Popular Posts

7/25/2012

Basic Linux Shell Script Part 1


Hello Guy Today I'll show you some Basic Linux shelll script.
Open and test the below script :

#### Introduction to Shell Script ..!
======================================= By Mr. Dara ....
### Basic Linux Commands ####

1. tty - reveals the current terminal
2. whoami - reveals the currently logged-in user
3. which - reveals where in the search path a program is located
4. echo - print to the screen
a. echo $PATH - dumps the current path to STDOUT
5. set - prints and optionally sets shell variables
6. clear - clear the screen or terminal
7. reset - resets the screen buffer
8. history - reveals your command history
a. !690 - executes the 690th command in our history
b. command history is maintained on a per-user basis via:
~/.bash_history
~ = users's $HOME directory in the BASH shell
9. pwd - prints the working directory
10. cd - changes directory to the desired directory
a. 'cd ' with no options changs to the $HOME directory 'Destop'
b. 'cd ~' change to $HOME directory
c. 'cd /' change to the root of the file system
d. 'cd Desktop/' changes us to the relative directory 'Desktop'
e. 'cd ..' changes us one-level up in the directory tree
f. 'cd ../..' chage us two-level up in the direcoty tree
11. Arrow Keys (up and down) navigates through your command history
12. BASH Supports tap completion:
a. type unique charaters in the command and press 'Tab' key
13. You can copy and paste in GNOME terminal and window using :
a. left button to block
b. right button to paste OR Ctrl-Shift-v to paste

14. ls - list files and directories
a. ls / - list the contents of the '/' mount point
b. ls -l - list the contents of a directory in long format :
Include: permissions, links, ownership, size, date, name
c. ls -ld /etc - list the properties of the directory '/etc', NOT the contents of '/etc'
d. ls -ltr - sort chronologically from older to newer (bottom)
e. ls --help - returns possible usage information
f. ls -a - reveals hidden files. e.g.. 'bash_history'
Note: files/directories prefixed with '.' are hidden. e.g. '.bash_history'

15. cat - catenates files
a. cat 123.txt - dumps the contents of '123.txt' to STDOUT
b. cat 123.txt 456.txt dumps both files to STDOUT
c. cat123.txt 456.txt > 123456.txt - create new catenated file

16. mkdir - creates a new directory
a. mkdir dara - creates a 'dara' directory

17. cp - copies files
a. cp 123.txt dara/
by default, 'cp' does NOT preserve the original modification time
b. cp -v 456.txt dara/

18. mv - moves files
a. mv 123456.txt dara/ - moves the file, preserving timestamp

19. rm - removes files/directories
a. rm 123.txt
b. rm -rf 456.txt - removes recursively and enforces

20. touch - creates blank file/updates timestamp
a. touch test.txt - will create a zero-byte file, if it doesn't exit
b. touch 123456.txt - will update the timestamp
c. touch -t 201201011530 123456.txt - change timestamp
21. stat - reveals statistics of tiles
a. stat 123456.txt - reveals full attributes of the file

22. find - finds files using search patterns
a. find / -name 'fstap'
Note : 'find' can search for fields returned by the 'stat' command
23. alias - returns/sets a liases for commands
a. alias - dumps current aliases
b. alias copy='cp -v'



#### Thanks for first step ..## wait to see the next Lesson ..

Final Exam ITE Chapter 1 - 10 (Question and Answer)

Final Exam ITE Chapter 1 - 10 (Question and Answer)

1. After Windows XP has been installed, which program would a technician use to select the programs that will run at startup?
ntldr
regedit
msconfig
Task Manager

2. Which power management method offers the most power management features?
ACPI
AMP
APM
UPS
WPM

3. A Windows XP laptop user finds that the low battery alarm does not give enough warning. Where can the user adjust the alarm setting to issue an earlier warning?
in Power Options Properties
in the BIOS
in the System Tray on the desktop
on the battery

4. A new application fails to install from a CD known to be virus-free and compatible with the operating system. What is a possible solution to this problem?
Use the Last Known Good Configuration.
Update the operating system from the Windows Update website.
Close all other running programs before installing the new application.
Run the installation application under Windows XP compatibility mode.

5. A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem?
Power cycle the printer.
Download and install a new printer driver.
Replace the paper in the input tray with new paper.
Remove and replace the primary corona wire.

6. When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts?
glass cleaner
isopropyl alcohol
mild detergent
rubbing alcohol
slightly abrasive cleanser

7. Which protocol dynamically assigns IP addresses to network devices?
DHCP
DNS
ICMP
RARP
TCP

8. A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message indicating the I/O address of the failing device.

9. Which two items are considered proper cleaning tools? (Choose two.)
compressed air
antistatic mat
soft cloth
antistatic wrist strap
flat-head screwdriver

10. What characterizes spoofing?
Making data appear to come from a source other than the actual source.
Sending abnormally large amounts of data to a remote server to prevent user access to the server services.
Intercepting or inserting false information in traffic between two hosts.
Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.


11. Refer to the exhibit. What type of device is highlighted in white?
touch pad
mouse
biometric authentication
Bluetooth

12. What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
low latency network connection
secure Web server
Internet access
PSTN access
VPN client

13. Which environmental factor helps ensure optimal performance for laptops?
The humidity level should always be below 20 percent.
Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheating.
In dusty conditions, laptop vents should be partially covered to prevent the internal components from getting dirty.
Laptops should be cleaned every month or the internal components will be damaged.

14. What must be done before a technician cleans a very dirty LCD screen on a laptop?
Place the laptop in standby mode.
Remove the screen from the laptop.
Remove the battery.
Enable the autoclean setting in the BIOS.

15. A technician has been asked to find how a hacker keeps breaking in to a computer. Which security precaution was most likely missed when the operating system was first installed?
A user account was not created.
The hard drive was not formatted with NTFS.
The OS product key was not entered.
A password was not assigned to the default administrator account.

16. Which type of power connector is used to connect devices such as optical drives and hard drives?
20-pin
24-pin
Berg
Molex
P8
P9

17. A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
The total cost of the new solution is considerably lower.
Data is more secure in the event of hardware failures.
Individual users are in control of their own computers and network resources.
Data resources and access are centrally controlled.
Personnel costs are lower because a dedicated network administrator is no longer necessary.


18. Refer to the exhibit. Which type of removable media is depicted?
hard disk
USB optical drive
PC card
flash drive

19. Which three rules increase the level of password strength? (Choose three.)
Passwords should never expire.
Passwords should be a combination of letters and numbers.
Passwords should combine a user's special dates and initials so they can be alphanumeric.
Passwords should be changed by the user after specific periods of time.
Password expiration and lockout policies should be clearly defined.
Passwords should be short to reduce the chances of users forgetting them.

20. A customer reports poor telephone communications when using a copper telephone line that also has a DSL service. What is the most likely cause of the problem?
The DSL modem is incorrectly configured.
The DSL filter is faulty or not connected.
The HSDPA (High Speed Data Packet Access) is interfering with the telephone operation.
The telephone does not comply with the IEEE 802.15.1 standard.

21. A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network media should be recommended?
Category 5e
coaxial
fiber optic
UTP

22. Which option is the most secure type of user authentication?
smart card
username and encrypted password
signature files
fingerprint scanner

23. Which type of scanner generally has high costs but produces top-quality images?
all-in-one
drum
handheld
flatbed

24. When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
A
B
C
D
E

25. Fans that are used to help cool a system are commonly placed on which two components? (Choose two.)
sound card
CMOS
video card
RAID card
CPU

26. Which three customizable properties are available when right-clicking the Windows XP My Computer desktop icon and selecting Properties? (Choose three.)
virtual memory settings
automatic updates settings
hard drive properties
computer name
display properties
startup properties

27. A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing?
44.1 MHz
100 MB/s
3 GHz
1 TB

28. What are two functions of a VPN gateway? (Choose two.)
establish secure VPN connections
provide remote user access to the VPN client software
manage VPN tunnels
ensure low latency connections to VPN clients
establish high bandwidth WAN connections to the Internet

29. A laptop user has noticed that connecting an external monitor, keyboard, and speaker each day is causing damage to the laptop connectors. What can the user do to prolong the life of the connectors?
Obtain devices which are specially designed for heavily used laptops.
Use only PCI devices.
Attach all of the devices to a USB hub.
Use a docking station.

30. Which two interface types make it possible to attach different external components to laptops and desktops without powering the computer off? (Choose two.)
ExpressCard
FireWire
ISA
PCI
PCMCIA
USB

31. A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacked and packaged for shipping. What advice should a technician give the customer?
The resolution of an inkjet printer is too low for this work.
An inkjet printer has limited color capability.
Immediately after printing, the ink is wet.
An inkjet printer is a high cost option.


32. Refer to the exhibit. Which type of device uses the connector shown in the graphic?
DVD drive
keyboard
NIC
RAM
sound card

33. A customer who owns a business that creates high-quality color graphic images wants a new printer. The customer already has an ink-jet printer. Which type of printer would be a good recommendation?
dot-matrix
solid-ink
daisy-wheel
thermal

34. Which three things should be investigated first when troubleshooting a printer? (Choose three.)
equipment power
corrupt print driver
low-ink warning
out of paper
operating system compatibility
firmware version

35. A technician is planning to convert a file system from FAT32 to NTFS. What step should be taken before doing the conversion?
Create a complete system backup.
Backup the registry.
Set a System Restore Point.
Create an Emergency Repair Disk.

36. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to use correct this problem?
Task Manager
Add or Remove Programs
Event Viewer
System Restore

37. A technician needs to purchase a new video adapter for a computer. Which factors should be considered when selecting the adapter?
type of hard drive installed
amount of memory installed
expansion slot type
case form factor

38. The driver for a network interface card has been updated on a Windows XP computer. All network access has been lost. Which steps in the Windows XP Classic View should be followed to roll back the network interface card driver?
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Double-click the NIC adapter. Click the Driver tab. Click the Roll Back Driver button.
Choose Start > Settings > Control Panel. Double-click Network Connections. Right-click the NIC. Choose Properties > Uninstall.
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Choose Action > Uninstall.
Choose Start > Settings > Control Panel. Double-click Add or Remove Programs. Click Change.

39. A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
Replace the toner or ink cartridge.
Uninstall and reinstall the printer driver.
Replace the paper with some from a new ream.
Delete the print job from the queue and print again.

40. Why does the cable from the power supply to the motherboard have different colored wires?
A single wire could not carry enough current.
There is one wire for each motherboard component.
Each wire carries a different voltage.
The motherboard slot requires the number of wires that are represented by the different colors.

41. What is the best way to fully ensure that data is unable to be recovered from a hard drive?
formatting the drive
deleting the partitions on the hard drive
overwriting data multiple times, rendering the data unusable
shattering the hard drive platters with a hammer

42. Which key or key sequence pressed during the boot process will allow a user to restart a Windows PC using the last known good configuration?
F1
F8
F12
Alt-Z
Windows key

43. What is the purpose of using thermal compound when installing a CPU, a heat sink, and a fan assembly on a motherboard?
to insulate the CPU from the heat sink
to attach the heat sink firmly to the CPU
to conduct heat that is generated by the CPU to the heat sink
to ensure an electrical connection between the CPU and heat sink

44. The IT department reported that the web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which attack characterizes this type of situation?
adware
DDoS
phishing
social engineering
spyware

45. A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
The technician interrupted a number of times to ask questions.
The technician occasionally confirmed an understanding of the problem.
The customer was escalated to a level-two technician.
The technician ended the call without saying "Have a nice day".

46. Which type of cable standard uses a 9-pin connector and supports data rates in excess of 800 Mbps?
DB-9
DB-25
IEEE 1284
IEEE 1394a
IEEE 1394b

47. Which program checks for installed hardware during the Windows XP boot process?
HALL
NTLDR
NTDETECT
NTOSKRNL

48. At which TCP/IP model layer would a MAC address be found?
application
transport
internet
network access

49. A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation?
NTBOOTDD
HAL
NTSCSILDR
NTWINHAL

50. In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system?
Emergency Repair Disk (ERD)
Automated System Recovery (ASR)
Windows Recovery Manager (WRM)
Automated Windows Recovery (AWR)
System Restore (SR)


Thanks for your visit ..!

7/21/2012

ITE Exam chapter 10 (Question and Answer)

ITE Exam chapter 10 (Question and Answer)

1. Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
Use simple step-by-step instructions.
Explain possible causes of the problem to the customer.
Criticize the customer to prevent the possibility of repeating the problem in the future.
Ask to set up a conference call with a level-two technician.
Speak in plain terms.

2. Which common feature of helpdesk software allows a technician to control a customer computer from a call center desk?
online help files
contact database
bug reporting tools
call queue management
remote diagnostics utility

3. For a computer technician, what is the first step in resolving a customer problem?
brainstorming with co-workers
searching vendor support sites
reviewing technical documentation
speaking directly with the customer

4. Where would legal details be found that describe proper handling of information for a specific customer?
SLA
Netiquette rules
customer support call transcripts
employee confidentiality agreement

5. While servicing a computer, a technician notices that a document labeled "confidential" is open on the computer. What should the technician do?
Call another user to check the file.
Step away from the computer and ask the user to close the document.
Minimize the document and pretend not to notice it.
Report the situation to the manager responsible for the user.
Close the file without saving any changes to the file.

6. Which task would be the responsibility of a level-two technician?
resolving computer problems that are limited to software errors
gathering information from the customer
directing the customer to the appropriate computer vendor for help
resolving computer problems that require opening up the computer

7. Why is good communication a critical part of successfully troubleshooting customer problems?
It helps technicians learn important details from the customer.
It ensures that customers will not complain about poor service.
It ensures that the technician is in high demand on the job market.
It reduces the need to rely on technical manuals and online research.

8. Which two actions are examples of good netiquette? (Choose two.)
Avoid beginning an e-mail with a formal greeting when it is a reply.
Help keep flame wars only for humanistic reasons.
Check grammar and spelling before sending e-mail.
Use mixed case in e-mail instead of all upper case or all lower case.
Reply to flames but not via e-mail.

9. Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
your name
ticket number
impressions of the customer
customer name
department name
part numbers

10. Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.)
Take calls only from customers that are knowledgeable about computers.
Take frequent gaming breaks.
Go for a quick walk.
Listen to soothing sounds.
Practice relaxed breathing.
Take a long lunch hour to reduce fatigue.

11. Which statement is true about the role of stress when troubleshooting customer computer problems?
Reducing stress helps customers provide more useful information.
Increased stress helps improve focus on fixing the problem quickly.
Stressful situations are important for establishing good customer rapport.
Stress is one of the most useful resources available to the computer technician.

12. A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
Listen to the complaint and explain that the coworker is frequently rude.
Tell the customer that they can call the supervisor if they have a complaint.
Listen to the complaint, apologize for the incident, and then offer to help the customer.
Ask the customer to submit their complaint in writing.

13. Which issue is an example of an exception to an SLA that should be escalated to a manager?
A customer wishes to change the details of the contact person on the SLA.
A customer wants two new computers added to the existing SLA without additional cost.
The customer is asking to upgrade the level of service and is willing to pay the price difference.
An unhappy customer calls to get clarification of the costs and penalties of the SLA.

14. A technician works on a customer computer at the customer site after answering a support call. Which two items should the technician regard as being the property of the customer? (Choose two.)
customer e-mails
transcripts of the support call
hard copies of files on the customer desk
technical notes that are related to the support case
Internet searches that are related to the support case

15. What are two examples of technician interactions with a customer that are considered to be either unethical or illegal? (Choose two.)
being impatient
lacking sensitivity
sending chain letters
sending anonymous e-mails
closing a case before resolution

16. What is the primary responsibility of a level-one helpdesk technician?
to solve simple problems
to update drivers and OS patches
to use remote diagnostic software
to gather pertinent customer information

17. What is the recommended way to place customers on hold?
Place customers on hold as soon as the issue is identified. The on-hold message will inform customers that they have been placed on hold.
As soon as the issue has been identified, tell customers that you need to put them on hold, then immediately place them on hold.
Ask and wait for permission before placing customers on hold.
Do not place customers on hold. Ask them to call back in an hour when the issue would have been researched and a solution found.

18. A computer technician wants to make sure that a customer, who had been experiencing a problem with a hard drive, is satisfied that the problem has been resolved. Which of these rules would help accomplish this desire?
Ask a level-two technician to check on the customer satisfaction survey response.
Call the user daily to ensure the hard drive is working satisfactorily.
Follow up with the customer to verify that the problem has been resolved.
Inform the distribution center that the customer is satisfied with the repair.

19. While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed?
Interrupt the customer immediately to explain the solution.
Interrupt the customer at the earliest opportunity because you know what they are going to say.
Wait until the customer has finished speaking, and then explain the possible solution.
Ask the customer to complete the explanation as quickly as possible because a possible solution is known.

20. What are two examples of situations where a helpdesk call should be escalated to a level-two technician? (Choose two.)
The computer case must be opened.
The problem description lacks specific details.
The customer contact information is inaccurate.
The make and model of computer are not recorded.
The problem cannot be resolved in less than ten minutes.

7/13/2012

ITE Exam chapter 9 (Question and Answer)

ITE Exam chapter 9 (Question and Answer)

1. At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?
Document findings.
Identify the problem.
Implement a solution.
Determine an exact cause.

2. Which precaution helps protect against social engineering in the workplace?
disclosing passwords to company personnel only
guiding visitors within the premises and escorting them personally when they leave
keeping hidden from public view any passwords that are posted in the work area
sharing access cards with other employees

3. What are two important outcomes of good computer and network security? (Choose two.)
keep equipment functioning
expose confidential information
allow unrestricted network access
reduce available network resources
provide access only to authorized users

4. Which best practice should be included in a password protection policy?
Encourage users to document passwords in a personal file.
Enforce password protection at the BIOS level.
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Restrict passwords to text-based strings.

5. Which security device stores user physical characteristics to provide a user level of facility access?
a biometric sensor
a card key
a key fob
a smart card

6. How can web tools, such as Java or ActiveX, be used for a malicious attack?
by altering the interactivity level of a web page
by creating popup windows
by causing the web browser to crash, leaving the system vulnerable
by installing unwanted programs on a computer

7. What is a signature as the term is used in antivirus and antispyware software development?
a system restore point
a software removal tool
an operating system patch
a programming code pattern

8. A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy?
denial of service
ping of death
replay
SYN flood

9. Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)
Have you shared your password?
Is your security software up to date?
What problems are you experiencing?
What websites have you visited recently?
Have you scanned your computer recently for viruses?


10. Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?
2, 4, 5, 3, 1, 6
2, 5, 4, 3, 6, 1
5, 4, 2, 3, 6, 1
3, 5, 4, 2, 6, 1

11. A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown?
Notification for downloading available updates will be displayed when the computer is rebooted.
The update will be lost.
The update for the computer will be queued on the website.
The update will be installed as soon as the computer is powered on.

12. What condition can allow unauthorized access to a network for users who are not physically connected to the network?
exposed network cables
active jacks in public areas
poor wireless device security
unattended PCs that are logged into the network

13. A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail?
spoof
adware
grayware
spam

14. Why should everyone in an organization give high priority to computer and network security?
because antivirus software often does not work
because computer and network security is included in every job description
because everyone can be affected by computer and network security problems
because computer and network security is the primary responsibility of every employee

15. What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses?
Download the latest signature files on a regular basis.
Schedule a scan once a week.
Schedule antivirus updates using Windows Task Manager.
Follow the firewall configuration guidelines on the antivirus manufacturer website.

16. Which three questions should be addressed by organizations developing a security policy? (Choose three.)
What items need to be protected?
How should the items be protected?
What is to be done in the case of a security breach?
When do the items need protecting?
What insurance coverage is required?
What are the possible threats to the items?

17. What are two examples of malware? (Choose two.)
registry cleaner
pop-up blocker
spyware
e-mail
grayware

18. Which two actions improve security on a wireless network? (Choose two.)
Enable WEP.
Broadcast the default SSID.
Keep the default administrator password for the access point.
Enable MAC filtering.

19. For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined?
Document the findings.
Verify full system functionality.
Establish a theory of probable causes.
Establish a plan of action for resolution.

20. A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
Create a restore point.
Manually update the Last Known Good Configuration.
Reinstall the antivirus software.
Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.

7/10/2012

ITE Exam Test Chapter 8 (Question and Answer)

ITE Exam Test Chapter 8 (Question and Answer) 100 %

1. Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
The distance a signal can travel through the cable.
The number of twists in the wires inside the cable.
The number of wires inside the cable.
The type of shielding used inside the cable.
The type of connectors required to terminate the cable.

2. Which two statements are true of network computing in contrast to non-network computing? (Choose two.)
File duplication is more likely.
Fewer peripherals are needed.
Resource conservation is decreased.
Application licensing costs are higher.
Centralized administration capabilities are enhanced.

3. Which suite of protocols is used to transmit data across the Internet?
Appletalk
ARP
DNS
IPX/SPX
TCP/IP

4. Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
Manually assign an IP address.
Configure the NIC for a MAC address.
Attach a cable that has an RJ-45 connector.
Configure the NIC for a specific network protocol.

5. The Internet is an example of which type of network?
LAN
SAN
WAN
WLAN

6. Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN?
ADSL
ISDN
VPN
WAN

7. Which two characteristics describe Ethernet technology? (Choose two.)
supported by IEEE 802.3 standards
supported by IEEE 802.5 standards
typically uses an average of 16 Mb/s for data transfer rates
uses a bus logical topology
uses a ring topology

8. Which method is recommended in order to avoid problems with counterfeit network equipment?
Buy extra parts in case one fails.
Only install equipment that comes with a user manual.
Purchase equipment only through manufacturer-authorized partners.
Use items of uncertain authenticity only in non-mission critical applications.

9. What is the maximum range a data signal can travel through a 1000BASE-T network segment?
3280 ft (1000 m)
1640 ft (500 m)
984 ft (300 m)
607 ft (185 m)
328 ft (100 m)

10. What is true about the TIA/EIA?
It develops and maintains the 802 standards for LANs.
It establishes consensus processes among qualified groups.
It defined the Open Systems Interconnection networking model.
It developed standards to replace proprietary standards after U.S. telephone industry deregulation.

11. What is the most commonly used DSL technology?
ADSL
HDSL
IDSL
SDSL
VDSL

12. Which device enables computers to be attached to a network without segmenting the network?
bridge
hub
router
switch

13. Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
The network is small with less than eight users.
The company network requires secure access to confidential information.
The users need a central database to store inventory and sales information.
Each user understands how to safely share files across a network.
The data gathered by the employees is critical and should be backed up on a regular basis.
All employees passed a strict background check as part of the corporate hiring practices.

14. A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
the laptop battery level
the IP address that is assigned to the laptop
the power level of the wireless antenna
the available wireless networks within range
the distance from the school-owned wireless device

15. Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?
default gateway
MAC address
physical address
subnet mask

16. A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
a bad network cable
interference from surrounding devices
reduced computer power supply output
static IP addressing with incomplete information

17. Which networking protocol translates a network name such as www.cisco.com to a unique IP address?
APIPA
ARP
DHCP
DNS
Proxy ARP

18. Why should network cables always be labeled?
to prevent cable wear
to improve appearance
to reduce network clutter
to save troubleshooting time

19. Which Windows XP command displays the route taken by packets crossing an IP network?
iproute
netview
nslookup
ping
tracert

20. A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.)
faulty NIC
bad IP address
faulty patch cord
unavailable DHCP server
incorrect protocol configuration

7/08/2012

ITE Exam Chapter 7 (Question and Answer)

ITE Exam Chapter 7 (Question and Answer)


1. What is the best source for a Windows-compatible scanner driver?
website for scanner manufacturer
Microsoft Update website
scanner installation disk
Windows Device Manager
Windows hardware profiles

2. Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
drum
fuser
fusing unit
platen
transfer corona wire

3. Which software, embedded in a printer, controls how the printer operates and can be upgraded?
driver
firmware
operating system
printer utilities

4. Which two interface types can supply power to a scanner or printer? (Choose two.)
USB
SCSI
serial
parallel
FireWire

5. A technician has been called to add a networked printer to a computer, but the printer cannot be installed. The technician has sufficient rights to install the printer, and other computers can print to the same printer. Where should the technician look first to isolate the problem?
the printer
the print driver
the print cartridge
the printer service/spooler

6. Which Windows XP command sends a file named example.txt to the default printer?
send example.txt
example.txt default-printer
default-printer example.txt
print example.txt

7. Which printer technology is used in low-cost, photo-quality printers?
impact
inkjet
laser
thermal

8. What is typical of a network printer installation?
the requirement of a UPS
the requirement of a hub or a switch
the use of FireWire or USB
the use of Ethernet or wireless

9. Which software converts scanned pages into text?
Image Text Converter
Optical Character Recognition
Optical Text Recognition
Character Image Recognition

10. What is a feature that causes printers to require higher levels of maintenance than other electrical devices require?
high voltage
moving parts
network connectivity
electrostatic charges
11. What problem might be encountered if a laser printer is plugged into a UPS?
damage to the UPS
inconsistent print quality
electrical shock to users
damage to the laser printer

12. What are two recommended procedures for proper scanner care and maintenance? (Choose two.)
wiping the glass with cloth
removing the glass during cleaning
keeping the lid open when the scanner is not in use
spraying cleaner directly on the glass
leaving the scanner connected to the power source

13. What is the first step in troubleshooting a printing problem?
Identify the symptoms.
Install a new ink toner cartridge.
Disconnect power from the printer.
Discuss solutions with the customer.
Determine the exact cause of the problem.


14. Refer to the exhibit. Which two printer configuration settings should be modified when changing from standard paper to photo paper? (Choose two.)
Duplex
Paper Type
Print Layout
Print Quality
Paper Orientation

15. Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
Replace the print cartridge. If that fails to solve the problem, restart the printer and run diagnostics.
Check the printer data cabling. If the cabling is secure on both ends, replace the print cartridge or ribbon.
Send the print job again. If that fails to work, turn the printer off and back on, then resend the print job. If the problem still exists, reinstall or upgrade the print driver.
Check the printer power. If the power is on, resend the print job. If the document still fails to print properly, check the printer to ensure it is set as the default printer and resend the document.

16. Which routine maintenance procedure can extend the life of a printer?
removing impurities collected on internal components
removing and cleaning the corona wire regularly
cleaning toner from the fusing drum
refilling low ink cartridges

17. Which technology is used by laser printers?
digital drop
electrophotographic
electrostatic spray
impact
ink melting

18. What are two possible negative results from refilling ink cartridges on a printer? (Choose two.)
internal leaks
damage to the corona
reduced life of the printer
toner cartridge malfunctions
damage to the electrophotographic drum

19. What is the recommended first step in performing printer maintenance?
Empty all paper trays.
Remove the toner cartridge.
Remove power to the printer.
Disconnect the network cable.

20. A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
all-in-one
drum
flatbed
handheld


7/03/2012

ITE Exam Chapter 6 (Question and Answer)


ITE Exam Chapter 6 (Question and Answer)

1. What is the proper way to clean optical drives?
Spray ionized solution inside the drive.
Use an electrostatic vacuum cleaner.
Blow the dust with compressed air from the inside.
Use a cleaning disc for optical drives.

2. Which component should be removed before cleaning a laptop?
memory module
battery
hard drive
power supply

3. A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do next?
Attach the AC adapter.
Replace the battery with a spare.
Press a key on the keyboard or use the pointing device.
Remove any unused devices including externally connected ones.

4. Which three components commonly connect to USB or FireWire ports? (Choose three.)
camera
AC adapter
PC Card
printer
scanner
graphics adapter

5. Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
first
second
third
fourth

6. Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
CardBus
PC ExpressCard
ISA
PCI

7. Which two questions that a technician can ask during the troubleshooting process are considered open-ended? (Choose two.)
Does the monitor come on?
Can you access the Internet?
Is the laptop battery charging?
What software has been installed?
How would you describe the problem you are experiencing?

8. Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
mobility
functionality
size
OS installed
compatibility


9. Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
30mm wide
34mm wide
43mm wide
45mm wide
54mm wide

10. What is the major difference between desktop and laptop motherboards?
Desktops use the AT form factor while laptops use the mini or baby AT form factor.
Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.
Desktops have a variety of expansion and RAM slot designs while laptops have standard expansion and RAM slot designs.
Currently there is no significant difference in the motherboard form factors for the desktop and laptop.

11. A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
Restart the laptop.
Re-install the Windows operating system.
Reset the display to its native resolution.
Obtain an updated display driver from Microsoft.
Set the resolution to VGA mode.

12. Where can a technician change the power schemes on a laptop running Windows XP?
Select Advanced Settings from within the BIOS.
Select Power Options from within the Control Panel.
Select Power from within Administrative Tools.
Select Configure Power Settings from within Computer Management.

13. Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
Use a lint-free cotton cloth.
Use a cotton ball.
Use a household cleaning solution.
Wipe the disc from the center outward.
Wipe the disc in a clockwise direction.
Wipe the disc in a counterclockwise direction.

14. A technician is replacing a laptop SODIMM. With what component is the technician working?
AC adapter
battery
ExpressBus expansion card
hard drive
optical drive
RAM

15. Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
Ethernet
modem
parallel
DVI


16. Refer to the exhibit. A laptop user realizes that the key that is shown in the exhibit is used when connecting a laptop to an external projector. What additional key on the laptop keyboard is normally required to make the image on the laptop screen display on the projector?
Ctrl
Alt
Shift
Tab
Fn

17. Which display technology is most commonly found in modern laptop computers?
CRT
LED
plasma
LCD

18. Which two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
optical drive
disk drive
fan
monitor
wireless NIC



19. Refer to the exhibit. A laptop touchpad is nonresponsive. What port can be used to attach an external pointing device as a quick fix until the touchpad issue can be resolved?
port A
port B
port C
port D



20. Refer to the exhibit. What does this symbol indicate when illuminated on a laptop?
The laptop is connected to an external monitor or projector.
The laptop battery is fully charged.
The laptop can communicate with a Bluetooth wireless device.
The laptop is in energy efficiency mode.
The laptop integrated camera is active.