What are two factors that must be considered when choosing a computer case? (Choose two.)

What are two factors that must be considered when choosing a computer case? (Choose two.)


the number of LED indicators at the front of the case

the size of the motherboard and the power supply

the vendor that manufactured the motherboard

the size of the monitor

the number of internal drive locations


Answer:

the size of the motherboard and the power supply
the number of internal drive locations

What are three important considerations when installing a CPU on a motherboard? (Choose three.)

What are three important considerations when installing a CPU on a motherboard? (Choose three.)


The CPU heat sink and fan assembly are correctly installed.
The CPU is correctly aligned and placed in the socket.
The CMOS EPROM battery is removed prior to installing the CPU.
Antistatic precautions are taken.
The CPU contacts are first cleaned with isopropyl alcohol.
Maximum insertion force is applied to the load lever so the CPU is locked in place.

Answer:


The CPU heat sink and fan assembly are correctly installed.*
The CPU is correctly aligned and placed in the socket.*

Antistatic precautions are taken.*

Which statement describes the purpose of an I/O connector plate?

Which statement describes the purpose of an I/O connector plate?


It makes the I/O ports of the motherboard available for connection in a variety of computer cases.
It provides multiple connections for SATA hard drives to connect to the motherboard.
It plugs into the motherboard and expands the number of available slots for adapter cards.
It connects the PCIe adapter slots used for video directly to the CPU for faster processing.


Answer: It makes the I/O ports of the motherboard available for connection in a variety of computer cases.

What is the advantage of using signed drivers?

What is the advantage of using signed drivers?


They never need upgrading.
They are verified to be compatible with the operating system.
They are guaranteed by the manufacturer to work with any hardware.
They are guaranteed to work with all operating systems.
They are free of errors.


Answer: They are verified to be compatible with the operating system.

A technician has assembled a new computer and must now configure the BIOS. At which point must a key be pressed to start the BIOS setup program?

A technician has assembled a new computer and must now configure the BIOS. At which point must a key be pressed to start the BIOS setup program?




after the POST, but before Windows starts to load
during the Windows load process
before the computer is powered on
during the POST


Answer: during the POST

Which two types of data should be backed up before troubleshooting a computer for a customer? (Choose two.)

Which two types of data should be backed up before troubleshooting a computer for a customer? (Choose two.)


Windows operating system files
BIOS system file
Internet Explorer favorites files
driver files for the hard disk
documents that are created by the customer


Answer:

Internet Explorer favorites files
documents that are created by the customer

Which step of the six-step troubleshooting process is where a technician would ask the computer user to print a document on a newly installed printer?

Which step of the six-step troubleshooting process is where a technician would ask the computer user to print a document on a newly installed printer?



Test the theory to determine the cause.
Verify full system functionality and, if applicable, implement preventive measures.
Establish a theory of probable cause.
Document findings, actions, and outcomes.
Establish a plan of action to resolve the problem and implement the solution.
Identify the problem.


Answer: Verify full system functionality and, if applicable, implement preventive measures.

A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status and the file system structure. The technician asks the customer if a backup has been performed on the disk and the customer replies that the backup was done a week ago to a different logical partition on the disk. What should the technician do before performing diagnostic procedures on the disk?

A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status and the file system structure. The technician asks the customer if a backup has been performed on the disk and the customer replies that the backup was done a week ago to a different logical partition on the disk. What should the technician do before performing diagnostic procedures on the disk?


Install a new hard disk as the primary disk, then make the current disk a slave.
Perform file restore from the existing backup copy at the logical partition.
Run the CHKDSK utility.
Back up the user data to a removable drive.


Answer: Back up the user data to a removable drive.

What is the preferred method to remove a disc from an optical drive that fails to eject the disc?

What is the preferred method to remove a disc from an optical drive that fails to eject the disc?


Remove the top of the drive enclosure.
Send the drive to an authorized repair depot.
Insert a pin into the small hole on the front of the drive.
Use a small screwdriver and pry the drive door open.


Answer: Insert a pin into the small hole on the front of the drive.

After a new PCIe video card is added, the computer seems to boot successfully but it will not display any video. The computer was working properly before the new video card was installed. What is the most likely cause of the problem?

After a new PCIe video card is added, the computer seems to boot successfully but it will not display any video. The computer was working properly before the new video card was installed. What is the most likely cause of the problem?


The monitor cable is faulty.
The saved CMOS settings are set to use the built-in video adapter.
The PC does not have enough RAM to support the new video card.
The new video card is not compatible with the CPU in the PC.


Answer: The saved CMOS settings are set to use the built-in video adapter.

After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause?

After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause?


Establish a new theory of probable causes.
Document each test tried that did not correct the problem.
Test all remaining possible causes starting with the most complex.
Use a top-down approach to isolate the cause of the problem.
Randomly replace components one at a time until the problem is solved.


Answer:

Establish a new theory of probable causes.*
Document each test tried that did not correct the problem.*

Early microprocessors which disappeared from the market did so because

Early microprocessors which disappeared from the market did so because



A. Insufficient address bits
B. Unreliable performance
C. They were too expensive.
D. Heat load
E. Slow clock speeds
F. They couldn't handle expanding memory demands.


Answer:

G. They were too inexpensive.
A. Insufficient address bits
F. They couldn't handle expanding memory demands.

The reason the "ugly" Intel architecture has survived over the years is that

The reason the "ugly" Intel architecture has survived over the years is that



A. It was adopted for the IBM PC in the early 1980s.
B. It has huge market forces behind it.
C. Intel architects didn't believe the MIPS design rules.
D. It followed IBM's market strategy.
E. The CPU marketplace is harsh and demands superior engineering.
F. Intel successfully lobbied for congressional support.


Answer:

G. It is not backward compatible.
A. It was adopted for the IBM PC in the early 1980s.
B. It has huge market forces behind it.

An addressing scheme where the address is a base register plus 2^n times an index (where n is specified in 2 or 3 bits of the instruction) is called

An addressing scheme where the address is a base register plus 2^n times an index (where n is specified in 2 or 3 bits of the instruction) is called



A. Offset.
B. Referenced.
C. Base plus scaled index.
D. Computed.
E. Scaled.
F. DIrected.


Answer:

G. Biased.
C. Base plus scaled index.
E. Scaled.

In general, Intel's arithmetic instructions

In general, Intel's arithmetic instructions



A. Execute faster than others'.
B. Perform integer and floating-point calculations equally quickly.
C. Have not changed since their inception in 1978.
D. A source and destination register be the same.
E. Area feat of modern engineering.
F. Require that the destination register be one of the source registers.


Answer:

G. Are not backwards compatible.
D. A source and destination register be the same.
F. Require that the destination register be one of the source registers.

A large number (more than 200) instructions were added to the Intel instruction set

A large number (more than 200) instructions were added to the Intel instruction set


A. With the release of the first Pentium chip
B. In 1985 with the first 16-bit processor
C. In 2006 when silicon prices dropped.
D. In 2012 when the power wall became a significant obstacle.
E. In 1978 when the 8080 first went to market
F. Because of the demand for audio and video processing


Answer:

G. Between 1999 and 2001 for floating point and multimedia purposes
F. Because of the demand for audio and video processing
G. Between 1999 and 2001 for floating point and multimedia purposes

With the arrival of multimedia applications in the late 1990s, Intel introduced

With the arrival of multimedia applications in the late 1990s, Intel introduced




A. Micropipelining.
B. Instructions which could operate on multiple data at once.
C. A brand new microarchitecture.
D. Separate audio and video instructions.
E. Single Instruction Multiple Data (SIMD) instructions.
F. Nothing new since its current instructions were adequate.


Answer:

G. Special registers for audio and video data.
B. Instructions which could operate on multiple data at once.
E. Single Instruction Multiple Data (SIMD) instructions.

Intel's first 32-bit processor, the 80386 appeared the same year as the MIPS and ARM processors. However

Intel's first 32-bit processor, the 80386 appeared the same year as the MIPS and ARM processors. However



A. The 80386 contained a newer instruction set architecture.
B. The high four register bits were hard-wired to zero because Intel tried to beat ARM and MIPS to market.
C. Intel continued to build on their former instruction set.
D. New instructions were not needed.
E. Intel already had a huge user base while ARM and MIPS had virtually none.
F. It was unable to execute programs written for the previous generation of processors.


Answer:

G. THe chip consumed less power than its competitors.
C. Intel continued to build on their former instruction set.
E. Intel already had a huge user base while ARM and MIPS had virtually none.

When floating point operations were introduced in the Intel processor line,

When floating point operations were introduced in the Intel processor line,



A. The instruction length was increased to 32-bits.
B. Integer processing slowed down as a result
C. IBM's chips were no longer needed.
D. They were not performed in the CPU itself.
E. They were performed in a separate off-chip processor.
F. They did not affect the instruction set.


Answer:

G. The new instructions were microcoded and executed on the original 8086 chip.
D. They were not performed in the CPU itself.
E. They were performed in a separate off-chip processor.

Intel's 1978 microprocessor, the 8086 had a 16-bit architecture with

Intel's 1978 microprocessor, the 8086 had a 16-bit architecture with



A. sixteen-bit registers, some of which were special-purpose
B. A combination of legacy 8-bit and new 16-bit registers.
C. A single 16-bit register
D. Sixteen 16-bit registers
E. An accumulator.
F. Fewer registers that are common now.

Answer:

G. A hardware stack.
A. sixteen-bit registers, some of which were special-purpose
F. Fewer registers than are common now.

In general, a more complex instruction set means

In general, a more complex instruction set means



A. Shorter clock cycles
B. More compact code
C. Lower instruction count
D. Faster execution time
E. Lower cycles per instruction
F. Easier pipelining.


Answer:

G. Faster compilers.
B. More compact code
C. Lower instruction count

In the ARM 12-bit immediate field, the eight least significant bits are zero-extended to a 32-bit value, then rotated right the number of bits specified in the first four bits of the field multiplied by two. This allows

In the ARM 12-bit immediate field, the eight least significant bits are zero-extended to a 32-bit value, then rotated right the number of bits specified in the first four bits of the field multiplied by two. This allows



A. All 24-bit values to be represented.
B. All powers of 2 in a 32-bit value to be represented.
C. The most frequently used 32-bit values to be represented.
D. Positive and negative numbers.
E. All even numbers in a 32-bt word to be represented.
F. All 32-bit values to be represented.


Answer:


G. Faster addition..
B. All powers of 2 in a 32-bit value to be represented.
C. The most frequently used 32-bit values to be represented.

Each ARM instruction begins with _____

Each ARM instruction begins with _____



A. A four-bit code which determines whether the instruction will execute.
B. Condition codes
C. The designation for the destination register.
D. A six-bit operation code which can be zero.
E. A valid bit.
F. An indication of how long it is.


Answer:

G. Bits that tell the length of the instruction.
A. A four-bit code which determines whether the instruction will execute.
B. Condition codes

The ARM processor uses a status word of four bits: negative, zero, carry and overflow. What is this status word used for?

The ARM processor uses a status word of four bits: negative, zero, carry and overflow. What is this status word used for?



A. Passing arguments to subroutines.
B. Returning values from subroutines.
C. Arguments for conditional branch instructions.
D. Performing the divide function.
E. Conditionally executing instructions.
F. Deciding whether or not to execute the instruction.


Answer:

G. Terminating the program if it crashes.
E. Conditionally executing instructions.
F. Deciding whether or not to execute the instruction.

The MIPS and ARM instruction sets differ widely on how they perform

The MIPS and ARM instruction sets differ widely on how they perform



A. Addition.
B. Signed addition.
C. Compares and conditional branches
D. Register-to-register transfers.
E. Memory addressing.
F. Register addressing.



Answer:

G. Multiplication.
C. Compares and conditional branches
E. Memory addressing.

Which is not a difference between the MIPS and ARM processor

Which is not a difference between the MIPS and ARM processor



A. The use of the zero register
B. The year of the first product announcement
C. The number of registers
D. Use of condition codes for branching.
E. The number of data addressing modes
F. Use of RISC instructions.


Answer:


G. Number of register designator bits in instructions.
B. The year of the first product announcement
F. Use of RISC instructions

Which is the fastest way to convert an array index to a memory address location

Which is the fastest way to convert an array index to a memory address location



A. Divide by four.
B. Reroute address lines, each to the second one to its left.
C. successive adds of four
D. Shift right in hardware.
E. shift left 2 in software
F. multiply by four


Answer:

G. shift left 2 in hardware
B. Reroute address lines, each to the second one to its left.
G. shift left 2 in hardware

Two methods of indexing lists of numbers are

Two methods of indexing lists of numbers are



A. Offsets and shifts.
B. Arrays and pointers
C. serial and parallel
D. Tables and arrays
E. Pointers and arrays.
F. in-order and out-of-order


Answer:

G. Increments and decrements.
B. Arrays and pointers
E. Pointers and arrays.

Inlining saves

Inlining saves 



A. Programmers from themselves
B. variables onto the stack.
C. Space on the heap.
D. Code size at the expense of execution time.
E. The overhead of a procedure call
F. Execution time at the expense of code size.


Answer:


G. calling parameters in $a registers.
E. The overhead of a procedure call
F. Execution time at the expense of code size.

What is the fastest way of saving a variable in the $a0 register

What is the fastest way of saving a variable in the $a0 register



A. Use the $at register.
B. Place it into cache.
C. Add it to $0 and store it in another register.
D. Write it to disk
E. Copy it to another register
F. Save it in memory


Answer:


G. Push it onto the stack
C. Add it to $0 and store it in another register.
E. Copy it to another register

If one subroutine calls another, we must at least preserve

If one subroutine calls another, we must at least preserve



A. The $sp register
B. The $ra register
C. The $s registers
D. The $a registers
E. The frame pointer.
F. The return address register


Answer:

G. The $t registers.
B. The $ra register
F. The return address register

The disadvantage of the four-model approach is ____.

The disadvantage of the four-model approach is ____.



a. it gives an unclear picture of the current system functions before any modifications or improvements are made
b. the requirements of a new information system always are different from the current information system
c. the added time and cost needed to develop a logical and physical model of the current system
d. it results in unhappy users


Answer: C

Decision trees show the logic structure in a ____.

Decision trees show the logic structure in a ____.



a. vertical form that resembles a tree with the roots at the bottom and the branches at the top
b. horizontal form that resembles a tree with the roots at the left and the branches to the right
c. vertical form that resembles a tree with the roots at the top and the branches at the bot-tom
d. horizontal form that resembles a tree with the roots at the right and the branches to the left


Answer: B

The iteration structure is the completion of ____.

The iteration structure is the completion of ____.



a. one or more process steps based on the results of a test or condition
b. steps in chronological order, one after another
c. a process step that is repeated until a specific condition changes
d. a specific condition that is repeated until a process changes


Answer: C

The selection structure is the completion of ____.

The selection structure is the completion of ____.



a. one or more process steps based on the results of a test or condition
b. steps in chronological order, one after another
c. a process step that is repeated until a specific condition changes
d. a specific condition that is repeated until a process changes


Answer: A

In a DFD, the Gane and Sarson symbol for an entity is a ____.

In a DFD, the Gane and Sarson symbol for an entity is a ____.



a. rectangle with rounded corners
b. line with a single or double arrowhead
c. flat rectangle that is open on the right side and closed on the left side
d. rectangle, which may be shaded to make it look three-dimensional


Answer: D

In a DFD, the Gane and Sarson symbol for a data store is a ____.

In a DFD, the Gane and Sarson symbol for a data store is a ____.



a. rectangle with rounded corners
b. line with a single or double arrowhead
c. the flat rectangle that is open on the right side and closed on the left side
d. rectangle, which may be shaded to make it look three-dimensional


Answer: C

In a DFD, the Gane and Sarson symbol for data flow is a ____.

In a DFD, the Gane and Sarson symbol for data flow is a ____.



a. rectangle with rounded corners
b. line with a single or double arrowhead
c. flat rectangle that is open on the right side and closed on the left side
d. rectangle, which may be shaded to make it look three-dimensional


Answer: B

In a DFD, the Gane and Sarson symbol for a process is a ____.

In a DFD, the Gane and Sarson symbol for a process is a ____.



a. rectangle with rounded corners
b. line with a single or double arrowhead
c. flat rectangle that is open on the right side and closed on the left side
d. rectangle, which may be shaded to make it look three-dimensional


Answer: A

In the accompanying figure, the sequence structure is the completion of ____.

In the accompanying figure, the sequence structure is the completion of ____.



a. one or more process steps based on the results of a test or condition
b. steps in a chronological order, one after another
c. a process step that is repeated until a specific condition changes
d. a specific condition that is repeated until a process changes


Answer: B

___ is based on combinations of the three logical structures, or control structures (one of which is shown in the accompanying figure), which serve as building blocks for the process.

___ is based on combinations of the three logical structures, or control structures (one of which is shown in the accompanying figure), which serve as building blocks for the process.



a. Modular design
b. General design
c. Global design
d. Total design


Answer: A

In a data dictionary, ____ is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element.

In a data dictionary, ____ is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element.



a. domain c. length
b. valence d. index


Answer: C

The data dictionary usually records and describes a default value, which is the ____.

The data dictionary usually records and describes a default value, which is the ____.



a. specification of the set of values permitted for the data element
b. identification of the user(s) responsible for changing values for the data element
c. specification for the origination point for the data element's value
d. value for the data element if a value otherwise is not entered for it

Answer: D

Balancing ____.

Balancing ____.



a. uses a series of increasingly detailed DFDs to describe an information system
b. ensures that the input and output data flows of the parent DFD are maintained on the child DFD
c. uses a series of increasingly sketchy DFDs to describe an information system
d. ensures that the input and output data flows of the child DFD are maintained on the parent DFD


Answer: B

Leveling ____.

Leveling ____.



a. uses a series of increasingly detailed DFDs to describe an information system
b. ensures that the input and output data flows of the parent DFD are maintained on the child DFD
c. uses a series of increasingly sketchy DFDs to describe an information system
d. ensures that the input and output data flows of the child DFD are maintained on the parent DFD


Answer: A

A grey hole is a process that has ____.

A grey hole is a process that has ____.



a. no input
b. at least one output and one input, but the output obviously is insufficient to generate the input shown
c. no output
d. at least one input and one output, but the input obviously is insufficient to generate the output shown


Answer: D

A black hole is a process that has ____.

A black hole is a process that has ____.



a. no input
b. at least one output and one input, but the output obviously is insufficient to generate the input shown
c. no output
d. at least one input and one output, but the input obviously is insufficient to generate the output shown


Answer: C

A spontaneous generation process is a process that has ____.

A spontaneous generation process is a process that has ____.



a. no input
b. at least one output and one input, but the output obviously are insufficient to generate the input shown
c. no output
d. at least one input and one output, but the input obviously is insufficient to generate the output shown


Answer: A

A DFD shows ____.

A DFD shows ____.



a. how data are related
b. what key fields are stored in the system
c. how a system transforms input data into useful information
d. what data is stored in the system



Answer: C

A project triangle shows three legs: _____.

A project triangle shows three legs: _____.



a. project cost, scope, and time
b. project cost, size, and scope
c. project size, scope, and time
d. project size, cost, and time


Answer: A

Most risk identifications include a brief description of ____.

Most risk identifications include a brief description of ____.



a. the team member who might cause a risk to occur
b. who would be responsible for responding to a given risk
c. the project manager most vulnerable to a given risk
d. the team member most vulnerable to a given risk


Answer: B

Effective project reporting requires ____.

Effective project reporting requires ____.



a. strong communication skills
b. staffing the project team
c. creating Gantt charts
d. assigning specific tasks to team members


Answer: A

For a project manager, reporting _____.

For a project manager, reporting _____.



a. involves controlling capital
b. includes informing management, users, and the project team about the progress of the project
c. consists of staffing, which includes selecting the project team and assigning specific tasks to team members
d. includes identifying and arranging project tasks and estimating completion times and costs


Answer: B

For a project manager, monitoring _____.

For a project manager, monitoring _____.



a. requires guiding, supervising, and coordinating the project team's workload
b. involves controlling capital
c. consists of staffing, which includes selecting the project team and assigning specific tasks to team members
d. includes identifying and arranging project tasks and estimating completion times and costs


Answer: A

A project manager's scheduling function _____.

A project manager's scheduling function _____.



a. involves guiding, supervising, and coordinating the project team's workload
b. includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target
c. involves staffing, which includes selecting the project team and assigning specific tasks to team members
d. includes identifying and arranging project tasks and estimating completion times and costs


Answer: C

A project manager's planning _____.

A project manager's planning _____.



a. involves guiding, supervising, and coordinating the project team's workload
b. includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target
c. consists of staffing, which includes selecting the project team and assigning specific tasks to team members
d. includes identifying project tasks and estimating completion times and costs


Answer: D

In the preliminary investigation report, the ____ section contains the results of the preliminary investigation, including a description of the project's scope, constraints, and feasibility.

In the preliminary investigation report, the ____ section contains the results of the preliminary investigation, including a description of the project's scope, constraints, and feasibility.



a. appendix c. case for action
b. introduction d. findings


Answer: D

In a preliminary investigation report, the ____ contain(s) a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.

In a preliminary investigation report, the ____ contain(s) a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.



a. introduction
b. systems request summary
c. expected benefits
d. time and costs estimates


Answer: A

A(n) _____, sometimes called a(n) _____, is another problem-solving tool often used by an analyst to look for a correlation between two variables.

A(n) _____, sometimes called a(n) _____, is another problem-solving tool often used by an analyst to look for a correlation between two variables.



a. Gantt chart, work breakdown structure
b. Fishbone diagram, Ishikawa diagram
c. Pareto chart, vertical bar graph
d. XY chart, scatter diagram


Answer: D

A survey is ____, generally takes less time, and can involve a broad cross-section of people.

A survey is ____, generally takes less time, and can involve a broad cross-section of people.



a. more flexible than a series of interviews, and it is less expensive
b. more flexible than a series of interviews, but it is more expensive
c. not as flexible as a series of interviews, but it is less expensive
d. not as flexible as a series of interviews, and it is more expensive


Answer: C

In sequence, the interviewing process involves a series of steps: ____, conduct the interview, document the interview, and evaluate the interview.

In sequence, the interviewing process involves a series of steps: ____, conduct the interview, document the interview, and evaluate the interview.



a. determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interview
b. establish objectives for the interview, develop interview questions, prepare for the interview, determine the people to interview
c. develop interview questions, prepare for the interview, determine the people to interview, establish objectives for the interview
d. prepare for the interview, determine the people to interview, establish objectives for the interview, develop interview questions


Answer: A

To avoid the problem of project creep, ____.

To avoid the problem of project creep, ____.



a. define project scope as vaguely as possible
b. leave project scope undefined
c. define project scope as clearly as possible
d. expand the focus beyond the problem at hand


Answer: C

___ is an example of a discretionary project.

___ is an example of a discretionary project.



a. Creating a new report for a user
b. Adding a report required by a new federal law
c. Including annual updates to payroll and tax percentages
d. Including quarterly changes in insurance reporting required by law


Answer: A

When assessing priorities for systems requests, a systems analyst should look for a high score in which of the following ____.

When assessing priorities for systems requests, a systems analyst should look for a high score in which of the following ____.



a. Will the proposed system diminish customer service?
b. Will the proposed system increase costs?
c. Will the proposed system result in less information for the organization?
d. Will the proposed system increase revenue for the company?


Answer: D

Of the measures of feasibility in the accompanying figure, issues that relate to ____ include "Has management established a firm timetable for the project?" and "Will a project manager be appointed?"

Of the measures of feasibility in the accompanying figure, issues that relate to ____ include "Has management established a firm timetable for the project?" and "Will a project manager be appointed?"



a. schedule feasibility
b. technical feasibility
c. economic feasibility
d. operational feasibility


Answer: A