Refer to exhibit. Based on the advertisement that is shown, what is the native resolution of this computer system ?
8x
3 GB
2 GHz
1919 MB
1280*800
1335 * 9.57
8x
3 GB
2 GHz
1919 MB
1280*800
1335 * 9.57
2. Witch IEE standard defines the FireWare technology ?
1284
1394
1451
1539
3. Wich three system resources are commonly used for communication between the CPU or memory and other components in the computer ? (Choose three.)
IRQ
DMA
• UDP
I/O address
USB
PnP
IRQ
DMA
• UDP
I/O address
USB
PnP
4. Which three devices are considered ouput devices ?
Fingerprint scanner
Headphones
Keyboard
Monitor
Mouse
Printer
5. Which two devices are considered input devices ? (Choose two.)
Biometric authentication device
Printer
Digital camera
Projector
Speakers
6. Which two form factors are commonly used to build a new computer ? (Choose two.)
BTX
NLQ
ATX
CLV
ECC
7. A tehnician creates a simple circuit that has a 9 V light bulb attached to a 9 V battery. The power ouput of the light bulb is 100 W. Wich equation should be used to calculate how much current in amps is required to archive the full 100 W ouput from the 9V bulb ?
I=P/V = 100W/9V= 11.11A
I=P*V=100W*9V=900A
I=(P/2)*V=50W*9V=450A
I=P*2*V=100W*(9v+9v)=8100A
8. A technician receives a complaint of poor image quality after the user changes the native resolution. While investigating the complaint, the technician discovers there is a mismatch between native mode and the native resolution of the peripheral. Which item is configured incorrectly?
DLP
LCD
Printer
scanner
9. What are the two connector types for the 1394a interface ? (Choose two.)
2 pin
4 pin
6 pin
8 pin
9 pin
15 pin
10. How many FireWire devices can be supported by a single FireWire port ?
12
25
32
54
63
127
11. What is a function of a KVM switch ?
Digitizes an image or document and sends the information to multiple computers;
Stores images from both digital stil cameras and video cameras on magnetic media;
Provides capability to share a keyboard, a mouse, USB devices, and speakers with multiple computers;
Provides biometric identification to an individual user by the use of fingerprints, voice recognition, or a retinal scan.
12. What is the function of a fan on top of a heat sink ?
To cool the memory modules;
To move the heat away from CPU;
To draw cool air into the computer case;
To provide a water-cooling system for extremely fast CPUs.
13. A student has passed the \compTIA A+ cfertification exam. Based on this passing score, for which job is the student now qualified ?
Network associate;
Security technician;
Network technician;
Network professional;
PC hardware and software tehnician
14. Which memory module has a front side bus speed of 200MHz ?
DDR-333
DDR-400
DDR-667
DDR3-667
PC100 SDRAM
15. What are two factors that must be considered when choosing a computer case? (Choose two.)
The size of monitor;
The vendor that manufactured the motherboard;
The number of external or internal drive locations;
The size of the motherboard and the power supply;
The number of LED indicators at the front of the case.
16. Which important feature is offered by the USB standard ?
A single USB connection to a computer can support up to 255 separate devices;
It offers rates of around 580 Mb/sec in low-speed mode;
It allows up to 920 Mb/sec in the 2.0 version.
It can supply power from the computer to devices.
17. Wich tehnology would be best to use for drive redundancy and data protection?
CD;
DVD;
PATA;
RAID;
SCSI.
18. Which type of computer resources are direct lines to the processor and are used by computer components to request attention from the CPU ?
DMAs
I/O addresses
IRQs
Memory addresses
19. What is a function of the operating system in a computer ?
It defines the physical components in the computer;
It instructs the computer how to process information;
It provides instructions on how to access the internet;
It identifies the type of firmware that is installed in the computer.
20. Which type of ROM can be reprogrammed with software while it is still physically installed in the computer ?
EEPROM
EPROM
PROM
ROM
******** tHE eNd ******
- CHAPTER 02
1. Which two devices commonly affect wireless LAN ? (Choose two.)
Blu-ray players;
Home theaters;
Wirelles phones;
Microwaves;
Incandescent light bulbs;
External hard drive.
Blu-ray players;
Home theaters;
Wirelles phones;
Microwaves;
Incandescent light bulbs;
External hard drive.
2. A technician has a room of computers wich are running very hot. The technician discovers that the heat sinks in the computers are very dusty. What should the technician use to clean the heat sinks ?
Mild cleaning solution;
Lint free cloth;
Isoprpyl alcohol;
Compressed air.
3. Which computer components must a technician never try to work on when wearing an antistatic wrist strap ?
CPU;
Hard disk;
Keyboard;
CRT monitor;
RAM module.
4. Refer to the exhibit. Wich type of tool is shown in the grafic ?
Cable meter;
Digital multimeter;
Network traffic monitor;
Electrostatic discharger.
5. How does a technician discharge static buildup ?
Touching the painted part of the computer case;
Touching an unpainted part of the computer case;
Touching an antistatic wrist strap before touching any computer equipment;
Touching an antistatic mai before touching any computer equipment.
6. Refer to exhibit. Which type of tool is presented in the graphic ?
Hex screwdriver;
Stripped screwdriver;
Philips-head screwdriver;
Flat-head screwdriver.
Hex screwdriver;
Stripped screwdriver;
Philips-head screwdriver;
Flat-head screwdriver.
7. Which step should be performed first when servicing computer equipment ?
Wipe down the exterior with a lint free, damp soft cloth;
Open the case and chek for any loose connections;
Turn off and remove the power source;
Replace any suspected bad components with known good components.
8. Wich condition refers to a sudden and dramatic increase in voltage, which is usualy caused by lighting ?
Brownout;
Sag;
Spike;
Surge.
Brownout;
Sag;
Spike;
Surge.
9. Which Windows XP command-line scans the critical files of the operating system and replaces any files that have been corrupted ?
Chkdsk;
Defrag;
Disk Cleanup;
Disk Management;
Scan System;
System File Checker.
10. The performance of a computer is reduced after if has been using the Internet. Wich three tools could be run to try to improve the performance of the computer ? (Choose three.)
Fdisk;
Spyware Remover;
Defrag;
Disk Cleanup;
A Bios updater;
Device Manager Utility.
11. Why is documentation of all services and repairs an important organizational tool for a tecnician ?
It allows for public sharing on the Internet;
It increases the cost of services and repairs;
It minimizes the requirements that are used when hiring new technicians;
It provides reference material for similar problems when such problems are encounterd in the future.
12. Why should an antistatic wrist strap be worn when working on electronic equipment ?
To prevent interference from clothing and loose jewelry;
To equalize the electrical charge between a person and the equipment;
To prevent clothing made of silk, polyester, or wool from generating a static charge;
To draw static electricity away from a component and transfer it safetely from equipment to a grounding point.
13. Which precaution should be taken when working around electronic devices?
Avoid using magnetized tools;
Only use hard tools from the same vendor;
Wear ESD protection to repair monitors in humid environments;
Avoid using ESD wrist straps and ESD mats simultaneously.
14. Which tool in Windows XP gives a technician access to initialize disks and create partitions ?
Defrag;
Disk Cleanup;
Disk Management;
Format;
Scandisk.
15. What are two significant sources of EMI ? (Choose two)
Infrared mice;
RAM modules
Electrical storms;
LCD monitors;
Power lines.
16. Which two tools are recommended for cleaning a PC ? (Choose two)
Antibacterial spray;
Compressed air;
Mild abrasive detergent;
Nylon brush;
Rubbing alcohol;
Soft cloth.
17. Which tool should be used if a user needs to optimize space on a hard drive?
Defrag;
Disk Management;
Fdisk;
Format.
18. Which two types of tool can help protect a computer from malicious attacks? (Choose two)
Antivirus software;
Disk Cleanup;
Disk Management;
Fdisk;
Scandisk;
Spyware Remover.
19. Which three computer components contain hazardous materials and require special handing for disposal ? (Choose three)
Batteries;
Floppy drives;
Monitors;
Optical drives;
Paralel cables;
Printer toner cartridges.
20. Which two tools can help protect against ESD ? (Choose two)
Antistatic wrist strap;
Compressed air;
Antistatic mat;
Safesty glasses;
Polyester clothing.
******* tHE EnD ********
- CHAPTER 03
1.What is a function of a video adapter card?
stores video files in RAM;
connects a computer to a video storage device;
provides the appropriate drivers for the monitor;
provides an interface between a computer and a display monitor.
stores video files in RAM;
connects a computer to a video storage device;
provides the appropriate drivers for the monitor;
provides an interface between a computer and a display monitor.
2.A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
It issues a number of short beeps;
The LED on the front of the computer case flashes a number of times;
It places an error message in the BIOS;
It locks the keyboard.
3.What is a convenient way that a technician can tell whether a ribbon cable is for an IDE hard drive or a floppy drive?
The IDE cable has a colored stripe on one edge;
The floppy cable motherboard connector is normally gray;
The IDE cable is gray;
The floppy cable has a twist in the cable.
4.A field technician has been asked to install a wireless 802.11g NIC in a computer, but is unsure about the expansion slots available. Which two types of wireless NICs should the technician have available? (Choose two.)
PCIe;
AGP;
SCSI;
PCI;
SATA.
5.Which type of drive is installed in a 5.25-inch bay?
hard drive;
• optical drive;
floppy drive;
LS120 drive.
6.Which action is recommended to prevent the motherboard from contacting the metal base of the case?
Ensure that the non-conductive side of the case is beneath the motherboard;
Use standoffs to keep the motherboard above the metal base;
Use a self-adhesive non-conductive membrane on the underside of the motherboard.
7.What is the first step that a technician should take before physically opening a computer case?
Verify the room temperature;
Consult the website of the manufacturer;
Check the ventilation in the room;
Provide small containers to collect small screws.
Verify the room temperature;
Consult the website of the manufacturer;
Check the ventilation in the room;
Provide small containers to collect small screws.
8.What is the most reliable way for users to buy the correct RAM to upgrade a computer?
Buy RAM that is the same color as the memory sockets on the motherboard;
Ensure that the RAM chip is the same size as the ROM chip;
Ensure that the RAM is compatible with the peripherals installed on the motherboard;
Check the motherboard manual or manufacturer's website.
9.After a technician has assembled a new computer, it is necessary to configure the BIOS. At which point must a key be pressed to start the BIOS setup program?
before the computer is powered on;
during the Windows load process;
during the POST;
after the POST, but before Windows starts to load.
10.Which two connections should be provided to a floppy disk drive during installation? (Choose two.)
a floppy data cable to connect the FDD to the motherboard;
a cable from the power supply to the Berg power connector on the FDD;
a cable from the 3-pin fan power connector into the Berg power connector on the FDD;
a data cable from the Molex connector of the optical drive to the Berg connector on the FDD;
a cable from the 20-pin ATX power connector socket on the motherboard to the Berg power connector on the FDD.
Refer to the exhibit. What is the order of steps that should be followed for a power supply installation in a computer?
Steps 1, 2, 4;
Steps 1, 3, 2;
Steps 1, 4, 3;
Steps 2, 3, 4.
Steps 1, 2, 4;
Steps 1, 3, 2;
Steps 1, 4, 3;
Steps 2, 3, 4.
12.When building a computer, which two components are normally installed in 3.5-inch drive bays? (Choose two.)
hard drive;
optical drive;
floppy drive;
flash drive;
video card.
13.Which two connectors are used to connect external peripherals? (Choose two.)
EIDE;
Molex;
PATA;
PS/2;
USB.
14. Refer to the exhibit. Which should be the last step when connecting external cables to a computer?
Step 1;
Step 2;
Step 3;
Step 4;
Step 5;
Step 6.
15.A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to an ATX motherboard?
Berg;
Mini-Molex;
Molex;
20-pin connector.
16.Where should internal drives be installed in a computer?
in internal bays;
on the AGP channel;
on the motherboard;
on PCIe expansion slots.
17.What is a function of the BIOS?
enables a computer to connect to a network;
provides temporary data storage for the CPU;
performs a check on all internal components;
provides graphic capabilities for games and applications.
18.When installing a CPU in a ZIF socket, how should the technician align the pins to avoid damage?
Pin 1 is always aligned with the opposite corner from the base of the lever;
Pin 1 on the CPU is aligned with Pin 1 on the ZIF socket;
Pin 1 is aligned with the corner closest to the memory;
The removed corner of the CPU is always aligned with the corner opposite Pin 1.
19.What should be the next installation step after all the internal components of a PC have been installed and connected to the motherboard and power supply?
Connect the monitor cable;
Connect the network cable;
Reattach the side panels to the case;
Connect the power cables to the computer.
20.What is a function of the adapter cards that are installed in a computer?
to transfer external power to the motherboard;
to connect the motherboard to internal memory;
to connect internal power cables to the motherboard;
to provide functionality for external components to be connected to the computer.
********** tHE enD ************
- CHAPTER 04
1. Which two are benefits of preventative maintenance? (Choose 2)
Extends the life of the components
Requires less manpower
Reduces repair costs
Teaches the users to help themselves
Extends the life of the components
Requires less manpower
Reduces repair costs
Teaches the users to help themselves
2. Which of the following is not an example of software maintenance?
Remove unwanted programs
Clean the mouse and keyboard
Review driver updates
Review security updates
Review software updates
Remove unwanted programs
Clean the mouse and keyboard
Review driver updates
Review security updates
Review software updates
3. What should a preventative maintenance plan be based on?
The technician’s experience
The company’s budget
The needs of the equipment
The complaints of the users
The technician’s experience
The company’s budget
The needs of the equipment
The complaints of the users
4. What are some of the things you should do when providing hardware maintenance? (Choose 3)
Check the condition of the cables
Clean the components with mild detergent and a lint free cloth
Check and secure any loose cables
Remove dust from the components
Replace all parts after 1 year
Check the condition of the cables
Clean the components with mild detergent and a lint free cloth
Check and secure any loose cables
Remove dust from the components
Replace all parts after 1 year
5. What statements are true regarding preventative maintenance? (Choose 3)
It helps prevent failure of parts
Ensures components are in good working condition
It is a learned skill
Provides a regular and systematic inspection
It reduces the workload on the technicians
It helps prevent failure of parts
Ensures components are in good working condition
It is a learned skill
Provides a regular and systematic inspection
It reduces the workload on the technicians
6. Where can you find a list of all the devices that are configured on a computer?
Motherboard manuals
Control Panel
Device Manager
Hardware database
Motherboard manuals
Control Panel
Device Manager
Hardware database
7. When you are researching possible solutions for a computer problem, name one location you may start your research?
Internet, other technicians, newsgroups, technical websites, online forums, computer manuals, device manuals, manufacturer’s FAQ’s
Internet, other technicians, newsgroups, technical websites, online forums, computer manuals, device manuals, manufacturer’s FAQ’s
8. What is the second step of the troubleshooting process?
Try quick solutions
Gather data from the computer
Gather data from the customer
Verify obvious issues
Evaluate the problem
Try quick solutions
Gather data from the computer
Gather data from the customer
Verify obvious issues
Evaluate the problem
9. An employee of a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. What type of threat is this?
Man-in-the-middle
Phishing
Physical
Social engineering
Spoofing
10. Which threat to security uses traffic from zombie computers to overwhelm servers?
DoS
DDoS
Phishing
Spoofing
SYN flood
DoS
DDoS
Phishing
Spoofing
SYN flood
11. Which two statements are true regarding username and password standards?
Keep the username naming convention simple
Usernames should expire periodically
Keep the passwords simple and easy to remember
Rules about password expiration & lockout should be defined
Users should create their own username and password
Keep the username naming convention simple
Usernames should expire periodically
Keep the passwords simple and easy to remember
Rules about password expiration & lockout should be defined
Users should create their own username and password
12. When setting up a new wireless access point, which basic security measure should be taken?
Disable SSID broadcast
Enable SSID broadcast
Broadcast the default SSID
Broadcast a unique SSID
Disable SSID broadcast
Enable SSID broadcast
Broadcast the default SSID
Broadcast a unique SSID
13. An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented?
Adware
Phishing
Spyware
Trojan
14. What is the best method for a company to secure data being transmitted across the internet between remote sites?
Use plain text in an e-mail
Use a shared server with an encrypted password on the file
Use computers secured with smartcard authentication
Use a VPN connection
Use plain text in an e-mail
Use a shared server with an encrypted password on the file
Use computers secured with smartcard authentication
Use a VPN connection
15. Which is the best way to secure a laptop left at the office while the user is away for an extended period of time?
Cover the laptop with files and leave it on your desk
Put the laptop in a desk drawer in your locked office
Place the laptop in a locked security cage designed to store computer equipment
Hide the laptop in your supervisor’s office
Cover the laptop with files and leave it on your desk
Put the laptop in a desk drawer in your locked office
Place the laptop in a locked security cage designed to store computer equipment
Hide the laptop in your supervisor’s office
16. What is the safest place to store backups?
Portable lock box
Locked telecommunications room
Locked server room
Offsite secure facility
Portable lock box
Locked telecommunications room
Locked server room
Offsite secure facility
17. What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
Download the latest signature files on a regular basis
Schedule a scan once a week
Schedule anti-virus updates using windows task manager
Follow the firewall configuration guidelines on the anti-virus manufacturer website.
Download the latest signature files on a regular basis
Schedule a scan once a week
Schedule anti-virus updates using windows task manager
Follow the firewall configuration guidelines on the anti-virus manufacturer website.
18. Which two items can be downloaded from the Microsoft website to help protect Windows XP?
ROM upgrades
Service packs
Security patches
BIOS upgrades
DirectX updates
ROM upgrades
Service packs
Security patches
BIOS upgrades
DirectX updates
19 A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data?
Delete the files containing the confidential data
Reformat the hard drives
Expose the hard drives to ultraviolet light
Destroy the hard drives with a hammer
Delete the files containing the confidential data
Reformat the hard drives
Expose the hard drives to ultraviolet light
Destroy the hard drives with a hammer
20. A technician downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
Create a restore point
Manually update the last know good configuration
Reinstall the anti-virus software
Change the firewall rules to enable the installer to access a port 8900 of the Microsoft server
Create a restore point
Manually update the last know good configuration
Reinstall the anti-virus software
Change the firewall rules to enable the installer to access a port 8900 of the Microsoft server
21. What is the difference between WEP64 and WEP 128?
WEP64 can handle 64 simultaneous connections, & WEP128 can handle 128 simultaneous connections.
WEP64 operates on a 64-bit processor, but WEP128 requires a dual core 128-bit processor
WEP64 uses 64-byte packets, and WEP128 uses 128-byte packets
WEP64 uses a 64-bit encryption key, and WEP uses a 128-bit key.
WEP64 can handle 64 simultaneous connections, & WEP128 can handle 128 simultaneous connections.
WEP64 operates on a 64-bit processor, but WEP128 requires a dual core 128-bit processor
WEP64 uses 64-byte packets, and WEP128 uses 128-byte packets
WEP64 uses a 64-bit encryption key, and WEP uses a 128-bit key.
22. Which best practice should be included in a password protection policy?
Encourage users to document passwords in a personal file
Enforce password protection at the BIOS level
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system
Restrict passwords to text-bases strings
Encourage users to document passwords in a personal file
Enforce password protection at the BIOS level
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system
Restrict passwords to text-bases strings
23. The value of physical equipment if often far more than the value of the data it contains.
True
False
True
False
24. What network uses encryption to protect data?
Wireless
VPN
WEP
Star
Wireless
VPN
WEP
Star
25. What file system used in some versions of Windows lacks both journaling and encryption capabilities?
NTFS
FAT32
FAT 16
NTFS2
26. Manufacturers of operating systems and software applications may provide code updates called __________ that prevent a newly discovered virus or worm from making a successful attack.
Signatures
patches
Service pack
SYN flood
Signatures
patches
Service pack
SYN flood
************ THe eNd ***********
- CHAPTER 05
1
A technician has installed new video drivers on a Windows XP computer and now the monitor shows distorted images. What startup mode can the technician use to access a new driver on the network?
Safe Mode
Safe Mode with Networking Support
Real Mode with Networking Support
Safe Mode with Rollback Support
A technician has installed new video drivers on a Windows XP computer and now the monitor shows distorted images. What startup mode can the technician use to access a new driver on the network?
Safe Mode
Safe Mode with Networking Support
Real Mode with Networking Support
Safe Mode with Rollback Support
2
Which mode allows applications that are not compatible with the current operating system to run in an environment that simulates an earlier operating system?
real mode
protected mode
virtual real mode
compatibility mode
3
Which operating mode is used by Windows XP to run a DOS application?
protected mode
64-bit mode
virtual real mode
real mode
4
A technician has a computer that is unable to boot Windows XP properly. The technician has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair XP from the XP boot disk?
Recovery Console
Windows Disk Manager
msconfig
fix /mbr
5
Once minimum hardware requirements are satisfied, where should a technician look to determine if the computer hardware has been tested with Windows XP?
the Microsoft Compatibility Assistant
the Windows XP Hardware Compatibility List
the Microsoft Knowledge Base
the Windows XP manual
6
A technician has finished installing Windows XP. What should the technician do to verify that all hardware has been installed correctly?
Run HWINFO.EXE to verify that all devices are listed.
Use the Windows XP Msconfig utility to prove that all the devices are operational.
Use the Windows XP Testall utility to confirm that the devices are operational.
Use the Device Manager utility to ensure that all the devices are operational.
7
A user decides to install a new version of Windows Vista but needs to retain the configurations and customizations of the current Windows XP operating system. Which software can be used to achieve this?
Windows Task Manager
Windows Vista Setup Wizard
Microsoft Management Console
Windows User State Migration Tool
A user decides to install a new version of Windows Vista but needs to retain the configurations and customizations of the current Windows XP operating system. Which software can be used to achieve this?
Windows Task Manager
Windows Vista Setup Wizard
Microsoft Management Console
Windows User State Migration Tool
8
Which two operating systems can function correctly on a system with 64 MB of RAM? (Choose two.)
Windows XP Home
Windows XP Professional
Windows XP Media Center
Windows Vista Home Basic
Windows Vista Home Premium
9
Which registry file contains information about the hardware and software in the computer system?
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
10
What are two features of the Microsoft Management Console (MMC)? (Choose two.)
MMC logs a history of application events.
It organizes operating system snap-ins.
It can be used to create customized MMCs.
It displays computer performance information.
It enables virtual memory settings to be customized.
11
When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this issue?
Roll back the driver.
Restart both the computer and the printer.
Scan the downloaded driver file with a virus scanner.
Use the Last Known Good Configuration to restart the computer.
12
Which directory contains Windows XP OS system files?
C:\WINNT
C:\WINDOWS
C:\Program Files
C:\Documents and Settings
13
A company with 40 computers needs to reduce repair costs, decrease downtime, and improve reliability. Which task will meet these needs?
Enact a comprehensive security policy.
Upgrade all the operating systems.
Develop a preventive maintenance plan.
Create an Automated System Recovery CD.
14
Which set of guidelines is used to ensure that programmers develop applications that are compatible with an operating system?
ACAPI
API
IRQ
PnP
15
A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP utility will check the file system for errors?
Attrib
Chkdsk
Fdisk
Format
A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP utility will check the file system for errors?
Attrib
Chkdsk
Fdisk
Format
16
What would be the result of having a corrupt Master Boot Record?
A new application will fail to install.
The operating system will fail to start.
The printer will function incorrectly.
The keyboard will be unresponsive to the user.
What would be the result of having a corrupt Master Boot Record?
A new application will fail to install.
The operating system will fail to start.
The printer will function incorrectly.
The keyboard will be unresponsive to the user.
17
A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS?
Format all the existing files with the NTFS File tool.
Create a new NTFS partition and copy the files into the new partition. The existing partition can not be changed.
Run the Microsoft Convert utility.
Overwrite the FAT32 file system with NTFS. Files will automatically be added to the new file system.
18
How much RAM can be addressed by a 64-bit operating system?
4 GB maximum
16 GB maximum
32 GB maximum
64 GB maximum
128 GB or more
19
When a computer boots from the Windows Vista disc, which three functions are performed if the Custom (advanced) option is selected? (Choose three.)
Existing files and settings are kept.
Changes to disk partitions can be made.
A clean copy of Windows Vista is installed.
The existing Windows installation is repaired.
The location of the Windows installation can be selected.
The Recovery Console can be used to repair the Master Boot Record.
20
What is the term for the ability of an operating system to run multiple applications at the same time?
multiuser
multitasking
multithreading
multiprocessing
************ THe eNd ***********