This document contains 35 multiple choice questions related to computer hardware, software, networking and troubleshooting. Some key topics covered include printer troubleshooting, memory installation, Windows partitions, firewall configuration, and security best practices.
Introduction to Systems with Examples and Introduction to Embedded Systems, History, Advantages, Applications, Classifications,What is inside Embedded System, Architecture, Features and Languages used in Embedded Systems advantages and disadvantages
EC8791-Embedded and Real Time Systems #7th Sem ECE #Embedded System Introduction # Embedded System Real Time Examples #Career opportunity in Embedded System Filed #Growth of Embedded System
An embedded system is a combination of the computer hardware and software accomplished with additional mechanical or other parts designed to perform a specific function.
Embedded software is an almost every electronic device in the use today. There is a software hidden away inside our watches, VCR's, cellular phones.A well-designed embedded system conceals the existence of the processor and the software .
http://www.edgefxkits.com/
Visit our page to get more ideas on embedded system by professionals.
Edgefx provides free verified embedded system kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
#Learn_and_Compete
by:Eslam Said
Outlines:
▪ What’s Embedded Systems ?
▪ Embedded Systems Applications
▪ Embedded systems Components
▪ The Embedded real time systems
▪ Embedded systems Constraints
▪ Embedded Systems Characteristics
Embedded application is a software application, basically written to control the devices or machines. DT offers a range of embedded software development services in the domain of embedded product.
Introduction
Embedded Operating Systems
Applications of Embedded Systems
Characteristics of Embedded Systems
Architecture of Real Embedded Systems
Embedded Operating System
Real Time Operating Systems (RTOS)
Introduction to Systems with Examples and Introduction to Embedded Systems, History, Advantages, Applications, Classifications,What is inside Embedded System, Architecture, Features and Languages used in Embedded Systems advantages and disadvantages
EC8791-Embedded and Real Time Systems #7th Sem ECE #Embedded System Introduction # Embedded System Real Time Examples #Career opportunity in Embedded System Filed #Growth of Embedded System
An embedded system is a combination of the computer hardware and software accomplished with additional mechanical or other parts designed to perform a specific function.
Embedded software is an almost every electronic device in the use today. There is a software hidden away inside our watches, VCR's, cellular phones.A well-designed embedded system conceals the existence of the processor and the software .
http://www.edgefxkits.com/
Visit our page to get more ideas on embedded system by professionals.
Edgefx provides free verified embedded system kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
#Learn_and_Compete
by:Eslam Said
Outlines:
▪ What’s Embedded Systems ?
▪ Embedded Systems Applications
▪ Embedded systems Components
▪ The Embedded real time systems
▪ Embedded systems Constraints
▪ Embedded Systems Characteristics
Embedded application is a software application, basically written to control the devices or machines. DT offers a range of embedded software development services in the domain of embedded product.
Introduction
Embedded Operating Systems
Applications of Embedded Systems
Characteristics of Embedded Systems
Architecture of Real Embedded Systems
Embedded Operating System
Real Time Operating Systems (RTOS)
Data Acquisition and Control System for Real Time Applicationsijsrd.com
This paper proposes an Embedded Ethernet which is nothing but a processor that is capable to communicate with the network. This helps in data acquisition and status monitoring with the help of standard LAN. Currently device with processor is widely used in industrial field. The Embedded Ethernet provides web access to distributed measurement/control systems and provides optimization for instrumentation, educational laboratories and home automation. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM Processor based Embedded Ethernet interface is presented. In this design, data can be transmitted transparently through Ethernet interface unit to remote end desktop computer. By typing the IP address of LAN on the ARM9 board, the user gets sensor values on the PC screen at remote station. This provides the status of the devices at remote field. The user can also control the devices interfaced to the ARM9 Board by pressing the button displayed on the GUI of the remote Desktop PC.
Outdoor LED Billboard IPC --- function introductionMax Dan
One:WiFi/ X86 computer architecture, wireless way for the Bluetooth /3G (similar to Internet cafes in the wired way to change the way)
Two: IPC LED hardware appearance and profile (detailed internal structure and operating instructions see IPC LED manual)
Contact:
Rettar Du
General Manager
Ocolour Technologies Co., Limited
Tel: +86-755-2691 5212
Fax: +86-755-6160 5212
Web: www.ocolour.com
Email/Skype: info@ocolour.com
Mob/Whatsapp: +86-186 6458 8467
Add: Huamei Rd., Songgang Ave.,
Songgang Town, Bao’an District, Shenzhen, China
Design and Development of ARM9 Based Embedded Web ServerIJERA Editor
This paper describes the design of embedded web server based on ARM9 processor and Linux platform. It
analyses hardware configuration and software implementation for monitoring and controlling systems or
devices. User can monitor and control temperature and smoke information. It consists of application program
written in „C‟ for accessing data through the serial port and updating the web page, porting of Linux 2.6.3x
Kernel with application program on ARM9 board and booting it from the RAM.
The Unified Computing System is a next-generation database platform that Unites compute, network, storage access, and virtualization into a cohesive system
This is an Final Year Project implemented by Er. Anal Prasanna Salshingikar during Diploma in Engineering
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
Project
Purpose
The purpose of this project is to provide an opportunity for students to apply network administration and design competencies gained throughout this course.
Deliverables
Please choose ANY FOUR options from the following five options and complete the report for your chosen four options (OPTION 1 is MANDATORY).
Option 1: Network Design Case (100 points)
Option 2: Windows Security Firewall (33.33 points)
Option 3: Configuring OSPF Routing (33.33 points)
Option 4: Configuring EIGRP Routing (33.33 points)
Option 5: IPv6 Address Configuration (33.33 points)
Option 1: Network Design Case
Scenario
Consider that the prevailing market conditions have made it possible for our firm to expand our current operations. I have presented several options to our board of directors and they are eager to proceed with an expansion except for one condition. The board feels that our current telecommunications infrastructure hinders our business operations and that it is imperative to design a new voice and data infrastructure to facilitate the planned expansion. The board is prepared to advocate any prudent expenditure necessary to implement a new infrastructure at the upcoming stockholder’s meeting.
As you know, our firm is headquartered in San Antonio where we occupy the first and third floor of a large, but somewhat antiquated building. Each floor of the building measures 400 ft. by 250 ft. We currently have 52 Pentium-based PC’s located on the third floor to meet the needs of our accounting, billing, and phone sales departments. The first floor contains 17 Pentium-based computers and six Apple PowerMacs used by management, our receptionist, walk-in sales staff, and our adjusters. We currently have a 10Base2 network that is used to connect some, but not all, of our existing systems. The previous network manager told us the remaining systems could not be networked due to the 10Base2 architecture. We also have smaller offices in Austin, Houston, and Corpus Christi. These offices generally have 4 to 6 Pentium or Apple-based computers. The computers in these locations are not currently networked.
Our immediate expansion plans, if approved by the shareholders, include opening a second office in Houston, two offices in Dallas and an office in El Paso. These offices will be similar to the existing small offices operated in Austin, Houston and Corpus Christi. My vision for the new telecommunications network includes having all of the existing and proposed offices connected together in a seamless, secure manner. All of the computers in all of the offices should be connected.
Deliverables:
· I need to understand whether or not we can continue to build on our current network and why. I also need to know what we should use to replace it if we need to do so.
· I see the network as consisting of two primary parts, the networks within each facility and the network that connects the various facilities together. Please provide diagrams that illustrate h ...
Cisco discovery d homesb module 1 - v.4 in english.
Template 8
1. http://multishares.blogspot.com/2012/01/cisco-it-essential-v41-final-exam-11-16_20.html
1
A network administrator has been informed about a problem with the network printer. What is the most reliable way to
prevent print jobs from being added to the queue while the printer is being repaired?
– Stop the print spooler.
2
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
– regional settings
– network settings
3
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing.
After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS.
Which port should be opened to solve the problem?
– 443
4
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST
audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What
are two possible causes of this problem? (Choose two.)
– The monitor cable connector is loose or disconnected because the retaining screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.
5
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition
6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems
comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will
best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.
7
Which feature is characteristic of the ntbackup command?
– It is used create restore points.
8
Which safety precaution should an installer take when installing cable in the ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the installation.
9
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank.
2. Which security control measure provides the most secure solution for employee identification?
– biometric devices
10
Which Startup type must be selected for a service that should run each time the computer is booted?
– automatic
11
What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST
12
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the
memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
– SODIMM
13
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.
14
Refer to the exhibit. Which utility has the IT department started on each computer?
– Defragment
15
A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the
taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this
problem?
– Start the Vista Aero enhanced display features by launching services.msc.
16
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which
encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
– VPN
17
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
– thermal compound
18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
3. – 25
– 110
– 143
19
A company has a preventive maintenance policy that requires every computer have a new restore point created every six
months. How can a technician create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.
20
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin
21
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of
data?
– SCSI (Ultra-320)
22
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy.
Which physical topology requires that every node is attached to every other node on the network?
– mesh
23
What is the highest risk associated with improperly charged or mishandled batteries?
– The battery can explode.
24
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary
25
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.
26
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.
27
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.
4. 28
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is
unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.
29
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security
technique should the manager take to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.
30
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try
first in order to correct the problem?
– Defragment the hard disk.
31
A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try
to repair the problem? (Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.
32
Refer to the exhibit. Based on the information shown, which statement is true?
– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.
33
Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is
accurate regarding this motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.
34
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0
35
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics
performance. Which type of memory should be installed?
– RAM
1
5. A network administrator has been informed about a problem with the network printer. What is the most reliable way to
prevent print jobs from being added to the queue while the printer is being repaired?
– Stop the print spooler.
2
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
– regional settings
– network settings
3
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing.
After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS.
Which port should be opened to solve the problem?
– 443
4
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST
audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What
are two possible causes of this problem? (Choose two.)
– The monitor cable connector is loose or disconnected because the retaining screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.
5
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition
6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems
comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will
best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.
7
Which feature is characteristic of the ntbackup command?
– It is used create restore points.
8
Which safety precaution should an installer take when installing cable in the ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the installation.
9
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank.
Which security control measure provides the most secure solution for employee identification?
– biometric devices
10
Which Startup type must be selected for a service that should run each time the computer is booted?
– automatic
11
What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST
12
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the
memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
– SODIMM
13
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.
14
Refer to the exhibit. Which utility has the IT department started on each computer?
– Defragment
6. 15
A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the
taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this
problem?
– Start the Vista Aero enhanced display features by launching services.msc.
16
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which
encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
– VPN
17
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
– thermal compound
18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
– 25
– 110
– 143
19
A company has a preventive maintenance policy that requires every computer have a new restore point created every six
months. How can a technician create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.
20
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin
21
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of
data?
– SCSI (Ultra-320)
22
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy.
Which physical topology requires that every node is attached to every other node on the network?
– mesh
23
What is the highest risk associated with improperly charged or mishandled batteries?
– The battery can explode.
24
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary
25
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.
26
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.
27
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.
28
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is
unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.
7. 29
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security
technique should the manager take to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.
30
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try
first in order to correct the problem?
– Defragment the hard disk.
31
A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try
to repair the problem? (Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.
32
Refer to the exhibit. Based on the information shown, which statement is true?
– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.
33
Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is
accurate regarding this motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.
34
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0
35
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics
performance. Which type of memory should be installed?
– RAM
What is one advantage of a solid state drive?
– less prone to failure than a traditional drive
2
A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys.
After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions
the technician could take? (Choose two.)
– Replace the keyboard.
– Use an external keyboard until the laptop keyboard is replaced
3
A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly
when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds
normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is
the most likely cause of the excessive hard disk activity?
– disk fragmentation
4
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
– biometrics
5
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is
the most important reason for the company that the preventive maintenance be done?
– Preventive maintenance helps to protect the computer equipment against future problems.
6
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken
to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
8. – Avoid lifting the equipment using the strength in your back
– Lift the equipment using the strength in your legs and knees
7
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password
in order for the authentication to be accepted?
– smart key
8
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which
two short-range technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
9
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose
two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
10
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
11
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of
commands should the technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
12
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by
manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce
any output. Which three actions could possibly resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
13
A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible
causes and solutions for this problem? (Choose two.)
– The laptop BIOS should be upgraded when installing the RAM.
– The new RAM is defective and must be replaced.
14
A technician has received several reports from employees about receiving e-mail from websites that request private bank
information. Which type of security should be implemented to block employees from accessing these suspicious
websites?
– phishing protection
15
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to
ensure that a removable external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
16
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the
login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
17
A network technician is installing network service in a new office. What is the distance limitation of a single data run for
UTP cabling without adding networking devices?
9. – 330 ft (100 m)
18
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
19
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
20
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the
computer. What could the technician do to reset the monitor settings?
– Use the F8 key.
21
A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is
connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What
should be recommended as a solution?
– The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the
control panel.
22
Which external connection technology would a technician choose for a customer who wants to connect a device capable
of a data transfer rate of 700 Mb/s to a computer?
– IEEE 1394b (Firewire)
23
A Windows XP computer that once had three operating systems installed now has only one operating system. However,
when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows
the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and
Recovery area. Click Edit.
24
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC
and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines
that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
– The monitor was damaged during cleaning.
25
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
26
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all
pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The
computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal
performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
28
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
29
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by
a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the
technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
30
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and
10. keyboard of a computer in a branch office?
-Remote Desktop Protocol
31
A technician is compiling a company computer support training manual. One of the utilities that is described in the
manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.
32
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a
newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
33
A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the
highest possible performance. Which type of RAID should the technician install?
-RAID level 0 – data striping
34
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
35
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
36
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the
remote installations to fail? (Choose two.)
-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.
37
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users
should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to
the user?
-modify
38
A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What
could the technician do to remedy the problem?
-Reload TCP/IP on the computer.