COMPUTER PROBLEM SOLVING B
Email address *
97)  Which of the following terms identifies the condition that occurs when charges on separated objects are unmatched?
1 point
95)  An important first step in troubleshooting which component in a laser printer is causing a jam is to:
1 point
74)  You have a problem using SMTP. You think that the problem is with port 25. How do you check to see if the problem is the port?
1 point
84)  Which wireless technology is used to create a direct connection between two devices?
1 point
92)  Which of the following utilities verifies that there is a connection on a network between two hosts?
1 point
63)  What is the application used by chat rooms?
1 point
81)  You have a network with 200 nodes. TCP/IP is used as the Transport protocol and you want to subnet the network into three subnets. What device will you use to connect the different subnets?
1 point
52)  After installing a new firewall, the suer states that they cannot connect to any web pages. Which port would you ensure is open on the firewall to give your users the access they require?
1 point
90)  Which of the following best describes a destructive or damaging software meant to disrupt the operation of a PC through the destruction of hardware and software?
1 point
55)  What is the purpose of dynamic memory allocation?
1 point
94)  The first hard disk in your computer has one primary partition and one Extended partition. The extended partition is divided into two logical drives D and E. When you install a second hard drive, you create a primary and extended partition. You create one logical drive only and format it. What would be the drive letter assigned to the first logical drive on the extended partition of first hard disk?
1 point
100)  _____, lack of proper equipment and incorrect ergonomic information are all contributing factors to an improper computer setup.
1 point
61)  The primary router for a subnet is also known as the default:
1 point
91)  Which factors transmit electrostatic discharge (ESD) to the metal-oxide semiconductor (MOS) devices?
1 point
82)  Many compromised computers acting synchronously to attack are collectively called a:
1 point
80)  What part of a computer should you NEVER attempt to repair?
1 point
66)  Which encryption method uses the Advanced Encryption System (AES) ciper for stronger encryption?
1 point
72)  What is the Windows based GUI utility that provides information on processes that are running on a computer?
1 point
86)  What type of members share a centralized directory database of resources?
1 point
65)  What is the total number of possible IP addresses in a Class B network?
1 point
70)  Which of the following protocols guarantees packet delivery?
1 point
79)  What is the correct sequence to re-install all of your programs and operating systems, while deleting your old files?
1 point
77)  ____ is not considered a type of network cable.
1 point
93)  Which term defines the condition where an electrical deterioration between the pins of the processor and the socket occur?
1 point
64)  Which is not a LAN topology?
1 point
88)  Which of the following is an authentication protocol used to encrypt account names and passwords?
1 point
75)  For more efficient use of high bandwidth networks, a larger TCP _____may be used.
1 point
87)  Most of the user accounts in your Windows environment will be which type?
1 point
62)  In order to be an e-commerce server, a computer must offer what services?
1 point
56)  Before upgrading your operating system, you should first:
1 point
67)  Which of the following utilities verifies that there is a connection on a network between two hosts?
1 point
68)  The common 4:3 resolution found in notebook monitors that has an addressable pixel resolution of 1024 X 768 and a viewable area of 12.1 to 15 inches is known as which of the following:
1 point
85)  How many keys are used in public key encryption to encrypt and decrypt data?
1 point
60)  Your network is not functioning properly and you suspect that there could be a short in the cable connection. Which simple diagnostic tool will you use in this case?
1 point
59)  A computer runs for various periods of time before giving an "out of memory" message. The possible reason is:
1 point
98)  Sometimes when an electronic component has gotten wet, it can be revived by :
1 point
78)  Which OSI layer describes the network's level of operation at which the raw data is packaged for transfer from one network card to another?
1 point
57)  Which of the following Windows XP features allows a user to connect to his or her XP computer from any location using the Internet?
1 point
What is your name? *
Your answer
83)  Software that monitors and gathers information without the user’s knowledge is known as which of the following?
1 point
53)  Which of the following terms refers to the method used by Microsoft to prevent unlicensed use of its software?
1 point
99)  EISA and MCA devices do not have jumper settings. How are they configured?
1 point
96)  Which one of the following utilities is used to see the IP address to MAC address list in your computer ?
1 point
71)  Which of the following terms refers to the snapshot of the system state that is used during a system restore?
1 point
89)  Which of the following is not listed by the FBI National Computer Crime Squad (NCCS) as a computer crime?
1 point
69)  Two campuses (in different cities) of an organization would be connected using a _____ link.
1 point
76)  The system of pathways that is used for communication in a computer system is referred to as which of the following terms?
1 point
54)  You have several applications running, and the one you are currently working on freezes up. What do you do?
1 point
73)  What is the minimum recommended amount of memory required to load 64-bit Windows 7?
1 point
58)  To view available disk space on a UNIX based system run the command:
1 point
Password *
Your answer
Submit
Never submit passwords through Google Forms.
reCAPTCHA
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service