Name:     ID: 
 
Email: 

PC Repair 1 Final exam

True/False
Indicate whether the statement is true or false.
 

 1. 

Excessive heat can damage the CPU and the motherboard.
 

 2. 

A simple problem of replacing a bad memory module can become a complex research project if you don’t have a good grasp of current and past memory technologies.
 

 3. 

Most often, placing memory on the motherboard and updating the BIOS manually is all that is necessary for installation.
 

 4. 

A hard disk drive (HDD), most often called a hard drive, comes in two sizes for personal computers: the 1.8" size is used for laptop computers and the 2.5" size is used for desktops.
 

 5. 

If you are replacing a floppy drive, you must inform BIOS setup by accessing setup and changing the drive type.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 6. 

What is a possible remedy if your system hangs at odd times or during the boot?
a.
Install new CMOS RAM
c.
Flash the BIOS/UEFI
b.
Remove the TPM chip
d.
Format the hard disk
 

 7. 

Where must virtualization be enabled for VM (virtual machine) software to work?
a.
Windows Control Panel
c.
TPM chip
b.
BIOS/UEFI
d.
Jumper
 

 8. 

Which of the following represents a method for accessing the BIOS/UEFI setup program?
a.
Boot Windows and go to Control Panel
c.
Press a key or combination of keys during the BIOS/UEFI POST
b.
Set a motherboard jumper and start the computer
d.
Boot to the BIOS setup floppy disk
 

 9. 

According to the text, today’s DIMMs use what size data path?
a.
16-bit
c.
64-bit
b.
32-bit
d.
128-bit
 

 10. 

A processor housing that contains more than one processor is referred to as what term?
a.
Multithreaded processor
c.
Multiprocessor platform
b.
Multicore processor
d.
Multihoused processor
 

 11. 

Over the past week, every time Larry has started his computer, he has noticed that the time is not correct. Larry didn’t consider this a problem because his computer was working properly. However, now Larry has decided that he should investigate why the time is not accurate.
?3?
What can you tell Larry to check to find out why the clock does not keep the right time?
a.
POST is failing
c.
The motherboard is going bad and needs to be replaced
b.
The internal time clock is malfunctioning
d.
The CMOS battery is bad and needs to be replaced
 

 12. 

When is it okay to touch the inside of a computer that is turned on?
a.
When disassembling the computer
c.
When reassembling the computer
b.
When using a multimeter to measure voltage output
d.
When a qualified electronics expert or electrician is present
 

 13. 

Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling system. She powers up the computer, and it begins to boot but then shuts down.
 
What could be the cause of this problem?
a.
Computer is overclocked
c.
Processor is not compatible
b.
Thermal paste was not used
d.
Processor is not seated properly
 

 14. 

Memory in the processor package, but not on the processor die, is called ____ cache.
a.
Level 1
c.
Level 3
b.
Level 2
d.
Level 4
 

 15. 

Using the ____ technology, the Intel processor, chipset, and wireless network adapter are all interconnected as a unit, which improves laptop performance.
a.
Centrino
c.
vPro
b.
Core
d.
Centrum
 

 16. 

A(n) ____ gets its name because it has independent pins on opposite sides of the module.
a.
DIMM
c.
SIMM
b.
RIMM
d.
TRIMM
 

 17. 

A Rambus memory module is called a(n) ____.
a.
RIMM
c.
SIMM
b.
DIMM
d.
RDIMM
 

 18. 

To use System Information, in the Vista Start Search box or the Windows XP Run box, type ____ and press Enter.
a.
msinfo32
c.
wininfo
b.
msconfig
d.
msinfo
 

 19. 

If the chip’s surface is dull or matted, or you can scratch off the markings with a fingernail or knife, suspect that the chip has been ____.
a.
re-burned
c.
defaced
b.
re-marked
d.
installed new
 

 20. 

The ____-conductor IDE cable has half the number of pins as it has wires.
a.
40
c.
80
b.
60
d.
100
 

 21. 

With ____, two hard drives are configured as a single volume.
a.
binding
c.
spanning
b.
bonding
d.
wrapping
 

 22. 

The first sector on the disk, called the boot sector or ____ record, contains the information about how the disk is organized and the file system used.
a.
base
c.
slave
b.
interface
d.
boot
 

 23. 

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?
a.
FEFE::2::1
c.
FEFE::2:0:0:1
b.
FEFE::0002:0000:0000:0001
d.
FEFE:0:0:0:2:0:0:1
 

 24. 

Your mobile device appears to be contacting a remote server to upload your personal data.
 
Which of the following should be performed first to protect your personal data?
a.
Install anti-malware software.
c.
Verify you are on the correct Wi-Fi network.
b.
Switch to airplane mode.
d.
Perform a factory reset.
 

 25. 

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?
a.
Install apps only from untrusted sources.
c.
Keep the device fully charged.
b.
Install apps only from trusted sources.
d.
Perform regular backups.
 

 26. 

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install.
 
Which of the following steps should the user take next?
a.
Back up all user data and perform a factory reset.
c.
Disable full device encryption.
b.
Check for sufficient available storage space.
d.
Generate a new public key.
 

 27. 

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same.
 
What type of cable will John need to purchase to replace the iPad’s charger cable?
a.
Micro USB
c.
USB C
b.
Lightning
d.
Mini HDMI
 

 28. 

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone.
 
Which commercial email provider should Angela use for her new Android phone?
a.
Gmail
c.
Microsoft Exchange Online
b.
Yahoo! Mail
d.
iCloud
 

 29. 

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets.
 
Which of the following is the first step you will take to resolve this issue?
a.
Reset the network settings in the mobile device Settings app.
c.
Update the radio firmware in the mobile device.
b.
Replace the Bluetooth headset with a new pair.
d.
Forget all Wi-Fi networks on the mobile device
 

 30. 

Which of the following aspects of cloud computing allows a service provider to limit a customer’s use of a particular resource based on a service agreement between the provider and the customer?
a.
Rapid elasticity
c.
Metered service
b.
On-demand
d.
Measured service
 

 31. 

A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the printer but fails to print from the computer.
 
Which of the following steps should be taken next?
a.
Check for low memory errors on the printer.
c.
Verify the printer is powered on.
b.
Make sure printing paper is installed.
d.
Verify the USB cable is attached.
 

 32. 

Which of the following could be a major concern for implementing cloud computing for business-critical services?
a.
Incompatible software, hardware, or operating systems.
c.
A cloud provider’s inability to scale up or down.
b.
Being charged for computing services that go unused.
d.
An intermittent or unavailable Internet connection.
 

 33. 

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.
 
Which of the following could be used to network this building?
a.
PoE
c.
WAP
b.
EoP
d.
NIC
 

 34. 

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware?
a.
Virtualization
c.
Virtual desktop
b.
Emulator
d.
Zero client
 

 35. 

A small bank with several regional branches is searching for a solution to consolidate its business services into a single site with centralized management. The service should provide secure resources for use by the bank, and these resources must be isolated from any other organization using the same service provider.
 
Which of the following will best meet the needs of the bank?
a.
Hybrid cloud
c.
Community cloud
b.
Private cloud
d.
Public cloud
 

Multiple Response
Identify one or more choices that best complete the statement or answer the question.
 

 36. 

A mobile device user is having problems keeping malware off his device. The user is continuously removing offending apps and regularly running a check for OS updates. After a short period of relief, the malware continues to be a problem.
 
Which of the following are the best actions for the user to take? (Select TWO.)
 a.
Perform a factory reset.
 d.
Remove unused apps.
 b.
Disable full device encryption.
 e.
Jailbreak or root the device.
 c.
Install an anti-malware app.
 

 37. 

A technician is working at a client’s office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.
 
Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)
 a.
Crimper
 d.
Cable stripper
 b.
Toner probe
 e.
Punchdown tool
 c.
Cable tester
 f.
Loopback Plug
 

 38. 

A Windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the computer.
 
Which of the following steps should be taken to secure the VMs so no user can copy or delete another user’s VM files? (Select TWO.)
 a.
Install anti-malware software on each VM OS.
 d.
Connect each VM to a separate, dedicated virtual NIC.
 b.
Secure the VM files with permissions.
 e.
Install anti-malware software on the host OS.
 c.
Configure BIOS/UEFI passwords on the host computer.
 f.
Apply encryption to the VM files.
 

 39. 

Molly, a technician, has been tasked with researching an emulator for the software developers to test cross-platform applications on various PCs and a variety of mobile devices.
 
Which of the following will be a required step in selecting an emulator? (Select TWO.)
 a.
Verify the emulator supports a virtual processor.
 d.
Verify the system requirements of the hypervisor.
 b.
Verify the emulator supports virtual RAM.
 e.
Verify the emulator supports NAT and bridged network connections.
 c.
Verify the hypervisor software supports the emulator needed for testing.
 

 40. 

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
 a.
SLP
 d.
SSH
 b.
Port 443
 e.
Ports 161/162
 c.
SMTP
 

Matching
 
 
Match each item with a statement below.
a.
Bluetooth
f.
CPU
b.
POST
g.
DIMM
c.
PCIe
h.
airplane mode
d.
microATX
i.
SO-DIMM
e.
DisplayPort
j.
heat sink
 

 41. 

A diagnostic program built into a computer to test the hardware components before the computer boots up
 

 42. 

All wireless technologies are turned off resulting in no transmission or reception of wireless signals
 

 43. 

The smaller form factor of the ATX.  Its smaller size and reduced expansion ports helps reduce costs and power consumption
 

 44. 

Performs most of the processing for data and instructions for the entire system
 

 45. 

A short-range wireless technology used to connect two devices in a small personal network
 

 46. 

Smaller connectors for memory on laptops
 

 47. 

The standard for computer expansion cards
 

 48. 

The connector for memory found on a motherboard
 

 49. 

Draws heat away from the CPU or other heat sensitive components so that it can be dissipated quickly
 

 50. 

Transmits digital video and audio. They are slowly replacing VGA and DVI ports on computers
 



 
         Start Over