0% found this document useful (0 votes)
4 views

Computer Architecture Questions And Answers

The document provides detailed information on computer hardware and software concepts, including the functions of the CPU, memory access methods, power fluctuations, and various troubleshooting techniques. It covers BIOS functions, RAID adapters, operating system installations, and preventive maintenance actions. Additionally, it discusses security measures, data transfer protocols, and the importance of updating drivers for optimal system performance.

Uploaded by

maxprime558
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer Architecture Questions And Answers

The document provides detailed information on computer hardware and software concepts, including the functions of the CPU, memory access methods, power fluctuations, and various troubleshooting techniques. It covers BIOS functions, RAID adapters, operating system installations, and preventive maintenance actions. Additionally, it discusses security measures, data transfer protocols, and the importance of updating drivers for optimal system performance.

Uploaded by

maxprime558
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

SECTION 2: Answer all questions

1. The CPU is connected to the rest of the system through the system bus. State
2 components of the system bus and explain their functions.

o Data Bus: Transfers data between CPU, memory, and I/O devices.

o Address Bus: Carries the memory address of data the CPU wants to
access.

2. Explain two memory access methods.

o Sequential Access: Data is accessed in a pre-determined order (e.g.,


tapes).
o Direct Access: Data can be accessed directly at a specific location (e.g.,
hard disks).

3. State two types of AC power fluctuations that can cause data loss or
hardware failure.

o Power Surge: A sudden increase in voltage.

o Brownout: A temporary drop in voltage.

4. State two common drive interfaces.

o SATA (Serial ATA)

o PATA (Parallel ATA)

5. Explain the concept of Handshaking in data transfer.

o Handshaking is a communication protocol where two devices exchange


signals to establish a connection before data transmission. It ensures
synchronization and proper timing.

6. What is Virtual memory? Explain its functioning.

o Virtual memory uses part of the hard disk as RAM to extend physical
memory. When the system runs out of RAM, inactive data is moved to the
disk, allowing active processes to use RAM efficiently.

SECTION 3: Read the text and answer the questions

1. Enumerate the various stages of the troubleshooting process.

o Identify the problem.

o Establish a theory of probable cause.

o Test the theory.

o Establish a plan of action to resolve the issue.

o Implement the solution.

o Verify system functionality.

o Document the findings and solution.

2. Explain one technique you can use to speed up the data retrieval from hard
disks. State the various stages.

o Disk Defragmentation: It organizes fragmented data, improving access


speed.
▪ Analyze the disk.

▪ Defragment the data.

▪ Optimize the disk.

3. Two security measures before reinstalling operating systems:

o Back up data: Ensure user data is saved to external storage to avoid loss.

o Scan for malware: Use antivirus software to clean the system and ensure
no malicious software is carried over.

4. Explain the procedure to install Windows 10 operating system in a computer.

o Create a bootable USB/DVD with Windows 10.

o Boot the computer using the USB/DVD.

o Follow on-screen instructions to select language, time, and keyboard


input.

o Select "Install Now" and choose the drive for installation.

o Complete the installation and configure user settings.

5. Which security measure can you implement on the system to prevent the
problem stated above? Explain the process.

o Implement Disk Encryption:

▪ Use tools like BitLocker (Windows).

▪ Encrypt the drive to protect sensitive data from unauthorized


access.
SECTION 2: Questions and Answers

1.1 Explain the function of the BIOS in the computer system. Give two security
features found on the BIOS/UEFI.

• BIOS Function: The BIOS initializes hardware during the boot process and loads
the operating system.

• Security Features:

o Password protection for BIOS settings.

o Secure Boot to prevent unauthorized OS booting.

1.2 What is meant by flashing the BIOS? Briefly explain the process.

• Flashing the BIOS: Updating the BIOS firmware.

• Process: Download the BIOS update, boot into BIOS, apply the update using a
tool provided by the manufacturer, and restart the system.

2.1 CPUs may use two instruction sets: RISC and CISC. Explain each instruction
set.

• RISC (Reduced Instruction Set Computing): Uses simple instructions that


execute in one cycle.

• CISC (Complex Instruction Set Computing): Uses complex instructions that


perform multiple operations in a single command.

2.2 Distinguish between overclocking and throttling.

• Overclocking: Increasing CPU clock speed to improve performance.

• Throttling: Reducing CPU speed to prevent overheating or save power.

2.3 Explain the concept of CPU Virtualization.

• CPU virtualization allows multiple operating systems to run simultaneously on a


single physical CPU by sharing resources.

3. Which two activities are normally controlled by the Northbridge part of the
chipset?

• Managing communication between CPU, RAM, and GPU.

• Controlling high-speed interfaces like PCIe and memory bus.

4. What is the purpose of RAID adapters?


• RAID adapters manage redundant arrays of independent disks to improve
performance, reliability, and redundancy.

5. Name two (2) types of connections a user can use to synchronize some apps,
movies, music, and e-books between mobile devices.

• USB Cable

• Wi-Fi/Bluetooth

6. What are three factors to consider when purchasing a replacement


motherboard?

• Compatibility with CPU and RAM.

• Number and types of expansion slots.

• Supported form factor (e.g., ATX, Micro-ATX).

7. Which three computer components require separate cabling for power?

• CPU

• Motherboard

• Hard Drives

8. A technician must replace a power supply. Which two features should the
technician consider when selecting the replacement?

• Wattage rating.

• Connector compatibility (e.g., ATX 24-pin, PCIe).

9. Give an application for each of the following technologies: Bluetooth, RFID, NFC.

• Bluetooth: Wireless audio streaming.

• RFID: Inventory tracking.

• NFC: Contactless payments.

10. Give the full meaning of HDMI and SATA.

• HDMI: High-Definition Multimedia Interface.

• SATA: Serial Advanced Technology Attachment.


SECTION 3: Questions and Answers

1. What is meant by a 64-bit operating system?

• A 64-bit OS can process data in 64-bit chunks and supports larger amounts of
RAM, typically beyond 4GB.

2. Can this 64-bit application be installed on the current 32-bit system? Why?

• No: A 64-bit application requires a 64-bit system because 32-bit systems cannot
handle the larger memory addresses and instruction set required by 64-bit
programs.

3. What must the IT department do in order to install and run the application on the
sales staff computers?

• Upgrade the operating system from 32-bit to 64-bit.

4. What are two important concerns that the IT technician must discuss with the
customer to determine if the OS upgrade can be done?

• Hardware compatibility with 64-bit OS.

• Backup of data before upgrading.

5.1 Which Windows option should the technician use to reverse the software
installation and return the system to its prior state without affecting user files and
settings?

• System Restore.

5.2 Write the steps to follow in order to achieve this.

1. Open Control Panel.

2. Go to “System and Security” > “System.”

3. Select “System Protection” > “System Restore.”

4. Follow the prompts to restore to an earlier state.

6. Which type of password is enabled? Write the steps to fix it.

• BIOS Password

o Steps to Fix:

1. Boot into BIOS (press a specific key during startup, e.g., DEL or F2).

2. Navigate to Security Settings.

3. Remove or reset the BIOS password.


4. Save changes and restart the system.

7.1 At what stage of the boot process does the computer stop?

• Power-On Self-Test (POST) stage.

7.2 Why does the technician ask the user to restart the system and count how many
beeps the computer makes?

• Beep codes help identify specific hardware issues during POST.

8. Which service would simplify the workstation IP configuration task in the


company, knowing that the process was done manually and it was time-
consuming?

• DHCP (Dynamic Host Configuration Protocol): It automates the assignment of


IP addresses to devices.
SECTION 2:

1. Which action can reduce the risk of ESD damage when computer equipment is
being worked on?

• Use an anti-static wrist strap or grounded mat.

2. Name ten components found inside a desktop PC.


1. Motherboard

2. CPU

3. RAM (Memory)

4. Power Supply Unit (PSU)

5. Hard Disk Drive (HDD) / Solid-State Drive (SSD)

6. Graphics Card (GPU)

7. Optical Drive (CD/DVD drive)

8. Cooling Fan

9. Network Interface Card (NIC)

10. Expansion Slots / Cards

3. A technician looks at a motherboard and sees a 24-pin connector. What


component would connect to the motherboard through the use of this 24-pin
connector?

• The Power Supply Unit (PSU) connects to the motherboard.

4. What is provided by an operating system that has multiprocessing capability?

• An OS with multiprocessing capability allows multiple CPUs or CPU cores to


execute processes simultaneously, improving performance.

5. What are two benefits of computer preventive maintenance?

1. Reduces the risk of hardware failure.

2. Improves system performance and longevity.

6. Which two Windows utilities can be used to help maintain hard disks on
computers that have had long periods of normal use?

1. Disk Cleanup: Removes unnecessary files to free up space.

2. Disk Defragmenter: Optimizes hard disk performance by reorganizing


fragmented data.

7. What are two advantages of the NTFS file system compared with FAT32?

1. Supports larger partition and file sizes (over 4GB).

2. Provides better security features, such as file permissions and encryption.

SECTION 3:
1. What are the possible causes (2) of this malfunctioning?

1. Damaged speakers or speaker cables.

2. Missing or outdated sound card drivers.

2. Explain how you can fix the possible problems above.

• Damaged speakers: Replace or repair the speakers.

• Outdated drivers: Update the sound card drivers using the manufacturer’s
website or Windows Device Manager.

3. Where should you look to investigate driver problems?

• Device Manager in the Windows Control Panel.

4. He found that the corresponding driver is outdated. What element on this


interface shows that the driver is outdated?

• A yellow exclamation mark (!) next to the device name in Device Manager.

5. Write the steps to update the driver.

1. Open Device Manager.

2. Expand the category for sound drivers.

3. Right-click on the driver and select Update driver.

4. Choose Search automatically for updated driver software.

5. Follow the on-screen prompts to install the updated driver.

6. Restart the computer if necessary.

6. What is used by the operating system to communicate with hardware


components?

• Device Drivers.

7. Which preventive maintenance action do you advise the customer for its sound
card?

• Regularly update the sound card drivers and check hardware connections to
ensure they are properly seated and functional.

You might also like