Professional Documents
Culture Documents
1.3.2 What type of power connector is used to connect optical devices and hard
drives? Molex
1.4.1 In general, the Northbridge controls access to the RAM, video card, and the
The Southbridge, in most cases, allows the CPU to communicate with the hard
1.4.5 What hardware device will allow multiple hard drives to be connected with Fault
1.4.7 What type of power connector is used to connect optical devices and hard
drives? molex What type of connector is used to connect floppy drives? berg
1.5 Firewire and USB are two examples of devices that are hot-swappable, which
means they may be plugged in and out without turning off power.
1.5 What are the data transfer rates of both 1394a and 1394b?
1394a 400Mbps
1.5 DVI has a 24-pin female connector or a 29-pin female connector and provides a
compressed digital output to a monitor. DVI-I provides both analog and digital
signals. DVI-D provides digital signals only.
1.8 IRQs are used by computer components to request information from the CPU.
Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’) Page 1 of 10
2.1.2 Power conditions:
Spike - sudden increase in voltage that lasts for a very short period and exceeds
100% of the normal voltage on a line.
Power Surge- dramatic increase in voltage above the normal flow of electrical
current.
Brownout - reduced voltage level of AC power that lasts for a period of time;
occurs when the power line voltage drops below 80% of the normal voltage level.
2.2.2 The following are some software tools for use in maintaining disk drives:
Fdisk or Disk Management – these are used to create and delete partitions on a
hard drive.
System File Checker (SFC) – this is a command-line utility that scans the
operating system critical files and replaces any files that are corrupted.
Chkdsk or Scandisk – these are used to check the integrity of files and folders
on a hard drive by scanning the disk surface for physical errors.
Disk Cleanup – this is used to clear space on a hard drive by searching for files
that can be safely deleted.
Defrag – this is used to optimize space on a hard drive to allow faster access to
programs and data.
2.3.4 What is the proper cleaning material for each of the following?
Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’) Page 2 of 10
3.7.2 Cables that connect hard, floppy and CD ROM drives are generically called
ribbon cables because they are long and flat. To identify which side of the cable
aligns with Pin 1 on a connector, a stripe is on the side of the cable designated
for Pin-1. What indication will you have if you install the floppy cable backwards?
USB Ethernet
3.9.1 When a computer is first turned on, it performs a process called POST, which
3.9.2 The computer executes a series of commands as it ‘wakes up’ that are stored in
a special chip called the CMOS. Through this same read-only chip, you may
make changes to the boot order, system time, hardware interfaces and several
other settings. The computer stores startup configuration in a special chip called
5.4.1 When creating partitions on a hard drive, you have the option of creating: 4
technician needs to configure the hard drive on a computer so that there appears
to be one drive for the operating system and four drives for data from different
applications. How can the hard drive be configured to provide this perception?
Create one primary partition and an extended partition with four logical
Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’) Page 3 of 10
5.4.2 DOS and early Windows systems used 16 bit and 32 bit file-indexing systems
5.4.7 When a Windows XP computer has completed the POST for each adapter card
that has a BIOS, what is the next step during the boot sequence?
5.6.2 A user can set a system restore point that may be used to return the computer to
5.6.2 Windows 2000 offers the ability to create an Emergency Repair Disk (ERD) that
5.7 The first step in trying to troubleshoot a computer hardware or software problem
is to gather data from the customer. Use that information to verify obvious
issues and implement quick fixes. If that is not successful, use the Device
6.2.1 One of the most commonly used battery technology for use in laptops is Lithium-
ion; it is also used because it gives long lasting performance, is cost effective
6.2.3 A laptop may be placed into a device called a docking station that will allow it to
utilize external monitors, keyboard, mouse, printers and networks without having
6.3.2 What device was specifically designed for use in laptops to use less power and
6.3.3 The operating system can control power management through Advanced
6.4.1 In Windows XP, there is a 3-step process to access the power settings section of
the O/S. The steps are Start > Control Panel > Power Options.
6.4.1 What power management control can be used to improve battery life?
6.4.1 There are primarily two modes of minimizing power usage without shutting down
Hibernate - The CPU and RAM are off. The contents have been saved to a
temporary file on the hard disk, and the applications the user was working on are
left open.
Standby – The CPU is off, and the RAM to a slow refresh rate.
6.6.1 You suspect that excessive heat is causing intermittent failures of a laptop
help relieve this problem? clean the fan and ventilation ports
6.7.1 If you add a USB hard drive to an external USB hub with several other devices
and the hard drive does not appear to function properly, what is the first thing to
try to verify that they hard drive is not at fault? try the new hard drive alone
7.1.1 Before purchasing a printer, several things should be considered: initial purchase
price, cost of paper and ink, price per page, maintenance costs and warranty
costs. These items combined form the TCO or Total Cost of Ownership.
7.1.3 Place the following laser printing steps in the proper order and identify a keyword
that describes each step in the process:
Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’) Page 6 of 10
7.1.3 - Associate these characteristics with their printer types: Ink Jet, Laser, Solid Ink,
7.1.7 Impact or Thermal:
7.3.1 A term that relates to the resolution capability of both printers and scanners is
7.3.2 What three common office machines are combined in an all-in-one device?
7.4.2 The best source for a new printer driver is the manufacturer.
Equipment power
Low ink warning
Out of paper warning
Loose cable connections
Paper jams
Errors on equipment display
Errors on computer screen
Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’) Page 7 of 10
8.1.2 List some benefits of networking:
8.3.2 What are the default subnet masks for the following addresses?
Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0
8.4.1 Which network device uses a MAC address table to segment the network?
switch
8.5.2 What is the logical topology used for the Ethernet architecture? bus
8.8.2 What are the seven layers of the OSI model, and what primarily occurs at each?
Network layer
8.8.3 Label the TCP/IP Layers as contrasted and compared to the OSI Model.
_____
traffic for other networks should be sent. This information, along with the
can access devices on the same network but not on other networks, the wrong
9.2.4 A DDos attack is conducted by many computers against one victim, and it is
9.2.4 A Ping of Death is a series of repeated, larger than normal pings that crash the
Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’) Page 9 of 10
9.2.7 Spoofing is a process that involves impersonating another computer by
assuming their IP address, which makes data appear to come from a source
other than the actual source.
9.3.3 There are four major characteristics for secure passwords that should be
included in a security policy. They are:
Final 1-10 Study Guide, IT Essentials, v40 (Forms ‘B’ and ‘C’) Page 10 of 10