Name:     ID: 
 
Email: 

PC Repair 1 Final exam

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Which of the following could be a major concern for implementing cloud computing for business-critical services?
a.
A cloud provider’s inability to scale up or down.
c.
Being charged for computing services that go unused.
b.
An intermittent or unavailable Internet connection.
d.
Incompatible software, hardware, or operating systems.
 

 2. 

The first sector on the disk, called the boot sector or ____ record, contains the information about how the disk is organized and the file system used.
a.
slave
c.
base
b.
interface
d.
boot
 

 3. 

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?
a.
Install apps only from trusted sources.
c.
Install apps only from untrusted sources.
b.
Keep the device fully charged.
d.
Perform regular backups.
 

 4. 

When is it okay to touch the inside of a computer that is turned on?
a.
When reassembling the computer
c.
When using a multimeter to measure voltage output
b.
When disassembling the computer
d.
When a qualified electronics expert or electrician is present
 

 5. 

Which of the following represents a method for accessing the BIOS/UEFI setup program?
a.
Boot to the BIOS setup floppy disk
c.
Press a key or combination of keys during the BIOS/UEFI POST
b.
Boot Windows and go to Control Panel
d.
Set a motherboard jumper and start the computer
 

 6. 

A(n) ____ gets its name because it has independent pins on opposite sides of the module.
a.
DIMM
c.
TRIMM
b.
RIMM
d.
SIMM
 

 7. 

Which of the following aspects of cloud computing allows a service provider to limit a customer’s use of a particular resource based on a service agreement between the provider and the customer?
a.
On-demand
c.
Rapid elasticity
b.
Metered service
d.
Measured service
 

 8. 

With ____, two hard drives are configured as a single volume.
a.
wrapping
c.
bonding
b.
spanning
d.
binding
 

 9. 

Your mobile device appears to be contacting a remote server to upload your personal data.
 
Which of the following should be performed first to protect your personal data?
a.
Install anti-malware software.
c.
Switch to airplane mode.
b.
Perform a factory reset.
d.
Verify you are on the correct Wi-Fi network.
 

 10. 

A small bank with several regional branches is searching for a solution to consolidate its business services into a single site with centralized management. The service should provide secure resources for use by the bank, and these resources must be isolated from any other organization using the same service provider.
 
Which of the following will best meet the needs of the bank?
a.
Private cloud
c.
Public cloud
b.
Community cloud
d.
Hybrid cloud
 

 11. 

Where must virtualization be enabled for VM (virtual machine) software to work?
a.
Jumper
c.
TPM chip
b.
BIOS/UEFI
d.
Windows Control Panel
 

 12. 

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same.
 
What type of cable will John need to purchase to replace the iPad’s charger cable?
a.
USB C
c.
Mini HDMI
b.
Micro USB
d.
Lightning
 

 13. 

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets.
 
Which of the following is the first step you will take to resolve this issue?
a.
Reset the network settings in the mobile device Settings app.
c.
Forget all Wi-Fi networks on the mobile device
b.
Update the radio firmware in the mobile device.
d.
Replace the Bluetooth headset with a new pair.
 

 14. 

A Rambus memory module is called a(n) ____.
a.
RDIMM
c.
RIMM
b.
DIMM
d.
SIMM
 

 15. 

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone.
 
Which commercial email provider should Angela use for her new Android phone?
a.
Microsoft Exchange Online
c.
Gmail
b.
Yahoo! Mail
d.
iCloud
 

 16. 

A processor housing that contains more than one processor is referred to as what term?
a.
Multithreaded processor
c.
Multicore processor
b.
Multihoused processor
d.
Multiprocessor platform
 

 17. 

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?
a.
FEFE::0002:0000:0000:0001
c.
FEFE:0:0:0:2:0:0:1
b.
FEFE::2::1
d.
FEFE::2:0:0:1
 

 18. 

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware?
a.
Virtualization
c.
Emulator
b.
Virtual desktop
d.
Zero client
 

 19. 

If the chip’s surface is dull or matted, or you can scratch off the markings with a fingernail or knife, suspect that the chip has been ____.
a.
re-burned
c.
installed new
b.
re-marked
d.
defaced
 

 20. 

Memory in the processor package, but not on the processor die, is called ____ cache.
a.
Level 1
c.
Level 3
b.
Level 2
d.
Level 4
 

 21. 

The ____-conductor IDE cable has half the number of pins as it has wires.
a.
40
c.
80
b.
60
d.
100
 

 22. 

What is a possible remedy if your system hangs at odd times or during the boot?
a.
Flash the BIOS/UEFI
c.
Remove the TPM chip
b.
Install new CMOS RAM
d.
Format the hard disk
 

 23. 

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install.
 
Which of the following steps should the user take next?
a.
Check for sufficient available storage space.
c.
Generate a new public key.
b.
Disable full device encryption.
d.
Back up all user data and perform a factory reset.
 

 24. 

To use System Information, in the Vista Start Search box or the Windows XP Run box, type ____ and press Enter.
a.
msinfo32
c.
msconfig
b.
msinfo
d.
wininfo
 

 25. 

A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the printer but fails to print from the computer.
 
Which of the following steps should be taken next?
a.
Verify the USB cable is attached.
c.
Check for low memory errors on the printer.
b.
Verify the printer is powered on.
d.
Make sure printing paper is installed.
 

 26. 

Using the ____ technology, the Intel processor, chipset, and wireless network adapter are all interconnected as a unit, which improves laptop performance.
a.
Centrino
c.
vPro
b.
Centrum
d.
Core
 

 27. 

Over the past week, every time Larry has started his computer, he has noticed that the time is not correct. Larry didn’t consider this a problem because his computer was working properly. However, now Larry has decided that he should investigate why the time is not accurate.
?3?
What can you tell Larry to check to find out why the clock does not keep the right time?
a.
The motherboard is going bad and needs to be replaced
c.
The internal time clock is malfunctioning
b.
The CMOS battery is bad and needs to be replaced
d.
POST is failing
 

 28. 

Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling system. She powers up the computer, and it begins to boot but then shuts down.
 
What could be the cause of this problem?
a.
Processor is not compatible
c.
Thermal paste was not used
b.
Computer is overclocked
d.
Processor is not seated properly
 

 29. 

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.
 
Which of the following could be used to network this building?
a.
NIC
c.
WAP
b.
EoP
d.
PoE
 

 30. 

According to the text, today’s DIMMs use what size data path?
a.
32-bit
c.
64-bit
b.
128-bit
d.
16-bit
 

Multiple Response
Identify one or more choices that best complete the statement or answer the question.
 

 31. 

A mobile device user is having problems keeping malware off his device. The user is continuously removing offending apps and regularly running a check for OS updates. After a short period of relief, the malware continues to be a problem.
 
Which of the following are the best actions for the user to take? (Select TWO.)
 a.
Jailbreak or root the device.
 d.
Disable full device encryption.
 b.
Perform a factory reset.
 e.
Install an anti-malware app.
 c.
Remove unused apps.
 

 32. 

A Windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the computer.
 
Which of the following steps should be taken to secure the VMs so no user can copy or delete another user’s VM files? (Select TWO.)
 a.
Install anti-malware software on each VM OS.
 d.
Configure BIOS/UEFI passwords on the host computer.
 b.
Secure the VM files with permissions.
 e.
Install anti-malware software on the host OS.
 c.
Apply encryption to the VM files.
 f.
Connect each VM to a separate, dedicated virtual NIC.
 

 33. 

Molly, a technician, has been tasked with researching an emulator for the software developers to test cross-platform applications on various PCs and a variety of mobile devices.
 
Which of the following will be a required step in selecting an emulator? (Select TWO.)
 a.
Verify the system requirements of the hypervisor.
 d.
Verify the emulator supports a virtual processor.
 b.
Verify the emulator supports NAT and bridged network connections.
 e.
Verify the emulator supports virtual RAM.
 c.
Verify the hypervisor software supports the emulator needed for testing.
 

 34. 

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
 a.
SSH
 d.
SMTP
 b.
Port 443
 e.
Ports 161/162
 c.
SLP
 

 35. 

A technician is working at a client’s office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.
 
Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)
 a.
Cable stripper
 d.
Punchdown tool
 b.
Crimper
 e.
Cable tester
 c.
Loopback Plug
 f.
Toner probe
 

Matching
 
 
Match each item with a statement below.
a.
Bluetooth
f.
CPU
b.
POST
g.
DIMM
c.
PCIe
h.
airplane mode
d.
microATX
i.
SO-DIMM
e.
DisplayPort
j.
heat sink
 

 36. 

All wireless technologies are turned off resulting in no transmission or reception of wireless signals
 

 37. 

A diagnostic program built into a computer to test the hardware components before the computer boots up
 

 38. 

The standard for computer expansion cards
 

 39. 

A short-range wireless technology used to connect two devices in a small personal network
 

 40. 

The smaller form factor of the ATX.  Its smaller size and reduced expansion ports helps reduce costs and power consumption
 

 41. 

Smaller connectors for memory on laptops
 

 42. 

Performs most of the processing for data and instructions for the entire system
 

 43. 

Draws heat away from the CPU or other heat sensitive components so that it can be dissipated quickly
 

 44. 

The connector for memory found on a motherboard
 

 45. 

Transmits digital video and audio. They are slowly replacing VGA and DVI ports on computers
 

True/False
Indicate whether the statement is true or false.
 

 46. 

Most often, placing memory on the motherboard and updating the BIOS manually is all that is necessary for installation.
 

 47. 

A hard disk drive (HDD), most often called a hard drive, comes in two sizes for personal computers: the 1.8" size is used for laptop computers and the 2.5" size is used for desktops.
 

 48. 

Excessive heat can damage the CPU and the motherboard.
 

 49. 

A simple problem of replacing a bad memory module can become a complex research project if you don’t have a good grasp of current and past memory technologies.
 

 50. 

If you are replacing a floppy drive, you must inform BIOS setup by accessing setup and changing the drive type.
 



 
         Start Over