Sunday, December 16, 2007

Networks : Protocols For Sending And Reveiving E-Mail

Which two protocols are used for sending and receiving e-mail? (Select TWO.)
1. >>SNMP
2. SMTP
3. >>POP
4. FTP
5. PPP
Explanation : Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP) are both part of the TCP/IP suite of protocols and are used for e-mail. SMTP, which uses Port 25, is typically used for e-mail transfers between mail servers. You use it to send mail. POP, which uses Port 110, is used for transferring e-mail from a mail server to an e-mail client. You use it to receive mail.

The FTP (File Transfer Protocol) utility program allows the bi-directional transfer of files between two networked hosts. Both hosts must be using TCP/IP, and the source host (the file server) must be running the FTP server daemon application.

Point-to-Point Protocol (PPP) is a communication protocol used in dial-up connections.

SNMP (Simple Network Management Protocol) is used for collecting information about devices on a network.
Objective: Networks

Printers and Scanners: Continuous Black Line on Page

A laser printer prints a continuous black vertical line down the center of each page.
What is the most likely problem?
1. >>The fusing roller is dirty.
2. The toner cartridge is empty.
3. The corona wire is broken.
4. The drum is scratched.
Explanation : When a continuous black line appears on every page, it usually indicates that the photosensitive drum has been scratched. You should replace the drum or the toner cartridge if the drum is part of the toner cartridge.
If the fusing roller were dirty, the problem would most likely be a series of repeated marks instead of a continuous line.

If the toner cartridge were empty, the problem would be uneven, light, or no print on the page.

If the corona wire were broken, the problem would most likely be a blank page.
Objective: Printers and Scanners

Operating Systems: MSINFO32 vs Task Manager vs System CP utility

A user reports memory errors. Which utility will allow you to determine how much physical memory is installed, how much is currently being used, and the size of the paging file on a computer running Windows XP?
1. Task Manager
2. Msconfig
3. System Control Panel utility
4. >>System Information utility

Explanation : You can gather all that information from System Summary in the System Information utility (MSInfo32.exe). The System Information utility allows you to view a lot of information about the computer, including general statistics such as the amount of memory installed, the size of the paging file, the amount of physical RAM currently committed, and the processor type and speed.

The System Control Panel utility General tab reports the amount of RAM installed. The Advanced tab allows you to access virtual memory settings that report the current size of the paging file. This is also where you change virtual memory settings. However, it does not report the amount of RAM currently being used.

Task Manager allows you to gather information about the amount of RAM installed and the amount of RAM currently committed (in use). It does not provide the size of the paging file. However, it does report information about paging file usage. This is not the size of the paging file, but how much data is currently stored in the paging file. You can also see how much virtual memory is being used by each process.
Msconfig allows you to configure startup options for troubleshooting. It is not used to view current performance statistics.
Objective: Operating Systems

Components: Cleaning DVDs

How should you clean a dusty DVD-ROM?
1. >>Use a damp soft cloth and wipe from the center to the outer edge.
2. Use a damp soft cloth and wipe in a circular motion.
3. Use furniture polish on a soft cloth and wipe from the center to the outer edge.
4. Use furniture polish on a soft cloth and wipe in a circular motion.
Explanation : You should use a damp soft cloth and wipe from the center to the outer edge. Doing so will remove the dust without damaging the DVD-ROM. Special lint-free cloths are available for cleaning LCD monitors and camera lenses. This cloth is extra soft, so it is also a good choice for cleaning CDs and DVDs.

You should not wipe in a circular motion. Doing so could scratch the disc
.

You should not use furniture polish. Doing so will leave a film on the disc.
Objective: Personal Computer Components

Networks: Using an existing NIC in a new PC and connecting to the network

You are replacing a computer in an office. The existing computer has been connected to a TCP/IP network, and you want to use the existing network card in the new computer.
Which configuration settings would you have to set in the new computer? (Select THREE.)
1. MAC address
2. >>Default gateway
3. Network media
4. Subnet Mask
5. >>Network access method
6. Network topology
7. >>IP address
Explanation : Since the old computer was connected to a Transmission Control Protocol/Internet Protocol (TCP/IP) network, TCP/IP needs to be configured on the new computer. The IP address is the unique network client identification address. The default gateway is the network address of the local router interface, and the Subnet Mask is used to determine whether data packets are destined for local or remote hosts. All of these need to be configured and/or assigned to the network card.

The Media Access Control (MAC) address is the physical address of the network card. It is programmed into the card by the manufacturer and is not changeable.

The network topology refers to the configuration of the network (ring, bus, star, star-bus, etc.). These are not system settings.

The network media refers to the type of cable used (10Base-T, 10Base-2, Fiber, etc.).

The Network access method (for example, Carrier Sense-Multiple Access with Collision Detection or CSMA/CD) is determined by the type of network in use. You are using the existing card, so it already matched the type of network in use.
Objective: Networks

Printers and Scanners: Bad Character Output On Impact Printer

You are diagnosing a problem with a dot matrix printer. Each character printed is dark at the top and light at the bottom.
What should you try first to resolve the problem?
1. Replace the ribbon.
2. >>Align the print head.
3. Align the platen.
4. Reinstall the printer driver.

Explanation : When the amount of ink used to print a character is uneven, the problem is most likely caused by a misaligned print head. If the print head is not aligned, it will not apply uniform pressure to the ribbon when printing the character. Therefore, one part of the character will be dark and the other part will be light. Another possible cause problem that could result in this symptom is the ribbon being out of alignment.

The problem is probably not caused by a misaligned platen. If the platen is not aligned, the pressure applied to the ribbon will be uneven across the length of a line of text. The symptom for a misaligned platen is dark text on one side of the line, fading to light text on the other.

The problem is probably not caused by a worn ribbon. When the ribbon needs to be replaced, the text will become lighter evenly. It will not be dark on one part of a character and light on another.

The problem is not caused by a corrupt or incorrect printer driver. The printer driver is responsible for translating application and operating system commands to a language the printer can understand. Vertical white lines are caused by an ink distribution problem, not a translation problem.
Objective: Printers and Scanners

Operating Systems: Short Cut To the Command Prompt Window

You have been asked to add an icon on your friend's desktop that provides easy access to the command prompt.
What file in his Windows XP computer should be used in the command line of the icon to open a command prompt window?
1. >>CMD.EXE
2. COMMAND.EXE
3. COMMAND.COM
4. WIN.COM

Explanation : To add a command prompt icon to your Windows desktop for easy access, locate the program file CMD.EXE (for Windows NT/2000/XP), right-drag it to the desktop, and choose Create Shortcuts Here.
CMD.EXE is the 32-bit version of the 16-bit COMMAND.COM, which was used in Windows 95/98.
COMMAND.COM is the DOS command interpreter.
WIN.COM is used to launch the Windows graphical user interface.
Objective: Operating Systems

Laptops : Auxiliary Power Source

A user plans to use her laptop computer while she is traveling. She will be driving across the country and will not have access to a standard electrical outlet.
What should she do?
1. Purchase a Y-adapter.
2. Purchase a PCMCIA card.
3. Purchase a larger transformer.
4. >>Purchase a 12-volt power adapter.

Explanation : The user should purchase a 12-volt power adapter. A 12-volt power adapter can allow you to plug your laptop computer into an auxiliary power socket or the cigarette lighter in an automobile or into a power socket on an airplane. These adapters are often referred to as inverters.
A larger transformer will not solve the problem. The transformer (also known as the power brick) is located on the power cord. A larger transformer will not allow the battery to retain a charge longer. Also, a laptop must have a transformer with the correct power settings.

You should not purchase a Y-adapter. A Y-adapter is used to connect a keyboard and mouse to the same PS/2 port. It is not related to power.
You cannot purchase a PCMCIA card. A laptop does not receive power from the PCMCIA slot. Instead, a PCMCIA slot is used for peripherals, such as external drives, network adapters, or other peripherals.
Objective: Laptops and Portable Devices

Components: Measuring Resistance In a Circuit With A Multimeter

You are using a multimeter to troubleshoot a problem with a circuit. What should you do before measuring resistance?
1. Connect the device to a power source.
2. Touch the red probe to ground.
3. Touch the black probe to ground.
4. >>Disconnect the device from its power source.

Explanation : You should disconnect a device from its power source before measuring resistance. If the device is connected to the power source, the multimeter might be damaged when you attempt to measure resistance.

You should not touch the black probe to ground when measuring resistance. Resistance is measured across a circuit, so you should touch the leads to each end of the circuit you are measuring. You touch the black probe to ground when measuring voltage.

You should not touch the red probe to ground when measuring resistance. You should touch the leads to each end of the circuit you are measuring.

You should not connect the device to a power source. You must connect the device to the power source when measuring voltage, but you should not do so when measuring resistance.
Objective: Personal Computer Components

Networks : Automatically Self-Configure IP address and subnet mask

Which feature of Windows XP permits Dynamic Host Configuration Protocol (DHCP) clients to automatically self-configure an IP address and subnet mask when their DHCP server cannot be found?
1. >>APIPA
2. IPCONFIG
3. DNS
4. WINS
Explanation : Automatic Private IP Addressing (APIPA) is a feature of Windows 98/2000/XP that permits DHCP clients to automatically self-configure an IP address and subnet mask when their DHCP server cannot be found. When Windows is booting, if it cannot find a DHCP Server, APIPA configures an IP address for the computer automatically. This address is in the range 169.254.0.1 to 169.254.255.254 with a subnet mask of 255.255.0.0. The client uses this address until the DHCP server becomes available.

Domain Name Service (DNS) is used to resolve a fully qualified domain name to an IP address. When one computer needs to establish a communication session with another, the sending computer queries a DNS server for the IP address of the destination host. The DNS server responds with the IP address, which is used by the source computer to establish the connection. It does not assign IP addresses to clients.

Windows Internet Name Service (WINS) resolves NetBIOS names to IP addresses in a Windows network. It does not assign IP addresses to clients.

IPCONFIG is a utility used by Windows 2000 to view current IP configuration information. It does not assign IP addresses to clients.

Objective: Networks

Printers and Scanners: White Vertical Lines on Paper

You are diagnosing a problem with a laser printer. When the laser printer prints, each page has white vertical lines running down it.
What should you try first?
1. >>Shake the toner cartridge.
2. Reinstall the printer driver.
3. Clean the photosensitive drum.
4. Replace the fuser assembly.

Explanation : When a laser printer prints pages with vertical white lines, it usually means that the toner cartridge is clogged so toner is not being distributed evenly. The first thing to try is to shake the toner cartridge to try to remove the clog. If that does not work, replace the toner cartridge.

The problem is probably not caused by a dirty photosensitive drum. A dirty or scratched photosensitive drum can cause a mark on the paper that repeats at regular intervals. A dirty drum will not normally cause white vertical lines.

You should not replace the fuser assembly. A problem with the fuser assembly would generally result in smudges or blotches on the page. It is not the first thing to check when diagnosing white lines on the page.

The problem is most likely not related to the printer driver. The printer driver is responsible for translating application and operating system commands to a language the printer can understand. Vertical white lines are caused by an ink distribution problem, not a translation problem.
Objective: Printers and Scanners

Operating Systems: Red "X" in Device Manager

What does a red "X" mark over a device icon indicate in Device Manager?
1. The device does not currently have power.
2. The device driver has a resource conflict with another device.
3. >>The device is disabled.
4. The device is not on the HCL.
Explanation : Device Manager enables you to perform tasks such as identifying installed ports, updating device drivers, and changing I/O settings.
If Device Manager displays a red "X" over the icon for a device, then the device has been disabled.

If Device Manager displays an exclamation point inside of a yellow circle over the icon for the device, then there is a problem with the device or driver, usually because of a resource conflict.

Other Device Manager symbols include a blue I on a white background, which indicates that automatic settings were not used and resources have been manually assigned. It does not indicate a problem.
Objective: Operating Systems

Laptops: connecting PDAs to the Internet

Which types of connections can be used to connect a handheld PC to the Internet? (Select TWO.)
1. >>Bluetooth
2. Infrared
3. >>Cellular WAN
4. FireWire

Explanation : Cellular WAN is a technology that uses cell phone equipment to link a handheld PC, such as a Windows CE device or a Palm Pilot, to the Internet. A handheld PC is also called a Personal Digital Assistant (PDA). Cellular WAN has a transfer speed up to 56 kilobits per second (Kbps).
Bluetooth is a low-speed wireless technology for connecting devices in a personal area network. Bluetooth devices include mouse, keyboard, and digital cameras. The range for Bluetooth communication is only 100 meters. It operates at 721 Kbps. Some cell phones are equipped with Bluetooth to allow them to connect to other Bluetooth devices within range, including wireless headsets or wireless Internet access points. If you have a Bluetooth-enabled Internet access point, you can connect to the Internet using a Bluetooth-enabled device as long as you are within range.

FireWire (IEEE 1394) is a high-speed wired connection for connecting peripherals, such as video cameras, external hard drives, and printers. It is a wired technology, not a wireless technology. Two speeds are available: 400 megabits per second (Mbps) and 800 Mbps.
Infrared is a line of site wireless technology that supports transfer rates of 9600 bps to 4 Mbps. Its maximum range is 20 feet. It is typically used to connect a PDA to a PC or for supporting a wireless keyboard, mouse, or printer.
Objective: Laptops and Portable Devices

Components: Overheating Mobo in an extra warm environment

You are replacing a motherboard on a computer that is used in a factory. The air temperature on the factory floor is typically between 90 and 105 degrees F. You install the motherboard and boot the computer.
After several hours you receive a call that errors are occurring. You discover the processor is overheating.
What should you do?
1. Install a heat sink.
2. >>Install a Peltier cooler.
3. Leave the case open for extra ventilation.
4. Replace the processor with a different one.

Explanation : You should install a Peltier cooler. Extremely hot environments require additional cooling. A Peltier cooling device gets colder when it receives voltage. Therefore, it can cool the processor regardless of the ambient air temperature. Another thing to check is to make sure that you properly installed the processor's fan.
A heat sink will probably
not solve the problem. A heat sink is a convection device. In order for it to cool a Central Processing Unit (CPU), the air temperature must be cooler than the inside of the computer.

Replacing the processor will not resolve the problem. The problem is not caused by a defective processor. It is caused by insufficient cooling.

You should not leave the case open for extra ventilation. The ambient air temperature outside the case is very hot. Also, leaving the case open will cause a build up of dust inside the computer case, which will make the problem worse.

Objective: Personal Computer Components

Security: Configuring Permissions for a File Server (shared folder)

You are configuring permissions for a file server. The file server is a member of an Active Directory domain. It is running Windows Server 2003.
You need to ensure that all users in the Marketing department can add files to and modify files in the shared Brochures folder. Only Managers in the Marketing department should be able to delete files from the Brochures folder. Managers should also be able to change permissions on the folder if necessary. Only members of the Marketing department should have permission to access files in the Brochures folder.
How should you configure file system permissions?

1. Create a group named Marketing and add all user accounts in the marketing department to that group. Grant the group Modify permission to the Brochures folder. Create a group named MktgManagers and add all managers in the marketing department to that group. Grant the group Full Control permission to the Brochures folder. Remove the Everyone group from the permissions list.

2. >>Create a group named Marketing and add all user accounts in the marketing department to that group. Grant the group Modify permission to the Brochures folder. Create a group named MktgManagers and add all managers in the marketing department to that group. Grant the group Full Control permission to the Brochures folder. Deny Everyone the group Full Control permission to the Brochures folder.

3. Grant the user account for each member of the Marketing department the Modify permission. Grant the user account for each member of the Marketing department who is a manager the Delete permission.

4. Add the users in the marketing department to the Power Users group. Add the managers in the marketing department to the Administrators group. Remove the Everyone group from the permissions list.

Explanation : The best way to manage permissions is by creating groups, granting permissions to those groups, and then adding user accounts to the groups as required. In this case, the members of the Marketing department who are not managers require a different set of permissions than those who are managers. Therefore, you should create two groups: Marketing and MktgManagers. You can then grant the Marketing group Modify permission to the Brochures folder, which will allow users to add, read, and modify files in the folder. You can grant the MktgManagers group Full Control, which allows the MktgManagers to be able to delete files and subfolders and to change permissions on the folder. If you do not want MktgManagers to be able to change permissions, you could assign them the Delete Subfolders and Files permission discretely. Because managers belong to both groups, they would have the accumulated permissions: Modify and Delete Subfolders and Files. Finally, because the default permissions grant the Everyone group the Full Control permission, you will need to remove the Everyone group from the permissions list.

You should avoid assigning permissions to individual user accounts. Doing so will make the permissions list more difficult to maintain. Consider the situation where a file server has several shares used by members of the Marketing department. If you use groups to assign permissions, when a new user joins the Marketing department, you only need to add that user to the Marketing group instead of assigning permissions to individual folders.

You should not deny the Everyone group Full Control to the Brochures folder. All users who have been authenticated belong to the Everyone group. Because Deny takes precedence over Allow, by denying the Everyone group Full Control, you prevent all users from accessing the folder.

You should not add the users in the Marketing department to the Power Users group. Doing so will not grant them any permissions on the folder. You should not add the managers to the Administrators group. Doing so will give them unnecessary permissions on the file server. You should never grant more permissions than necessary.

Networks : Manual DNS Queries

Which TCP/IP utility allows a user to perform a manual DNS query of any DNS database?
1. TRACERT
2. WINIPCFG
3. >>NSLOOKUP
4. IPCONFIG

Explanation : NSLOOKUP is a TCP/IP utility that allows a user to perform a manual Domain Name System (DNS) query of any DNS database. You would use this to verify that DNS name resolution is functioning properly.

WINIPCFG is a graphical utility found in Windows 9x that allows you to get information about your IP configuration. It also allows you to release a Dynamic Host Configuration Protocol (DHCP) lease and request a new one.

IPCONFIG does the same thing as WINIPCFG, but for Windows NT/2000/XP. IPCONFIG can only be run from the command line.

TRACERT is a utility that allows you to trace the path information takes to get from one machine to another as it moves from network to network.
Objective: Networks

Printers and Scanners: Ink Spillage on an Ink Jet Printer

The ink tank on an ink jet printer is nearly full and a little ink has spilled over. What should you do?
1. >>Use a twisted paper towel to soak up the ink. Clean spilled ink with distilled water.
2. Use the maintenance kit to drain the tray.
3. Carefully remove the tray and empty it. Clean spilled ink with household cleaner.
4. Use a twisted paper towel to soak up the ink. Clean spilled ink with denatured alcohol.

Explanation : You should use a twisted paper towel to soak up the ink and clean any spilled ink with distilled water. You need to be very careful not to spill ink on the power supply or the printer's main board. Ink jet ink is water-based, so distilled water is the best way to clean up minor spills. You should always unplug the printer before performing maintenance on it.
You should not clean spilled ink with denatured alcohol. Ink jet ink is water-based, so the best way to clean it up is with distilled water.

Laser printers have maintenance kits; ink jet printers do not.

You should not attempt to remove the tray. Removing a tray that is filled with ink is likely to cause a spill that will damage the printer.
Objective: Printers and Scanners

Operating Systems: PC won't boot after a configuration change

A user makes some configuration changes and then installs an application. The application requires the user to reboot the computer. When the computer reboots, it is unable to start Windows XP.
You need to ensure that the user's data is preserved.
What should you try first?

1. >>Start in Safe Mode and perform a System Restore.
2. Use the Emergency Repair Disk.
3. Perform Automated System Recovery.
4. Start the system in VGA mode and uninstall the application.

Explanation : You should start the computer in Safe Mode and perform a System Restore. Windows XP saves a scheduled restore point, a restore point before making some configuration changes, and a restore point before an application is installed. It allows you to revert your computer's configuration to a specific point in time. Restoring a system using System Restore does not affect user data. You can initiate System Restore by booting normally or to Safe Mode. In this case, you will need to boot to Safe Mode.

You should not start the system in VGA mode and uninstall the application. VGA mode is used specifically to correct problems with the video adapter configuration. Also, uninstalling the application might not resolve the problem because the problem might be caused by one of the configuration changes.

You should not use Automated System Recovery (ASR). ASR reformats the hard disk and restores from an ASR backup set, which does not include user data. Therefore, user data would be lost.

You cannot use an Emergency Repair Disk (ERD). ERDs were supported by Windows NT and Windows 2000. They are not supported by Windows XP.

Laptops: Batteries and Charging II

How can you tell whether a laptop battery is charging?
1. The LED light on the laptop will be blinking.
2. >>The LED light on the laptop will be a solid orange or yellow light.
3. The LED light on the laptop will be a solid green or blue light.
4. The LED light on the laptop will be off.

Explanation : A solid orange or yellow LED light indicates that the battery is being charged.

A solid green or blue LED light indicates that the battery is fully charged.

A blinking LED light indicates that the laptop is hibernating.

An off LED light indicates that the laptop is turned off or not receiving power.
Objective: Laptops and Portable Devices

Printers and Scanners: Parallel Ports

Which standard defines how a printer manufacturer should implement a bidirectional parallel port?
1. >>IEEE 1284
2. IEEE 1394
3. IEEE 802.11b
4. IEEE 802.1x

Explanation : The IEEE 1284 standard defines guidelines for implementing bidirectional communication across a parallel port. Bidirectional communication is a technology used by printers to allow a printer to send data to the operating system, such as a notification that the paper tray needs to be refilled. IEEE 1284 supports higher transfer rates than a traditional parallel cable, but not as fast as Universal Serial Bus (USB).

IEEE 1394 (FireWire) is a high-speed connection standard for devices like digital cameras and video cameras. It is not a standard for defining a parallel printer port.

IEEE 802.1x is a security standard for wireless networks. It is not a standard for defining a parallel printer port.

IEEE 802.11b is a wireless networking standard. It is not a standard for defining a parallel printer port.
Objective: Printers and Scanners

Operating Systems: Incremental Backups

A user's computer performs scheduled backups that back up the data to a network server on the following schedule:
Full backup: Friday
Incremental backup: Monday, Wednesday

System state backup: Tuesday, Thursday

Backups are performed in the evening. The hard disk fails on Thursday afternoon.
Which backup or backups should you restore?
1. Friday, Wednesday, Tuesday, Monday
2. Tuesday, Wednesday
3. Friday, Wednesday
4. >>Friday, Monday, Wednesday
Explanation : You should first restore the full backup taken on Friday. Next you should restore each incremental backup in order. An incremental backup backs up all data that has changed since the last backup and resets the Archive flag on the files. The Archive flag determines whether the file needs to be backed up.
You should not restore Tuesday and then Wednesday. A system state backup does not back up user data. Therefore, restoring the Tuesday backup will not serve as a base for installing incremental data backups.
You should not install Friday and then Wednesday. An incremental backup backs up only the information that has changed since the last full, differential, or incremental backup. Therefore, the Wednesday backup will only back up files that have changed since Monday.
There is no need to restore the Tuesday backup. Any changes that were reflected in the Tuesday backup will also be reflected in the Wednesday backup. Also, you should restore incremental backups in the order in which they are taken.
Objective: Operating Systems

Laptops and Wireless

A user's laptop has a built-in wireless antenna. The user cannot connect to the wireless access point. When the user attempts to view wireless networks, none are listed. Other computers can connect to the wireless access point.
What should you try? (Select TWO.)
1. >>Verify that the user's TCP/IP settings are configured for automatic addressing.
2. Ask the user to open the display further.
3. >>Verify that the wireless antenna is turned on.
4. Verify that there is line of sight between the laptop and the wireless access point.
5. Disable the Ethernet adapter.
6. Install Windows XP Service Pack 2.

Explanation : Some laptops that have built-in wireless antennas include a button that turns wireless support off and on. You should first verify that the user has not accidentally pressed that button. Sometimes you need to enable the wireless connection through software, such as through the Network Control Panel utility or Device Manager.
Some wireless antennas are built into the display. Sometimes opening the display further will solve the problem.

The user's TCP/IP settings are not the cause of the problem. The computer cannot locate any wireless networks. This is a physical issue, not an IP addressing issue.
You do not need to disable the Ethernet adapter. A laptop can support both an Ethernet adapter and a wireless antenna at the same time.
You do not need to install Windows XP Service Pack 2. If the wireless antenna was built into the laptop, it is likely that the necessary drivers were installed by the Original Equipment Manufacturer (OEM). Also, Service Pack 2 is not required for wireless networking.

You do not need to verify that there is line of sight between the laptop and the wireless access point. The 802.11b and 802.11g protocols are radio-frequency protocols and do not depend on line of sight.
Objective: Laptops and Portable Devices

Components: Testing For A Faulty Parallel Port

You are troubleshooting a user's connection to a printer. The printer is attached to the parallel port on the user's computer.
How can you determine whether the problem is caused by a faulty port?
1. Attach a parallel cable that you know works.
2. Disconnect the printer cable and attach a loopback adapter to the port.
3. >>Press the self-test button on the printer.
4. Enable bidirectional support on the port.
Explanation : The best way to determine whether the problem is caused by a faulty port is to attach a loopback adapter to the port. A loopback adapter allows you to isolate the problem and determine whether it is caused by the port because it removes the printer and the cable as variables. If the loopback completes successfully, you know that the port is not the problem and you can then try a different cable to see if the problem is caused by the cable. If the loopback does not complete successfully, you know the problem is caused by the port itself.

Attaching a printer cable that you know works will not allow you to determine whether the problem is caused by the port. It will only allow you to eliminate the cable as the cause of the problem.

Pressing the self-test button on the printer will print a test page. This will ensure that the printer can print characters, but it will not help you isolate the communication problem.

Enabling bidirectional support on the port will not allow you to determine whether the port is causing the problem. Bidirectional support allows two-way communication between the operating system and the printer. However, if the port is not functioning, the cable is faulty, or the printer's parallel connector is not working, bidirectional messages will not be passed.
Objective: Personal Computer Components

Security: Securing a Wireless Network (WEP vs EFS vs SSID vs MAC vs Ad Hoc)

Your company has a wireless network that connects to a wired network. Your boss is concerned about data being intercepted as it is sent over the wireless network. He wants to ensure that only employees can use the wireless network.
What steps should you take? (Select TWO.)
1. >>Enable WEP.
2. Disable MAC address filtering.
3. >>Disable broadcast SSID.
4. Use ad hoc mode.
5. Enable EFS.

Explanation : You should enable Wired Equivalent Privacy (WEP). Doing so will cause the traffic sent over the wireless network to be encrypted using 40-bit encryption by default. Some access points and wireless network adapters also support 128-bit encryption, so you should use it if it is available. It is also more secure to use dynamic WEP keys if they are supported.
You should also disable broadcast Service Set Identifier (SSID). The SSID is used to publish the availability of the wireless network, sort of like a network name. If you disable broadcast SSID, only clients that are configured with the SSID will be able to find wireless network and connect. This will help prevent non-employees from connecting to the network.

Enabling Encrypting File System (EFS) will not cause data to be encrypted on the network. EFS is used to encrypt files where they are stored, not to encrypt network traffic.

Disabling Media Access Control (MAC) filtering will not resolve the problem. You might or might not want to use MAC filtering. MAC filtering can be used to increase the security of the network by only allowing certain network adapters to connect. However, it is more difficult to manage. Wireless Access Points (WAPs) have MAC filtering disabled by default.

You should not use ad hoc mode. Ad hoc mode is used for peer-to-peer wireless networking. When a WAP connects to a wired network, you need to configure the wireless clients for infrastructure mode. By configuring them for infrastructure mode only, you can prevent them from connecting to ad hoc wireless networks.
Objective: Security

Printers and Scanners: Paper Jams

A laser printer is experiencing paper jams. What should you do?
1. Clean the fuser assembly roller with water on a fibrous cleaning towel.
2. Replace the fuser assembly.
3. >>Use the maintenance software to realign the guide rollers.
4. Clean the rubber guide rollers using alcohol on a fibrous cleaning towel.

Explanation : You should clean the rubber guide rollers using alcohol on a fibrous cleaning towel. The guide rollers are responsible for moving the paper through the printer. They should be a little rough but clean. When they get dirt or paper dust on them, it can cause paper jams. You can clean them using alcohol on a fibrous cleaning towel. If they become too smooth, you can use alcohol on a non-metallic scouring pad to make them rough so they work better.

Replacing the fuser assembly will not resolve the problem. The fuser assembly is used to fuse ink to the paper, not to move the paper through the printer.

You should not clean the fuser assembly roller with water on a fibrous cleaning towel. A dirty fuser assembly roller is not the problem. Also, you should not use a fibrous cleaning towel and water to clean the fuser assembly roller. You should use alcohol and a soft cloth. You must be very careful not to scratch the fuser assembly roller.

You should not use maintenance software to realign the guide rollers. Ink jet printers include maintenance software, which can be used to realign the print heads. Laser printers have maintenance kits that contain spare parts.
Objective: Printers and Scanners

Operating Systems: Starting the PC without launching specific startup applications

You are troubleshooting a computer running Windows XP. You want to start the computer without launching specific startup applications. Aside from that change, you want the computer to boot normally.
What should you do?
1. Start the computer in Safe Mode.
2. Remove all shortcuts from the C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder.
3. >>Use Msconfig to disable the startup applications.
4. Start the computer in Safe Mode with Networking.

Explanation : You should use Msconfig, also known as the System Configuration Utility, to disable startup items. Msconfig allows you to select which items load at startup, including which .ini files are loaded and whether all, none, or only selected startup applications are loaded. Using Msconfig is a good way to troubleshoot problems related to startup or devices and applications that load at startup. You can also view which services are running.

You should not start the computer in Safe Mode. Safe Mode loads only the minimum drivers needed to run the operating system.

You should not remove all shortcuts from C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder. While this is the folder that stores shortcuts to the applications that run at startup for any user who logs onto the computer, it does not contain the user-specific shortcuts. Also, it is best not to remove the shortcuts because you will just have to reconfigure them later. Also, some startup applications are not configured through the Startup folder. Instead, they are configured through the registry.

You should not start the computer in Safe Mode with Networking. Safe Mode with Networking loads only the minimum drivers needed to start the operating system and access the network.
Objective: Operating Systems

Laptops and PCMCIA Card Slots

A user has a laptop computer with two Type II PCMCIA card slots, one on top of the other. How many Type III hard disk PC cards can the user install in the laptop?
1. >>1
2. 2
3. 0
4. 4
Explanation : All Portable Computer Memory Card International Association (PCMCIA) cards use the same 68-pin interface. The difference between Type I, Type II, and Type III cards is their height (thickness). A Type I card is 3.3 mm, a Type II card is 5.0 mm, and a Type III card is 10.5 mm. When the laptop has two Type II card slots, it can hold one Type III card, two Type II cards, or two Type I cards.

Objective: Laptops and Portable Devices

Components: HDD configuration with an ATA cable

Which of the following hard disk configurations is supported with one ATA cable?
1. Up to seven SCSI drives
2. >>One or two IDE drives
3. Between one and four IDE drives
4. Up to fifteen SCSI drives

Explanation : An Advanced Technology Attachment (ATA) cable is used to connect Integrated Drive Electronics (IDE) drives to a motherboard. Each ATA cable can support up to two drives: a master drive and a slave drive. A computer usually has two ATA cables, so you can add four drives, two on each cable.

An ATA cable has only three connectors: a motherboard connector and two hard disk connectors. Therefore, it cannot support more than two IDE drives.

An ATA cable is not used to connect Small Computer Systems Interface (SCSI) drives. SCSI devices are attached in a chain with the first device connected to the host controller. The last device in the chain must be terminated.
Objective: Personal Computer Components

Networks : Eavesdropping

Which type of network media is least subject to eavesdropping?
1. Shielded twisted pair
2. >>Fiber optic
3. Coaxial
4. 802.11g
Explanation : Fiber optic networks are least prone to eavesdropping because the signal is carried though light pulses instead of by electromagnetic signal. This makes it extremely difficult to tap the wire.

802.11g wireless networks are extremely subject to eavesdropping if encryption is not used.
Coaxial is a copper wire cable. Transmission is through electromagnetic signals, so it is relatively easy to tap the wire and eavesdrop.

Shielded twisted pair is a copper wire cable. Transmission is through electromagnetic signals, so it is relatively easy to tap the wire and eavesdrop.
Objective: Networks

Printers and Scanners: Printing Gibberish

You are diagnosing a problem with a laser printer. The laser printer prints the diagnostic print page correctly. However, when a user attempts to print a document, gibberish characters are printed to the page.
What should you try next?
1. Clean the photosensitive drum.
2. Change the toner cartridge.
3. >>Reinstall the printer driver.
4. Replace the primary corona wire.
Explanation : When a printer prints garbage or gibberish characters, you should first try printing a diagnostic test page. If the diagnostic test page prints correctly, it means that the problem is most likely the printer driver. It is the printer driver's responsibility to translate print commands sent by an application to a language the printer can understand. A corrupt or wrong driver will perform this task incorrectly, resulting in gibberish characters. The diagnostic test page is sent directly to the printer by the printer. It does not interface with the operating system, so it works even if there is not a driver installed.

Changing the toner cartridge will not resolve a problem with gibberish text. You would change the toner cartridge to correct a problem such as smudged characters or vertical white lines.

You should not replace the primary corona wire. The primary corona wire applies a uniform negative charge to the drum. If it was broken, it would not result in gibberish characters. Also, any problem caused by the primary corona wire would affect the diagnostic test page as well as any page sent from the operating system.

You do not need to clean the photosensitive drum. A dirty or scratched photosensitive drum can cause a mark on the paper that repeats at regular intervals. A dirty drum will not cause gibberish print. Also, any problem caused by a dirty drum will occur when the diagnostic test page is printed.
Objective: Printers and Scanners

Operating Systems: Checking Disk Integrity in XP

What tool should you use to verify that the hard disk on a Windows XP computer does not have any bad sectors?
1. ScanDisk
2. Fdisk
3. Defrag
4. >>Chkdsk
Explanation : You should use Chkdsk to check the integrity of a hard disk on a computer running Windows XP and optionally attempt to correct errors. You can launch Chkdsk from the command line or by clicking Check Now on the Tools tab of a hard disk's properties.

You cannot use ScanDisk to verify that the hard disk does not have any bad sectors on a computer running Windows XP. Scandisk was used on Windows 9x systems to verify hard disk integrity.

Defrag is used to defragment a hard disk to ensure that a file uses contiguous disk space. A defragmented hard disk performs better than a fragmented hard disk.

You cannot use Fdisk to check disk integrity. Fdisk was used in earlier versions of the Windows operating system and in MS-DOS to create partitions.
Objective: Operating Systems

Laptops: Removing PC card devices

What step or steps should you take before you eject a PC Card hard drive from a laptop computer?
1. Right-click the drive's icon and choose Eject.
2. >>Click the Safely Remove Hardware icon in the system tray.
3. Shut down the operating system and power off the computer.
4. Shut down the operating system.
Explanation : You should click the Safely Remove Hardware icon in the system tray and then click the option to safely remove that drive. Doing so shuts down the services the PC Card device is using so that you can safely remove the card.
You do not need to shut down the operating system. A PC Card hard drive is hot swappable.
You do not need to power off the computer. A PC Card hard drive is hot swappable.
You should not right-click the drive's icon and choose Eject. The Eject menu item is used to eject a CD or DVD from a removable media drive.
Objective: Laptops and Portable Devices

Components: BIOS flash after a hardware upgrade (Peripherals vs system devices)

You are upgrading components in a computer to refurbish it. The motherboard and BIOS are three years old. You are concerned that the BIOS may not properly support some of the components you want to install.
Which component might require updating Flash ROM contents before the installation will work properly?
1. >>Graphics card for 1600 x 1200 display
2. 56K modem
3. 100Base-TX network adapter
4. 128MB of physical SDRAM
5. DVD-ROM drive
6. 80 GB hard drive
Explanation : The Basic Input/Output System (BIOS) program is required to enable a CPU to boot up and configure the system for use. The program is stored on a Read-Only Memory (ROM) chip. On older systems, the chip had to be replaced to update BIOS. Flash ROM chips allow a user to store a new BIOS program on the chip by running a DOS program and loading an update file. A Flash BIOS chip is technically called an EPROM (Erasable Programmable Read Only Memory) chip. Circuitry built into the motherboard permits erasing and installing a new BIOS image file.

If components are added for which the BIOS is not programmed, it is necessary to run the Flash ROM program and update the BIOS. A new, higher capacity hard drive is one component that often creates the need for BIOS updates. Physical memory and hard drive size can be configured in CMOS, though memory size is often auto-detected during the Power On Self Test (POST) memory count. CMOS is external to the BIOS and can be looked at as being memory for the BIOS. CMOS is also known as the RTC/NVRAM chip.

Modems, network adapters, DVD drives, and graphics adapters are peripheral devices, not system devices. They use the existing slots and the expansion bus to communicate with the system and do not require BIOS upgrades.
Objective: Personal Computer Components

Security: Combining Group Permissions in a Shared Folder

Mary belongs to the Accounting group and the Temps group. The AP folder, which is located on a computer running Windows XP, has the following permissions:
Accounting - Allow Modify Temps - Deny Write
The AP folder is shared and the share has the Everyone - Full Control permission.
What access to the folder does Mary have when accessing it through the network share?
1. Mary cannot access any files in the folder.
2. >>Mary can read and modify files in the folder.
3. Mary can read files in the folder.
4. Mary can read, modify, and delete files in the folder.

Explanation : Mary can read files in the folder, but cannot modify or delete them. Mary obtains the Read permission through her membership in the Accounting group. However, her membership in the Temps group revokes the Write permission that would otherwise be granted through her membership in Accounting. When a resource is accessed through a share, both the NTFS permissions and the share permissions are checked and the most restrictive set of permissions is used. In this case, the most restrictive permissions are the NTFS permissions.
Mary cannot modify files in the share because a Deny overrides any Allow and the Temp group is denied Write permission.
Mary cannot delete files in the share. The Modify permission grants the ability to read, create, and modify files. However, users can only delete their own files. Also, Mary is denied Write access so she cannot make changes to the contents of the folder.
Mary can read files in the share. This permission is assigned as part of the Modify permission.
Objective: Security

Networks : Terminating an FTP session

When you are finished running an FTP session from the command line, which command will properly terminate your FTP session?
1. >>BYE
2. FTP
3. EXIT
4. PUT
Explanation : FTP can be initiated from a DOS, Windows 9x, or Windows NT/2000/XP command prompt provided that a connection to a network or the Internet is established first. To begin an FTP session, you first type FTP from the command line to get an FTP> prompt. To establish a connection with an FTP server at 135.61.85.1, from the FTP> prompt, type the following:
OPEN 135.61.85.1
To terminate an FTP session, simply type BYE from the FTP> prompt.

The PUT command is used after you have logged on and want to copy a file from your computer to the remote computer.

The EXIT command is used to terminate a DOS session.
After you are at the FTP> prompt, you would not use the FTP command again.
Objective: Networks

Printers and Scanners: Obtaining the Fastest Connection

Which port will give you the best performance when connecting a scanner to a computer?
1. IEEE 1284
2. USB 2.0
3. Serial
4. >>IEEE 1394
Explanation : The best performance when connecting a scanner to a computer is provided by IEEE 1394 (FireWire). FireWire 1394b provides transfer rates of more than 800 Mbps. FireWire 1394a provides transfer rates up to 400 Mbps.
USB 2.0 provides good transfer rates (up to 480 Mbps for high speed USB 2.0). However, it is not as fast as FireWire.
Scanners are typically not connected through a serial interface. A serial interface provides the slowest transfer rate.
Although you can connect a scanner using a parallel connector (IEEE 1284), doing so will result in a lower transfer rate than either USB 2.0 or IEEE 1394.
Objective: Printers and Scanners

Operating Systems: Obtaining the IP address and Subnet Mask on XP

A computer running Windows XP is configured to receive an IP address automatically. Which utilities would you use to find out the IP address and subnet mask assigned to its network adapter? (Select TWO.)
1. Network Connection Status
2. WINIPCFG
3. >>IPCONFIG
4. Network Connection Properties
5. >>PING
Explanation : On a computer running Windows XP Professional, there are three ways to find out the IP address and subnet mask assigned automatically. You can run the IPCONFIG command-line utility, display Status for the network connection, or select the Adapter node under Components | Network in System Information.

You cannot obtain the IP address and subnet mask using PING
. The PING utility is used to test a connection path between two computers and to test the TCP/IP stack. To test the TCP/IP stack, you ping the loopback address, which is 127.0.0.1.

You cannot obtain the IP address and subnet mask using the Network Connection Properties. If the TCP/IP properties were configured statically, you would set them and view them on the connection's Properties page. However, they are set dynamically, so you cannot view them there.

You cannot use WINIPCFG on a computer running Windows XP. WINIPCFG was a Windows 98 utility for viewing the IP address configuration.
Objective: Operating Systems

Laptops and PDAs I

A user reports that she cannot select information on her PDA's screen. She had not used the device while she was on vacation.
What should you try first?
1. Replace the screen.
2. Replace the stylus.
3. Replace the battery.
4. >>Recalibrate the device.
Explanation : The most likely problem is that the device needs to be recalibrated. A Personal Digital Assistant (PDA) can lose its calibration if it is powered off for a long period of time. You calibrate the device by using software that prompts you to tap the boundaries of the screen so that the operating system can calculate where the stylus is pointing.

You should not replace the stylus. The stylus is a pointing device and is most likely not the cause of the problem.

You should not replace the screen before attempting recalibration. If recalibration does not work, you might need to replace the screen.

You should not replace the battery. If the battery is dead, the device will not power on. The problem the user is having is that the operating system is unable to calculate screen coordinates correctly. Therefore, the problem is either with the screen's sensitivity or with its calibration.
Objective: Laptops and Portable Devices

Components: When NOT To Wear an ESD Wrist Strap

When should you NOT wear an ESD wrist strap?
1. When replacing a network adapter
2. When installing an internal hard drive
3. When adding memory to a computer
4. >>When working with an open CRT display device
Explanation : You should not use an Electrostatic Discharge (ESD) wrist strap when working on an open Cathode Ray Tube (CRT) display. An ESD wrist strap grounds your body to protect components from an ESD shock. However, a CRT display is highly charged, so you do not want to be grounded when you work inside one. In fact, only specially trained personnel should ever open a CRT display.

You should use an ESD wrist strap when adding memory to a computer. Doing so will help protect the memory and the other components on the motherboard from an ESD shock.
You should use an ESD wrist strap when installing an internal hard drive. Doing so will help protect the hard drive and the other components you might touch from an ESD shock.

You should use an ESD wrist strap when installing a network adapter. Doing so will help protect the network adapter and the other components you might touch from an ESD shock.
Objective: Personal Computer Components

Security: Upgrading and obtaining the EFS for your partition

You are upgrading a user's computer from Windows 98 to Windows XP Professional.
The computer currently has a hard disk partition formatted as FAT. The main reason for the upgrade is to allow users to secure files on that hard disk using permissions and encrypting file system (EFS).
What should you do?
1. >>Convert the hard disk to NTFS.
2. Convert the hard disk to FAT32.
3. Reformat the hard disk as NTFS.
4. Reformat the hard disk as FAT32.

Explanation : To use file permissions and EFS, you need to use the NTFS file system. You can convert the system hard disk to NTFS during installation. You can convert any hard disk from FAT or FAT32 to NTFS after installing Windows XP by using the Convert utility.
You should not convert the hard disk to FAT32. FAT32 does not support permissions or EFS.
You should not reformat the hard disk as FAT32. FAT32 does not support permissions or EFS. Also, reformatting the hard disk will cause all data stored on it to be lost.
You should not format the hard disk as NTFS. Formatting the hard disk will cause all data on it to be lost. A hard disk can be converted from FAT or FAT32 to NTFS, but not the other way around.
Objective: Security

Networks : ping vs tracert vs ftp vs telnet

Which utility is used to verify that another computer is online and connected to the network?
1. TRACERT
2. TELNET
3. >>PING
4. FTP
Explanation : The PING utility (for example, ping 208.160.120.17) is used to send test data packets to verify connectivity to another computer using ICMP. The Internet Control Message Protocol (ICMP) is part of the TCP/IP suite of protocols. It is an error-reporting protocol. PING sends an ICMP Echo Request to a target name (like computer2) or IP address. The resulting ICMP Echo Reply verifies that a TCP/IP configuration is set up properly and that the destination host is online and connected to the network.
TRACERT is also a TCP/IP utility. It uses ICMP echo requests to trace the route a data packet takes to its destination. The TRACERT command displays the hop count (also called the metric, the number of routers the signal must pass through to get to the destination), the time each hop takes (in milliseconds), the name of the computer or router passed through (optional), and the IP address of each router in the hop. TRACERT works with IP addresses, host names, and domain names. Like PING, TRACERT can verify a system is online, but that is not its primary purpose.

FTP (File Transfer Protocol) is a utility program that allows the bi-directional transfer (uploading and downloading) of files between two networked hosts. A small FTP client program runs on the remote computer and accesses a larger FTP server running on a host. FTP is not used to verify that another system is online.

The TELNET utility allows a computer to connect to a UNIX host by emulating a terminal (such as a DEC VT100) and establishing a remote command-line window. TELNET is not used to verify that another system is online.
Objective: Networks

Printers and Scanners: The Final Installation Step

You are installing a USB laser printer for a user. The user's computer is running Windows XP Professional. You install the toner cartridge, place paper in the paper tray, and connect the USB cable to the printer and to the computer.
What additional step do you need to take?
1. >>Install the printer software as instructed by the manufacturer.
2. Use Add or Remove Programs to install the printer.
3. Use Windows Update to download the most current driver.
4. Use Device Manager to install the printer driver.

Explanation : You should follow the manufacturer's instructions for installing the printer. Some printers have an executable on the CD-ROM that must be run before connecting the Universal Serial Bus (USB) cable. Others are installed using the standard procedure of either allowing Plug and Play to detect the printer or adding a printer through the Add Printer Wizard.

You do not need to use Windows Update to download the most current driver. Driver updates should be obtained from the manufacturer. Also, at this point no driver has been installed, so you would not be able to update the driver.

You should not use Add or Remove Programs to install the printer. Add or Remove Programs is a utility used to manage Windows components and applications. It is not used to install printer drivers.

You should not use Device Manager to install the printer driver. When you first set up a printer, you need to run the manufacturer's software or use Add Printer Wizard to install the printer. If you need to update the driver at a later time, you can do so by using Device Manager.
Objective: Printers and Scanners

Laptops: Inverters

What is the purpose of an inverter in a laptop computer?
1. The inverter limits the voltage required by the laptop.
2. >>The inverter controls power to the LCD panel.
3. The inverter converts AC power to DC.
4. The inverter converts power to the correct setting for the locale.

Explanation : The inverter is part of a laptop's display. It controls how much power is sent to the fluorescent lamps in the Liquid Crystal Display (LCD) panel.

The inverter does not convert power to the correct setting for the locale. When traveling internationally, you need to ensure that you have a power cable that can accept the input voltage of the locale to which you are traveling. Otherwise, you need to purchase a power converter. You might also need a plug adapter so that the adapter fits the socket.

The inverter does not convert alternating current (AC) to direct current (DC).

The inverter does not affect the amount of voltage required by the laptop.
Objective: Laptops and Portable Devices

Printers and Scanners: Multiple pages going through the rollers

A laser printer experiences frequent paper jams. You determine that it is trying to pull multiple pieces of paper through at a time.
What is the most likely problem?
1. Paper is too light-weight.
2. >>There is too much humidity
3. The paper sensor is damaged.
4. The paper roller is dirty.

Explanation : The major cause of a printer pulling multiple pages through at a time is either high or low humidity. When the air is humid (over 50% humidity), pages stick together because they are moist. When the air is too dry (under 25% humidity), pages generate static electricity, which causes them to cling together. Another potential reason multiple sheets of paper will be pulled through is that the separation tray is worn.

The rollers are configured to grab a single sheet of paper, regardless of its weight. Therefore, paper that is too light-weight is not the most likely cause of the problem.
A damaged sensor is not the most likely cause of multiple pages being picked up. A damaged sensor is more likely cause the paper not to move through correctly.
A dirty paper roller will cause marks on the page. It will not cause multiple pages to be picked up.
Objective: Printers and Scanners

Safety & Environment: Installling a Video Adapter

You are replacing a video adapter in a computer. What is the first step you should take?
1. >>Shut down the computer.
2. Unplug the display from the power source.
3. Unplug the computer from the power source.
4. Disconnect the display from the computer.

Explanation : The first step you should take is to shut down the computer. You should always shut down a computer before unplugging it to ensure that files are saved and closed properly.
There is no need to unplug the display from the power source. You are not working on the display; you are installing a new video adapter inside the computer's case.

You should disconnect the display from the computer, but only after you have shut down the computer. You should not disconnect a display while the computer is running.

You should unplug the computer, but only after you have shut down the computer.
Objective: Safety and Environmental Issues

Security: Virus Scans

What is the first step you should take before you run a virus scan?
1. Create an emergency anti-virus boot disk.
2. Run the ScanDisk utility.
3. Log out of the network.
4. >>Upgrade your virus definitions and virus testing engine.
Explanation : It is important that you first upgrade your virus definitions and your virus scan engine before you run a virus scan. Doing so will ensure you are scanning for all currently known viruses and worms. If you do not update the virus definition files first, you may miss a new virus.

Creating an emergency anti-virus boot disk also needs to be done prior to the virus scan, but this step should be performed after upgrading the virus definitions.

It is not necessary to run the ScanDisk utility or to log out of the network before running a virus scan.
Objective: Security
Sub Objective(s): Identify the fundamentals and principles of security

Printers and Scanners: Primary corona vs transfer roller vs fuser

Which laser printer component applies a strong uniform negative charge to the drum?
1. >>Primary corona wire
2. Transfer roller
3. Fusing assembly
4. Piezoelectric nozzle

Explanation : The laser printer's primary corona wire (also called the charging roller) applies a strong negative charge to the photosensitive drum. This is the first step in preparing a page to be printed.

The fusing assembly uses heat and pressure to make the image on the paper permanent. This is the last step in the process.

The transfer roller (also called the transfer corona) applies a positive charge to the paper so that the negatively charged toner particles will be attracted to the positively charged areas on the paper. Because the laser reduced the negative charge in the areas to be printed, only those areas will have a positive charge after the transfer roller completes its task. Therefore, only those areas attract the toner.

A piezoelectric nozzle is used in an ink jet printer, not in a laser jet printer.
Objective: Printers and Scanners

Components: Mouse

A user reports that his mechanical mouse is moving sporadically. You attempt to clean the ball, but the mouse still behaves erratically.
What should you try next?
1. Verify that the mouse is connected to the correct port.
2. >>Clean the rollers using rubbing alcohol and a cotton swab.
3. Install a new driver.
4. Change the battery.
Explanation : A mechanical mouse uses a ball that activates rollers when it is moved across a smooth surface. Both the ball and the rollers can gather dust and other debris from the environment. One of the symptoms of a dirty mouse is that the mouse pointer seems temporarily stuck or moves sporadically.

You do not need to change the battery. A mechanical mouse does not have a battery.
When a mechanical mouse moves erratically, the problem is due to a dirty ball and rollers. Installing a new driver will not correct that problem.

The mouse is not corrected to the wrong port. If the mouse were connected to the keyboard port, it would cause other symptoms, such as random characters appearing on the screen or the computer would beep at startup to indicate that a keyboard was not attached to the keyboard port. It would not function as a mouse, even erratically.
Objective: Personal Computer Components

Safety & Environment: Spike vs Noise vs Brownout

Which hazard or hazards will a surge protector protect against?
1. Spike, noise, and brownout
2. >>Spike
3. Spike and Noise
4. Noise and Sag
Explanation : A surge protector will protect against surges, which are short periods of increased voltage and spikes, which are short surges.
A surge protector will not protect against noise, which is an AC signal that does not have a smooth variance.
A surge protector will not protect against a brownout, which is a short decrease in voltage level.
A sag is another name for brownout.
Objective: Safety and Environmental Issues

Networks : Interference with wireless networks

Which of the following environmental conditions can prevent network transmission on an 802.11b network?
1. Walls that block line of sight
2. Bright lights
3. >>Electromagnetic interference
4. Humidity

Explanation : An 802.11b network is a wireless network that transmits data over radio waves. Therefore, it is subject to electromagnetic interference, such as electrical motors or other electrical devices. Some cordless phones have also been known to interfere with 802.11b transmissions.
Radio waves do not depend on line of sight. Therefore, walls that block the line of sight will not be a problem. However, some walls might contain material that prevents radio transmission.
Bright lights do not interfere with radio waves.

Humidity does not interfere with radio waves.
Objective: Networks

Safety & Environment: CRT vs Power Supply vs Battery vs Laser Printer

Which action should not be performed except by specially trained personnel due to the risk of electrical shock?
1. >>Opening a CRT monitor
2. Installing a new power supply in a desktop computer
3. Replacing a laptop battery
4. Cleaning the paper dust from a laser printer
Explanation : Only specially trained personnel should open a Cathode Ray Tube (CRT) monitor. A CRT monitor carries a strong electrical current that is not discharged when the monitor is unplugged. Only technicians who have been specially trained to work on CRT monitors should open the casing of one.

Although installing a power supply requires knowledge of how to connect the power supply to the components, doing so does not carry the risk of electrical shock as long as the computer is unplugged. However, you should never open the casing of a power supply because some components inside retain current strong enough to cause injury or death.

A laptop battery can be safely replaced by a user. The battery is made to be easily removable without the risk of electrical shock.

Cleaning the paper dust from a laser printer can be performed by a technician without special training. The best way to remove paper dust is with a can of compressed air.
Objective: Safety and Environmental Issues

Printers and Scanners: Blue areas not printing

The Sales department uses a shared inkjet printer. Several users report that the color of print jobs is wrong. When you run a diagnostic print, you discover that blue areas are not printing. You replace the ink jet cartridge, but the problem still occurs.
What should you do?
1. >>Use the maintenance software provided by the manufacturer.
2. Clean the nozzles using denatured alcohol.
3. Use a low static vacuum to clean the printer.
4. Replace the printer driver.

Explanation : An inkjet printer exhibits print quality problems when the nozzles are dirty, when the print heads are dirty, or when the print heads are misaligned. These problems can be corrected in most inkjet printers by running the maintenance software provided by the manufacturer. The most likely problem when one color does not print is that the nozzle for that color has become clogged.

You should usually not use a vacuum on an inkjet printer.

You should not clean the nozzles using denatured alcohol. The maintenance software is the best way to clean the nozzles. Also, because inkjet printers use water-based ink, you should use water instead of denatured alcohol when you do need to manually clean ink off a component.

You should not replace the printer driver. It is unlikely that the printer driver is causing blue ink not to print. The printer driver is responsible for translating application and operating system commands to a language the printer can understand.
Objective: Printers and Scanners

Laptops and Hot Swappable Components

Which of the following is NOT hot swappable on a laptop computer?
1. USB hard disk
2. USB printer
3. PC card modem
4. >>Memory
Explanation : Memory is not a hot swappable component in a laptop computer. You need to unplug the laptop and remove the battery before installing memory.
A USB printer is a hot swappable component, as are most USB devices. However, you will probably need to install driver software.

PC card devices are hot swappable. PC card devices include modems, wireless adapters, and network cards.
A USB hard disk is hot swappable. It should be recognized as soon as it is plugged in.
Objective: Laptops and Portable Devices

Laptops: The Fn + Scroll Key

Sue reports that the keyboard on her laptop computer is not working. When she types the word "lion", the text "356n" appears.
What should you do?
1. >>Verify that the Fn key is not stuck.
2. Verify that the Caps lock key is not stuck.
3. Replace the keyboard.
4. Attach an external keyboard.

Explanation : You should verify that the Fn key is not stuck. You can lock the Fn key down by pressing the Fn+Scroll keys. Therefore, you should also check The Fn key is used to provide alternate keyboard functions for some keys on a laptop computer. For example, some alphabetic keys become numbers, allowing you to use the regular keyboard as a keypad.k whether the Scroll key is active.

To unlock a locked function key, press the Fn+Scroll keys again.

You should not verify that the Caps lock key is not stuck. The Caps lock key causes letters to be typed in uppercase even if the Shift key is not pressed.

There is no need to replace the keyboard. The keyboard is not malfunctioning. The problem is just a stuck key or user error.

There is no need to attach an external keyboard. The keyboard is not malfunctioning.
Objective: Laptops and Portable Devices
Sub Objective(s): Use tools, diagnostic procedures and troubleshooting techniques for laptops and portable devices.
Component replacement CompTIA A+ Certification: 220-602