Preview

Question 1

Satisfactory Essays
Open Document
Open Document
903 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Question 1
Question 1
4 out of 4 points

Of the following all but one represent the three main categories of a computer system. Which one is not a main component category?
Answer

Selected Answer: Display system
Correct Answer: Display system

Question 2
4 out of 4 points

CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?
Answer

Selected Answer: Establish a theory of probable cause.
Correct Answer: Establish a theory of probable cause.

Question 3
4 out of 4 points

Which of the following can prevent the discharge of ESD? (Choose all that apply.)
Answer

Selected Answers: Antistatic wrist strap

Touching the chassis of the computer

Antistatic mat

Antistatic bags

Correct Answers: Antistatic wrist strap

Touching the chassis of the computer

Antistatic mat

Antistatic bags

Question 4
4 out of 4 points

The CompTIA six-step troubleshooting process includes a step in which you “Verify full system functionality and, if applicable, implement preventative measures.” Which number is this step?
Answer

Selected Answer: Step 5
Correct Answer: Step 5

Question 5
0 out of 4 points

What is the part of the computer system that receives inputs, directs those inputs to the processor, and redirects the processed data to outputs called at?
Answer

Selected Answer: CPU
Correct Answer: System Board

Question 6
4 out of 4 points

Which of the following is not considered to be a legacy I/O port?
Answer

Selected Answer: USB
Correct Answer: USB

Question 7
4 out of 4 points

A ________ determines what CPUs a system can use, what integrated ports the system can provide without use of third-party products, and the number and types of expansion slots a motherboard can feature.
Answer

Selected Answer: Chipset

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2. Place these trouble shooting steps in the correct order B- Establish the symptoms D- Select the most probable cause C- Test the result A- Document the solution…

    • 669 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    3. Which application is used for Step #2 in the hacking process to perform a vulnerability assessment scan?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This work MGT 311 Week 2 Discussion Questions 2 Set 2 contains answer on the following question "In Week One, you learned about individual personality characteristics. How do these traits affect the type of motivational strategy you use? Provide an example of how this would apply."…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This document MGT 311 Week 3 Discussion Questions 2 Set 2 shows solution on the following task "Although the optimal level of conflict can be functional, no conflict or too much conflict can be dysfunctional. What steps would you as a manager take to stimulate some degree of conflict when appropriate and reduce conflict when it is excessive?"…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft 2003 XP SP2 Workstation?…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    6 Are Texas well informed about government and elected officials? Do they trust government? 4…

    • 1621 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Title

    • 309 Words
    • 2 Pages

    3. Which application is used in step #2 in the hacking process to perform a vulnerability assessment scan? / Nessus…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Three step process 1. Explore the system. 2. Test for Vulnerability 3. Test for Exploitability.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?…

    • 464 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Why were the leaders of the American Revolution not content to remain loyal British subjects?…

    • 609 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Question 2

    • 913 Words
    • 8 Pages

    1. Suppose the natural rate of unemployment is 5 percent. If the actual unemployment rate is 7 percent, then the cyclical unemployment rate…

    • 913 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion Question 1

    • 328 Words
    • 2 Pages

    Historically, the market economy has worked best as freedom is what this country was founded upon. Life, liberty and the pursuit of happiness is a fundamental phrase coined from our history of allowing our citizens to go forward and become successful within our economy.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Study Questions 1

    • 438 Words
    • 2 Pages

    1) These “templates” are basic writing moves that are to be used to structure your writing. The authors of They Say; I Say show us how these templates can significantly improve our academic writing by formatting what we want to say in a way that will be more convincing and produce stronger arguments. The book was written as a tool to help students become stronger writers, and these “templates”, these basic moves that are so crucial in this type of writing, help us enter the world of academic writing.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    employment legislation

    • 2462 Words
    • 10 Pages

    Hardware components: processor speed and type; memory eg RAM, cache; storage devices, eg hard disk drive, memory stick, CD ROM, flash drive, DVD; input devices eg touch screen, graphics tablet, gaming controller, microphone, mouse, keyboard; output devices eg printer, monitor, sound; computer network connectivity eg 3G, Wireless, Bluetooth, NIC; costs…

    • 2462 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Problem Based Learning

    • 538 Words
    • 2 Pages

    The last step is resolving the problem points out a step of presenting and justifying the solution. This step includes:…

    • 538 Words
    • 2 Pages
    Good Essays