Name: 
 

VICA - Computer Maintenance Technology (version 1)



True/False
Indicate whether the sentence or statement is true or false.
 

1. 

All devices in a computer are either installed directly on the system board, directly linked with a cable or indirectly linked through an expansion card.
 

2. 

The power supply generates electricity in a voltage that the computer can handle.
 

3. 

The current trend is to keep most motherboard setup information in jumpers and switches.
 

4. 

When a system board can support more than one processor simultaneously, then it has the capability of multiprocessing.
 
 
cmt1_files/i0060000.jpg
Figure 6–8
 

5. 

In Figure 6-8, the SCSI host adapter (Item A) should be terminated.
 
 
cmt1_files/i0080000.jpg

Figure 10–7
 

6. 

In Figure 10-7, Item B is pointing at the data cable.
 

7. 

Windows NT supports the Plug and Play standard.
 

8. 

A read-only copy of the Security Accounts Manager database is stored on the backup domain controller.
 

9. 

Windows 98 drivers and systems files are protected from being altered by applications and users.
 

10. 

If the temperature of the fuser exceeds an allowed maximum, there is a strong likelihood that the printer will catch on fire.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

11. 

Both keyboard and mouse receive input mechanically, and this movement is converted to ____ data that is input into the computer.
a.
binary
b.
trinary
c.
decimal
d.
hexadecimal
 

12. 

The data cable of a hard drive connects to the ____.
a.
hard drive controller
b.
power supply
c.
adapter card
d.
CMOS
 

13. 

The CMOS chip is powered by a low electrical charge from a(n) ____.
a.
series of capacitors
b.
small battery on the motherboard
c.
connection from the power supply
d.
expansion card
 

14. 

System resources are assigned by ALL BUT which of the following methods?
a.
jumpers
b.
ROM BIOS
c.
DIP switches
d.
CMOS
 

15. 

The core components of DOS are two hidden files named ____ and ____.
a.
CONFIG.SYS, AUTOEXEC.BAT
b.
COMMAND.COM, CONFIG.SYS
c.
MSDOS.SYS, COMMAND.COM
d.
IO.SYS, MSDOS.SYS
 

16. 

ROM shadowing is the process of ____.
a.
writing the contents ROM to disk
b.
duplicating ROM in RAM in case system ROM should fail
c.
having a backup ROM available in case the system ROM should fail
d.
copying the contents of ROM to RAM, and then assigning memory addresses to that RAM
 

17. 

In the 16-bit ISA bus, upper DMA channel ____ cascades to lower DMA channel ____.
a.
4,1
b.
5,0
c.
4,0
d.
5,1
 

18. 

A Pentium CPU is said to have multi-processing capabilities because it contains ____ ALUs.
a.
1
b.
2
c.
4
d.
8
 

19. 

If two legacy devices require the same resources and cannot accept substitutes then ____.
a.
the device in the leftmost slot will be assigned
b.
the system will alternate between the two devices
c.
the two devices cannot coexist in the same PC
d.
the device in the rightmost slot will be assigned
 

20. 

Which of the following O/S's does NOT support USB?
a.
Windows 95, with update
b.
Windows 98
c.
Windows NT 4.x
d.
Windows 2000
 

21. 

All data stored in ____ is lost when the power is turned off.
a.
PRAM
b.
RAM
c.
ROM
d.
CMOS
 

22. 

Which of the following is not a parity option?
a.
even parity
b.
integral parity
c.
odd parity
d.
nonparity
 

23. 

Windows 95 was the first Microsoft OS to support ____-bit protected mode applications software.
a.
8
b.
16
c.
32
d.
64
 

24. 

With the exception of ____, ROM is NOT usually copied to RAM.
a.
startup BIOS
b.
CMOS
c.
ROM shadowing
d.
the interrupt table
 

25. 

When a file is not stored in consecutive clusters, it is said to be ____.
a.
contiguous
b.
dispersed
c.
distributed
d.
fragmented
 

26. 

In Windows 9x, floppy disk management is carried out in ____.
a.
Internet Explorer
b.
Windows Explorer
c.
SYSMANAGER
d.
Control Panel
 
 
cmt1_files/i0310000.jpg
Figure 5–11
 

27. 

In Figure 5-11, Item A indicates ____.
a.
bad azimuth
b.
bad radial alignment
c.
hysteresis
d.
a properly aligned head
 

28. 

Which of the following is NOT an indication of a virus infection?
a.
the system won't boot
b.
files disappear mysteriously
c.
the floppy drive light stays on continuously
d.
you can't access a drive
 

29. 

Before substituting a known-good motherboard for a suspected bad, you should ____.
a.
make sure the keyboard connector matches the keyboard
b.
check the voltages from the power supply
c.
make sure that the motherboard is compatible with other hardware
d.
make sure the system is properly grounded
 

30. 

In most cases, a parallel port is ____.
a.
9-pin female
b.
15-pin male
c.
25-pin female
d.
9-pin male
 

31. 

Digital camera pictures are usually stored in ____ format.
a.
MPEG
b.
WAV
c.
MIDI
d.
JPEG
 

32. 

A ____ is a device that changes the ratio of current to voltage.
a.
transformer
b.
rectifier
c.
regulator
d.
phased array
 

33. 

Materials that easily conduct electricity are called ____.
a.
conductors
b.
insulators
c.
semiconductors
d.
TTLs
 

34. 

A ____ is a device that can hold an electrical charge for a period of time.
a.
resistor
b.
capacitor
c.
diode
d.
transistor
 
 
cmt1_files/i0400000.jpg
Figure 11–8
 

35. 

In Figure 11-8, Item A is the electronic symbol for ____.
a.
resistor
b.
transistor
c.
diode
d.
ground
 

36. 

The degree of protection of a surge suppressor can be measured in ____, a measure of energy.
a.
amps
b.
joules
c.
volts
d.
ohms
 

37. 

A virtual machine can be thought of as a ____.
a.
machine designed for internet use
b.
logical machine within a physical machine
c.
part of the DOS operating system
d.
part of the VFAT
 

38. 

Windows 9x uses ____ as its primary tool for managing applications and OS components.
a.
command prompt
b.
DOS commands
c.
Program Manager
d.
Explorer
 

39. 

A group of computers join together over a network that share a common database used to control security is called ____.
a.
a network segment
b.
a domain
c.
a region
d.
the territory
 

40. 

The ____ component of the NT operating system is available in different versions to address different CPU technologies.
a.
system partition
b.
boot partition
c.
Hardware Abstraction Layer
d.
NTFS
 

41. 

The Security Accounts Manager (SAM) database ____.
a.
contains User accounts and computer accounts for an NT work group
b.
can exist on only one server in the domain
c.
allows decentralized administration of the domain
d.
contains User, Group, and Computer accounts for an NT domain
 

42. 

____ contains the last known good configuration.
a.
HKEY_CURRENT_USER
b.
HKEY_LOCAL_MACHINE\HARDWARE
c.
HKEY_CURRENT_CONFIG
d.
HKEY_CLASSES_ROUTE
 

43. 

In Windows 2000, ____ replaces Network Neighborhood.
a.
My Network Places
b.
Network Domain
c.
Shared Resources
d.
Network Region
 

44. 

There can be up to ____ IDE controllers on a system board.
a.
1
b.
2
c.
3
d.
4
 

45. 

A 16550 UART has a max speed rating of ____ Kbps.
a.
28.8
b.
56
c.
115.2
d.
230
 

46. 

The Xon-Xoff protocol only works with ____ data.
a.
ASCII
b.
EBIDIC
c.
binary
d.
hexadecimal
 

47. 

The server that tracks the relationship between domain names and IP addresses is called a ____ server.
a.
DNS
b.
HTTP
c.
DHCP
d.
LIMS
 

48. 

In the ____ step of the laser print cycle, the drum is cleaned of any residual toner and electrical charge.
a.
developing
b.
writing
c.
conditioning
d.
cleaning
 

49. 

To discharge the capacitors in a power supply or monitor, use a flat bladed screwdriver to short the ____ and ____ prongs.
a.
neutral, ground
b.
hot, neutral
c.
hot, ground
d.
neutral, switch
 

50. 

Windows NT can have up to ____ partitions.
a.
1
b.
2
c.
4
d.
8
 



 
Check Your Work     Reset Help