Thursday, November 29, 2007

Operating Systems: Checking for compatability prior to upgrades

What tool allows you to check your system for compatibility prior to installing Windows XP?
1. Disk Cleanup
2. >>Upgrade Advisor
3. MSCONFIG
4. Windows Update

Explanation : Before you attempt to upgrade a system to Windows XP, you should insert the Windows XP installation CD and run the Upgrade Advisor by clicking Check System Compatibility. The upgrade advisor examines your hardware and reports on what shortcomings it finds, if any.

You cannot use Windows Update to check for compatibility before upgrading to Windows XP. Windows Update allows users to download and install updates and security fixes for Windows.

You cannot use Disk Cleanup to check for compatibility before upgrading to Windows XP. You use Disk Cleanup to remove unnecessary files, empty the Recycle Bin, and restore disk space.

You cannot use MSCONFIG to check for compatibility before upgrading to Windows XP. MSCONFIG allows you to specify which programs and services you want to run at startup.
Objective: Operating Systems

Security: Smart Cards

You are troubleshooting login at a computer that uses a smart card for authentication.
What response should you see from the computer when you insert the smart card in the reader?
1. >>The computer should finish logging in to the network.
2. The computer should prompt for a user name.
3. The computer should prompt you to remove the smart card.
4. The computer should prompt for a password or personal identification number (PIN).

Explanation : The computer should prompt you for a password or PIN. Smart cards use a two-form authentication. The first part of the authentication is the smart card itself. You must also provide either a password or PIN, depending on the specific smart card and software.

The computer should not prompt you to remove the smart card. When using a smart card for authentication, you lock the computer by removing the smart card.

The computer should not finish logging in to the network The computer should not complete the logon process until you provide a password or PIN.

The computer should not prompt for a user name. The smart card is used instead of a user name for authentication.
Objective:
A Windows XP computer on a TCP/IP network can use the ping command to communicate with other computers by IP address, but not by the computer's name. This is the only computer on the network having this problem.
What is most likely wrong?

1. The network's DHCP server is failing.
2. The computer's IP address is configured incorrectly.
3. The computer's default gateway address is configured incorrectly.
4. >>The computer's Primary DNS server address is configured incorrectly.
5. The network's DNS server is failing.

Explanation : The most likely problem is that the computer's Primary Domain Name Service (DNS) server address is configured incorrectly. Because this is the only computer experiencing the problem, you can be relatively sure that the problem is directly related to that computer. Because you can communicate with other computers by IP address, you know that the computer can communicate on the network. Because the DNS server provides host name/IP address resolution, the problem is most likely related to finding or communicating with the DNS server. Configuring the wrong primary DNS server address could cause this problem.

The problem is most likely not that the Dynamic Host Configuration Protocol (DHCP) server is failing. The DHCP server provides IP address and other TCP/IP configuration properties for computers configured to receive an IP address automatically. If the DHCP server were failing, you would see a different symptom. Network computers would not receive IP addresses, which would prevent them from communicating with other computers that have correct address by IP address or name.

The problem is most likely not that the computer's IP address is configured incorrectly. This would prevent the computer from communicating with any other computers on the network by IP address or host name.

The problem is most likely not related to the computer's gateway server address being configured incorrectly. This would prevent the computer from communicating with any computers on other networks by IP address or by name. The default gateway is not used when communicating with local computers on the same network.
Objective: Networks

Operating Systems: Safe Mode vs Debugging Mode vs VGA Mode vs Last Known Good Config

You are troubleshooting a problem with a Windows XP Professional computer. The system will not start normally. The owner said all she did was download and install a program off the Internet. When she rebooted, the system hung at the Windows logo screen.
You have tried to use the Last Known Good Configuration but the system still fails to boot to the desktop.
How should you attempt to start the system to correct the error?

1. Debugging Mode
2. Safe Mode with Command Prompt
3. >>Safe Mode
4. Enable VGA Mode

Explanation : If using the Last Known Good Configuration does not correct a boot up problem, Safe Mode should be used. Safe Mode boots the operating system with a minimum configuration, and can be used to solve problems with a new hardware or software installation, or problems caused by user settings. Safe Mode boots with the mouse, basic video, keyboard, and mass storage drivers loaded. It uses the default system services (not any extra services) and does not provide network access. It does provide a graphical interface. With the graphical interface enabled, you can use the normal Windows tools and utilities to correct the problem.

Safe Mode with Command Prompt is the same as Safe Mode but does not load the graphical interface. Many standard Windows tools and utilities do not run without the graphical interface.

Enable VGA Mode is used when the video setting is such that you cannot see the screen well enough to fix a bad setting. This can happen if a user creates a desktop with black fonts on a black background, or something similar to that. Booting in this mode gives you very plain VGA video display but allows you to change the settings in the Display properties.

Debugging Mode gives you the opportunity to move system boot logs from the failing computer to another computer for evaluation. To use this mode, you first must connect the failing computer to another computer using a serial cable. You then can review the boot logs on a functioning computer.
Objective: Operating Systems

Security: Backups: Normal vs Incremental vs Daily vs Differential - and the Archive Bit

Which backup types back up selected files and clear the archive bit in Windows Backup? (Select TWO.)
1. Copy
2. Incremental
3. >>Normal
4. Daily
5. >>Differential

Explanation : A normal backup backs up the selected files and clears the archive bit. The archive bit identifies whether or not a file has changed since the last time it was backed up. Some backup types filter the files to back up based on the archive bit, backing up only those files with the archive bit set.

An incremental backup also backs up selected files, but is limited to only those files with the archive bit set. It clears the archive bit when it runs, so that only files that have changed since the last full or incremental backup are backed up. One potential disadvantage is that when you recover from multiple incremental backups, you must recover from all incremental backups made since the last base (normal) backup in the order in which they were taken. Recovery will fail if any of the backups are missing.

A daily backup backs up files modified on the day of the backup, but does not clear the archive bit. A daily backup uses the file modification date rather than the archive bit to determine the files to back up.

A copy backup backs up selected files, but does not clear the archive bit. It backs up all selected files and does not check the archive bit.

A differential backup backs up changed files from the selected files, based on the archive bit value, but does not clear the archive bit. Because of this, each subsequent differential backup backs up more data and takes longer to run, until a backup is run that clears the archive bit. Recovery using differential backups is relatively easy because you recover from the last base (normal) backup and then only need to recover from the most recent differential backup.
Objective: Security

Networks : Accessing the internet from computers with private IP addresses (Proxy)

Computers on your network are configured with private IP addresses that are not routable on the Internet. You want to substitute a routable Internet address when the computers need to access the Internet.
What type of server performs this function for your network?
1. DNS
2. >>Proxy
3. Gateway
4. DHCP

Explanation : A proxy server replaces a computer's configured address with its own address for Internet access. Private networks are typically configured with IP addresses that are not routable on the Internet. This will prevent computers on the network from accessing the Internet unless the configured private address is replaced by a routable IP address. This is done to help ensure the security of the network computers. Because only the proxy server address is exposed on the Internet, it is much harder for a hacker to break into the network.

A Dynamic Host Configuration Protocol (DHCP) server does not replace a computer's configured address for Internet access. A DHCP server assigns IP addresses and other TCP/IP configuration settings to network computers.

A Domain Name Service (DNS) server does not replace a computer's configured address for Internet access. DNS servers provide name registration and address resolution services.

A gateway does not replace a computer's configured address for Internet access. The term gateway, in a TCP/IP network, refers to a router. A TCP/IP gateway provides access to other network segments or networks in a routed network.
Objective: Networks

Printers and Scanners: Raster Image Processor

A parallel laser printer fails while printing a document that includes raster images. The print succeeds when you change the printer from printing 600 dots per inch (dpi) to 300 dpi. You need to print the document at 600 dpi.
How can you correct this problem?
1. >>Install more memory in the printer.
2. Connect the printer using USB instead of the parallel interface.
3. Install more memory in the computer.
4. Update the printer device driver.

Explanation : You should install more memory in the printer. A raster image is made of an array of pixels, or dots. The laser printer's raster image processor (RIP) prepares the printable image from the raster image. If the image is too large or too complex for the printer to hold the entire page in memory, the print operation fails. If you are unable to increase printer memory, you can work around the problem by reducing the print resolution or reducing the size of the image.

You should not connect the printer using USB instead of the parallel interface. Changing to a USB connection might enable the computer to load the image faster to the printer, but the only difference this would make is that the print job would probably fail more quickly.

You should not update the printer device driver. Raster image processing is handled internally by the printer's RIP, which is not related to hardware device driver support.

You should not install more memory in the computer. The problem is with a memory overflow in the printer, not the computer.

Security: Backing up Registry and Boot Files

What should you back up to ensure that you have a copy of a Windows XP computer's Registry and boot files?

1. >>Backup the system state.
2. Back up My Network Places.
3. Back up My Documents for each user.
4. Back up the Windows folder on drive C.

Explanation : You should back up the computer's system state to back up the Registry and boot files. System state backup also backs up the COM+ registration database, IIS metadirectory, and Windows File Protection system files.

You should not back up My Documents for each user to back up the Registry and boot files. System state is not stored in the My Documents folder.

You should not back up My Network Places to back up the Registry and boot files. This would not back up system state data for the local computer because it backs up data physically located on shared network folders.

You should not back up the Windows folder to back up the Registry and boot files. Some of the boot files are stored at the system drive root, not the Windows folder.
Objective: Security

Networks: Retrieving the MAC address

What command would you use to retrieve a computer's MAC address?
1. >>ping
2. tracert
3. ipconfig
4. netstat

Explanation : You should use the ipconfig command and run ipconfig /all to retrieve a computer's Media Access Control (MAC) address. The MAC address is the address that is hard-coded on the computer's network interface card (NIC).

You should not use the ping command to retrieve a computer's MAC address. The ping command is used to trace communication between two computers.

You should not use the tracert command to retrieve a computer's MAC address. The tracert command is used to test communication with another computer and return detailed routing information.

You should not use the netstat command to retrieve a computer's MAC address. The netstat command is used to view networking status information. For example, the netstat command can be used to identify which ports are open and are monitored ("listened to") by the computer. Ports are used to direct network traffic to the appropriate service or application. The most commonly used default ports are defined as well-known ports. Ports often found open on a Windows computer include port 80, which is the default for Hypertext Transfer Protocol (HTTP) traffic for Web-related traffic, and port 53, which is used for Domain Name Service (DNS) traffic.
Objective: Networks

Laptops: Power Management - Hibernate vs Suspend vs Standby vs Shutdown

You need to configure power management for your notebook computer. You need to ensure that when the computer sits idle for more than 15 minutes, the computer powers down and turns itself off. You also need to be able to bring the computer back to being fully functional and available with the same applications running as before the computer was turned off. You need to bring the computer back up as quickly as possible when it is turned back on.
Which power state should you have the computer enter after it sits idle for 15 minutes?
1. Hibernate
2. Shutdown
3. >>Standby
4. Suspend

Explanation : You should have the computer enter hibernate state after it sits idle for 15 minutes. When a computer hibernates, all currently running applications and data in RAM are written to the hard disk. The computer power is then turned off. When the computer is turned back on, it is able to come back to full functionality with the same applications running because it reads the applications and data from the hard disk and writes them back into memory.

Shutdown also turns off the computer, but does not write the running applications or data to the hard disk. Because nothing is written to the hard disk, when the computer is turned on, it must go through full operating system startup. You must then restart any applications and reopen any data files that you need. This means that is takes longer to get the computer back to the same state as before it shut down.

Both suspend and standby are low-power states. Neither suspend nor standby turns the computer off, so neither of these power options meets your requirements.
Suspend is a low-power state with applications and memory maintained in RAM, but not written to the hard disk. Suspend does not turn off the computer, but does turn off many components in the computer, such as the hard disk.

Nothing is saved to memory or the hard disk with standby, and fewer devices are turned off (if any) than with the suspend mode. Some devices, such as the processor, are put in a lower-power mode. Because there are fewer devices that must be turned back on than with other power states, the computer returns to full functionality from this state faster than from any of the others listed.
Objective: Laptops and Portable Devices

Networks: STP vs RG8 vs Fiber Optic

Which of the following cable types would you choose to network seven buildings on a university campus?
1. RG-58
2. >>STP
3. Multimode Fiber Optic
4. RG-8

Explanation : Multimode Fiber Optic cable offers the best solution as it can run 2,000 meters (6,560 feet) and is impervious to electrical grounds. This would be the best choice since seven buildings in a campus are likely separated by a good distance.

RG-8 and RG-58 are coaxial cables and are limited to five segments, so connecting seven buildings would be beyond their capability even if the distance was not a factor. RG-8 has a maximum cable length of 500 meters, while RG-58 is limited to 185 meters.

Shielded Twisted Pair (STP) cabling is limited to 100 meters and would not be able to reach all of the buildings on the campus.
Objective: Networks

Printers and Scanners: TWAIN II

What is the significance of the TWAIN interface standard?
1. Non-Windows applications use the TWAIN interface standard to emulate a Windows interface.
2. >>Scanner hardware device drives must be written to the TWAIN interface standard.
3. The TWAIN interface standard is responsible for optical character recognition (OCR).
4. The TWAIN interface standard enables applications to directly control a scanner.

Explanation : The TWAIN interface standard enables imaging applications to directly control a scanner and scan images into the application. The term comes from the phrase "never the twain shall meet" and is designed to make it easier to use scanners and other imaging devices.

The TWAIN interface standard is not a hardware device driver standard. Most, but not all, scanners support the TWAIN interface standard. Many manufacturers include interface software that supports more advanced features than those supported by the TWAIN interface standard.

The TWAIN interface standard is not related to OCR applications except as a way of importing images directly into an application at supports OCR functionality. OCR software is able to recognize and extract character data from a scanned image.

The TWAIN interface standard is not related to Windows interface emulation. It is related specifically to imaging applications.
Objective: Printers and Scanners

Operating Systems: Upgrading from 95 to XP Pro

How should you upgrade a computer's operating system from Windows 95 to Windows XP Professional?

1. Install Windows XP Professional to the same hard disk partition that contains the Windows 95 operating system files.

2. Install Windows XP Professional to a hard disk partition other than the one that contains the Windows 95 operating system files.

3. >>Install Windows 98 to the hard disk partition that contains the Windows 95 operating system files, and then install Windows XP Professional to the same directory.

4. Run the Windows XP Upgrade Advisor, and then install Windows XP Professional to the hard disk partition that contains the Windows 95 operating system files.

Explanation : There is no direct upgrade path from Windows 95 to Windows XP. Instead you must first upgrade to either Windows 98 or Windows 2000 Professional by installing that operating system to the hard disk partition that contains the Windows 95 operating system files. Then you can perform an upgrade to Windows XP Professional to the same disk partition and Windows directory.

You should not install Windows XP Professional to a hard disk partition that contains the Windows 95 operating system files. This will not run as an upgrade installation. Also, Microsoft strongly discourages installing multiple operating system versions or instances to the same hard disk partition unless it is an upgrade installation.

You should not install Windows XP Professional to a hard disk partition other than the one that contains the Windows 95 operating system files. This will run as a clean installation and create a multiboot computer.

You should not run the Windows XP Upgrade Advisor and then install Windows XP Professional to the hard disk partition that contains the Windows 95 operating system files. Running the Upgrade Wizard will have no effect on the installation.
Objective: Operating Systems

Laptops: Port Replicator vs Docking Station

Your laptop does not provide sufficient I/O ports to meet your needs. You are trying to decide whether a docking station or port replicator is more appropriate to your needs.
What additional hardware support is provided by both a docking station and a port replicator? (Select TWO.)

1. >>Serial interface connector
2. >>USB port
3. PCI slot
4. Hard disk bay
5. Removable media bay
Explanation : The serial interface connector and USB port are provided by both docking stations and port replicators.

Port replicators and docking stations are similar devices, but a port replicator has less additional hardware support than a docking station. You should find a serial interface connection and one or more USB ports on a port replicator. You should also find a parallel port, video connections, and RJ-45 and RJ-11 ports. In short, you should find complete set of I/O ports.

You should find the same I/O ports on a docking station, but you would also expect additional hardware support. Typically, this will include a hard disk bay, removable media bay, memory slots, and possibly one or more PCI slots for installation of desktop PC expansion cards.
Both a port replicator and docking station support cable lock security.
Objective: Laptops and Portable Devices

Security: FAT32 vs NTFS partitions

When would it be necessary to convert a FAT32 disk partition to NTFS? (Select TWO.)
1. You want to support long file names.
2. >>You want to be able to set local file access permissions.
3. You want to use the Windows Backup utility to back up the partition.
4. >>You want to enable encrypting file system (EFS) support.
5. You want you configure a dual-boot computer with Windows 98 and Windows XP.

Explanation : You would need to convert a FAT32 disk partition to NTFS if you want to enable EFS support or local file access permissions. Both of these features require NTFS. EFS lets you encrypt files stored on the disk partition. Setting local file access permissions lets you set access permissions by user and group. This means that you can control who can access the files and the level of access permitted. For example, you might let some users view and modify files, while other users can view the files only.

You should not convert a FAT32 disk partition to NTFS to configure a dual-boot computer with Windows 98 and Windows XP. Windows 98 does not support NTFS, so FAT32 would be required in this situation.

You should not convert a FAT32 disk partition to NTFS to support long file names (names longer than the DOS 8.3 standard). FAT32 supports long file names for operating systems that support long file names.

You should not convert a FAT32 disk partition to NTFS to use the Windows Backup utility. The Windows Backup utility can be used to back up from and restore to a FAT32 partition.
Objective: Security

Networks : DSL and PPPoE vs DIal-Up vs FTP

When connecting your computer to the Internet through a DSL connection, which protocol would you expect to be used on the DSL connection?
1. DHCP
2. >>PPP
3. PPPoE
4. FTP

Explanation : A computer connects to a DSL-enabled phone line through a DSL modem. The computer's Ethernet network card connects directly to the modem, and the modem connects directly to the phone line. The connection between the network card and the broadband device most likely uses Point-to-Point Protocol over Ethernet (PPPoE), a protocol specifically designed to support broadband connections. PPPoE is included in Windows XP.

Point-to-Point Protocol (PPP) is used when establishing a Dial-Up connection from one computer to another.

File Transfer Protocol (FTP) is used to establish a connection between an FTP server and host. It is used to transfer files over a network.

Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to clients.

Printers and Scanners: Printer Features unavailable out of the box

You install a new laser printer on a computer running Microsoft Windows XP Professional. The printer includes USB, parallel, and Ethernet network interface connectors. You use the USB connector to connect the printer to your computer.
You are unable to use all of the printer's features, such as the alternate paper tray and printing on both sides of the paper. You need access to these additional features.
What should you do?
1. >>Download and install the latest version of the printer device driver from the printer manufacturer.
2. Connect to the printer through the parallel connector.
3. Detach the printer, reinstall Windows XP Professional, and reconnect the printer.
4. Configure the printer as the computer's default printer.

Explanation : You should download and install the latest version of the printer device driver from the printer manufacturer. This will sometimes also include a printer-specific control application. The most likely reason that you are unable to access all of the printer features is that you are not using the printer-specific device driver. Windows XP Professional will choose the best matching device driver, but this is not always the best device driver for the printer.

You should not detach the printer, reinstall Windows XP Professional, and reconnect the printer. Windows XP Professional will most likely choose the same device driver as the one it is currently using, which will result in the same symptoms as you are currently seeing.

You should not configure the printer as the computer's default printer as a way to correct the problem. Making the printer the default printer will cause the computer to print to that printer when no other printer is specified, but it will not change the available printer options or features.

You should not connect to the printer through the parallel connector. This would not hurt the printer, but it would not accomplish anything, either. The printer should support the same features and options whether connected through the USB connector or the parallel connector.
Objective:

Laptops and Expansion Card Slots

A laptop computer has an external 68-pin slot that is 5 mm thick.
What type of expansion slot is this?
1. CardBus
2. PCMCIA Type I
3. PCMCIA Type III
4. >>PCMCIA Type II
Explanation : The expansion slot is a PCMCIA Type II slot. A 68-pin external expansion bus with a 5 mm opening is a Type II slot. Most PC Cards, which are expansion cards based on the PCMCIA standard, are Type II cards and will therefore be physically compatible with the notebook computer. This slot can be used with both Type I and Type II cards.

A Type I slot is a 68-pin slot, but is only 3.3 mm thick. This slot supports Type I cards only.

A Type III slot has 68 pins and is 10.5 mm thick. It supports Type I, II, and III cards. However, Type III cards are rarely seen, and very few notebook computers have Type III slots.

CardBus refers to a bus connection type that uses 32-bit bus mastering, not to the physical card interface, so this would be an inappropriate answer.
Objective: Laptops and Portable Devices

Components: Updating BIOS from Manufacturer (Flashing the BIOS)

You receive a service update from your PC's manufacturer for a PC you recently purchased. You need to update the PC's BIOS.
What is the best method for updating the BIOS?
1. >>Download the BIOS installation file from the manufacturer and flash the BIOS.
2. Order a new BIOS chip from the manufacturer and replace the BIOS chip.
3. Order a new motherboard from the manufacturer and replace the motherboard.
4. Download a BIOS patch from the manufacturer and install the patch on the hard disk.

Explanation : The correct way to update a computer's BIOS is to download the BIOS installation file and flash the BIOS. Depending on the manufacturer, the BIOS flash utility can run from the hard disk or from a floppy diskette.

The original IBM PC used a programmable, socket-mounted BIOS chip that could be reprogrammed and replaced. Current PCs have soldered-in BIOS chips that are not considered to be a field-replaceable unit (FRU) and should not be replaced.

It would be possible, in many cases, to replace a PC's motherboard. This is not considered the best method for updating the BIOS. That is because replacing the motherboard is neither time- nor cost-effective and is more effort than necessary to update the BIOS.

The BIOS is not patched using a software patch installed on the hard disk. The initial programs in the BIOS run before anything is retrieved from the hard disk. Software patches are used to update operating system and application software.
Objective:

Security: Features supported by XP and 2kpro out of the box

Which of the following security features are supported by both Windows XP Professional and Windows 2000 Professional without installing additional software? (Select TWO.)
1. Encrypting File System (EFS)
2. Kerberos
3. Voice print recognition
4. Smart card support
5. >>Windows Firewall
6. >>Windows Security Center

Explanation : Kerberos authentication support and encrypting file system (EFS) are supported by both Windows 2000 Professional and Windows XP Professional. Kerberos is the default authentication method for Windows 2000 Professional and Windows XP Professional. EFS lets you configure your file system so that files are encrypted automatically. You can enable encryption for a file folder.

Windows Firewall, Windows Security Center, and smart cards are supported by Windows XP, but not Windows 2000. However, additional updates are required for Windows XP support. Windows Firewall and Windows Security Center are installed as part of Windows XP Service Pack 2. Windows 2000 can support smart cards but requires installation of add-on software to enable the support. Unmodified copies of Windows XP and Windows 2000 that have not be updated to current service pack versions do not support these security features.

Voice print recognition is not supported by either Windows XP or Windows 2000 unless you install additional software support. There are applications that can run on either that add voice print recognition as a biometric security method, but the functionality is not built into the operating system.
Objective: Security

Networks: Automatic IP address assignment (DHCP)

You want Windows XP Professional computers on your network to receive an IP address automatically.
What kind of server is needed to support this?
1. >>DHCP
2. FTP
3. WINS
4. DNS
Explanation : A Dynamic Host Configuration Protocol (DHCP) server is needed to support automatic IP address assignment. Network computers lease IP addresses from the DHCP server. You can also have the DHCP server configure other IP configuration properties. These include primary and secondary Domain Name Service (DNS) server, default gateway, and NetBIOS name resolution method and, if appropriate, Windows Internet Name Service (WINS) server.

A WINS server provides NetBIOS name/IP address resolution. A WINS server is not a required part of automatic IP address assignment.

A DNS server maps TCP/IP host (network computer) names to IP addresses and provides DNS name/IP address resolution services.

A File Transfer Protocol (FTP) server supports file uploads and downloads between the server and network computers.
Objective: Networks

Laptops: Bluetooth vs Infrared vs USB vs 802.11b

You are looking for a wireless printer that will work with a recently purchased laptop computer. You want to connect the printer as a local device. The printer should be operational within 30 feet of the laptop and should be self-configuring.
What type of device interface should you use?
1. USB
2. IrDA
3. 802.11b
4. >>Bluetooth
Explanation : You should use a Bluetooth interface printer. Bluetooth is a radio communications technology with an effective range of 10 meters, or just over 30 feet. Bluetooth devices are self-configuring. Printers often have multiple interfaces, so a Bluetooth printer might also support other interface options, but you would configure the printer to use the Bluetooth interface.

You should not use Infrared Data Association (IrDA) printer. IrDA is an infrared, line-of-site communication technology that is functionally similar to a serial connection. Range is no more than 10 to 20 feet, and can be less, depending on environmental conditions such as dust and ambient light.

You should not use 802.11b. This is a wireless networking communication technology rather than an interface for connecting peripherals. A printer with an 802.11b interface would be designed for connecting directly to the network as a network printer, not for connecting locally to a computer. The printer would likely also have a local connection option, either parallel or Universal Serial Bus (USB), but these are wired interfaces. Communication range is over 300 feet, typically 500 feet or more.

You should not use a USB interface printer. USB is a wired, not wireless, interface.
Objective: Laptops and Portable Devices

Components: HDD impact on system performance

When you are choosing a new hard drive, which performance measurement should you evaluate as having the most impact on system performance?
1. >>Average Access Time
2. Latency
3. Average Seek Time
4. Transfer Rate

Explanation : There are a number of things to consider when you are purchasing a hard drive, including size, cost, and performance. There are a number of ways to measure hard drive performance, including Average Seek Time, Average Access Time, Latency, and Transfer Rate.

Average Seek Time (measured in milliseconds) is the amount of time it takes to move the heads from one cylinder to another.

Latency is also measured in milliseconds and is a measurement of the amount of time it takes for the data to be available after the heads reach their destination.

Average Access Time is the sum of the Average Seek Time and Latency.

The most significant performance factor is Transfer Rate. It is a measurement of the rate at which data is sent to the system. This rate depends on the controller as well as the hard drive.
Objective: Personal Computer Components

Networks: TCP/IP vs NETBEUI

You have been contracted to advise the owners of a new office building on setting up a computer network. The owners require a network that will be inexpensive but allow a Linux Server, five Macintosh workstations, and 40 Windows XP Professional computers to share data and printers.
What would be your advice to the client?

1. Install a network bridge between the Macs and the PCs.
2. Recommend replacing the Mac computers with Windows PCs.
3. Recommend using NetBEUI as the common protocol for the network.
4. >>Setup TCP/IP as the default protocol for the LAN.

Explanation : The best choice here is to use TCP/IP as the network protocol. TCP/IP (Transmission Control Protocol/Internet Protocol) is the protocol used on the Internet and is supported by Novell NetWare, Linux, Unix, Windows, and the Mac OS.

NetBEUI (NetBIOS Extended User Interface) is a proprietary Windows protocol used only by Windows computers. It is not used on the Internet because it is a non-routable protocol.

It is not necessary to replace the Macs because they are compatible with the common TCP/IP protocol.

Bridges are Data Link layer devices that join together different network segments. They pass on only traffic that needs to reach the segment on the other side of the bridge and, therefore, can help decrease overall network traffic. Segmenting the network would not accomplish the goal.
Objective: Networks

Laptops and Cleaning II

You need to clean debris from between the keys on a laptop keyboard. You turn off the computer.
What should you use to remove the debris? (Select TWO.)

1. Rinse with running tap water.
2. Use a stiff-bristled brush dampened with water or an ammonia solution.
3. >>Use a dry, soft-bristled brush, such as a paint brush.
4. >>Use compressed air.
5. Use a soft cloth dampened with distilled water.

Explanation : You should use a dry, soft-bristled brush or compressed air to clean a laptop keyboard. Either one can be used to remove debris without damaging the keyboard.
You should not use water, at any time or in any form, to clean between the keys on a laptop computer. Any water can damage a laptop computer.
Objective: Laptops and Portable Devices

Components: CRT Flicker

A user complains about the amount of flicker noticeable on a CRT monitor.
Which configuration setting directly affects flicker?
1. >>Refresh rate
2. Aspect ratio
3. Dot pitch
4. Resolution

Explanation : The refresh rate directly affect screen flicker. Refresh rate is measured in Hertz (Hz), which is the number of times per second that the screen is refreshed. The higher the refresh rate, the less likely that the screen will have noticeable flicker. Flicker is usually not noticed when the refresh rate is configured at a rate of 72 Hz or higher.

The screen resolution does not affect flicker. Resolution refers to the number of pixels on the screen. VGA resolution starts at 800 X 600 pixels and ranges up from there. For example, 21-inch monitors are typically designed to provide optimal display at a resolution of 1280 X 1024.

The dot pitch refers to the distance between colors dots of the same color on the screen. This value is measured in millimeters. The lower the number, the clearer the picture. Dot pitch ranges from 0.15 mm and 0.30 mm, with typical ranges between 0.22 mm and 0.26 mm.

The aspect ratio refers to the ratio between the horizontal and vertical screen sizes. A standard CRT monitor as a 4:3 aspect ratio.
Objective: Personal Computer Components