Name: 
 

VICA - Computer Maintenance Technology (version 5)



Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

1. 

____ chips require less electricity than TTL chips.
a.
CMOS
b.
Resistor
c.
PROM
d.
RAM
 

2. 

The ____ ensures that all activities are performed in a synchronized fashion.
a.
system bus
b.
system clock
c.
real time clock
d.
CPU
 

3. 

The ____ slot is used specifically for accelerated graphics video cards.
a.
SIMM
b.
AGP
c.
PCI
d.
ISA
 
 
cmt5_files/i0050000.jpg
Figure 1–31
 

4. 

In Figure 1-31, item A is an example of a(n) ____ interface.
a.
GUI
b.
command driven
c.
interrupt driven
d.
graphical
 

5. 

Windows 2000 Datacenter Server is designed to support up to ____ processors and up to ____ GB of memory.
a.
16, 32
b.
32, 64
c.
64, 128
d.
128, 256
 
 
cmt5_files/i0080000.jpg
Figure 2–9
 

6. 

What type of bus is displayed in Figure 2-9?
a.
16-bit ISA
b.
VESA
c.
8-bit ISA
d.
PCI
 

7. 

Circuitry found on the system board that is also commonly found as a separate device is known as a(n) ____ component.
a.
intrinsic
b.
external
c.
auxiliary
d.
embedded
 

8. 

When the CPU is substantially faster than other components, it must wait on the slower device. This CMOS-configured delay is referred to as a ____.
a.
suspend state
b.
delay factor
c.
wait state
d.
clock wait
 

9. 

The '2' in 486DX2-50 means that ____.
a.
the system clock speed is doubled
b.
the CPU internal speed is half as fast as the system clock
c.
the system clock speed is reduced by half
d.
the CPU internal speed is twice that of the system clock
 

10. 

The bus used in the IBM PC is now called the ____ bus.
a.
S-100
b.
8-bit ISA
c.
16-bit ISA
d.
EISA
 

11. 

As a response to IBM's introduction of the MCA bus, the 'Gang of Nine" designed and built a competing bus know as the ____ bus.
a.
VESA
b.
ISA
c.
EISA
d.
PCI
 

12. 

Devices connected to the VESA bus must run at the same clock speed as the CPU, which forces the CPU to endure frequent ____.
a.
overheating
b.
General Protection Faults
c.
parity errors
d.
wait states
 

13. 

If your system board does not support EDO memory, ____.
a.
you should not use EDO memory as it could seriously damage your board
b.
you should still use EDO memory, as it will dramatically increase performance
c.
you can use EDO memory, but it will not increase system performance
d.
you can only use FPM RAM
 

14. 

The largest amount of memory that a driver needs to initialize itself and to hold its data is called the maximum size, or the ____.
a.
payload
b.
capacity
c.
load size
d.
holding
 

15. 

A pie-shaped wedge magnetically mapped on a disk is a ____.
a.
trace
b.
track
c.
sector
d.
partition
 

16. 

The series of clusters that represent a file are referred to as a ____.
a.
segment
b.
cluster chain
c.
file chain
d.
file segment
 

17. 

In Windows 9x, floppy disk management is carried out in ____.
a.
Internet Explorer
b.
Windows Explorer
c.
SYSMANAGER
d.
Control Panel
 

18. 

Placing a disk in a faulty drive and issuing a command to access the disk can cause which command to appear on the screen?
a.
General failure reading drive A, Abort, Retry, Fail?
b.
Bad command or file name
c.
Invalid or missing COMMAND.COM
d.
Invalid Drive Specification
 
 
cmt5_files/i0220000.jpg
Figure 6–4
 

19. 

In Figure 6-4, Item A is next to a darker segment of the graphic, representing a ____.
a.
cylinder
b.
segment
c.
track
d.
sector
 

20. 

In Figure 6-4, Item B is next to a darker concentric circle, representing a ____.
a.
FAT
b.
segment
c.
track
d.
sector
 

21. 

FAT32 uses ____K clusters for hard drives from 8G to 16G in size.
a.
2
b.
4
c.
8
d.
16
 

22. 

The maximum amount of storage using CHS mode is ____ MB.
a.
350
b.
528
c.
650
d.
986
 

23. 

Of the fundamental troubleshooting rules, ____ suggests that you "ask simple questions".
a.
divide and conquer
b.
don't overlook the obvious
c.
approach the problem systematically
d.
assume nothing
 

24. 

When a PC boots, ____ indicate(s) that all is well after the POST.
a.
four beeps
b.
three beeps
c.
two beeps
d.
one beep
 
 
cmt5_files/i0290000.jpg

Figure 8–4
 

25. 

What key(s) would you press during startup to get the menu shown in Figure 8-4?
a.
CTRL-Esc
b.
F6
c.
CTRL-ALT-DEL
d.
F8
 

26. 

Which of the following screen sizes is NOT typical?
a.
15
b.
17
c.
19
d.
21
 

27. 

The fastest bus for video on a system board today is ____.
a.
ISA
b.
PCI
c.
AGP
d.
VESA
 
 
cmt5_files/i0330000.jpg
Figure 10–6
 

28. 

In Figure 10-6, Item A is most likely a(n) ____.
a.
volume control
b.
eject load button
c.
emergency eject hole
d.
headphone jack
 

29. 

The 'sampling rate' refers to ____.
a.
the frequency of the sound
b.
the number of samples taken over a given period of time
c.
the number of 'voices' the sound card supports
d.
the kinds of sound files supported
 

30. 

DVD can store ____ of data.
a.
650MB
b.
1.3GB
c.
8.5GB
d.
12.5GB
 

31. 

A ____ is a device that converts AC electricity to DC electricity.
a.
transformer
b.
rectifier
c.
regulator
d.
phased array
 

32. 

The bond between neutral and ground helps eliminate ____ within the PC.
a.
resource conflicts
b.
power fluctuations
c.
overheating
d.
electrical 'noise'
 

33. 

The GDI core program of Windows 9x uses ____.
a.
only 32 bit code
b.
only 16 bit code
c.
a mix of 8 and 16 bit code
d.
a mix of 16 and 32 bit code
 

34. 

A virtual machine can be thought of as a ____.
a.
machine designed for internet use
b.
logical machine within a physical machine
c.
part of the DOS operating system
d.
part of the VFAT
 

35. 

____ is called a desktop shortcut.
a.
An icon that points to an executable program
b.
A combination of keystrokes to execute a command
c.
A Windows 9x programming technique
d.
The quickest way to save a file
 

36. 

NTVDMs are contained in the ____.
a.
Kernel mode
b.
Hardware Abstraction Layer
c.
Executive Services
d.
User mode
 

37. 

To access the Advanced Options Menu in Windows 2000, press ____ at startup.
a.
F5
b.
F8
c.
CTRL-C
d.
CTRL-Shift
 

38. 

The Emergency Repair Process restores the system to the state it was in ____.
a.
at the time of the last successful boot
b.
immediately after the Windows 2000 installation
c.
before any hardware drivers were installed
d.
before the GUI was added
 
 
cmt5_files/i0450000.jpg
 

39. 

In an EIDE configuration, the reason you would install the CD-ROM and the Zip drive in the secondary controller, and the hard drive on the primary controller is that ____.
a.
the CD-ROM and Zip drive MUST be on the secondary controller
b.
the CD-ROM and Zip drive MUST be on the same controller
c.
the hard drive is faster and should be matched up with the primary controller
d.
it is just done that way
 

40. 

A differential SCSI device uses a ____ connection.
a.
10 pin
b.
25 pin
c.
50 pin
d.
100 pin
 

41. 

A digital alternative to regular phone lines is ____.
a.
ASIC
b.
POTS
c.
DSL
d.
None of the above.
 

42. 

A 16550 UART has a max speed rating of ____ Kbps.
a.
28.8
b.
56
c.
115.2
d.
230
 

43. 

The fundamental first step in modem troubleshooting is ____.
a.
call the phone company to test the line
b.
make sure the cord from the phone jack is plugged into the line jack
c.
run a terminal program to test the connection
d.
replace the phone cord
 

44. 

On an Ethernet network, if a computer detects a data collision ____.
a.
the network crashes
b.
the data is deleted
c.
the data packet is rerouted
d.
after a random amount of time the data is re-transmitted
 

45. 

The most common FDDI cabling system is ____.
a.
UTP
b.
STP
c.
Fiber-optic
d.
Coaxial
 

46. 

In the ____ step of the laser print cycle, toner is placed onto the drum where the charge has been reduced.
a.
developing
b.
writing
c.
conditioning
d.
transferring
 

47. 

To clean the print cartridge assemblage, use ____ and cotton swabs, being careful not to touch the nozzle plate.
a.
DMSO
b.
clean distilled water
c.
denatured alcohol
d.
acetone
 

48. 

A(n) ____ is a special device that allows a notebook to easily connect to a full-sized monitor, keyboard, and other peripheral devices.
a.
relay box
b.
docking station
c.
connection bay
d.
extender
 

49. 

The most common way a virus is spread is ____.
a.
commercial software
b.
Internet downloads
c.
from a floppy disk used to boot a PC
d.
from software upgrades
 

50. 

A(n) ____ virus changes its distinguishing characteristics as it replicates.
a.
polymorphic
b.
encrypting
c.
stealth
d.
covert
 



 
Check Your Work     Reset Help