CompTIA Strata IT Fundamentals
Question No: 1 – (Topic 1)
Which of the following statements about a riser card is true?
It is used to connect a computer ina network.
It is used to connect extra microprocessors.
It provides extra memory for expansion cards.
It is used to extend slots for expansion cards.
Answer: D Explanation:
Riser card is a circuit board that is used to extend slots for expansion cards and provides the ability to connect additional expansion cards to the computer. These cards are used with LPX motherboards. With the introduction of ATX motherboards, riser cards are rarely used. In ATX motherboards, the expansion cards connect directly to the computer motherboard instead of using riser cards.
What is LPX?
LPX is a motherboard form or that is used in some desktop computers. In LPX motherboards, expansion cards are inserted into a riser card that contains several slots. Unlike other common form ors such as AT and ATX, the expansion cards in LPX are not vertical, but parallel to the motherboard.
The LPX form or is designed for smaller cases, and usually it is used for connecting two or three expansion cards.
Question No: 2 – (Topic 1)
Which of the following is the most common laptop battery found today?
Answer: B Explanation:
The Lithium Ion battery isthe most common laptop battery found today.
Answer option D is incorrect. Nickel Cadmium batteries are legacy batteries and not often found today.
Answer option C is incorrect. Brand names are not relevant to this question and Energizer does not make laptop batteries.
Answer option A is incorrect. The Nickel Metal Hydroxide battery was an early replacement for NiCad, but is no longer used.
Reference. http.//www.dummies.com/how-to/content/types-of-laptop-batteries.navId- 323015.html
Question No: 3 – (Topic 1)
Which of the following can occur if the power cable runs along with the computer network cable?
Answer: A Explanation:
If the power cable runs along with the computer network cable, radiation from the power cable, known as electromagnetic interference (EMI) , may be inducted into the computer network cable affecting the signals that pass through it. Answer option Bis incorrect. ESD stands for Electrostatic discharge. The static electricity that we generate everyday creates ESD. If you walk across a carpet and touch someone, you experience a mild shock.
Electrostatic discharge occurs when the electrostatic charge istransferred from one charged entity to another entity sensitive to that charge.To minimize Electrostatic discharge (ESD) problems, consider wearing a wrist strap when you are working with computer components. A wrist strap is a wire with a watchband-stylestrap at one end and a plug or clip on the other end. The wrist strap plug or clip is connected to the ground or to the piece of equipment being worked on.
Answer option D is incorrect. Surge is a momentary voltage variation ( /- 170 volts) that lasts fromone microsecond to a few milliseconds. Turning on and off large inductive electrical devices such as air conditioners and refrigerators can cause a surge. Answer option C is incorrect. Broadcast storm is a situation in which one or more network devices send jabber packets constantly, thereby increasing the traffic. A faulty network interface card (NIC) that sends jabber packets can be detected by the network monitor software. A faulty NIC can cause a broadcast storm on the network. Broadcast storms causedby a faulty network interface card can be resolved by disabling or replacing the card.
Question No: 4 – (Topic 1)
You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?
Answer: B Explanation:
64 Megabytes is the minimum. Now, this may seem odd as many modern machines come with 1, 2, or even 4 gigabytes of RAM. Remember, we are asking in this question what the minimum amount of RAM is. You should absolutely consider getting more RAM.
What are theminimum requirements for installing Windows XP Professional? The minimum requirements for installing Windows XP Professional are: Processor: Pentium II processor running at 233MHz or faster.
RAM: 64MB minimum. Microsoft recommends 128MB RAM.
Hard DiskDrive: 1.5GB of free hard disk space for boot partition. More space will be needed if installing over a network.
Video Card and Monitor: Running at VGA resolution or higher. Network Card: PXE-enabled or a network boot disk and network card for network-based installation. Other Appliances: CD-ROM or DVD drive for CD-ROM-based and DVD-based installations, Keyboard and pointing device. Answer options D, A, and C are all incorrect. Obviously more RAM is always a good idea, but these numbers are not the minimumrequirements.
Question No: 5 – (Topic 1)
Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?
Answer: D Explanation:
The /o switch of the XCOPY command copies file ownerships and NTFS permissions
onfiles while copying them.
In NTFS file system, when a new file is created, it inherits permissions from its new parent directory. This might cause security issues when a user copies files. In this case users who did not have access to the files might gainaccess on them. Therefore, in order to retain original file permissions, users have to use the XCOPY /o command.
Answer option B is incorrect. The /s switch of the XCOPY command is used to copy directories and subdirectories except empty directories.
Answer option A is incorrect. The /p switch of the XCOPY command prompts the user before creating each destination file.
Answer option C is incorrect. The /r switch of the XCOPY command overwrites Read only files while copying data.
Question No: 6 – (Topic 1)
Which of the following are types of LCD monitors?
Each correct answer represents a complete solution. Choose two.
Answer: B,C Explanation:
Two types of LCDs are available. Active matrix
Active matrix LCDs uses individual transistors to control each pixel on the screen. This type of LCD consumes more power but provides sharper images than the passive matrix LCD. Passive matrix
Passive matrixscreens do not refresh quickly to rapid changes. The passive matrix screen displays weak colors. LCDs consume less power and are cheaper than Active matrix LCDs.
Answer option A is incorrect. SVGA is a type of CRT monitor used with the Desktop computers, and not the LCD monitor.
Answer option D is incorrect. There is no LCD display type such as X-Matrix.
Question No: 7 – (Topic 1)
Which of the following are the types of parental control?
Each correct answer represents a complete solution. Choose all that apply.
Content filter control
Usage management tool
Answer: A,B,C,D Explanation:
Following are the types of parental control. Content filter control
Usage management tool Monitoring control
Content filter control limits the access to age-appropriate content.
Usage control limits the usage of the devices,such as placing time-limits on usage or forbidding certain types of usage. Usage management tool allows the parents to enforce learning time into child#39;s computing time. Monitoring control can track down locations and activities when using the device.
Question No: 8 – (Topic 1)
Which of the following terms refers to an anti-virus software file that is updated from time to time to protect a computer from new viruses?
Answer: A Explanation:
Definition isan anti-virus software file that should be updated at regular intervals to protect a computer from new viruses. This file is also known as virus definition file. Thevirus definition file contains information about the latest viruses, which helps identifynew viruses and protect computers from them.
Answer option D is incorrect. Hotfix is a collection of files used by Microsoft for software updates that are released between major service pack releases. A hotfix is about a problem, occurring under specificcircumstances, which cannot wait to be fixed till the next service pack release. Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as soon as possible.
Answer option C is incorrect. A service pack is a collection of Fixes and Patches in a single product. A service pack can be used to handle a large number of viruses and bugs or to update an operating system with advanced and better capabilities. A service pack usually contains a number of file replacements.
Answer option B is incorrect. This term does not refer to any anti-virus software file. Reference. quot;http.//en.wikipedia.org/wiki/Computer_virusquot;
Question No: 9 – (Topic 1)
Which of the following software displays advertisements, whether or not the user has consented?
Answer: D Explanation:
Adware is software that displays advertisements, whether ornot the user has consented. Adware is software that automatically downloads and display advertisements in the Web browser without user permission. When a user visits a site or downloads software, sometimes a hidden adware software is also downloaded to display advertisement automatically. This can be quite irritating to user. Some adware can also be spyware.
Answer option C is incorrect. Spyware is a program that takes partial control over a user#39;s computer without user#39;s permission. Spyware programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited. Spyware programs can also interfere with the control of a user#39;s computer, such as installing additional software, redirecting Web browser activities, accessing Web sites blindly, etc. Answer option B is incorrect. A honeypot is a term in computer terminology used for a trap that is set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, and monitored, and which seems to contain information or a resource of value to attackers. Answer option A is incorrect. Trojan horseis a malicious software program code that masquerades itself as
a normal program. When a Trojan horse program is run, its hidden code runs to destroy or scramble data on the hard disk. An example of a Trojan horse is a program that masquerades as a computer logon to retrieve user names and password information.
The developer of a Trojan horse can use this information later to gain unauthorized access to computers. Trojan horses are normally spread by e-mail attachments. Unlike viruses, Trojan horses do notreplicate themselves but only destroy information on hard disks.
Question No: 10 HOTSPOT – (Topic 1)
Identify the SO-DIMM in the image given below.
Explanation:Small Outline Dual Inline Memory Module (SO-DIMM) is a type of memory module that comes in 72 pins and 144 pins. The 72-pin SO-DIMM supports 32-bit transfers, and the 144-pin SODIMM supports 64-bit transfers. It was introduced for laptops. SO- DIMMs come in smaller packages, consume lesser power, but are more expensive than DIMMs. The SO-DIMM displayed in the image below has 72 pins located on its base. It has two holes at both ends of the line of pins and a curved edge at the lower end on the left side.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|