0% found this document useful (0 votes)
62 views

Clean Install

The document provides information about operating systems and computer hardware. It contains multiple choice questions about topics such as installation methods, network configuration, hardware components, and peripheral devices. It tests knowledge of operating system fundamentals, hardware requirements, and basic troubleshooting steps.

Uploaded by

Miha Štefanec
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

Clean Install

The document provides information about operating systems and computer hardware. It contains multiple choice questions about topics such as installation methods, network configuration, hardware components, and peripheral devices. It tests knowledge of operating system fundamentals, hardware requirements, and basic troubleshooting steps.

Uploaded by

Miha Štefanec
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Modul 1

1. An operating system is severely damaged. All data on the partition needs to be deleted, and
all application software must be reinstalled. Which installation method should be used to
correct the problem?
• clean install
• upgrade
• multi-boot
• virtualization

2. Which two statements should be included in a pre-installation checklist when upgrading


an operating system? (Choose two.)
• Verify that the hardware resources have multiple partitions.
• Verify that the hardware resources meet or exceed the published minimum requirements.
• Complete a full backup of all important files and data.
• Overwrite any data currently contained on the drive to remove all contents.
• Verify that the hardware resources are certified to work with the existing operating system
prior to upgrading.

3. Which three pieces of information must be specified on a computer to allow that


computer to send and receive information across networks? (Choose three.)
• closest server
• operating system
• IP address
• subnet mask
• default gateway
• network card driver

4. Which two items must be unique to each computer and cannot be duplicated on a
network? (Choose two.)
• partition
• file system
• computer name
• IP address
• operating system

5. Which method of interacting with an operating system involves typing commands at a


command prompt?
• CLI
• GUI
• redirector
• kernel translator

6. What are three characteristics of an operating system that is released under the GPL (GNU
Public License)? (Choose three.)
• full access to source code
• software often available free
• structured development cycle
• can be expensive to purchase
• limits what end-user can do with code
• support normally user-based and often free

7. What is the purpose of a default gateway?


• physically connects a computer to a network
• provides a permanent address to a computer
• identifies the network to which a computer is connected
• identifies the logical address of a networked computer and uniquely identifies it to the rest
of the network
• identifies the device that allows local network computers to communicate with devices on
other networks

8. Which two statements are true about drive partitions? (Choose two.)
• Partitions are necessary in multi-boot installations.
• A hard drive can be divided into an operating system partition and a data partition.
• User data is never overwritten when a drive is partitioned.
• A disk partition is a defined section of an operating system.
• Each partition requires a different file system type.

9. What occurs when computers are configured to receive their network configurations
dynamically?
• Each computer receives a permanent IP address.
• A network administrator enters information on each computer.
• Each computer requests configuration information from a server.
• An NIC automatically provides configuration information to the computer and stores that
configuration information.

10. What are two ways that a user can interact with an operating system shell? (Choose two.)

• CLI
• OS
• GUI
• NIC
• kernel 1. Which computer component is considered the nerve center of the computer
system and is responsible for processing all of the data within the machine?
• RAM
• CPU
• video card
• sound card
• operating system
2. What are two advantages of purchasing a preassembled computer? (Choose two.)
• usually a lower cost
• exact components may be specified
• extended waiting period for assembly
• adequate for performing most general applications
• suited for customers with special needs

3. A user plans to run multiple applications simultaneously on a computer. Which computer


component is essential to accomplish this?
• RAM
• NIC
• video card
• sound card
• storage device

4. Which adapter card enables a computer system to exchange information with other
systems on a local network?
• modem card
• controller card
• video card
• sound card
• network interface card

5. What is the main storage drive used by servers, desktops, and laptops?
• tape drive
• hard drive
• optical drive (DVD)
• floppy disk drive

6. Which component is designed to remove high-voltage spikes and surges from a power line
so that they do not damage a computer system?
• CPU
• surge suppressor
• motherboard
• hard drive

7. What are two examples of output peripheral devices? (Choose two.)


• printer
• speakers
• flash drive
• external DVD
• external modem

8. What two functions does a UPS provide that a surge protector does not ? (Choose two.)
• protects the computer from voltage surges
• provides backup power from an internal battery
• protects the computer from sudden voltage spikes
• gives the user time to phone the electrical company
• gives the user time to safely shut down the computer if the power fails
• provides backup power through a generator provided by the wall outlet

9. What is a word processor?


• It is a physical computer component.
• It is a program designed to perform a specific function.
• It is a program that controls the computer resources.
• It is a functional part of an operating system.

10. What is the purpose of the ASCII code?


• translates bits into bytes
• interprets graphics digitally
• translates digital computer language into binary language
• represents letters, characters, and numbers with bits

11. Why do servers often contain duplicate or redundant parts?


• Servers require more power and thus require more components.
• Servers should be accessible at all times.
• Servers can be designed as standalone towers or rack mounted.
• Servers are required by networking standards to have duplicate parts.

12. What are two benefits of hooking up a laptop to a docking station? (Choose two.)
• Mobility is increased.
• An external monitor can be used.
• Alternate connectivity options may be available.
• The keyboard can be changed to a QWERTY-style keyboard.
• More wireless security options are available.

13. Applications can be grouped into general use software or industry specific software.
What are two examples of industry specific software? (Choose two.)
• CAD
• presentation
• spreadsheet
• word processing
• medical practice management
• contacts/scheduling management

14. Which three terms describe different types of computers? (Choose three.)
• operating system
• network
• laptop
• desktop
• Windows
• mainframe

15. How is a server different from a workstation computer?


• The server works as a standalone computer.
• The server provides services to clients.
• The workstation has fewer applications installed.
• The workstation has more users who attach to it.

16. How many values are possible using a single binary digit?
•1
•2
•4
•8
•9
• 16

17. What measurement is commonly associated with computer processing speed?


• bits
• pixels
• hertz
• bytes

18. What can be used to prevent electrostatic discharge (ESD)?


• dry and non humid conditions
• carpeted floor
• grounding strap
• uncluttered work space

19. If a peripheral device is not functioning, what are three things you should do to solve the
problem? (Choose three.)
• Use the testing functionality on the peripheral itself, if available.
• Verify that all cables are connected properly.
• Disconnect all cables connected to the computer except those connected to the peripheral.

• Ensure that the peripheral is powered on.


• Disconnect the peripheral and verify that the computer is operating normally.
• Reload the computer operating system.

20. Which two steps should be performed when installing a peripheral device? (Choose two.)

• Download and install the most current driver.


• Connect the peripheral using any cable and any available port on the computer.
• Connect the peripheral using an appropriate cable or wireless connection.
• Test the peripheral on another machine before installing it on the one where it will be
used.
• Check the computer documentation to see if the peripheral vendor is compatible with the
PC vendor.

21. In newer operating systems, how are system resources assigned by default when
components are installed?
• manually assigned by the operating system
• manually assigned by the administrator
• statically assigned by the component to a preset resource
• dynamically assigned between the component and the operating system

11. Which three resource specifications are given by the manufacturer to ensure that an
operating system performs as designed? (Choose three.)
• required hard disk space
• type of accelerated graphics card
• recommended amount of RAM
• printer requirements
• processor type and speed
• type of keyboard

You might also like