Beruflich Dokumente
Kultur Dokumente
Hardware
Answer: C. As the POST (power-on self-test) checks all the components of the computer, it may present
its findings on the screen or in the form of beep codes. The complementary metaloxide semiconductor
(CMOS) stores information such as time and date and BIOS passwords. RTC stands for real-time clock; it
is the device that keeps time on the motherboard. Windows generates all kinds of error codes but not
beep codes. The beep codes come from the POST, which happens before Windows boots.
7. What are they good for?
To identify which device is not working. The Hardware Manual for that specific computer model
specifies what each beep code means.
8. You want to upgrade memory in your computer. Which of the following is user-replaceable
memory in a PC?
A. CMOS
B. BIOS
C. DRAM
D. SRAM
E. ROM
Answer: C. Dynamic Random Access Memory (DRAM) is the modules (or sticks) of memory that you can
install into a motherboard. SDRAM, DDR, DDR2, and DDR3 are all examples of DRAM. The
complementary metal-oxide semiconductor (CMOS) is a chip that is soldered onto the motherboard that
works in conjunction with the Basic Input/Output System, another chip soldered on to the motherboard.
Static RAM (SRAM) is memory that is nonvolatile (as opposed to DRAM); it is also soldered to the circuit
board. Read-Only Memory (ROM) is usually not serviceable. The BIOS resides on a ROM chip, more
specifically an electrically erasable programmable ROM (EEPROM) chip.
9. Which of the following types of printers uses toner?
A. Impact
B. Laser
C. Inkjet
D. Thermal
Answer: B. The laser printer uses toner. Impact printers use ribbon, inkjet printers use ink cartridges,
and thermal printers use specially coated paper.
10. You need to replace and upgrade the memory card in a smartphone. Which type of memory
does the smartphone most likely use?
Answer: Smartphones typically use Secure Digital (SD) cardsmore to the point, microSD cards.
Operating System
1. What is the main advantage of selecting a 64-bit operating system over a 32-bit operating
system?
Answer: The ability to access more than 4 GB of RAM. If you want to access more than 4 GB of RAM, you
will need a 64-bit operating system. 32-bit OSes are limited to 4 GB of RAM, and in some cases 3.25 GB.
Many computers today, especially custom computers such as virtualization systems and gaming
computers, require more than 4 GB of RAM so a 64-bit operating system is the only choice.
2. What does a yellow exclamation point next to a device in the Device Manager indicate?
Answer: If you see a yellow exclamation point in the Device Manager, this indicates that the device does
not have a proper driver. If the device is disabled, it will have either a down arrow (for Windows 7/Vista)
or a red x (Windows XP). If a driver was not digitally signed, the device might show up in the Unknown
devices category until it is installed properly. If a device has a working driver, then upgrading it will be up
to you, but you wont necessarily be notified of this.
3. What is the command that allows you to open the Windows registry?
Answer: regedit
4. When you open the Windows Registry you can see a tree structure categorized in five basic
hives. Please name one.
Possible answers: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS,
HKEY_CURRENT_CONFIG.
5. By default Windows 7 Professional and Enterprise has a feature that allows you to restore
system files to a earlier point in time. Do you remember its name?
Answer: System Restore, that helps you restore your computer's system files to an earlier point in time.
Typically, you want to restore your computer to a restore point that was created just before the date
and time when you started noticing problems. The descriptions of the restore points that are created
automatically correspond with the name of an event, such as Windows Update installing an update.
System Restore returns your computer to the state that it was in before the restore point that you
choose.
6. How can you access it?
Answers: From the Start menu right click on Computer, go to Properties, then System Protection and
System Restore / From the Start menu go to the search box, type System Restore, and then, in the list of
results, click System Restore.
7. What is the event viewer and how you can access it?
Answer: Event Viewer is a tool that displays detailed information about significant events (for example,
programs that don't start as expected or updates that are downloaded automatically) on your
computer. Event Viewer can be helpful when troubleshooting problems and errors with Windows and
other programs. The command to open it up is eventvwr.
8. How can you get to know that the precise application takes of lot of CPU and makes the whole
computer very slow.
Answer: By opening and using the task manager.
9. On a terminal server can you log off another user? If so how
Answer: yes, from the task manager Users highlight the user and disconnect / log off.
10. What is Active Directory?
Answer: Active Directory (AD) is a directory service that Microsoft developed for Windows domain
networks and is included in most Windows Server operating systems as a set of processes and services.
An AD domain controller authenticates and authorizes all users and computers in a Windows domain
type networkassigning and enforcing security policies for all computers and installing or updating
software. For example, when a user logs into a computer that is part of a Windows domain, Active
Directory checks the submitted password and determines whether the user is a system administrator or
normal user
11. Name four type of objects that you can search for in AD
Possible Answers: Users, computers, groups, printers, shared folders, Organizational Units, Remote
Installation Servers, Remote Installation Clients
12. In order to perform a network installation of Windows, which of the following must be
supported by the computers network interface card?
A. PXE
B. PCI
C. PCL
D. PnP
Answer: A. Network installations require that the network card be configured for Preboot Execution
Environment (PXE). This allows the network card to boot off of the network, locate a network
installation server, and request that the installation begin. This configuration might be done in the BIOS
of the computer (if the network adapter is integrated to the motherboard), within a special program in
Windows, or one that boots from CD (if the network adapter is an adapter card). Peripheral Component
Interconnect (PCI) is an expansion bus that accepts network adapter cards, sound cards, and so on. PCL
stands for Printer Command Language, developed by HP so a computer can properly communicate with
dot matrix or thermal printers. PnP stands for Plug n Play, a Windows technology that allows devices to
be located and installed automatically.
1. From a software point of view what is an office suite? Please name two currently in use
Answer: An office suite is a collection of bundled productivity software (a software suite)
intended to be used by knowledge workers. The components are generally distributed together,
have a consistent user interface and usually can interact with each other, sometimes in ways
that the operating system would not normally allow.
Desktop suites:
Free: Apache OpenOffice, Calligra Suite, LibreOffice, NeoOffice
Proprietary: MobiSystems OfficeSuite, ThinkFree Office, iWork, Kingsoft Office,
Microsoft Office, SoftMaker Office, WordPerfect Office, ConceptDraw Office
Discontinued: AppleWorks, Corel Home Office, Go-oo, IBM Lotus SmartSuite, IBM Lotus
Symphony, IBM Workplace Managed Client, KOffice, Microsoft Works, OpenOffice.org, Siag
Office, StarOffice/Oracle Open Office
Mobile suites:
Proprietary: Documents To Go, Kingsoft Office, iWork, Microsoft Office Mobile, Polaris
Office, Quickoffice, SoftMaker Office, ThinkFree Mobile
Online suites:
Free: Feng Office CE, Tiki Wiki CMS Groupware
Proprietary: Cloud@Mail.Ru, Google Docs, iWork.com, Office Online, ShareOffice,
ThinkFree Online, Zoho Office Suite
2. Can you name five Microsoft Office 2013 (Professional Plus version) applications?
Possible answers: Word, Excel, PowerPoint, Outlook, Access, OneNote, Publisher, Lync and
InfoPath.
3. Which of the following Server Operating Systems is not correct?
A: Windows Server 2003
B: Windows Server 2003 R2
C: Windows Server 2005
D: Windows Server 2012
Answer: C
4. Please name 3 different email client applications to be used under MS Windows
Possible answers: Outlook express, Outlook, Lotus Notes, Mozilla Thunderbird, eM Client, Inky,
Claws Mail, Novell,
5. On a client computer a user cant open Outlook: s/he only sees that screen with the logo and
nothing happens. Another colleague can work with that application on the same machine. What
would you do first to troubleshoot this?
Answer: Recreate his/her Outlook profile. Either from the start menu control panel Mail
Show profiles, or renaming the Outlook folder on %userprofile%\AppData\Local\Microsoft
6. A user calls in with the following window:
9. What would you do first if an Intranet site prompts for your credentials when browsing with the
Internet Explorer?
Answer: Check if the site has been added to Local Intranet zone in Internet Options.
10. If a user calls you claiming that he cant open pdf files inside the Internet Explorer what would
you check first, taking into account that he uses Adobe Acrobat 9?
Answer: In Adobe Acrobat go to Edit Preferences Internet and uncheck the box Allow fast web view
or uncheck the box that states Display PDF in browser.
Networking
Function
-t
Pings the specified host until stopped. To see statistics and continue type ControlBreak. To stop type Control-C.
-a
-f
-w
Possible answers: IMAP (Internet Message Access Protocol), POP (Post Office Protocol), MAPI
(Messaging Application Programming Interface), SMTP (Simple Mail Transfer Protocol).
5. What are advantages of using the Dynamic Host Configuration Protocol (DHCP)?
IP addresses can be managed from a central location.
Computers can automatically get new addressing when moved to a different network segment.
Answers: Advantages of using DHCP include: IP addresses can be managed from a central location and
computers can automatically get new addressing when moved to a different network segment (perhaps
one that uses a different DHCP server). Quality of Service (QoS) adjusts the network speed based on the
type of traffic generated. DHCP has nothing to do with the Hosts.txt file; that file contains static entries
of hostname to IP address conversions. Media Access Control addresses are usually not changed on a
network adapter, although they can be masked. MAC filtering maintains a list of MAC addresses that are
allowed to access a network, but once again, this is a different concept from DHCP.
6. Which of the following is a valid IPv4 address for a network host?
A. 127.0.0.1
B. 169.254.0.0/16
C. 172.17.58.254
D. 255.10.15.7
Answer: C. Of the answers listed, 172.17.58.254 is the only valid IPv4 address for a network host. A host
on the network is any computer or network device that uses an IP address to communicate with other
computers or devices (hosts). 172.17.58.254 is a Class B private IP address so it fits the description of a
valid IPv4 address for a network host. 127.0.0.1 is the local loopback address. Every computer using
TCP/IP gets this address; it is used for testing. It cannot be used to communicate with other hosts on the
network. 169.254.0.0/16 means an IP address of 169.254.0.0 with a default subnet mask of 255.255.0.0,
indicating the network number is 169.254. It is not a valid host IP address because it ends in 0.0. The
first IP address of a network is always reserved for the network number; it can not be used by a host.
Otherwise, if the address was, say, 169.254.0.1, the address would work, but because it is an APIPA
address, it would be able to communicate only with other systems using APIPA addresses. 255.10.15.7 is
not valid. That address is within the Class E reserved range. Normal host IP addresses first octet will
either be between 1 and 126, or 128 and 223, but not between 224 and 255.
7. Which of the following IP addresses would you see if a computer is connected to a multifunction
network device and is attempting to obtain an IP address automatically but is not receiving an IP
address from the DHCP server?
A. 172.16.10.10
B. 192.168.0.10
C. 169.254.10.10
D. 192.168.10.10
Answer: C. If the computer fails to obtain an IP address from a DHCP server, Windows will take over and
apply an Automatic Private IP Address (APIPA). This address will be on the 169.254.0.0 network. All of
the other addresses could possibly be obtained from a DHCP server. 172.16.10.10 is a Class B private IP.
192.168.0.10 and 192.168.10.10 are Class C private IP addresses.
8. What is the main difference between a switch and a router?
Answer: A switch interconnects devices on the same network so that they can communicate, whereas a
router interconnects one or more networks. Remember that the switch is in charge of connecting
devices on the LAN. But the router is in charge of connecting the LAN to another LAN, to the Internet, or
to both. Multifunction network devices make matters confusing; they combine the functionality of a
switch, a router, a wireless access point, and a firewall. Physically, the four-port section of the device is
the switch portion and the single port that leads to the Internet is the router portion.
Scenarios