CompTIA IT Fundamentals
Question No: 211 – (Topic 2)
Which of the following should be done to reduce physical safety hazards around a newly installed computer?
Verify all connections are seated properly.
Avoid placing other computers nearby.
Bundle loose cables with zip ties or Velcro straps.
Attach all peripherals to the computer.
Question No: 212 – (Topic 2)
A technician has added an external hard drive to a personal computer. The hard drive is powered on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the technician should check?
The power cable
The OS version for compatibility
The hard drive firmware revision
The data cable
Question No: 213 – (Topic 2)
A user reports an inability to access the Internet on a new SOHO router. On further investigation, a technician notices that the wireless network is not visible. Which of the following is the MOST likely cause?
SSID broadcast is disabled
Wireless password has changed
Firmware update is required
WPA2 is enabled
Topic 3, Volume C
Question No: 214 – (Topic 3)
Which of the following cache levels are implemented on microprocessors? Each correct answer represents a complete solution. Choose two.
Level 0 (L0) cache
Level 1 (L1) cache
Level 5 (L5) cache
Level 2 (L2) cache
Answer: B,D Explanation:
The Level 1 (L1) cache is implemented on microprocessors. The L1 cache is a type of memory implemented inside the microprocessor chip. It is the fastest memory in the computer. It contains the current working set of data and code. Cache memory is used to store frequently used information, so that the processor can access this information without delay.
Level 2 (L2) cache is employed between main memory and L1 cache. The L2 cache contains additional data and code. In old architecture, L2 cache is mounted on the motherboard, which means that it runs at the motherboard#39;s speed. In modern architecture, L2 caches are built directly into the microprocessor.
Answer options C and A are incorrect. There are no such cache levels as level 0 and level 5.
Question No: 215 – (Topic 3)
Which of the following SCSI types use 16-bit bus?
Fast Wide SCSI-2
Double Wide SCSI-2
Ultra-2 SCSI (Fast-40)
Answer: A,D Explanation:
The following SCSI types use 16-bit bus: 1.Wide SCSI-2
2.Fast Wide SCSI-2 3.Wide Ultra SCSI-3 4.Wide Ultra-2 SCSI
5.Ultra-3 (Fast-80 or Ultra 160)
Small Computer System Interface (SCSI) is the second most popular drive interface in use today after the Integrated Drive Electronics (IDE) interface. SCSI is faster than IDE and supports more devices.
SCSI devices, such as hard disk drive and CD-ROM drive, are better suited in a network environment in which many users access shared drives simultaneously.
Answer option B is incorrect. Double Wide SCSI-2 uses 32-bit bus.
Answer options C and E are incorrect. Fast SCSI-2 and Ultra-2 SCSI (Fast-40) used 8-bit bus.
Question No: 216 – (Topic 3)
Which of the following does the image denote?
Question No: 217 – (Topic 3)
Mark purchases a new computer and installs the Windows 2000 Professional operating system on it.
He wants to connect the computer to the Internet. Which of the following actions can he take to protect his computer from unauthorized access, adware, and malware?
Each correct answer represents a complete solution. Choose two.
Configure a firewall on the computer.
Configure auditing on the computer.
Set hidden attributes on his important files.
Install all the service packs available for the operating system.
Answer: A,D Explanation:
In order to protect his computer from unauthorized access, adware, and malware, Mark can take the following actions:
Install all the service packs available for the operating system. Configure a firewall on the computer.
What is Service Pack?
A service pack is a collection of Fixes and Patches in a single product. A service pack can be used to handle a large number of viruses and bugs or to update an operating system with advanced and better capabilities. A service pack usually contains a number of file replacements.
What is a firewall?
A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.
Answer option C is incorrect. Setting hidden attributes on files cannot protect computers from unauthorized access, adware, and malware.
Answer option B is incorrect. Configuring auditing will not protect computers from unauthorized access, adware, and malware. Auditing is used to track user accounts for file and object access, logon attempts, system shutdown, etc. This enhances the security of the network.
Reference: TechNet, Contents: quot; Chapter 2 – Malware Threatsquot;
Question No: 218 – (Topic 3)
Which of the following are types of Random Access Memory (RAM) ? Each correct answer represents a complete solution. Choose all that apply.
Answer: A,B,D Explanation:
These are the type of Random Access Memory: DRAM
EDO RAM SRAM VRAM
What is the function of DRAM? Hide
Dynamic Random Access Memory (DRAM) is used as the primary memory for computers and workstations. It requires having its storage cells refreshed or given a new electronic charge every few milliseconds.
What is an EDO RAM? Hide
EDO RAM stands for Extended Data Out RAM. It is a type of memory, which improves performance of the computer by eliminating memory wait states.
What is the function of SRAM? Hide
Static Random Access Memory (SRAM) is used for a computer#39;s cache memory and as part of the random access memory digital-to-analog converter on a video card. Unlike DRAM, SRAM does not have to be periodically refreshed. SRAM retains data bits in its memory as long as power is being supplied. SRAM is significantly faster and more expensive than DRAM.
What is VRAM? Hide
VRAM, also known as Video RAM, is used to store image data for processing by the video adapter. It is the memory that stores information about the pictures that display on the monitor screen.
Answer option E is incorrect. There is no RAM such as NRAM.
Question No: 219 – (Topic 3)
Which of the following devices has a 15-pin 3 row connector?
Answer: B Explanation:
The VGA monitor uses a 15-pin 3 row connector to connect to a video adapter. Older Color Graphic
Array (CGA) video standard monitors use 9- pin connectors to connect to DB-9 female connectors on CGA adapters.
Answer option D is incorrect. Serial port is the primary means for connecting modems and mouse to a computer. There are two types of serial port connectors, 9-pin and 25-pin. The word serial refers to the that data is sent in series, one bit at a time, over a single wire. This design is significantly slower than sending 8 bits at a time via a parallel channel, but serial signals can travel much farther without degradation.
Answer option A is incorrect. The joystick port has a 15-pin 2 row male connector.
Answer option C is incorrect. A parallel port is a 25-pin 2 row female connector on the back of a PC.
It is used to connect printers, scanners, etc. A parallel port transfers information between computers and peripheral devices 8 bits at a time.
ECP, EPP, and SPP are types of parallel ports.
Question No: 220 – (Topic 3)
Which of the following statements about Bluetooth are true?
Each correct answer represents a complete solution. Choose two.
It forms a network whenever two Bluetooth devices come within a range of ten meters.
It has a maximum transmission range of 200 meters.
It does not require a line-of-sight connection between devices.
It requires a line-of-sight connection between devices.
Answer: A,C Explanation:
Bluetooth is a standard for very low powered and short-range radio connections. As a radio technology, it does not require a line-of-sight connection as an infrared connection does.
Bluetooth is used to link Personal Digital Assistant (PDA), mobile phones, and laptops, and provides them with Internet access via hot spots. It uses the 2.4 Ghz spectrums with a data transfer rate of about 1
Mbps. Bluetooth networks are not permanent as compared to other networks where a central communication point is needed such as a hub or a router. A Bluetooth network can be formed when two Bluetooth devices are within a range of ten meters, enabling them to communicate directly with each other. This dynamically created network is known as a
piconet. A Bluetooth-enabled device can support up to seven other Bluetooth devices in a master-slave relationship; the first Bluetooth device is the master, and all the other devices are slaves that communicate with the master in one piconet. The maximum transmission range of Bluetooth is around 10 meters.
Answer option D is incorrect. The infrared devices require a line-of-sight connection between devices.
Answer option B is incorrect. The maximum transmission range of Bluetooth is around 10 meters.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|