


































































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A collection of questions and answers related to the comptia a+ certification exam (220-901 & 902). It covers various topics, including hardware components, networking fundamentals, troubleshooting techniques, and basic security concepts. Intended for individuals preparing for the comptia a+ certification exam.
Typology: Exams
1 / 74
This page cannot be seen from the preview
Don't miss anything!
router can be set to limit the number of dynamic addresses it hands out - Answer SOHO
"Internet of Things" (IoT). - Answer The IoT is the global network of physical objects which have embedded processors (of some sort) that can communicate with computers across the Internet
2.4 GHz Frequency - Answer In the United States, the 2.4 GHz frequency range consists of channel 1 through 11. (Again, other countries may differ slightly.) For noninterference with other wireless devices, choose channel 1, 6, or 11. That's because the 2.4 GHz spectrum is divided into three sections: channels 1-5, channels 6-10, and channel 11. This network is also running in mixed mode; it allows connections from 802.11b, 802.11g, and 802.11n (2.4 GHz) wireless clients.
4 Pin color Red - Answer ...wtf is this
5 GHz frequency - Answer If using the 5 GHz frequency range in the United States, a wireless access point can be set up on any channel between 48 and 165. Other countries may have slightly different ranges. The wireless network shown in the figure is currently configured to run in mixed mode, meaning that it can accept connections from wireless clients running the 802.11a, 802.11n, or 802.11ac protocols. This allows for greater compatibility. However, some organizations will require only a single type of connection for all clients (for example, 802.11ac). This can result in greater WAP efficiency and, of course, greater speed for all clients involved— but at greater expense.
10BaseT uses _____ connectors? - Answer RJ-
802.11 Wireless - Answer this type of wireless connectivity is known as Wi-Fi or wireless LAN (WLAN). The Institute of Electrical and Electronics Engineers (IEEE) developed the 802. series of protocols. These define the various speeds, frequencies, and protocols used to transmit data over radio waves in small geographic areas using unlicensed spectrums.
802.11a Characteristics - Answer 54 Mbps max speed 5.0 GHz Frequency Range up to 165ft
802.11b Characteristics - Answer 11 Mbps Max Speed 2.4 GHz frequency Range of 300ft (new standards make this standard obsolete)
802.11g Characteristics - Answer 54 Mbps Max Speed 2.4 GHz frequency Range of 300ft
802.11n Characteristics - Answer 5.0 GHz frequency 2.4 GHz frequency 500 Mbps max Speed Max range of 230ft indoors and 820 outdoors
A customer calls and says that her computer will not boot. The customer reports that she can hear the fan and drives running and the lights on the box are lit but the screen is blank. Which components would you take to the site to fix the problem? - Answer Video card & Monitor
A customer calls to say that the Windows desktop appears to be distorted. What could you do to try and isolate the problem? - Answer Monitor can be malfunctioning & Boot computer to command prompts
A FireWire port can support 63 interconnected devices. Which choice below correctly identifies the process of connecting FireWire devices together? - Answer Daisy Chaining
A laser printer generates a completely black paper. What is the Cause? - Answer Primary Corona
A laser printer has come due for service. You check the counter and the printer has printed roughly 20,000 pages. Which of the following steps would you take? - Answer Refer to the Printer's Maintenance kit and follow instructions.
A user tells you that she cannot connect to some network resource while others are readily accessible and no one else has the same problem. What do you check in order to investigate this problem? - Answer Check the user's Active Directory and shared resource permissions
A WMC computer is having display problems. How can you adjust the graphics hardware acceleration so that you can troubleshoot the problem? - Answer control panel > system > advanced > Performance
A/V Workstations - Answer Remember that audio/video workstations need specialized A/V cards; large, fast hard drives; and multiple monitors.
Access Control List (ACL) - Answer is used to control which users or groups have access to specific shared resources on a server.
Active Directory - Answer is a tool used for authentication and directory lookup. In a domain network, all users and other resources can be added to Active Directory on a domain controller. This directory service allows users to log onto a particular station and then have centrally defined and controlled access to all network resources that are made available to them.
Adjusting the Print Spooler service in Computer Management - Answer Open the Computer Management console window, click the + sign to expand Services and Applications, and then click Services. In the right window pane, scroll until you find the Print Spooler service. To start a stopped service, right-click it and click Start.
Adjusting the Print Spooler service in Task Manager - Answer Open Task Manager, right-click the taskbar, and then click Start Task Manager (or press Ctrl+Shift+Esc). Under the Services tab, right-click the Print Spooler service and select Start, Stop, or Restart service (the options vary according to your OS version).
Adjusting the Print Spooler service in the Command Prompt - Answer When the Command Prompt is open (in elevated mode), you can start the Print Spooler service by typing net start spooler. Typing net stop spooler stops the service.
ADSL (Asymmetrical Digital Subscriber Line) - Answer ADSL enables transmission over copper wires that is faster than dial-up. It is generally geared toward the consumer that requires more downstream bandwidth than upstream. Because the downloading and uploading speeds are different, it is known as an asymmetric technology.
Advanced Technology Extended (ATX) - Answer Original ATX power supplies connect to the motherboard with a 20-pin connector. Newer ATX 12V 2.x power supplies connect with a 24pin connector.
Alsoknown as "thicknet," was once used as a backbone cable in coaxial network installations,
but is very rarely seen anymore. - Answer RG- 8
AMD socket types - Answer include AM3, AM3+, FM1, FM2, and FM2+
An analog computer monitor connection has how many rows of pins? - Answer 3 15pins
An application has installation requirements of 1GB Ram, 2MB video memory and 15GB HD space. When you try to install the program on your laptop, it displays an error message, "Insufficient memory". You know for a fact that your system has exactly 4GB of RAm and your video card is set at 2GB. There is more than 250GB free HD available. What will resolve this error? - Answer Add more RAM
An employee is complaining that when he turns his lights on in the office, he can't connect to the network. With the light off his sytem works fine. What can be the problem? - Answer The cable system is faulty
An external USB hard drive would typically have its own power supply and a USB cable described as? - Answer A male to B male
An inbound modem converts - Answer Analog to digital
Android application Package (APK) - Answer is used when programs are compiled to be run on an Android based device. These programs when compiled, are similar to .msi file in that it contains all assets. resources, and the program code.
Apple Filing Protocol - Answer Apple Filing Protocol offers file services for Mac computers running OS X allowing for the transfer of files across the network. It uses port 548 (and sometimes 427) for establishing the communication between two systems. Mac computers can also make use of SMB (and other protocols) for making connections to other systems.
Apple Filing Protocol (AFP) - Answer is apple's version of Server Message Block (SMB). It is tailored to work specifically with the file system of the MAC OS. It provides file sharing capabilities as well as many other file services to Apple clients. AFP is not used to access contact details or a list of devices on a server or database.
At the maximum segment length of 10 meters or (100 meters with a cat 5 cable), IEEE 1394b supports which max length? - Answer 800 mb/s 9 conductor
At the maximum segment length of 15 Feet, IEEE 1394a supports which max length? - Answer Standard Firewire 400mbps IEEE 1394a 4 & 6 conductor
At what frequency do Bluetooth-connected devices communicate? - Answer 2.4 GHz used by IEEE
and all other hardware run normally
BIOS S4 - Answer All contents inside of the compiter's RAM modules are saved to the hard drive and the computer is powered down. When the computer is restarted, windows will reload its last saved state. (hibernation)
BIOS S5 - Answer computer has been shut down normally and will boot normally opening any services an applications that were configure to run on startup.
BitLocker software is based on? - Answer the Advanced Encryption Standard (AES) and uses a 128-bit key. Keep in mind that a drive encrypted with BitLocker usually suffers in performance compared to a nonencrypted drive and could have a shorter shelf life as well.By default, BitLocker is used to encrypt the internal drive of a system. However, you can also encrypt USB drives and other removable devices by using BitLocker To Go.
Blackout - Answer is when a total loss of power for a prolonged period occurs.
Bridge - Answer The bridge is a device that can either connect two LANs together or separate them into two sections. There are wired bridges and wireless bridges; today they are used to increase the size of networks.
Brute Force Attack - Answer is when every possible password instance is attempted. This is often a last resort because of the amount of CPU resources it might require. It works best on shorter passwords but can theoretically break any password, if given enough time and CPU power.
Bus Speed - Answer the base clock of the motherboard
Cable Internet how are internet connections made? - Answer Cable Internet is a common option for home use and for SOHO networks that use a router to allow multiple computers access to the Internet via a cable. An RG-6 cable is run into the office and connected to the cable modem by way of a screw-on F-connector. The cable modem also has an RJ45 connection for patching to the router or to an individual computer's network adapter.
Cable Types and Connectors - Answer It is referred to as twisted pair because the copper wires inside of the cable are twisted together into pairs throughout the entire length of the cable. Regularly, admins use UTP cable, ( unshielded twisted pair). Regularly, admins use UTP cable.
Cache - Answer which is also known as a buffer. The cache on most hard drives is on-board DRAM.
CAD/CAM Workstations - Answer Computer-aided design (CAD) and computer-aided manufacturing (CAM) workstations are common in electrical engineering, architecture, drafting,
and many other engineering arenas. They run software such as AutoCAD. Don't forget, CAD/CAM computers need powerful, multicore CPUs, high-end video cards, and as much RAM as possible.
Capturing pertinent statistical information about the network behavior over a period of time to determine what is normal operational behavior is called? - Answer Baselining
Category UTP - Answer 1. Category 3 10Mb/s networks
Cellular - Answer has grown to encompass several different technologies, such as GSM, CDMA, GPRS, EDGE, 4G, LTE, and more. Cellular data connections are also referred to as wireless WAN or WWAN connections. Use of cellular on a smartphone, tablet, or with a WAN card requires a subscription with a cellular provider.
Charging - Answer aka conditioning A negative charge is applied to the drum by the primary corona wire, which is powered by a high-voltage power supply within the printer.
Check Disk (chkdsk command) - Answer can check for bad clusters on the drives and confirm the integrity of the file system. If errors are present it will attempt to repair the bad sectors.
Cleaning - Answer A rubber blade removes excess toner from the drum as it spins. An erasing lamp removes any leftover charge on the drum, bringing it to zero volts. The printer is now ready for another print job.
Clearing - Answer This is the removal of data with a certain amount of assurance that it cannot be reconstructed. The data is actually recoverable with special techniques. In this case, the media is recycled and used within the company again. The data-wiping technique (also known as shredding) is used to clear data from media by overwriting new data to that media or by performing low-level formats.
Clock Speed - Answer the frequency of the CPU
Coaxial - Answer Coaxial cable is another way to transfer data over a network. This cable has a single conductor surrounded by insulating material, which is then surrounded by a copper screen and, finally, an outer plastic sheath.
Collating - Answer If you print a single job, collating is not an issue. But it's when you print multiple copies of the same job that collating might become necessary. Historically, multiple copies of the same print job would print out all of page 1, then all of page 2, then all of page 3,
Computer component to the voltage it uses - Answer 5V: PCIe cards, disks, AGP (accelerated graphics port) 3.3V: AGP, Chipsets 12V: PCIe cards, CPUs, Motors
Computer-aided design (CAD) and computer-aided manufacturing (CAM) workstations - Answer are common in electrical engineering, architecture, drafting, and many other engineering arenas. Don't forget, CAD/CAM computers need powerful, multicore CPUs, high-end video cards, and as much RAM as possible.
Configuring IPv4 - Answer Configuring IP works the same way in most versions of Windows. First, we navigate to the Internet Protocol (TCP/IP) Properties window, which we refer to as the IP Properties dialog box. To do this, go to Control Panel > Network and Internet > Network and Sharing Center, and then select the Change Adapter Settings link. (In Windows Vista, select the Manage My Network Connections link.) Then right-click the Ethernet icon (or Local Area Connection icon) and select Properties. Finally, highlight Internet Protocol Version 4 and then click the Properties button. (For speed, right-click the network icon in the Notification Area and select Open Network and Sharing Center.)
COPY Command - Answer is the predecessor to the XCOPY command. Like the MOVE command, it is used to copy files between individual directories; however, the difference is the
Common Media and VoIP Unified Communications - Answer - RTP
CompTIA recommended procedure for the removal of malware in general: - Answer 1. Identify malware symptoms.
COPY command will leave the original file within the source directory. One of its limitation is it cannot be used to copy data that spans multiple directories
CPU cache - Answer CPU cache is a special high-speed memory that reduces the time the CPU takes to access data. By using high-speed static RAM (SRAM) and because the cache is often located directly on—or even in—the CPU, CPU cache can be faster than accessing information from dynamic RAM (DRAM) modules. However, it will be limited in storage capacity when compared to DRAM.
Data Loss Prevention (DLP) - Answer software is designed to detect and prevent breach of sensitive data. DLP Software will detect and block data while it is in use, on the network, and in storage. Used to protect sensitive digital documents from being leaked or accessed by unauthorized users.
DDR (Double Data Rate) - Answer DDR is synchronized to the memory clock just like SDRAM, actually SDRAM that has been double-pumped, meaning that twice the data is transferred but at the same clock speed. It does this by transferring data on the rising and falling edges of each clock signal (every cycle). So let's use DDR-200 as an example. A 100 MHz system bus's transfers are doubled, so instead of 100 million transfers, it can now do 200 million transfers per second.
DDR3 Standards - Answer Read off of printout Default Gateway - Answer would be the address of a device that is used either directly or indirectly, to access an external subnet or network. Typically the address would point to a router.
Demilitarized zone (DMZ) - Answer is an area that is not quite on the Internet and not quite part of your LAN. It's a sort of middle ground that is for the most part protected by a firewall, but particular traffic will be let through. It's a good place for web servers, e-mail servers, and FTP servers because these are services required by users on the Internet. The beauty of this is that the users will not have access to your LAN—if it is configured correctly, of course. Quite often, the DMZ is set up as the third leg of a firewall. The first leg connects to the LAN, the second leg connects to the Internet, and the third connects to the DMZ. You need to know the ports that your servers will use and create rules within the firewall (or an all-in-one device, such as a SOHO router) to allow only the required traffic into the DMZ.
Destruction - Answer This is when the storage media is physically destroyed through pulverizing (with a hammer or other similar tool), drilling holes through the platters, electromagnetic degaussing, shredding, incineration, and so on. At this point—if there is anything left of the drive—the media can be disposed of in accordance with municipal guidelines. Some organizations require a certificate of destruction to show that a drive has indeed been destroyed.
Developing - Answer The surface of the drum that was previously exposed to the laser is now applied with negatively charged toner. This toner has a higher charge than the areas of the drum that were written to.
During laser printing, what charge is placed on the drum during the conditioning phase? - Answer -600V
DVD-5 Capacity - Answer Sides: 1 Total Layers: 1 Capacity: 4.7 GB
DVD-18 Capacity - Answer Sides: 2 Total Layers: 4 Capacity: 17 GB
Dynamic Address - Answer Dynamically assigned addresses are more common for a client computer; this is when the computer seeks out a DHCP server so that it can get its IP information automatically. When you select this, the rest of the information becomes grayed out and the
computer attempts to get that IP information from a host (such as a multifunction network device or DHCP server). This is common; in fact, it's the default configuration for Windows.
Dynamic Host Configuration Protocol (DHCP) - Answer is used to automatically assign IP addresses to hosts. These hosts could be computers, printers, servers, routers, and so on. In most SOHO networks, a router will use DHCP to assign IP addresses to the client computers. However, your ISP will also use DHCP to assign an IP address to you; usually your router gets this. The DHCP service makes life easier for the network administrator by automatically assigning IP addresses, subnet masks, gateway addresses, DNS servers, and so on, from a central location. If you get your address from a DHCP server, you are getting your address assigned dynamically, and it could change periodically. Computers that do obtain IP addresses from a DHCP server have the advantage of automatically getting new addressing when they are moved to a different network segment. However, some computers require a static address, one that is assigned by the network administrator manually. It is better in many situations for servers and printers to use static addresses so you know exactly what the address is and so it won't change.
E-mail Servers - Answer are part of the message server family. When we make reference to a message server, we mean any server that deals with e-mail, faxing, texting, chatting, and so on. An Exchange Server might run POP3, SMTP, and IMAP, and allow for Outlook Web App (OWA) connections via a web browser. That's a lot of protocols running. So it's not surprising to hear some Exchange admins confess that running an e-mail server can be difficult at times.
Each node on the internet must be assigned an unique____ address? - Answer IP
Embedded Multi-Media Card (eMMC) - Answer An internal storage technology for smartphones and tablets using the MultiMedia Card standard. Supporting error correction in hardware (see ECC memory), an eMMC chip contains a controller and flash memory. See embedded flash and MMC.
Encrypting File System (EFS) - Answer a component of NTFS
Encrypting File System (EFS) - Answer The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.
Encryption - Answer is the process of converting information with the use of a cipher (algorithm), making it unreadable by other users unless they have the correct "key" to the information. Cryptography is the practice of hiding information. In a cryptosystem, information is protected by disguising it.
Enhanced Integrated Drive Electronics (EIDE) - Answer uses Molex Connectors have 4 pins and supply +5V and +12V to any attached devices
Equation for data transfer rate - Answer Clock speed × bytes × 2 = Data Transfer Rate Example: 100 MHz × 8 × 2 = 1,600 MB/s Now, an easier way to solve the data transfer rate equation for all types of DDR is to simply multiply the megatransfers per second (MT/s) by 8. Why 8? Because DDR sends 8 bytes per transfer. Equation: 200 MT/s × 8 = 1,600 MB/s.
Error Correction Code (ECC) vs Non-ECC - Answer ECC in RAM can detect and correct errors.
EXE - Answer files that end with a .exe extension are commonly known as executable files. These files are most often found on DOS and Window based platforms. They can also contain other files such as bitmaps and icon files for a GUI
Exposing - Answer aka writing The laser is activated and "writes" to the drum as it spins. Where the laser hits the drum, it dissipates the negative charge toward the center of the drum that is grounded. The "exposed" areas of the drum now have a lesser negative charge.
External drives present support personnel with their own support issues. Identify the probable cause of a user's external Universal Serial Bus (USB) drive not being recognized by the computer. - Answer There is a damaged or malfunctioning USB port
extract Command - Answer is an external command used to extract files located within a cabinet file, stored on external media, to a destination on a hard disk. With the use of the /A switch, the
(SATA Express or PCI Express); advanced cooling methods (liquid cooling if you want to be serious); a high-end video card and specialized GPU; an above average, high-definition sound card; a big monitor that supports high resolutions and refresh rates; plus a fast network adapter and strong Internet connection (and mad skills).
Google Cloud Messaging (GCM) - Answer is a messaging service that can be used on Android devices to send data and send to sync messages from a corporate server to android powered devices.
gpupdate command - Answer executing the gpupdate command will cause the computer to refresh both its local and Active Directory Group Policy Settings. Only the updated Group Policy settings are updated using this command.
Graphics Processing Unit (GPU) - Answer is the processor for video, it is part of the chipset and utilizes RAM as shared video memory
Half Duplex - Answer means that your network adapter can send or receive data but not at the same time
Hard Disk Drives - Answer the most common of magnetic media, they are nonvolatile, which means any info stored on them cannot be lost when the computer is turned off.
Hardware differences between Tablets/Smartphones/Laptops - Answer One of the big distinctions between tablets/smartphones and laptops is the lack of field-serviceable parts. Another difference is that tablets and other similar devices are usually not upgradable. Part swaps or repair is usually done in lab.
Heat Sink - Answer The heat sink is a block of metal made to sit right on top of the CPU, with metal fins stretching away from the CPU. It uses conduction to direct heat away from the CPU and out through the fins. With a passive heat sink, that's all there is to it; it dissipates heat and requires no moving parts—it is "fanless." But with an active heat sink, a fan is attached to the top of the heat sink. The fan plugs into the motherboard for power and usually blows air into the heat sink and toward the CPU, helping to dissipate heat through the heat sink fins
Homegroup - Answer A homegroup is a group of PCs on a home network that can share files and printers. Using a homegroup makes sharing easier. You can share pictures, music, videos, documents, and printers with other people in your homegroup.
How can a second SATA device be added to a SATA cable that already contains a device - Answer It can't
How can you check your local TCP/IP connection - Answer "PING localhost & PING 127.0.0.1"
How can you tell that you are looking at the main power connector to the motherboard? - Answer It will be in the form of a 20-pin or 24-pin Advanced Technology eXtended (ATX) connector.
How do light-emitting diode (LED) backlights compare to cold cathode fluorescent lamp (CCFL) backlights? - Answer They are lighter, cheaper, brighter, and have a longer lifespan.
How do you configure media streaming in Windows? - Answer To configure media streaming in Windows, go to Control Panel > HomeGroup, and then click the Change advanced sharing settings link. Open the appropriate network type and then click the Choose media streaming options link. Turn on media streaming and then click Customize for any particular device. From these last two locations, you can choose what is to be streamed, and you can select parental ratings if you want. Remember that a home server PC should have a fast network adapter and a RAID array, and needs to be part of a network (such as a HomeGroup) so that file and print sharing and media streaming can be configured.
how do you configure the system to show protected system files? - Answer To view files such as bootmgr, pagefile.sys, and hiberfil.sys, deselect the Hide protected operating system files checkbox.
How do you defragment a drive? - Answer Defragmenting the drive can be done with Microsoft's Disk Defragmenter, with the command-line defrag, If using the Disk Defragmenter program, you need 15 percent free space on the volume you want to defrag. If you have less than that, you need to use the command-line option defrag -f. To summarize, the more contiguous the data, the less the hard drive has to work to access that data, thus decreasing the data access time and increasing the lifespan of the drive.
How do you ping local loopback IPv4? - Answer use the ping 127.0.0.1 command
How do you ping local loopback IPv6? - Answer ping ::
How do you replace a keyboard? - Answer 1. Shut down laptop and disconnect battery. Employ ESD measures.
How do you troubleshoot and repair a system infected with spyware? - Answer first disconnect the system from the Internet. Then try uninstalling the program from Control Panel > Programs and Features in Windows. Some of the less malicious spyware programs can be fully uninstalled without any residual damage. Be sure to reboot the computer afterward and verify that the spyware was actually uninstalled! Next, scan your system with the AV software to remove any
How many pins does a DDR DIMM have? - Answer 184 pins
How many pins does a DDR2 DIMM have? - Answer 240 pins
How many pins does a DDR3 DIMM have? - Answer 240 pins
How many pins does a DDR4 DIMM have? - Answer 288 pins
How many pins does a FireWire 400 connector have? - Answer 6-pins
How many pins does a FireWire 800 Institute of Electrical and Electronics Engineers (IEEE)1394B connector have? - Answer 9
How to turn on and off the UAC - Answer In Windows 8/7, you can turn off UAC by going to Control Panel > User Accounts and Family Safety. Then select User Accounts and click the Change User Account Control settings link. Unlike Windows Vista, where you can only turn UAC on or off, Windows 8/7 displays a slider that enables you to select from four settings:
Hybrid cloud - Answer A mixture of public and private clouds. Dedicated servers located within the organization and cloud servers from a third party are used together to form the collective network. In these hybrid scenarios, confidential data is usually kept in-house.
Hyper-Threading (HT) - Answer enables a single CPU to accept and calculate two independent sets of instructions simultaneously, thereby simulating two CPUs. Don't confuse HyperThreading with HyperTransport used by AMD. HyperTransport is a high-speed, low-latency, point-to-point link that increases communication speeds between various devices (such as the CPU and the northbridge).
Hypertext Transfer Protocol (HTTP) - Answer Hypertext Transfer Protocol transfers web pages and other web-based material from a web server to your web browser. It is normally done in a compressed format but not in a secured format. Web servers have port 80 open by default.
Hypertext Transfer Protocol Secure (HTTPS) - Answer Hypertext Transfer Protocol Secure sends and receives information like HTTP but includes the Transport Layer Security protocol (a successor of the Secure Sockets Layer [SSL] protocol) to encrypt the information, most commonly when making purchases/payments online or when logging in to a confidential website. The HTTPS server has port 443 open.
IEEE 1394 - Answer Also known as FireWire, this port is used for devices that demand the low-
latency serial transfer of data, usually concerning music or video.
If a laser printer pulls multiple paper sheets at one time, what are the possible causes? - Answer Humidity, improper media, worn separation pad.
If a motherboard does not support Redundant Array of Independent Disks (RAID) natively, how can you configure a RAID array on that system? - Answer Install and configure a non-system RAID controller
If the computer you are working on has an onboard Redundant Array of Independent Disks (RAID) controller that appears in power-on self-test (POST) as functional, but your computer cannot boot from the array nor can it detect the array, what should you check to troubleshoot the problem? - Answer Check the RAID configuration in the controller's Basic Input/Output System (BIOS)
If you are connected to the internet through a Hot Spot, what connection speed can you generally anticipate? - Answer 2 - 11 Mbps
If you attempt to connect to a known wireless network Service Set Identifier (SSID), but receive a message that the SSID is not found, what is the problem? - Answer Someone has changed the access poin'ts SSD
If you boot a PC and see a black screen with a white blinking underscore on the top left what does that mean? - Answer The issue could be the boot order
If you hear a loud whine or squeal from your computer, which two components should you inspect as the source of the problem? - Answer Hard disk and power supply
If you install a new disk drive into a computer, but cannot access it, what must you do to make the disk accessible? - Answer FDISK and FORMAT
If you replace a central processing unit (CPU) and then the computer will not function afterward, which of the following should you look for when troubleshooting? - Answer Bent or broken pins on the CPU
If you see streaks on a printed page, which part of the printer needs to be cleaned? - Answer Printer Heads
If you set up your Dynamic Host Configuration Protocol (DHCP) server to resolve Internet Protocol (IP) address conflicts, which of the following problems does this action resolve? - Answer Assignment of duplicate IP addresses