0% found this document useful (0 votes)
374 views26 pages

PC Repairing (MCQS)

Uploaded by

Noman Asif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
374 views26 pages

PC Repairing (MCQS)

Uploaded by

Noman Asif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

1.

All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer» B. spam.

2. A process known as ____________ is used by large retailers to study trends.


A. data mining
B. data selection
C. pos
D. data conversion
Answer» A. data mining

3. ____________terminals (formerly known as cash registers) are often connected to complex


inventory and sales computer systems.
A. data
B. point-of-sale (pos)
C. sales
D. query
Answer» B. point-of-sale (pos)

4.
A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.

A. pss
B. pos
C. inventory
D. data mining
Answer» A. pss

5. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer» C. computer forensics.
6. Which of the following is NOT one of the four major data processing functions of a
computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer» C. analyzing the data or information

7. ____________ tags, when placed on an animal, can be used to record and track in a
database all of the animal’s movements.
A. pos
B. rfid
C. pps
D. gps
Answer» B. rfid

8. Surgeons can perform delicate operations by manipulating devices through computers


instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer» A. robotics.

9. Technology no longer protected by copyright, available to everyone, is considered to be:


A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer» A. proprietary.

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. nanoscience
B. microelectrodes
C. computer forensics
D. artificial intelligence
Answer» A. nanoscience
11. ____________ is the science that attempts to produce machines that display the same
type of intelligence that humans do.
A. nanoscience
B. nanotechnology
C. simulation
D. artificial intelligence (ai)
Answer» D. artificial intelligence (ai)

12.

____________ is data that has been organized or presented in a meaningful fashion.

A. a process

B. software

C. storage

D. information

Answer» D. information

13.
The name for the way that computers manipulate data into information is called:

A. programming.
B. processing.
C. storing.
D. organizing.
Answer» B. processing.

14.
Computers gather data, which means that they allow users to ____________ data.

A. present
B. input
C. output
D. store
Answer» B. input
15. After a picture has been taken with a digital camera and processed appropriately, the
actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer» B. output.

16.
Computers use the ____________ language to process data.

A. processing

B. kilobyte

C. binary

D. representational

Answer» C. binary

17. Computers process data into information by working exclusively with:


A. multimedia.
B. words.
C. characters.
D. numbers.
Answer» D. numbers.

18. In the binary language each letter of the alphabet, each number and each special
character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer» D. eight bits.

19. The term bit is short for:


A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
19. The term bit is short for:
Answer» C. binary digit.

20. A string of eight 0s and 1s is called a:


A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer» B. byte.

21. A ____________ is approximately one billion bytes.


A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer» C. gigabyte

22. A ____________ is approximately a million bytes.


A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer» C. megabyte

23. ____________ is any part of the computer that you can physically touch.
A. hardware
B. a device
C. a peripheral
D. an application
Answer» A. hardware

24. The components that process data are located in the:


A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer» C. system unit.
25. All of the following are examples of input devices
EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer» D. printer.
26. Which of the following is an example of
an input device?
A. scanner
B. speaker
C. cd
D. printer
Answer» A. scanner

27. All of the following are examples of storage devices EXCEPT:


A. hard disk drives.
B. printers.
C. floppy disk drives.
D. cd drives.
Answer» B. printers.

28. The ____________, also called the “brains†of the computer, is responsible for
processing data.
A. motherboard
B. memory
C. ram
D. central processing unit (cpu)
Answer» D. central processing unit (cpu)

29. The CPU and memory are located on the:


A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer» B. motherboard.

30. Word processing, spreadsheet, and photo-editing are examples of:


A. application software.
B. system software.
30. Word processing, spreadsheet, and photo-editing are examples of:
C. operating system software.
D. platform software.
Answer» A. application software.

31.
____________ is a set of computer programs used on a computer to help perform tasks.

A. an instruction
B. software
C. memory
D. a processor
Answer» B. software

32. System software is the set of programs that enables your computers hardware devices
and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer» D. application

33.
The PC (personal computer) and the Apple Macintosh are examples of two different:

A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer» A. platforms.

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and
different operating systems.
A. languages
B. methods
C. cpus
D. storage devices
Answer» C. cpus
35.
Servers are computers that provide resources to other computers connected to a:

A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer» A. network.

36. Smaller and less expensive PC-based servers are replacing ____________ in many
businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer» D. mainframes

37. ____________ are specially designed computers that perform complex calculations
extremely rapidly.
A. servers
B. supercomputers
C. laptops
D. mainframes
Answer» B. supercomputers

38. DSL is an example of a(n) ____________ connection.


A. network
B. wireless
C. slow
D. broadband
Answer» D. broadband

39. The difference between people with access to computers and the Internet and those
without this access is known as the:
A. digital divide.
B. internet divide.
C. web divide.
D. broadband divide.
Answer» A. digital divide.
40. ____________ is the science revolving around the use of nano structures to build devices
on an extremely small scale.
A. nanotechnology
B. micro-technology
C. computer forensics
D. artificial intelligence
Answer» A. nanotechnology

41.
Which of the following is the correct order of the four major functions of a computer?

A. process ?? output ?? input ?? storage


B. input ?? output?? process ?? storage
C. process ?? storage ?? input ?? output
D. input ?? process ?? output ?? storage
Answer» D. input ?? process ?? output ?? storage

42. ____________ bits equal one byte.


A. eight
B. two
C. one thousand
D. one million
Answer» A. eight

43. The binary language consists of ____________ digit(s).


A. 8
B. 2
C. 1,000
D. 1
Answer» B. 2

44. A byte can hold one ____________ of data.


A. bit
B. binary digit
C. character
D. kilobyte
Answer» C. character
45. ____________ controls the way in which the computer system functions and provides a
means by which users can interact with the computer.
A. the platform
B. the operating system
C. application software
D. the motherboard
Answer» B. the operating system

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer» C. system

47. ____________ are specially designed computer chips that reside inside other devices, such
as your car or your electronic thermostat.
A. servers
B. embedded computers
C. robotic computers
D. mainframes
Answer» B. embedded computers

48. The steps and tasks needed to process data, such as responses to questions or clicking an
icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer» A. instructions.

49.
The two broad categories of software are:

A. word processing and spreadsheet.

B. transaction and application.

C. windows and mac os.


49.
The two broad categories of software are:

D. system and application.

Answer» D. system and application.

50.
The metal or plastic case that holds all the physical parts of the computer is the:

A. system unit.
B. cpu.
C. mainframe.
D. platform.
Answer» A. system unit.

1. When installing PCI NICS you can check the IRQ availability by looking at
1. Jumper settings
2. CONFIG.SYS
3. Dip switches
4. Motherboard BIOS
Answer: Motherboard BIOS
2. Pick the correct choice for the 80386SXCPU.
1. 32 bit word size, 16 bit data path
2. 8 bit word size, 32 bit data path
3. 16 bit word size, 16 bit data path
4. 32 bit word size, 8 bit data path
Answer: 32 bit word size, 16 bit data path
3. When your hard drive crashes from any of the correct selections in the question above, or
from dropping it, it is known as head-to-disk interference, or HDL
1. loop backs
2. True
3. FALSE
4. sniffer
Answer: True
4. In Inkjet technology the droplets of ink are deflected by?
1. electronically charged plates
2. multi directional nozzles
3. high pressure plates
4. electro static absorption
Answer: multi directional nozzles
5. With respect to a network interface card, the term 10/100 refers to
1. megabits per seconds
2. protocol speed
3. a fiber speed
4. minimum and maximum server speed
Answer: megabits per seconds
6. From what location are the 1st computer instructions available on boot up?
1. boot.ini
2. CONFIG.SYS
3. ROM BIOS
4. CPU
Answer: ROM BIOS
7. What tool is used to test serial and parallel ports?
1. high volt probe
2. cable scanner
3. loop backs
4. sniffer
Answer: loop backs
8. Missing slot covers on a computer can cause?
1. over heat
2. EMI
3. power surges
4. incomplete path for ESD
Answer: over heat
9. ESD would cause the most damage to which component?
1. Expansion board
2. Power supply
3. Monitor
4. Keyboard
Answer: Expansion board
10. What could cause a fixed disk error.
1. slow processor
2. No-CD installed
3. Incorrect CMOS settings
4. bad ram
Answer: Incorrect CMOS settings
11. What is the highest binary number that can be referred to on a three position jumper block?
1. 6
2. F
3. 4
4. 1
Answer: 1
12. A numeric error code check: A 17xx indicates a problem with________
1. DMA controller
2. ROM BIOS
3. CMOS
4. hard drive or controller
Answer: hard drive or controller
13. What voltage does a Pentium system use?
1. + 5 volts
2. +12 volts
3. +3.3 volts
4. + 8 volts
Answer: +3.3 volts
14. Which provides the fastest access to large video files?
1. IDE hard drives
2. SCSI hard drives
3. Optical drives
4. EIDE hard drives
Answer: SCSI hard drives
15. A 25-pin female connector on the back of your computer will typically be_______
1. A parallel port
2. Serial port 1
3. Docking
4. COM2 port
Answer: A parallel port
16. You were installing an application in Windows 95, and the computer crashes, what do you
do?
1. press alt + Ctrl + delete, and end task
2. press alt + Ctrl + delete, twice
3. turn off computer and boot from a floppy disk
4. press the reset button on the computer
Answer: turn off computer and boot from a floppy disk
17. On the PC side, the printer port is a___________
1. 15 pin female parallel connector
2. 25 pin female serial connector
3. 25 pin male serial connector
4. 25 pin female parallel connector
Answer: 25 pin female parallel connector
18. You just installed a new IDE hard drive, but your system BIOS will not recognize the new
drive, what should you check first.
1. jumpers on the hard drive
2. drivers that need to be loaded
3. cable sequence
4. hard drive manufacturer web site information
Answer: jumpers on the hard drive
19. You have a system that periodically locks up. You have ruled out software, and now suspect
that it is hardware. What should you do first that could help you narrow it down to the
component at fault?
1. replace the RAM
2. rotate the RAM
3. replace the level 2 cache SIMM
4. disable the CPU cache in CMOS
Answer: disable the CPU cache in CMOS
20. What’s the best way to protect your hard drive data?
1. periodically defrag it
2. run chkdsk at least once a week
3. regular backups
4. run scandisk at least once a week
Answer: regular backups
21. During boot-up, the memory test_________
1. Is a superfluous step that should be ignored
2. Is an operational error
3. Checks and verifies that contiguous memory is installed
4. Displays what memory is installed, but nothing else
Answer: Checks and verifies that contiguous memory is installed
22. Topically, how many type III PC cards can you insert in a laptop_______
1. 3
2. 1
3. 2
4. 6
Answer: 1
23. What is the best ground for a conductive work bench?
1. Chassis ground
2. To another device
3. AC outlet
4. Ground to bend
Answer: AC outlet
24. What is the first thing you could do to check for damage to a printer after receiving it?
1. Check the cables
2. Run MSD diagnostics
3. Unbox it and examine it for physical damage
4. Attach it to a PC and print something
Answer: Unbox it and examine it for physical damage
25. After doing a low-level format, what would be the next step in configuring the hard drive in
a system?
1. Install operating system
2. Format DOS partition
3. Partition had disk
4. None of the above
Answer: Format DOS partition
26. RS-232 is a standard that applies to________
1. parallel ports
2. serial ports
3. networks
4. game ports
Answer: serial ports
27. When installing a SCSI CD-ROM drive, you must set the CD-ROM SCSI adapter to:
1. SCSI ID=1
2. B0007
3. An unused SCSI address
4. The same address as the SCSI device before the CD-ROM
Answer: An unused SCSI address
28. What command is used to reset a MODEM when using the “AT Command Set”?
1. ATZ
2. DTR
3. ATR
4. DCE
Answer: ATZ
29. Resistance is measured in ?
1. Volts
2. Watts
3. Amps
4. Ohms
Answer: Ohms
30. Which standard govern parallel communications?
1. RS-232a
2. IEEE 1284
3. CAT 5
4. RS232
Answer: IEEE 1284
31. Which part of the laser printer should NOT be exposed to sunlight?
1. PC drum
2. Primary corona wire
3. Transfer corona assembly
4. Toner cartridge
Answer: PC drum
32. In laser printer technology, what happens during the conditioning stage?
1. A uniform negative charge is placed on the photosensitive drum
2. A uniform negative charge is placed on the toner
3. The corona wire places a uniform positive charge on the paper
4. All of the above
Answer: A uniform negative charge is placed on the photosensitive drum
33. To view any currently running Terminate Stay Resident (TSR’s) programs you could
type__________
1. MEM
2. Memory
3. SYS /M
4. Memmaker
Answer: MEM
34. The 34-pin connection on an I/O card is for?
1. SCSI drive
2. Floppy drive
3. Zip drive
4. IDE drive
Answer: Floppy drive
35. What product is used to clean smudged keys on a keyboard?
1. Denatured alcohol
2. TMC solvent
3. All-purpose cleaner
4. Silicone spray
Answer: All-purpose cleaner
36. Your customer tells you the print quality of their dot matrix printer is light then dark. Which
of the following could cause the problem.
1. Improper ribbon advancement
2. Paper slippage
3. Paper thickness
4. Head position
Answer: Improper ribbon advancement
37. The terms “red book”, “yellow book”, and “orange book” refer to:
1. ide
2. floppy drive technology
3. SCSI
4. CD-ROM standards
Answer: CD-ROM standards
38. What beep codes could indicate a system board or power supply failure?
1. no beep
2. steady short beep
3. one long continuous beep tone
4. All of the above
Answer: All of the above
39. On the 16-bit ISA bus, IRQ2 is elevated to which higher level Interrupt?
1. 11
2. 13
3. 9
4. 15
Answer: 9
40. A wrist grounding strap contains which of the following:
1. Capacitor
2. Voltmeter
3. Surge protector
4. Resistor
Answer: Resistor
41. The mouse pointer moves erratically, what is the possible cause? The mouse
1. has an incorrect IRQ setting
2. driver is not installed properly
3. ball is dirty
4. is not connected
Answer: ball is dirty
42. Which peripheral port provides the FASTEST throughput to laser printers?
1. Parallel
2. RS-232
3. Serial
4. SCSI
Answer: Parallel
43. Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC
and don’t get a beep. What should you check first?

1. RAM
2. system board
3. power supply
4. speaker
Answer: speaker
44. To view any currently running Terminate Stay Resident (TSR’s) programs you could
type__________
1. MEM
2. SYS /M
3. Memory
4. Memmaker
Answer: MEM
45. A hard disk is divided into tracks which are further subdivided into_____________
1. sectors
2. clusters
3. heads
4. vectors
Answer: sectors
46. Voltage4s measured___________
1. in series
2. in parallel
3. after checking resistance
4. after breaking the circuit
Answer: in parallel
47. Suppose that you have a the maintenance package identifies several possible field
replaceable units (FRUs) that will resolve the problem. What should you do after turning the
power off?
1. Replace all of the indicated FRUs at once and return the machine to the customer if
the problem is resolved
2. Replace the indicated parts, one at a time in the recommended sequence, until the
problem is resolved; return unused FRUs to stock
3. Follow the same procedure as in ays replace the system board first if it is on the list
of possible FRUs If multiple FRUs are indicated, then software is the most likely
source of the problem
4. None of the above
Answer: Replace the indicated parts, one at a time in the recommended sequence, until the
problem is resolved; return unused FRUs to stock
48. Which type of system board is the MOST likely candidate for processor upgrading if you
want maximum performance and future compatibility?
1. PCI
2. ISA
3. ML
4. EISA
Answer: PCI
49. ESD would cause the most damage to which component?
1. Monitor
2. Expansion board
3. Power supply
4. Keyboard
Answer: Expansion board
50. Which Motherboard form factor uses one 20 pin connector
1. BABY AT
2. ATX
3. AT
4. All of the above
Answer: ATX

4. Question

The most common input devices include:

monitors and keyboards.


monitors and mice.
mice and keyboards.
printer and mice.
5. Question

The primary output device for computers is a:

video monitor.
printer.
keyboard.
mouse.
11. Question

The input, output, and storage devices are known as:

peripheral devices.
secondary storage devices.
firmware.
hardware drivers

If a user needs information instantly available to the CPU, it should be stored:

in the CPU.
in RAM.
in secondary storage.
on a CD.
12. Question

Storage devices include all of the following EXCEPT:

a recordable CD.
RAM.
a hard drive.
a DVD drive.
13. Question
The input, output, and storage devices are known as:

peripheral devices.
secondary storage devices.
firmware.
hardware drivers.
14. Question

Digital means that computer information is discrete and countable, subdivided into:

digits.
analog units.
input.
bytes.
15. Question

The smallest unit of information a computer can understand and process is known as
a:

digit.
byte.
bit.
kilobyte.
16. Question

A bit can have two values:

bit and byte.


0 and 1.
2 and 4.
1 and 2.
17. Question

Binary means

there are two possibilities: on and off.


the same as a byte: 8 bits.
there are three options: 0, 1, and 2.
that computers really need to have three or more options.
18. Question

A group of 8 bits is known as a:


kilobyte.
binary digit.
byte.
megabit.
19. Question

The binary system uses the power of:

10.
4.
256.
2.
20. Question

A byte can represent any number between 0 and:

2.
255.
256.
1024.
21. Question

The most widely used code that represents each character as a unique 8-bit code is:

ASCII.
Unicode.
binary numbering system.
EBCDIC.
22. Question

ASCII stands for:

American Standard Code for Information Interface.


American Standard Computer Interface Internet. .
American Standard Code for Information Interchange.
Advanced Standard Code for Interface Interchange.
23. Question

In ASCII, ____________ characters can be created.


255
1,024
256
128
24. Question

An advanced coding scheme that incorporates Chinese, Greek, Hebrew, and Japanese
is known as:

ASCII.
World wide interchange (WWI).
Worldcode.
Unicode.
25. Question

1,024 bytes of data is a:

megabyte.
kilobyte.
gigabyte.
terabyte.
31. Question

Linux is a(n):

computer system.
operating system.
piece of application software.
type of CPU device.
32. Question

The clock of a computer system is the:

software that shows the time on the taskbar.


timing device that processes all instructions input into the computer.
timing device that produces electrical pulses to synchronize the computer’s
operations.

device that is the newest and most modern in a computer system.


33. Question

A computer’s clock speed is measured in:


gigabytes.
bits.
megahertz.
gigahertz.
34. Question

The word size of a typical PC’s CPU is:

1 or 2 bytes.
32 or 64 bits.
32 or 64 bytes.
8 or 16 bits.
35. Question

The ____________, by Intel, is a 64-bit processor.

Pentium
Athlon
Itanium
Celeron

You might also like