Deck 1: Technician Essentials and PC Anatomy

Full screen (f)
exit full mode
Question
Firmware is a type of dedicated software on a hardware memory device used to control hardware by receiving instruction input from software applications.
Use Space or
up arrow
down arrow
to flip the card.
Question
The BIOS chip can save user data changes made to applications such as games and office programs.
Question
A common point of system failure on a laptop computer is the TV Tuner card.
Question
The final step to the six-step troubleshooting process defined by CompTIA is to verify the fixes to the system functionality and implement any possible preventative measures to avoid repetition of the issue.
Question
In troubleshooting, an example of testing a theory to determine the cause might be to swap out a suspected bad component with a known good component.
Question
An antistatic wrist strap would be used to remove dust particles from a dirty computer screen.
Question
Loopback plugs check input/output functions by connecting transmission pins to receive pins to see if the port is physically working properly.
Question
As a first step in troubleshooting, and before attempting to establish how to fix a reported computer issue, the technician should question the user about the symptoms to identify the problem as exactly as possible.
Question
Examples of inputs include all the following: Touch sensitive screens, keyboards, fingerprint readers, mouse, voice recognition microphones, and optical/kinetic recognition devices.
Question
The failure of a CMOS battery can cause catastrophic failure of the motherboard and thus the entire computer system.
Question
If you do not see, hear, or feel any static electricity discharged from your finger to a computer device, it is safe to assume that no damage has occurred.
Question
On a laptop computer, an add-on card, such as an ExpressCard, can cause the system not to boot.
Question
Which of the following features are found almost exclusively on laptop computers? (Choose all that apply.)

A) PCIe slot
B) ExpressCard slot
C) USB ports
D) DVD drive
E) Port cluster
F) Touchpad
Question
Which of the following features may be visible from the front of a desktop computer? (Choose all that apply.)

A) Card reader
B) DVI-D port
C) USB ports
D) DVD drive
E) Port cluster
F) Audio ports
Question
You are preparing to upgrade the firmware in a system. Which of the following devices are likely to include a firmware chip? (Choose all that apply.)

A) DVD drive
B) USB card
C) RAID host adapter
D) Motherboard
E) Port cluster
F) Touchpad
Question
You examine a possibly failed motherboard to determine if the motherboard or a component connected to it has failed. Which of the following points of failure will you likely find on the motherboard? (Choose all that apply.)

A) CMOS battery
B) DVD drive
C) Capacitors
D) SATA cable
E) Power supply
Question
You evaluate a collection of add-on cards to determine which cards should be retained as spares. Obsolete cards that will be discarded include ISA cards and EISA cards for desktops, and for laptops, PC Cards that must use a special device to enable a network or modem cable to be connected to the card. The extension is known as a

A) Header cable
B) Gender changer
C) Port adapter
D) Express Card
E) Dongle
F) PCMCIA Card
Question
The CompTIA six-step troubleshooting process includes a step in which you "Verify full system functionality and, if applicable, implement preventative measures." Which number is this step?

A) Step 2
B) Step 1
C) Step 6
D) Step 5
E) Step 4
F) Step 3
Question
CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?

A) Establish a theory of probable cause.
B) Document findings, actions, and outcomes.
C) Test the theory to determine the cause.
D) Establish a plan of action to resolve the problem and implement the solution.
Question
You check the contents of your computer toolkit before performing internal upgrades on a desktop computer. Which of the following tools in your toolkit should you use to prevent ESD damage to internal components?

A) Cable tester
B) Wrist strap
C) Loopback plugs
D) Torx drivers
E) Multimeter
F) Crimper
Question
You check the contents of your computer toolkit before performing upgrades on a desktop computer. Which of the following tools in your toolkit should you use to verify proper operation of the power supply?

A) Cable tester
B) Wrist strap
C) Loopback plugs
D) Torx drivers
E) Multimeter
F) Crimper
Question
Of the following all but one represent the three main categories of a computer system. Which one is not a main component category?

A) Hardware
B) Firmware
C) Display system
D) Software
Question
Of the following, which operating system is considered to be open source?

A) Windows XP
B) Apple iOS
C) Linux
D) Windows 7
E) Windows Vista
Question
Operating system commands are considered to have two types. Which one of the following pairings represents the labels used to describe these two types of commands?

A) Internal/external
B) Intrinsic/extrinsic
C) Software/hardware
D) System/application
E) 32 bit/64 bit
Question
Of the following, which would be considered system utilities?

A) CHKDSK
B) Defrag
C) Delete
D) Dir
E) Disk Management
Question
Toolkits generally have _____ for the removal and replacement of jumpers.

A) Hex drivers
B) Three-claw parts retrieval tool
C) Eyebrow tweezers
D) Torx driver
Question
Which of the following can prevent the discharge of ESD? (Choose all that apply.)

A) Antistatic wrist strap
B) Touching the chassis of the computer
C) Antistatic mat
D) Antistatic bags
Question
CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?

A) Establish a theory of probable cause.
B) Document findings, actions, and outcomes.
C) Test the theory to determine the cause.
D) Establish a plan of action to resolve the problem and implement the solution.
Question
A technician has booted up the 5-year-old computer of a user who complains that the system suddenly no longer uses of his add-on audio card. Upon booting, the technician notices that the system time is 10 years in the past. Which one of the following is a probable cause to investigate?

A) The network time server is down.
B) The synchronization with atomic clock has failed.
C) The user changed the time to avoid passing the expiration date on a trial piece of software.
D) The CMOS battery has failed.
Question
What is the part of the computer system that receives inputs, directs those inputs to the processor, and redirects the processed data to outputs called at?

A) CPU
B) Interface card
C) Controller chip
D) Southbridge
E) System Board
F) PCI Mastering
Question
Which of the following is likely to have a firmware component? (Choose all that apply.)

A) Video card
B) Printer
C) Network Interface Card
D) Motherboard
Question
Match the following procedures to the tools needed:

-Verify correct voltage from power supply.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Question
Match the following procedures to the tools needed:

-Clean the power supply and case fans.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Question
Match the following procedures to the tools needed:

-Test I/O ports.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Question
Match the following procedures to the tools needed:

-Research a BSOD (STOP) error.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Question
Match the following procedures to the tools needed:

-Test the network cable.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Question
Match the following network installation functions with the correct tool:

-Checks cable continuity and wire-pair configuration.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Question
Match the following network installation functions with the correct tool:

-Use to set a UTP cable into a wall jack (keystone jack).

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Question
Match the following network installation functions with the correct tool:

-Use this to test the transmit/receive functions of a network card.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Question
Match the following network installation functions with the correct tool:

-Within a batch of cables, use this to locate or match up a cable from one end of a long run with the other end of the cable.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Question
Match the following network installation functions with the correct tool:

-Use to remove the protective outer sheath of a cable.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Question
Match the following network installation functions with the correct tool:

-Use to attach cable wires to a connector.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Question
Order the following troubleshooting steps by placing them in the right order:

A) Identify the problem.
B) Establish a theory of probable cause.
C) Test the theory to determine the cause.
D) Establish a plan of action to resolve the problem and implement a solution.
E) Verify full system functionality, and where possible implement preventative measures.
F) Document finds, actions, and outcomes.
Question
Order the following scenario actions as they would be done by a technician following the six-step troubleshooting process:

A) Interview the user who indicates that his printer is printing poorly. Asked a few questions to determine that the quality of the print output is light or missing.
B) Given that the printer receives data and attempts to print, the technician suspects that there is an issue with the toner cartridge, perhaps being low on ink toner.
C) Call the user to get the exact model number of the printer in use. Replace the ink toner cartridge with a new one that appears to fix the issue. Try the old cartridge in another printer of the same model to see if it replicates the problem.
D) Decide to leave the new cartridge in the printer.
E) Test the new cartridge by using the printer test page option and from a word processor to verify application functionality.
F) Enter the information on the office number, user's name, model number of the printer, and the date of the toner cartridge replacement. Determine that the old print cartridge if shaken can still be used for a limited number of copies. Was it placed on the shelf to be used as a test cartridge? Discover that this user used ink toner at twice the rate of other users. Recommend a different printer device that is more economical on ink consumption.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Technician Essentials and PC Anatomy
1
Firmware is a type of dedicated software on a hardware memory device used to control hardware by receiving instruction input from software applications.
True
2
The BIOS chip can save user data changes made to applications such as games and office programs.
False
3
A common point of system failure on a laptop computer is the TV Tuner card.
False
4
The final step to the six-step troubleshooting process defined by CompTIA is to verify the fixes to the system functionality and implement any possible preventative measures to avoid repetition of the issue.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
In troubleshooting, an example of testing a theory to determine the cause might be to swap out a suspected bad component with a known good component.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
An antistatic wrist strap would be used to remove dust particles from a dirty computer screen.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
Loopback plugs check input/output functions by connecting transmission pins to receive pins to see if the port is physically working properly.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
As a first step in troubleshooting, and before attempting to establish how to fix a reported computer issue, the technician should question the user about the symptoms to identify the problem as exactly as possible.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
Examples of inputs include all the following: Touch sensitive screens, keyboards, fingerprint readers, mouse, voice recognition microphones, and optical/kinetic recognition devices.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
The failure of a CMOS battery can cause catastrophic failure of the motherboard and thus the entire computer system.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
If you do not see, hear, or feel any static electricity discharged from your finger to a computer device, it is safe to assume that no damage has occurred.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
On a laptop computer, an add-on card, such as an ExpressCard, can cause the system not to boot.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following features are found almost exclusively on laptop computers? (Choose all that apply.)

A) PCIe slot
B) ExpressCard slot
C) USB ports
D) DVD drive
E) Port cluster
F) Touchpad
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following features may be visible from the front of a desktop computer? (Choose all that apply.)

A) Card reader
B) DVI-D port
C) USB ports
D) DVD drive
E) Port cluster
F) Audio ports
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
You are preparing to upgrade the firmware in a system. Which of the following devices are likely to include a firmware chip? (Choose all that apply.)

A) DVD drive
B) USB card
C) RAID host adapter
D) Motherboard
E) Port cluster
F) Touchpad
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
You examine a possibly failed motherboard to determine if the motherboard or a component connected to it has failed. Which of the following points of failure will you likely find on the motherboard? (Choose all that apply.)

A) CMOS battery
B) DVD drive
C) Capacitors
D) SATA cable
E) Power supply
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
You evaluate a collection of add-on cards to determine which cards should be retained as spares. Obsolete cards that will be discarded include ISA cards and EISA cards for desktops, and for laptops, PC Cards that must use a special device to enable a network or modem cable to be connected to the card. The extension is known as a

A) Header cable
B) Gender changer
C) Port adapter
D) Express Card
E) Dongle
F) PCMCIA Card
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
The CompTIA six-step troubleshooting process includes a step in which you "Verify full system functionality and, if applicable, implement preventative measures." Which number is this step?

A) Step 2
B) Step 1
C) Step 6
D) Step 5
E) Step 4
F) Step 3
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?

A) Establish a theory of probable cause.
B) Document findings, actions, and outcomes.
C) Test the theory to determine the cause.
D) Establish a plan of action to resolve the problem and implement the solution.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
You check the contents of your computer toolkit before performing internal upgrades on a desktop computer. Which of the following tools in your toolkit should you use to prevent ESD damage to internal components?

A) Cable tester
B) Wrist strap
C) Loopback plugs
D) Torx drivers
E) Multimeter
F) Crimper
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
You check the contents of your computer toolkit before performing upgrades on a desktop computer. Which of the following tools in your toolkit should you use to verify proper operation of the power supply?

A) Cable tester
B) Wrist strap
C) Loopback plugs
D) Torx drivers
E) Multimeter
F) Crimper
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
Of the following all but one represent the three main categories of a computer system. Which one is not a main component category?

A) Hardware
B) Firmware
C) Display system
D) Software
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
Of the following, which operating system is considered to be open source?

A) Windows XP
B) Apple iOS
C) Linux
D) Windows 7
E) Windows Vista
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
Operating system commands are considered to have two types. Which one of the following pairings represents the labels used to describe these two types of commands?

A) Internal/external
B) Intrinsic/extrinsic
C) Software/hardware
D) System/application
E) 32 bit/64 bit
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
Of the following, which would be considered system utilities?

A) CHKDSK
B) Defrag
C) Delete
D) Dir
E) Disk Management
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
Toolkits generally have _____ for the removal and replacement of jumpers.

A) Hex drivers
B) Three-claw parts retrieval tool
C) Eyebrow tweezers
D) Torx driver
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following can prevent the discharge of ESD? (Choose all that apply.)

A) Antistatic wrist strap
B) Touching the chassis of the computer
C) Antistatic mat
D) Antistatic bags
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?

A) Establish a theory of probable cause.
B) Document findings, actions, and outcomes.
C) Test the theory to determine the cause.
D) Establish a plan of action to resolve the problem and implement the solution.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
A technician has booted up the 5-year-old computer of a user who complains that the system suddenly no longer uses of his add-on audio card. Upon booting, the technician notices that the system time is 10 years in the past. Which one of the following is a probable cause to investigate?

A) The network time server is down.
B) The synchronization with atomic clock has failed.
C) The user changed the time to avoid passing the expiration date on a trial piece of software.
D) The CMOS battery has failed.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
What is the part of the computer system that receives inputs, directs those inputs to the processor, and redirects the processed data to outputs called at?

A) CPU
B) Interface card
C) Controller chip
D) Southbridge
E) System Board
F) PCI Mastering
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is likely to have a firmware component? (Choose all that apply.)

A) Video card
B) Printer
C) Network Interface Card
D) Motherboard
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
Match the following procedures to the tools needed:

-Verify correct voltage from power supply.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
Match the following procedures to the tools needed:

-Clean the power supply and case fans.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
Match the following procedures to the tools needed:

-Test I/O ports.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
Match the following procedures to the tools needed:

-Research a BSOD (STOP) error.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
Match the following procedures to the tools needed:

-Test the network cable.

A) Multimeter
B) Compressed air
C) Loopback test
D) Knowledge Base website
E) Cable tester
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
Match the following network installation functions with the correct tool:

-Checks cable continuity and wire-pair configuration.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
Match the following network installation functions with the correct tool:

-Use to set a UTP cable into a wall jack (keystone jack).

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
Match the following network installation functions with the correct tool:

-Use this to test the transmit/receive functions of a network card.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
Match the following network installation functions with the correct tool:

-Within a batch of cables, use this to locate or match up a cable from one end of a long run with the other end of the cable.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
Match the following network installation functions with the correct tool:

-Use to remove the protective outer sheath of a cable.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
Match the following network installation functions with the correct tool:

-Use to attach cable wires to a connector.

A) Cable tester
B) Punch Down tool
C) Loopback plug
D) Toner probe
E) Wire stripper
F) Crimper
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
Order the following troubleshooting steps by placing them in the right order:

A) Identify the problem.
B) Establish a theory of probable cause.
C) Test the theory to determine the cause.
D) Establish a plan of action to resolve the problem and implement a solution.
E) Verify full system functionality, and where possible implement preventative measures.
F) Document finds, actions, and outcomes.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
Order the following scenario actions as they would be done by a technician following the six-step troubleshooting process:

A) Interview the user who indicates that his printer is printing poorly. Asked a few questions to determine that the quality of the print output is light or missing.
B) Given that the printer receives data and attempts to print, the technician suspects that there is an issue with the toner cartridge, perhaps being low on ink toner.
C) Call the user to get the exact model number of the printer in use. Replace the ink toner cartridge with a new one that appears to fix the issue. Try the old cartridge in another printer of the same model to see if it replicates the problem.
D) Decide to leave the new cartridge in the printer.
E) Test the new cartridge by using the printer test page option and from a word processor to verify application functionality.
F) Enter the information on the office number, user's name, model number of the printer, and the date of the toner cartridge replacement. Determine that the old print cartridge if shaken can still be used for a limited number of copies. Was it placed on the shelf to be used as a test cartridge? Discover that this user used ink toner at twice the rate of other users. Recommend a different printer device that is more economical on ink consumption.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 44 flashcards in this deck.