True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
During
booting, the BIOS locates the master boot record, which looks to the partition table to determine
where the logical boot drive is located.
|
|
2.
|
When you
create upper memory blocks, you are increasing the total amount of extended memory
available.
|
|
3.
|
As a
precaution, place the hard drive component-side down on its antistatic bag on a flat
surface.
|
|
4.
|
When
vacuuming out a computer, any vac with the appropriate attachments will be suitable.
|
|
5.
|
A peripheral
is a hardware device that is controlled by software and you must install both the hardware and
software.
|
|
6.
|
One
advantage to installing Windows 9x in its own directory on a Windows 3.x machine is that it uses less
disk space.
|
|
7.
|
The method
used by an operating system to manage the data on a drive is called the file system.
|
|
8.
|
Windows NT
is more efficient because user applications software can directly access the hardware.
|
|
9.
|
After the
repair is completed, allow the customer to be satisfied that all is working before you
leave.
|
|
10.
|
When solving
computer problems in an organization other than your own, check with their technical support as well
as the PC user.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
11.
|
A ____ is a
pointing device used to move a pointer on the screen. a. | keyboard | b. | monitor | c. | floppy drive | d. | mouse | | |
|
|
12.
|
____ is used
to hold data and instructions as they are processed. a. | ROM | b. | Random access memory | c. | COAST | d. | EPROM | | |
|
|
13.
|
The ____
slot is used specifically for accelerated graphics video cards.
|
|
14.
|
A chip on
the motherboard that contains circuits to perform fundamental input/output tasks is the
____. a. | RAM
BIOS | b. | CMOS
chip | c. | ROM
BIOS | d. | system
clock | | |
|
|
15.
|
Data stored
in virtual memory is actually stored in a file on the hard drive called a(n) ____. a. | RAM
cache | b. | buffer | c. | swap file | d. | overflow file | | |
|
|
16.
|
When
configuring a mixture of legacy and Plug and Play cards, ____ cards are configured
first. a. | Plug and
Play | b. | legacy | c. | right-most | d. | left-most | | |
|
|
17.
|
The entry in
the Windows 95 MSDOS.SYS file that contains the location of the Windows 9x directory is
____. a. | WinBootDir= | b. | WinDir= | c. | HostWinBootDrv= | d. | BootGUI= | | |
|
|
18.
|
In early
motherboards, the Intel 8259 microchip was used to manage ____. a. | IRQs | b. | DMA channels | c. | serial
ports | d. | parallel ports | | |
|
|
|
Figure 33
|
|
19.
|
In Figure
3-3, Item C is the ____. a. | system board connections for IDE and floppy
drives | b. | DIMM slots | c. | P1 power connection on the system board | d. | PCI local bus
slots | | |
|
|
20.
|
In Figure
3-3, Item D is the ____. a. | system board connections for IDE and floppy
drives | b. | DIMM slots | c. | P1 power connection on the system board | d. | PCI local bus
slots | | |
|
|
21.
|
An
error-checking procedure for memory, whereby either every byte has an even number of ones or every
byte has an odd number of ones is known as ____. a. | checksum | b. | parity | c. | ESCD | d. | PRAM | | |
|
|
22.
|
Electrically
Erasable Programmable ROM (EEPROM), also known as ____, allow their contents to be
changed. a. | PRAM | b. | RAM | c. | PROM | d. | Flash ROM | | |
|
|
23.
|
A ____ is an
environment that a 32-bit protected-mode OS provides for a real-mode program to operate
in.
|
|
|
|
|
24.
|
In Fig04-09,
Item B represents ____ memory. a. | upper | b. | expanded | c. | conventional | d. | HMA | | |
|
|
25.
|
Because the
OS manages a file on the disk as a group of clusters, a cluster is also called a
____. a. | sector | b. | segment | c. | file allocation unit | d. | track | | |
|
|
26.
|
A
high-density 3.5" floppy disk can have up to ____ entries in the root
directory.
|
|
27.
|
CHS mode
requires ____ bytes per sector.
|
|
28.
|
A ____ file
contains a list of DOS commands in a text file. a. | command | b. | executable | c. | batch | d. | list | | |
|
|
29.
|
Hewlett
Packard recommends a printer cable length not to exceed ____ feet.
|
|
30.
|
To clean a
mouse, remove the cover and mouse ball, and use a cotton swab dipped in a very small amount of ____
to clean the rollers. a. | alcohol | b. | WD-40 | c. | liquid soap | d. | solvent | | |
|
|
31.
|
When
purchasing a monitor, consider one with a dot pitch of no more than ____ mm.
|
|
|
Figure 106
|
|
32.
|
In Figure
10-6, Item B is most likely a(n) ____. a. | volume control | b. | eject load
button | c. | emergency eject hole | d. | headphone
jack | | |
|
|
33.
|
The
'sampling rate' refers to ____. a. | the frequency of the sound | b. | the number of samples
taken over a given period of time | c. | the number of 'voices' the sound card
supports | d. | the kinds of sound files supported | | |
|
|
34.
|
Most game
music is stored in ____ files, but most multimedia sound is stored in ____ files. a. | MPEG,
JPEG | b. | WAV,
MIDI | c. | MIDI,
WAV | d. | JPEG,
MPEG | | |
|
|
35.
|
Digital
camera pictures are usually stored in ____ format.
|
|
36.
|
In an
electrical circuit, electrons seek a place of rest by moving from a ____ charged location (called
"hot") to a ____ charged location (called "ground). a. | neutrally,
negatively | b. | positively, negatively | c. | negatively,
positively | d. | positively, neutrally | | |
|
|
37.
|
____ are
calculated by multiplying volts by amps. a. | Volts | b. | Amps | c. | Ohms | d. | Watts | | |
|
|
|
Figure 118
|
|
38.
|
In Figure
11-8, Item A is the electronic symbol for ____. a. | resistor | b. | transistor | c. | diode | d. | ground | | |
|
|
39.
|
In Figure
11-8, Item C is the electronic symbol for ____. a. | resistor | b. | transistor | c. | diode | d. | ground | | |
|
|
40.
|
The type of
fire extinguisher that is rated to handle electrical fires is Class ____.
|
|
41.
|
DOS and
Windows 3.x use ____. a. | 32 bit code | b. | 24 bit code | c. | 16 bit code | d. | 8 bit code | | |
|
|
42.
|
If Windows
9x does not find a System.dat, it will automatically replace it with ____. a. | System.da0 | b. | System.bak | c. | User.dat | d. | System.old | | |
|
|
43.
|
The NTVDM
reserved for all 16-bit Windows 3.x applications is called the ____ environment. a. | legacy
machine | b. | Virtual Windows machine | c. | Win16 on Win32
(WOW) | d. | user machine | | |
|
|
44.
|
The most
important reason to buy a brand-name PC rather than a clone is ____. a. | price | b. | brand loyalty | c. | proprietary
components | d. | after-sales service and support | | |
|
|
|
|
|
45.
|
In an EIDE
configuration, the reason you would install the CD-ROM and the Zip drive in the secondary controller,
and the hard drive on the primary controller is that ____. a. | the CD-ROM and Zip
drive MUST be on the secondary controller | b. | the CD-ROM and Zip drive MUST be on the same
controller | c. | the hard drive is faster and should be matched up with the primary
controller | d. | it is just done that way | | |
|
|
46.
|
____ is used
by the PC and ____ is used by the modem. a. | Xon, Xoff | b. | CTS, RTS | c. | Xoff, Xon | d. | RTS, CTS | | |
|
|
47.
|
The protocol
____ is not provided at the session and presentation layer of the OSI mode.
|
|
|
|
|
48.
|
In Fig18-2,
Item 3 represents the ____ stage of the laser print cycle. a. | developing | b. | conditioning | c. | cleaning | d. | writing | | |
|
|
49.
|
Typically, a
____ PC Card is used to add modems, network cards, etc. to the laptop. a. | Type
I | b. | Type
II | c. | Type
III | d. | Type
IV | | |
|
|
50.
|
A(n) ____
virus changes its distinguishing characteristics as it replicates. a. | polymorphic | b. | encrypting | c. | stealth | d. | covert | | |
|