Name: 
 

VICA - Computer Maintenance Technology (version 2)



True/False
Indicate whether the sentence or statement is true or false.
 

1. 

During booting, the BIOS locates the master boot record, which looks to the partition table to determine where the logical boot drive is located.
 

2. 

When you create upper memory blocks, you are increasing the total amount of extended memory available.
 

3. 

As a precaution, place the hard drive component-side down on its antistatic bag on a flat surface.
 

4. 

When vacuuming out a computer, any vac with the appropriate attachments will be suitable.
 

5. 

A peripheral is a hardware device that is controlled by software and you must install both the hardware and software.
 

6. 

One advantage to installing Windows 9x in its own directory on a Windows 3.x machine is that it uses less disk space.
 

7. 

The method used by an operating system to manage the data on a drive is called the file system.
 

8. 

Windows NT is more efficient because user applications software can directly access the hardware.
 

9. 

After the repair is completed, allow the customer to be satisfied that all is working before you leave.
 

10. 

When solving computer problems in an organization other than your own, check with their technical support as well as the PC user.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

11. 

A ____ is a pointing device used to move a pointer on the screen.
a.
keyboard
b.
monitor
c.
floppy drive
d.
mouse
 

12. 

____ is used to hold data and instructions as they are processed.
a.
ROM
b.
Random access memory
c.
COAST
d.
EPROM
 

13. 

The ____ slot is used specifically for accelerated graphics video cards.
a.
SIMM
b.
AGP
c.
PCI
d.
ISA
 

14. 

A chip on the motherboard that contains circuits to perform fundamental input/output tasks is the ____.
a.
RAM BIOS
b.
CMOS chip
c.
ROM BIOS
d.
system clock
 

15. 

Data stored in virtual memory is actually stored in a file on the hard drive called a(n) ____.
a.
RAM cache
b.
buffer
c.
swap file
d.
overflow file
 

16. 

When configuring a mixture of legacy and Plug and Play cards, ____ cards are configured first.
a.
Plug and Play
b.
legacy
c.
right-most
d.
left-most
 

17. 

The entry in the Windows 95 MSDOS.SYS file that contains the location of the Windows 9x directory is ____.
a.
WinBootDir=
b.
WinDir=
c.
HostWinBootDrv=
d.
BootGUI=
 

18. 

In early motherboards, the Intel 8259 microchip was used to manage ____.
a.
IRQs
b.
DMA channels
c.
serial ports
d.
parallel ports
 
 
cmt2_files/i0210000.jpg
Figure 3–3
 

19. 

In Figure 3-3, Item C is the ____.
a.
system board connections for IDE and floppy drives
b.
DIMM slots
c.
P1 power connection on the system board
d.
PCI local bus slots
 

20. 

In Figure 3-3, Item D is the ____.
a.
system board connections for IDE and floppy drives
b.
DIMM slots
c.
P1 power connection on the system board
d.
PCI local bus slots
 

21. 

An error-checking procedure for memory, whereby either every byte has an even number of ones or every byte has an odd number of ones is known as ____.
a.
checksum
b.
parity
c.
ESCD
d.
PRAM
 

22. 

Electrically Erasable Programmable ROM (EEPROM), also known as ____, allow their contents to be changed.
a.
PRAM
b.
RAM
c.
PROM
d.
Flash ROM
 

23. 

A ____ is an environment that a 32-bit protected-mode OS provides for a real-mode program to operate in.
a.
VDM
b.
PDM
c.
VMI
d.
MDV
 
 
cmt2_files/i0270000.jpg
 

24. 

In Fig04-09, Item B represents ____ memory.
a.
upper
b.
expanded
c.
conventional
d.
HMA
 

25. 

Because the OS manages a file on the disk as a group of clusters, a cluster is also called a ____.
a.
sector
b.
segment
c.
file allocation unit
d.
track
 

26. 

A high-density 3.5" floppy disk can have up to ____ entries in the root directory.
a.
64
b.
136
c.
224
d.
448
 

27. 

CHS mode requires ____ bytes per sector.
a.
64
b.
128
c.
256
d.
512
 

28. 

A ____ file contains a list of DOS commands in a text file.
a.
command
b.
executable
c.
batch
d.
list
 

29. 

Hewlett Packard recommends a printer cable length not to exceed ____ feet.
a.
6
b.
10
c.
15
d.
50
 

30. 

To clean a mouse, remove the cover and mouse ball, and use a cotton swab dipped in a very small amount of ____ to clean the rollers.
a.
alcohol
b.
WD-40
c.
liquid soap
d.
solvent
 

31. 

When purchasing a monitor, consider one with a dot pitch of no more than ____ mm.
a.
13
b.
21
c.
28
d.
36
 
 
cmt2_files/i0360000.jpg
Figure 10–6
 

32. 

In Figure 10-6, Item B is most likely a(n) ____.
a.
volume control
b.
eject load button
c.
emergency eject hole
d.
headphone jack
 

33. 

The 'sampling rate' refers to ____.
a.
the frequency of the sound
b.
the number of samples taken over a given period of time
c.
the number of 'voices' the sound card supports
d.
the kinds of sound files supported
 

34. 

Most game music is stored in ____ files, but most multimedia sound is stored in ____ files.
a.
MPEG, JPEG
b.
WAV, MIDI
c.
MIDI, WAV
d.
JPEG, MPEG
 

35. 

Digital camera pictures are usually stored in ____ format.
a.
MPEG
b.
WAV
c.
MIDI
d.
JPEG
 

36. 

In an electrical circuit, electrons seek a place of rest by moving from a ____ charged location (called "hot") to a ____ charged location (called "ground).
a.
neutrally, negatively
b.
positively, negatively
c.
negatively, positively
d.
positively, neutrally
 

37. 

____ are calculated by multiplying volts by amps.
a.
Volts
b.
Amps
c.
Ohms
d.
Watts
 
 
cmt2_files/i0430000.jpg
Figure 11–8
 

38. 

In Figure 11-8, Item A is the electronic symbol for ____.
a.
resistor
b.
transistor
c.
diode
d.
ground
 

39. 

In Figure 11-8, Item C is the electronic symbol for ____.
a.
resistor
b.
transistor
c.
diode
d.
ground
 

40. 

The type of fire extinguisher that is rated to handle electrical fires is Class ____.
a.
A
b.
B
c.
C
d.
D
 

41. 

DOS and Windows 3.x use ____.
a.
32 bit code
b.
24 bit code
c.
16 bit code
d.
8 bit code
 

42. 

If Windows 9x does not find a System.dat, it will automatically replace it with ____.
a.
System.da0
b.
System.bak
c.
User.dat
d.
System.old
 

43. 

The NTVDM reserved for all 16-bit Windows 3.x applications is called the ____ environment.
a.
legacy machine
b.
Virtual Windows machine
c.
Win16 on Win32 (WOW)
d.
user machine
 

44. 

The most important reason to buy a brand-name PC rather than a clone is ____.
a.
price
b.
brand loyalty
c.
proprietary components
d.
after-sales service and support
 
 
cmt2_files/i0510000.jpg
 

45. 

In an EIDE configuration, the reason you would install the CD-ROM and the Zip drive in the secondary controller, and the hard drive on the primary controller is that ____.
a.
the CD-ROM and Zip drive MUST be on the secondary controller
b.
the CD-ROM and Zip drive MUST be on the same controller
c.
the hard drive is faster and should be matched up with the primary controller
d.
it is just done that way
 

46. 

____ is used by the PC and ____ is used by the modem.
a.
Xon, Xoff
b.
CTS, RTS
c.
Xoff, Xon
d.
RTS, CTS
 

47. 

The protocol ____ is not provided at the session and presentation layer of the OSI mode.
a.
HTTP
b.
FTP
c.
SMTP
d.
DHCP
 
 
cmt2_files/i0550000.jpg
 

48. 

In Fig18-2, Item 3 represents the ____ stage of the laser print cycle.
a.
developing
b.
conditioning
c.
cleaning
d.
writing
 

49. 

Typically, a ____ PC Card is used to add modems, network cards, etc. to the laptop.
a.
Type I
b.
Type II
c.
Type III
d.
Type IV
 

50. 

A(n) ____ virus changes its distinguishing characteristics as it replicates.
a.
polymorphic
b.
encrypting
c.
stealth
d.
covert
 



 
Check Your Work     Reset Help