The CPU and RAM are off. The contents have been saved to a temporary file on the hard disk, and the applications the user was working on are left open. Standby – The CPU is off, and the RAM to a slow refresh rate. 6.4.2 Unless a device is designated as hot-swappable, before adding or removing it you should unplug the power cord or remove the battery. Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 5 of 10

6.4.2 Place the following steps in the correct order for removing a hot-swappable device: 2 4 3 1

Left click the device to be removed. Remove the device A message tells you it is safe to remove the device. Left click the ‘Safely Remove Hardware’ icon in the System Tray.

6.6.1 You suspect that excessive heat is causing intermittent failures of a laptop computer system. What basic preventive maintenance process should you do to help relieve this problem? clean the fan and ventilation ports 6.7.1 List some quick solutions to try when troubleshooting a laptop. a) reboot the computer b) disconnect peripherals c) check BIOS settings d) use the last known good configuration option 6.7.1 If you add a USB hard drive to an external USB hub with several other devices and the hard drive does not appear to function properly, what is the first thing to try to verify that they hard drive is not at fault? try the new hard drive alone 7.1.1

Before purchasing a printer, several things should be considered: initial purchase price, cost of paper and ink, price per page, maintenance costs and warranty costs. These items combined form the TCO or Total Cost of Ownership.

7.1.3 Place the following laser printing steps in the proper order and identify a keyword that describes each step in the process: 1 2

Cleaning Conditioning

3

Writing

4 5

Developing Transferring

6

Fusing

Remove excess toner from the drum Negatively charge the drum to -600V to remove latent images Use a laser to create an invisible image on the drum Apply toner to the drum Move the toner from the drum to the positively charged paper ‘Fix’ the image permanently onto the paper

Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 6 of 10

7.1.3 - Associate these characteristics with their printer types: Ink Jet, Laser, Solid Ink, 7.1.7 Impact or Thermal: Vibrant color quality Low initial cost Uses continuous forms Expensive, sensitive paper Wet after printing High resolution B&W Uses inexpensive ink Can print through carbons Few moving parts High quality color Uses toner Prone to clogging Uses ink ‘sticks’ Poor quality images

Solid Ink Ink Jet Impact Thermal Ink Jet Laser Ink Jet Impact Thermal Ink Jet Laser Ink Jet Solid Ink Impact

7.3.1 A term that relates to the resolution capability of both printers and scanners is DPI. What does DPI stand for? dots per inch 7.3.2 What three common office machines are combined in an all-in-one device? printer, scanner and fax 7.3.3 To scan a book requires a flatbed scanner. 7.3.5 A very high-quality commercial scanner, typically used for photographs, is a drum scanner 7.4.2 The best source for a new printer driver is the manufacturer. 7.6.1 Which things should be investigated first when troubleshooting a printer? Equipment power Low ink warning Out of paper warning Loose cable connections Paper jams Errors on equipment display Errors on computer screen

Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 7 of 10

8.1.2 List some benefits of networking: Fewer peripherals needed Increased communication capabilities Avoiding File Duplication and Corruption Lower Cost Licensing Centralized Administration Conserving Resources 8.3.2 Describe the five classes of IP addresses: Class A Class B Class C Class D Class E

Large networks, implemented by large companies and some countries Medium-sized networks, implemented by universities Small networks, implemented by ISP for customer subscriptions Special use for multicasting Used for experimental testing

8.3.2 What are the default subnet masks for the following addresses? Class A Class B Class C

255.0.0.0 255.255.0.0 255.255.255.0

8.3.3 Dynamic Host Configuration Protocol (DHCP) is a software utility used to dynamically assign IP addresses to network devices. 8.3.4 What protocol is used to connect securely to a remote computer? What protocol governs how files are exchanged on the WWW? What protocol provides services for file transfer and manipulation? What protocol is used to download e-mail from a remote mail server? What protocol is used to send e-mail to a remote e-mail server?

SSH HTTP FTP POP SMTP

8.4.1 Which network device uses a MAC address table to segment the network? switch 8.5.2 What is the logical topology used for the Ethernet architecture? bus 8.8.2 What are the seven layers of the OSI model, and what primarily occurs at each? 7 6 5 4 3 2 1

Application Presentation Session Transport Network Data Link Physical

Network Services (Email, TFTP, DNS) Compression, encryption, formatting Establishes, Manages and Terminates Flow Control, Reliable Transport IP addressing and path determination Hardware addresses Media electrical/ physical specifications

Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 8 of 10

8.8.2 Logical addressing and routing function at which layer of the OSI model? Network layer

8.8.3 Label the TCP/IP Layers as contrasted and compared to the OSI Model. _____ 8.9.2 A(n) default gateway is configured in a host on a network to indicate where traffic for other networks should be sent. This information, along with the computers IP address, can be found by using the ipconfig command. If you can access devices on the same network but not on other networks, the wrong default gateway is the most likely cause. 9.2.4 A DDos attack is conducted by many computers against one victim, and it is often difficult to locate the sources. 9.2.4 A Ping of Death is a series of repeated, larger than normal pings that crash the receiving computer. An E-mail Bomb is a large quantity of bulk e-mail that overwhelms the e-mail server preventing users from accessing it.

Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 9 of 10

9.2.7 Spoofing is a process that involves impersonating another computer by assuming their IP address, which makes data appear to come from a source other than the actual source. 9.3.3 There are four major characteristics for secure passwords that should be included in a security policy. They are: 1. 2. 3. 4. 10.2

should expire after a specific time period uses upper and lower case, numbers, and punctuation or symbols should not be written down lockout rules should be defined

Know various ways to handle disgruntled (unhappy) customers.

Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’)

Page 10 of 10

Related Documents