0% found this document useful (0 votes)
246 views4 pages

Coc#1 3

The document contains questions and answers related to configuring and troubleshooting computer systems and networks. It covers topics like installing operating systems, setting up dual boot configurations, installing drivers, assembling computer hardware, setting up peer-to-peer and client-server networks, and configuring servers and active directory. Some key points addressed are how to partition a hard drive for dual booting, how to create a bootable flash drive, how to check for issues with power supplies or video cards, and how to troubleshoot network and server access problems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
246 views4 pages

Coc#1 3

The document contains questions and answers related to configuring and troubleshooting computer systems and networks. It covers topics like installing operating systems, setting up dual boot configurations, installing drivers, assembling computer hardware, setting up peer-to-peer and client-server networks, and configuring servers and active directory. Some key points addressed are how to partition a hard drive for dual booting, how to create a bootable flash drive, how to check for issues with power supplies or video cards, and how to troubleshoot network and server access problems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Qualification Title COMPUTER SYSTEMS SERVICING NC II

COC 1 Title INSTALL AND CONFIGURE COMPUTER SYSTEMS


1. You want to set up a dual-boot scenario between Windows 7 and Windows Server 2008. How would
you do this?
Answer: Step 1: Partition hard drive
Step 2: Install Windows 7 first
Step 3: Then install Windows Server 2008 in the second partition
2. What do you call the computer software which you configure before installing the OS?
Answer: BIOS
3. How many RID (Relative Identification) Master in one domain?
Answer: Single
4. What would you advise to a client who wants to improve the computer’s built-in video card?
Answer: Buy an internal video card having higher memory capacity
5. What may be the problem and what should be done if the display does not match what you expect to
view on the monitor?
Answer: Probably, the video driver is not installed. Install the video driver
6. What type of screw driver will you use for small screws usually found in Compaq and Apple computers?
Answer: Torx Screwdriver
7. How will you check and what instrument will you use to determine whether the power supply is providing
enough voltage output or not?
Answer: Voltmeter. Measure the output voltage of the power supply using
appropriate setting on the voltmeter
8. What will you do if a customer wants to install an operating system in his PC but does not have an
optical drive?
Answer: Create a bootable flash disk
9. What may be the problem if a computer does not recognize a bootable flash drive? What would you do
to resolve this?
Answer: Maybe the BIOS is not properly configured to boot on the
flash drive. Configure the BIOS to boot on the flash drive
10. After testing the assembled product, you have noticed that the product is not working, what are the
possible causes?
Answer:  Cold solder
 wrong component placement,
 wrong polarity
11. What will you do if after installing both the IDE hard drive and optical drive you have noticed that only
one drive is working?
Answer: Check the jumper setting
12. If after assembling a brand new computer the monitor does not display any image or character, what
may be the possible causes?
Answer:  Power on switch
 monitor cable
13. Enumerate possible causes when the computer does not produce any sound from the speaker.
Answer:  Speaker’s power may not be turned on
 the signal cable of the speaker
 sound card driver not installed
14. Where should you keep peripheral cards or computer memory cards?
Answer: Anti-static bag
15. What should you do after installing peripheral devices such as a sound card?
Answer: Install driver
16. What should you configure in the BIOS when you are going to install an operating system using an
optical media?
Answer: Boot sequence
17. Prior to assembling a computer, what should you wear to protect computer parts from ESD?
Answer: Anti-static wrist strap
18. What should you do if suddenly there is a lightning storm that occurs while assembling a computer?
Answer: Power off the computer and unplug it from the outlet. .
19. What should you do if accidentally, water spilled on the computer which you are currently using?
Answer: Power off the unit immediately, wipe with dry cloth the external parts and blow dry to ensure that
internal portions are completely dry before turning the power on.
Qualification Title COMPUTER SYSTEMS SERVICING NC II
COC 2 Title SET UP COMPUTER NETWORKS
1. What do you call a bootable disk that contains a full usable OS?

Answer: Live CD/DVD


2. What term is used to define one or more IP subnets that are connected by the fast links?

Answer: Site
3. When modifying the scheme, Microsoft recommends adding administrator, to what group only for the duration
of the task?

Answer: Schema Task


4. What kind of cable are you going to use if you want to network two computer units only?

5. Based on rules, what type of network would you suggest to your client who wants to network more than 100
computers?

Answer: Client/Server type of network


6. What type of network would you recommend if your client has only few computer units?

Answer: Peer to peer network


7. What if the computer you have to network is more than 100, and you have noticed that the network is slowing
down, what are you going to do? Give at least one recommendation?

Answer: Divide the network into groups or subnet the network


8. What would you do if the devices that you are going to network are far from each other?

Answer: Use an extender or repeater


9. What would you do if you suspect that the cause of the trouble in the network is the cable?

Answer: Get a LAN tester and check the cable


Swap a good or working cable in place with the suspected cable
10. After checking the cable with LAN tester and the tester indicates that the output of the two ends swapped:
pin one goes to pin three from the other end, and pin two goes to pin six on the other end, what does it signify?
Is it good or bad?

Answer: The cable is good and it is a crossover type cable


11. After replacing a good cable, still the computers cannot connect to each other, what are the possible causes
if the network is using static IP addresses?

Answer:
- Wrong IP address
- Maybe some computers don’t belong to the workgroup
- Wrong subnet mask

12. After configuring the network interface card, how will you going to test the connectivity of your network?

Answer :
- Ping each other
- Using net view

13. What type of cable will you use to connect two computers?

Answer:
Crossover cable
14. What is the common type of cabling standards used for straight thru cable?

Answer: 568B standard


15. In order for computers to network, what are the things you are going to set or configure?

Answer: Workgroup name should be the same, IP addresses should have the same
network address and host address should be different; for subnet mask,
computers in the same network or subnet should be the same.
Qualification Title COMPUTER SYSTEMS SERVICING NC II
COC 3 Title SET UP COMPUTER SERVERS
1. What should you do if you want to transfer file/files into another computer? How do you share a folder name
TESDA in DRIVE C?

Answer: Create a folder using windows explorer. Right click the folder
and click Sharing and security
2. Name the two (2) kinds of Linux boot loader.

Answer: GRUB and LILO

3. What is the term used for software which is not part of the OS?

Answer: Third party software/installer

4. What do you call a bootable disk that contains a full usable OS?

Answer: Live CD/DVD

5. Why there are different executable programs running in Task Manager when you start a RemoteApp from a
desktop?

Answer:
RemoteApp and full desktop use different shells and logon mechanisms. Full desktop uses EXPLORER.EXE t
present the user with the desktop, whereas th RemoteApp use RDINIT.EXE, the equivalent of USERINIT .EXE
un full desktop sessions, which in turn both launch RDPSHELL.EXE and updates the client-side taskbar and
handles logoff logic

6. Do you still need to lock down the server when you use RemoteApp programs?

Answer:
Absolutely yes. RemoteApp programs are for display convenience not for security feature. If users can get to th
system, they can run any executable they have access to, so, you need to lock down the server. You can use
AppLocker (or Software Restriction Policies), NTFS Permissions and Group Policy to lock down your servers.

7. Can you configure a server to permit users only to connect via RemoteApp and block users from connecting
the desktop?

Answer: No. This option is not supported

8. What contains the rules and definitions that are used for creating and modifying object classes and attributes
within the Active Directory?

Answer: Schema

9. What allows businesses to define, manage, access and secure network resources including files, printer, pe
and applications?

Answer: Directory Services

10. What Windows Server 2008 feature is a special installation option that creates a minimal environment for
running only specific service or roles?

Answer: Server Core

11. What is the minimum amount of storage space required for the Active Directory installation files?

Answer: 200MB

12. You set up a network where each computer acts as a client and server and in which each user shares othe
resources, including printers. What do you call this setup?

Answer: Peer-to-peer networking

13. What special identity group contains all authenticated users and domain guest?

Answer: Everyone
14. What account name refers to each user’s login name?
Answer: SAM account

15. What do you call the group that you cannot manually modify or view its membership?
Answer: Special Identity Group

16. What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema
necessary?
Answer: LDIFDE

17. What may be the problem if the shared folder could not be accessed? What will you do to resolve the probl
Answer: Maybe the computer does not belong to the network.
Check the network address portion and the workgroup

18. Aside from installing anti-virus software, how can you protect your server from viruses?
Answer: Install firewall, install updates

19. If one of the users forgot his/her password, how are you going to change the password? Enumerate the ste
resetting a password using GUI.
Answer: Reset the password, Login as administrator. Click Start, right click My Computer, then click Manage.
Local Users and groups, double click Users folder, select and right click the username, select Set password.

20. What are you going to do to access a server located far from the client computer which you are troubleshoo
Answer: Remotely access the server using Remote Desktop connection

21. What may be the reason why you cannot access and connect to other computers remotely? How would yo
resolve the problem?
Answer: Maybe the computer has no password. Assign a password to that computer

22. After installing an anti-virus to your network, you cannot connect to other computers, what could be the pos
cause of it?
Answer: Possibly, the anti-virus is blocking the network access. You
have to configure the anti-virus so as to not to block network
access

23. After logging, you noticed that you cannot change the IP address of other users, what could be the possible
cause?
Answer: The password or account is not an administrator account

24. What policies are you going to suggest to secure your server?
Answer: Use anti-virus software, Prohibit downloading unless authorized
By the Administrator, Restrict administrative access

25. What would you suggest in order to come up with a strong admin password?
Answer: Apply Kerberos, use password that has combination of letters
and numbers, upper and lower case letters and special
characters

26. As an Administrator and security precaution, what type of account will you use in performing ordinary tasks
Answer: Power user account. Limit the use of administrator account

You might also like