Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

IT Essentials Final Exam Answers, Exams of Information and Communications Technology (ICT)

A list of questions and answers related to IT Essentials. The questions cover topics such as RAID adapters, input devices, external storage, power supply, wireless networks, safety data sheets, digital multimeters, CPU cleaning, expansion slots, NTFS file system, hard drives, system resources, cloud computing, network connectivity, laptop input devices, and laptop screen issues. useful for IT students who want to prepare for their exams or improve their knowledge in IT Essentials.

Typology: Exams

2023/2024

Available from 10/18/2023

hesigrader01
hesigrader01 🇺🇸

3.5

(6)

1.1K documents

1 / 33

Toggle sidebar

Related documents


Partial preview of the text

Download IT Essentials Final Exam Answers and more Exams Information and Communications Technology (ICT) in PDF only on Docsity! Page 1 IT Essentials (ITE v6.0) Final Exam Answers 100% Full Update 1. What is the purpose of RAID adapters? o to allow older PCI technology expansion slots to be used o to provide enhanced audio and graphic capabilities o to connect multiple storage devices for redundancy or speed o to connect peripheral devices to a PC to improve performance 2. Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television? o DVI o HDMI o PS/2 o DB-15 3. Which type of input device can identify users based on their voice? o digitizer o KVM o switchbiometric identification device o scanner 4. What type of external storage should be used by a technician to back up over 2 TB of music and video data files? o CompactFlash card o external flash drive o external hard drive o Secure Digital card 5. What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss? o surge suppressor o uninterruptible power supply o standby power supply o power inverter 6. Which measure can help control RFI effects on wireless networks? Page 2 o Ensure the humidity and temperature levels are set as low as possible. o Ensure the number of wireless NICs exceeds the number of wireless phones. o Ensure the wireless network is on a different frequency than the offending source. o Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs. 7. What is the purpose of a Safety Data Sheet? o to specify procedures for dealing with potentially hazardous materials o to specify procedures in designing and building common computer systems o to specify procedures for the operation of sensitive components and prevention of electrostatic discharge o to specify procedures in the use of humidity control and prevention of moisture damage 8. What can be tested with a digital multimeter? o wireless signal strength and access point positioning o basic functionality of computer ports o copper cable location o quality of electricity in computer components 9. When should a technician avoid wearing an antistatic wrist strap? o when installing RAM o when replacing a power supply unit o when installing a hard drive o when opening a computer case 10. Which solution should be used to clean a CPU and a heat sink? o soap and water o rubbing alcohol o a diluted ammonia solution o isopropyl alcohol 11. Which two types of expansion slots would be used by a wireless NIC in a computer today? (Choose two.) o PCIe o AGP o PCI o DIMM o ISA Page 5 o Use a can of compressed air to remove excess dust. o Use a moistened cotton swab to remove excess dust. 17. Which built-in tool is available on a Mac OS X machine to perform disk backups? o Disk Utility o Deja Dup o Finder o Time Machine 18. A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented? o everything that was done to try to solve the problem o only the solution, because this solved the problem o only the failed attempts, so that future technicians will know what not to try o a description of the problem and solution 19. After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure? o Create a System Repair Disc and restore the image. o Press the F12 key during the boot process and start the computer in Safe Mode. o Boot from a Windows 7 installation media and access the System Restore utility. o Access the Control Panel and choose Restore Files from Backup from the System and Security menu. 20. What are two advantages of the NTFS file system compared with FAT32? (Choose two.) o NTFS allows faster access to external peripherals such as a USB drive. o NTFS supports larger files. o NTFS provides more security features. o NTFS allows faster formatting of drives. o NTFS is easier to configure. o NTFS allows the automatic detection of bad sectors. 21. What type of hard drive contains flash memory for caching frequently used data but stores the most of the data on a magnetic hard disk drive? o USB flash drive o solid-state drive o embedded multimedia card Page 6 o solid-state hybrid disk 22. What does %USERPROFILE% represent in the path C:\Users\%USERPROFILE%\AppData\Local\ Temp? o the location of the Documents folder of a particular user o an environment variable that is set by the operating system o a variable set by the administrator for each user of the system o a fixed value that represents the level of access of a user to system files 23. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application? o Task Manager o Add or Remove Programs o Event Viewer o System Restore 24. A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems? o Computer Management o Device Manager o My Computer o System Tools 25. Which technology provides a solution for PC virtualization? o hypervisor o server clustering o Terminal Services o RAID 26. What are two consequences of setting an incorrect boot order in the system BIOS? (Choose two.) o The computer locks up without any error messages. o The computer displays a “BOOTMGR is missing” error after POST. o The computer displays an “Invalid Boot Disk” error after POST. o The computer continually restarts without displaying the desktop. Page 7 o The computer displays an „Inaccessible Boot Device‟ error after POST. Page 10 o net cisco.com o ping cisco.com o nbtstat cisco.com o ipconfig /flushdns 32. Which wireless security mode supports government grade security and offers both personal and enterprise authentication? o WEP o WPA2 o WPA o LEAP 33. Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web? o PaaS o IaaS o SaaS o ItaaS 34. A network administrator occasionally asks a technician to make sure that dust does not accumulate on devices in the network equipment closets. What is the purpose of having the technician do this job? o Dust can cause network equipment to overheat and cause problems on the network. o Dust increases electromagnetic interference in nearby connected cables. o Dust can encourage insects and other pests to live in the equipment closets. o Dust is considered a fire hazard that poses danger to personnel and equipment. o Dust diminishes the range of wireless services. 35. A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can receive responses from workstations on the same subnet but not from remote workstations. What could be causing the problem? o The NIC driver is out of date. o The operating system is not compatible with the remote sites. o The TCP/IP protocol stack is not loaded. o The default gateway is incorrect. 36. What are three common input devices found on laptops? (Choose three.) Page 11 o touchpad Page 12 o fingerprint reader o web camera o external monitor o PS/2 keyboard o AC power connector 37. A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem? o The touchscreen is not calibrated. o An app is not compatible with the device. o The operating system has encountered an error. o A power-intensive app is running at the background. 38. A computer technician has decided that a problem with a laptop can be solved by repairing a hardware component. What should be done first before attempting to repair a hardware component on a laptop? o Consult the service manual for the laptop. o Ask a fellow technician for advice. o Backup the BIOS settings. o Remove the keyboard. 39. Which closed-ended question would be appropriate for a technician to use to narrow down the possible problems on a laptop that will not power on? o Can the laptop operate using the AC adapter? o Have you changed your password recently? o What software has been installed recently? o What were you doing when the problem occurred? 40. A technician is troubleshooting the appearance of flashing lines on a laptop screen. What are two possible causes of this distortion? (Choose two.) o Power to the pixels has been removed. o The display settings have been changed. o The GPU is not cooling correctly. o The LCD cutoff switch is damaged. o The display is not correctly installed. 41. What is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaced? Page 15 o Use airplane mode if you are accessing the Internet at an open Wi-Fi site. Page 16 o Ensure that the operating system software and applications contain the latest updates. o Unmount all unused disk partitions. 45. A tire store needs to use carbon copy paper to print customer invoices so that both the store and the customer have a copy. What is the best printer solution? o piezoelectric printer o inkjet printer o thermal printer o impact printer 46. A user on a home network wants to share a printer from a Windows 7 computer. What must the user do in order for other Windows 7 computers in the house to obtain the proper driver? o The user must browse the Internet, then download and install the proper driver. o The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded. o Nothing. Windows automatically provides the driver. o The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers. 47. Which three components are typically found in laser printer maintenance kits? (Choose three.) o fuser assembly o primary corona o pickup rollers o transfer rollers o secondary corona o paper trays 48. What characterizes a DDoS attack? o Many hosts participate in a coordinated attack. o Infected computers are called daemons. o It is easy to identify the source of the attack. o All hosts must be in the same geographic area. 49. What guideline should be followed when establishing a password security policy? Page 17 o Passwords should be physically stored in a convenient location. o Passwords should contain mainly numbers for better encryption. o The system administrator should assign passwords to the users. Page 20 o Make the users members of a group called Backup Operators. Page 21 o Check the Folder is Ready for Archiving box in the properties of each folder. 60. Match the facility access control devices to the correct descriptions. (Not all options are used.) o Question ITE Final Exam v6 Question 001 o Answer ITE Final Exam v6 Answer 001 61.Why do laptop computers use CPU throttling techniques? o to enhance the performance of the CPU o to reduce the heat that the CPU may generate o to ensure the CPU is running at its peak speed o to conserve the battery life by reducing the bus speed between the CPU and RAM 62. What tool is included in the Mac OS X for backing up disks to image files and recovering disk images? o Disk Utility o Deja Dup Page 22 o Disk Error-Checking o System Restore 63. A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.) o Avoid lifting the equipment using the strength in your back. o Lift the equipment using the strength in your legs and knees. o Avoid bending your knees when lifting the printer. o Bend your back to pick the printer up. o Avoid lifting the printer close to your body. 64. Refer to the exhibit. As part of the process of building a computer, what is the proper order of the first three steps in the installation of a power supply? ITE Final Exam v6 002 o Steps 1, 2, 4 o Steps 1, 3, 2 o Steps 1, 4, 3 o Steps 2, 3, 4 65. Which two operations can help prevent a mobile device from being tracked without permission? (Choose two.) o Turn off the GPS when not in use. o Use a VPN connection whenever possible. o Set the device to not store credentials. o Set the device to connect only to known WiFi networks. o Disable or remove apps that allow connections to the GPS. 66. What is a characteristic of a computer power connector? o A Molex power connector supplies power to a motherboard. Page 25 o Update the driver for the graphics card. o Run the programs in Compatibility Mode. o Use the recovery partition to reinstall Windows. 77. After a Windows operating system has been installed, which program would a technician use to select the programs that will run at startup? o Ntldr o Regedit o Msconfig o Task Manager 78. Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure? o PAN o WAN o LAN o MAN 79. What are the four layers in the TCP/IP reference model? o application, presentation, internet, network access o application, transport, network, data link o application, transport, internet, network access o application, presentation, session, transport o physical, data link, network, transport 80. A user wants to map a network drive on a PC that is named “WORK2” and runs Windows 7. The name of the shared resource the user wishes to map to is called “installs” and is located on a workstation called “WORK1”. What would be the correct path for mapping the network drive? o \\ username\WORK2\\installs o \\username\password/WORK1/installs o // WORK2/installs o \\work1\installs o \\username\Work2\installs o \WORK2|installs 81. A customer who travels frequently wants to know which technology is the most suitable for being connected to the corporate network at all times at low cost. Which network technology would a network administrator recommend? Page 26 o satellite o ISDN o cellular o microwave 82. What is the difference between cloud computing and a data center? o A data center provides access to shared computing resources, wheras a cloud is a private on-premise facility that stores and processes local data. o Cloud computing solutions are network resources and services provided to the clients through the use of services from data centers. o The data center makes use of more devices to process data. o Data centers require cloud computing but cloud computing does not require data centers. 83. A user complains about being unable to connect to the wireless network. Which two actions should be part of troubleshooting the wireless connection? (Choose two.) o Verify that the laptop is plugged into an electrical outlet. o Reconfigure TCP/IP settings on the laptop. o Reinsert the laptop battery. o Try moving the laptop to different places to see if a signal can be detected. o Verify in the laptop software whether any wireless networks are detected. 84. A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem? o The NIC driver is out of date. o The operating system is not compatible with the remote sites. o The TCP/IP protocol stack is not loaded. o The default gateway is not set. 85. An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer’s problem? o improper IP address configuration on the host o hardware failure of the ISR used to connect the customer to the ISP o bad cables or connections at the customer site Page 27 o failure of DNS to resolve names to IP addresses Page 30 91. What is the purpose of using the MIME email protocol on mobile devices? o to enable pictures and documents to be included in email messages o to re-synchronize the email account with other devices o to remotely lock the email account if the device is stolen o to encrypt the email messages 92. What is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaced? o if the battery only supports the system for a reduced period of time o if there are signs of swelling o if the screen brightness begins to dim o if the device feels warm to the touch 93. A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.) o Inkjet printers are less expensive as an initial purchase than laser printers. o A laser printer is significantly slower than an inkjet printer. o Both laser and inkjet printers produce poor quality images. o The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing. o Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper. 94. For cleaning a laser printer, what should be used to pick up excess particles of toner? o a HEPA-capable vacuum o a lint-free cloth o isopropyl alcohol o a damp cloth 95. Which two password control policies should an organization implement to ensure strong passwords? (Choose two.) o Passwords should be set to expire every 60 days. o Passwords should contain no more than eight characters. o Passwords must contain encrypted characters. o Passwords should contain letters and numbers. o Passwords should contain only capital letters. Page 31 96. A computer technician has been asked to secure all Windows 7 computers by encrypting all the data on each computer. Which Windows feature should be used to provide this level of encryption? o BitLocker o EFS o TPM o Windows Update 97. The activity of a previously unknown program triggers an alert by Windows firewall. What three options will the user have for dealing with this event? (Choose three.) o Keep blocking o Unblock o Ask me later o Deny all o Turn off o Turn on 98. A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.) o Log in as a different user. o Disconnect the computer from the network. o Search helpdesk repair logs for more information. o Discuss solutions with the customer. o Ask the customer open-ended questions about the problem 99. A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do? o Tell the customer to install 2 GB of DDR3 PC3-10600 RAM. o Explain that the original technician is no good and the supervisor will be told. o Suggest that the customer purchase a new computer. o Confirm the issues and give detailed instructions to solve the problem. Page 32 100. What expectation is defined in the service level agreement between an organization and service vendor? o guaranteed service response time o maximum number of service calls per day o chain of custody procedures o communication etiquette rules 101. In which circumstance should a level one technician initiate an escalated work order? o when a customer appears to be very knowledgeable o when a customer demands talking to a particular technician o when a problem requires expertise from another technician o when the technician cannot understand the problem as explained by the customer 102. An application appears frozen and is not responding to a mouse or the keyboard. What Windows OS tool can be used to stop the application? o Event Viewer o Task Manager o Device Manager o Disk Management 103. Which two issues are likely to cause BSOD errors? (Choose two.) o out-of-date browser o RAM failing o device driver errors o lack of antivirus software o power supply failure 104. A user has installed a new FTP client on a computer, but is unsuccessful in connecting to an FTP server. Which two key pieces of information should the user ensure are configured correctly on the FTP client? (Choose two.) o username o password o FTP client IP address o FTP server IP address o FTP client port number o FTP server port number
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved