• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/159

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

159 Cards in this Set

  • Front
  • Back
IRQ 0
System timer
IRQ 1
Keyboard
IRQ 2
Cascade, redirect to IRQ 9
1RQ 3
Serial ports, com 2 & 4
IRQ 4
Serial ports, com 1 & 3
IRQ 5
Parallel port LPT2
IRQ 6
Floppy drive controller
IRQ 7
Parallel port LPT1
IRQ 8
Real-time clock
IRQ 9
Redirected from IRQ 2
IRQ 10
Available
IRQ 11
Available
IRQ 12
PS/2 mouse
IRQ 13
Math coprocessor
1RQ 14
Hard disk controller
IRQ 15
Secondary hard disk controller
I/O address 170h-17Fh
Secondary IDE controller, Master drive
I/O address 1F0h-1FFh
Primaryy IDE controller, Master drive
I/O address 278h-27Fh
LPT 2
I/O address 2F8h-2FFh
COM 2
I/O address 378h-37Fh
LPT 1
I/O address 3F8h-3FFh
COM 1
What is an ALU?
ALU - Arithmetic Logic Unit.
The ALU handles mathmatical calculations. Another type of ALU is commonly known as the "math coprocessor"
Which device is responsible for the organizing the communications between system components?
The CPU - Central Processing Unit
The CPU is considered the "brain" of the computer.
What is the difference between RAM and cache?
RAM, Random Access Memory, is used as temporary storage for computational results.
Cache is another type of much faster memory used for frequently accessed instructions or data.
What is the primary difference between RAM and ROM?
RAM is volatile memory. All information stored in RAM is lost if power is lost.
ROM is nonvolatile memory. All information in ROM will remain intact should power be lost.
When a computer is started or booted, what runs first?
A POST, power-on self-test, is run to determine system functionality.
TRUE/FALSE
The primary hard drive is usually attached to the end connector on a ribbon cable.
TRUE
Although not an absolute requirement, the primary hard drive is usually connected to the end connector.
What does the red stripe on a ribbon cable represent?
The red stripe represents Pin 1. This is colored so that the cable orientation can be correct.
The red stripe on a drive cable always indicates pin 1.
The P8 and P9 power supply connectors attach to a motherboard in a side by side fashion. What is the rule for installing these power
connectors properly?
The P8 and P9 power connectors are attached the motherboard with their black wires together.
What does CMOS stand for and what is its purpose?
CMOS - complementary metal-oxide semiconductor
The CMOS chip retains settings for time, boot sequence and keyboard parameters.
What do two devices use when communicating directly with each other without using the processor?
DMA - Direct Memory Access channels.
Devices can communicate directly and bypass the processor by using DMA channels.
What is IRQ 0 reserved for?
IRQ 0 is set aside for the computer's system timer. This IRQ is given the highest priority.
Which IRQs are typically used by LPT1 and LPT2 for printers?
LPT1 - IRQ 7
LPT2 - IRQ 5
You are installing a new network card in a workstation. You need to take an educated guess as to which IRQ would be best to use.
Which IRQ(s) would be best?
IRQ 10 and IRQ 11 are usually good bets since they are not reserved for any device by default. However, verify other devices are not
using these IRQs prior to hardware installation.
A serial cable typically uses a __ pin connector and a parallel port typically uses a __ pin connector.
A serial cable typically uses a 9 pin connector - DB-9.
A parallel port typically uses a 25 pin connector - DB-25.
TRUE/FALSE
8-bit refers to the number of bits that can be sent in parallel between two devices.
TRUE
The terms 8, 16, 32, and 64-bit refer to the number of bits that can be concurrently sent across a bus or cable.
Through what type of configuration can IDE and ATA devices support two hard drives in the same system and controller?
Two IDE/ATA hard drives can be used with the same controller using the master/slave configuration.
Typically the master hard drive contains the operating system but there are no hard and fast rules for this.
You have two hard drives and want to use the master/slave configuration. How do you set the primary drive as the master?
Usually, a jumper setting on the hardware will allow either master or slave to be set.
TRUE/FALSE
The master drive must be set to the master jumper setting and installed on the end of of the ribbon cable.
This is the standard method of configuration. The slave drive must also be jumpered for the slave setting and use the middle ribbon cable
connector.
Will a drive work when it is set to slave and is the only drive in the system?
No.
If a single drive is used it must be set to master
What transfer rate is supported under Ultra-3 SCSI systems?
Up to 160MBps
SCSI systems utilize device ids. What happens when two devices on the same SCSI bus utilize the same id?
A conflict will occur and neither device will be operational.
SCSI systems require __________ at each end of the SCSI chain to absorb signals and terminate the bus.
Terminating Resistors
Terminating resistors prevent signals from bouncing back by "absorbing" signals at the ends of the SCSI chain.
When referencing SCSI systems, "A-cables" use what bit/pin configuration?
SCSI A-cables use 8-bit 50-pin cable configuration.
What type of SCSI cables support 16-bit systems with 68-pin cables?
P-cables use this configuration.
Monitors can hold enough charge to seriously injure you even when unplugged.
TRUE
Never wear an ESD strap when working with a monitor.
Monitors are not servicable and should not be opened.
How many devices can USB theoretically support?
Up to 127 devices.
This would require multiple daisy-chained USB hubs to reach this number.
What transfer rate does IEEE-1394 or FireWire support?
FireWire can support up to 400MBps.
FireWire is typically used to support high-data/high-speed devcies such as video cameras and DVD players.
FireWire systems can support up to 63 daisy-chained devices.
How can a laptop take advantage of several desktop peripherals such as a printer and scanner at the user's office (base of operation)?
Docking stations are designed for this purpose. Docking stations are proprietary to the laptop manufacturers and can be used to connect
to peripherals which may not be as portable.
How are errors indicated during POST?
If errors are discovered during POST, then they will be indicated by a visual error message on the screen or by a series of beeps.
You are working on a machine that is problematic. You keep receiving a 2** and 3** error messages when the machine tries to POST.
The 2** indicates a problems with memory.
The 3** indicates a problem with the keyboard.
What does a single beep indicate after POST?
A single beep indicates no problems were detected during POST.
What is the most common problem with mice?
Dust buildup on the rollers causes mice to be less responsive.
The components can be cleaned with alcohol to remove the dirt and dust.
You are troubleshooting a bad floppy drive and notice the light is always on. What does this normally mean?
When the floppy light is always on this is usually due to ribbon cable being connected improperly.
What is the purpose of using a loopback adapter to test a parallel port?
A loopback adapter will test the port's ability to transmit and receive signals.
You turn on a computer and nothing happens. It is plugged into a functional outlet. What should you check?
Verify the voltage setting on the power supply is correct for your region:

115 for North America
230 for European
TRUE/FALSE
If the power supply's fan stops working, the entire power supply should be replaced.
TRUE
Although there may be a chance to salvage the unit, the exam is specific in this area. The power supply should be replaced.
You suspect a component within a computer is bad. What is the best-practices method of proving your suspicions?
It is always a good idea to swap a problematic component with a known working unit to determine if the original is faulty.
What is a "parts grabber" used for?
A parts grabber is a helpful tool used to retrieve parts such as jumpers and screws that may have fallen into the computer.
What solvent should be used to clean a keyboard?
Distilled water is recommended for keyboards.
What components should be cleaned with isopropyl alcohol?
Floppy drives
mouse rollers
What is a major cause of ESD, Electrostatic Discharge, within a computer?
Dust can cause ESD and/or computer components to overheat.
What is the difference between a brownout and a backout?
A brownout is the reduction of power delivered.
A blackout is a complete loss of power.
How does a UPS, Uninterruptible Power Supply, work?
Incoming power keeps the battery on a UPS charged and all power comes from the battery. In the event of a power failure, all computer
components remain operational and draw power from the UPS battery.
You have frequent power spikes and surges in your area. What device will protect computer equipment from these power fluctuations?
A suppressor will smooth out power delivery by removing excess voltage caused by spikes and surges.
What is the purpose of a noise filter with relation to power?
A noise filter conditions the flow of electricity by removing EMI.
What is recommended about working with CRT monitors and high-voltage equipment?
Never open them
Never wear an ESD strap while working on them.
What is the average static discharge voltage?
The average static discharge voltage is 1000 volts.
Only 30 volts are required to destroy a computer component.
In a 3-prong power outlet, which prong is used for ground?
The round prong in every outlet is ground.
What is meant by the term superscalar when referencing a processor?
Superscalar refers to a processor design where parallel processing and two instruction sets can be processed at the same time.
The Pentium is a superscalar processor.
What size is the the Pentium data bus?
All Pentiums have a 64-bit data bus.
Pentium processors also have a 32-bit address bus allowing for up to 4GB of RAM to be supported.
How are Pentium II processors attached to the motherboard?
Pentium II processors attach to motherboards via the Slot 1 connector.
Which processor uses the least voltage?
The Pentium 4 processor consumes the least voltage. Power usage ranges 1.44 to 1.75 volts.
Which Pentium processor has the least L1 cache?
The pentium 4 processor has the least with 8k of cache. The design is such that more cache actually slows down performance.
What are some of the other processor brands other than Intel Pentium?
AMD and Cyrix both produce processors that compete with Intel and the Pentium.
What is the primary function of RAM?
RAM provides temporary storage about devices and applications.
Where is SRAM typically used?
SRAM or Static RAM is used primarily for system cache due to its great speed - less than 10ns.
What are the two main reasons DRAM or Dynamic RAM, is commonly used for a computer's main memory?
1. Low cost
2. High Capacity
What are the six major types of RAM?
EDO - Extended Data Out RAM
SDRAM - Synchronous dynamic RAM
RDRAM - Rambus Dynamic RAM
DDR RAM - Double Data Rate RAM
VRAM - Video RAM
WRAM - Windows RAM
Which type of memory module has 168 connectors and is 64 bit?
DIMM - Dual Inline Memory Modules.
DIMMs are very common in today's computers.
What makes up a full memory bank?
When the data bus speed and RAM's bit width match this is called a "full bank." For example: A 64-bit processor and one 64-bit DIMM make a full bank because they match.
TRUE/FALSE
The majority of todays computer systems do not support memory with parity.
TRUE
Most modern computers utilize memory without parity
checking.
What type of motherboard are most of computers based on
today?
The ATX motherboard design
Does the AT or ATX motherboard have integrated I/O ports?
The ATX design has integrated I/O ports.
The AT design typically has ribbon cables attaching to parallel and serial ports.
What is the most common architecture for expansion cards in computers today?
PCI - Peripheral Component Internconnect.
The PCI bus, either 32 or 64 bits, supports most modern
expansion cards.
What does CMOS stand for?
Complementary Metal-Oxide Semiconductor Setttings.
The CMOS is where many motherboard settings/components are configured.
What are some of the components and features that can be configured in CMOS?
COM ports
Parallel ports
Floppy Drive settings
Hard Drive parameters
Memory settings
Date and Time
Boot Sequence.
Is RAM capacity configured within CMOS?
No.
RAM is calculated automatically upon startup
If the CMOS battery is removed, will settings be maintained?
No.
Removing the CMOS battery will cause the computer to
revert back to the default CMOS settings.
CMOS will need to be reconfigured.
What are the three most common types of printers?
dot matrix
inkjet/bubblejet
laser
Why are dot matrix printers considered line printers?
dot matrix printers print one line at a time or line by line.
Laser printers print on a "per page" basis.
Are inkjet/bubblejet printers considered line or page printers?
Inkjet/bubblejet printers are considered line printers for the sake of the A+ exam.
Most inkjet/bubblejet printers are inexpensive. Why is the cost per page so much higher than laser and dot matrix printers?
The ink cartridges are expensive to replace and/or refill.
Note, For the exam, cartridges should always be replaced not refilled.
TRUE/FALSE
Laser printers are considered nonimpact printers.
TRUE

Laser printers as well as inkjet printers are considered

nonimpact. Dot matrix printers actually strike the paper and are considered impact oriented.
Why is it recommended that printer cables not exceed six feet in length?
To avoid EMI interference.
Printer cables longer than six feet become more susceptible to EMI, Eletro Magnetic Interference.
What is the difference between a network printer and a shared printer?
A network printer stands alone as a seperate network node and has a network card installed.
A shared printer is typically connected to a computer and is "shared" out via the computer's operating system.
What is the most common remedy for laser printer problems?
In most cases the problem can be resolved by changing the toner and/or drum.
You have a printer connected properly but it prints out "garbage." What is the likely problem?
In most cases, illegible print or "garbage" is the result of a computer printer driver problem.
The driver should be reinstalled and/or updated.
What is the difference between a peer-to-peer network and a client/server network?
In peer-to-peer networks, workstations operate as both servers and workstations.
In a true client/server network, servers are dedicated computers and are NOT used as clients.
A network has each computer connected to a single cable backbone. What type of network topology is this?
This is a Bus topology. In a Bus topology, each computer connects to a single cabling segment.
TRUE/FALSE
In a Bus topology, each computer examines all packets.
TRUE

Due to the single segment cabling design inherent within a Bus topology, each computer will examine every packet. Only the computer
with destination address of the packet will accept the packet.
What is one the major advantages of a ring based network?
With a ring network, more the one computer can send data at the same time.
What are the most common network protocols?
TCP/IP
IPX/SPX
NetBEUI
Appletalk
What are the three primary types of cabling?
twisted-pair
coaxial
fiber-optic
Why is the purpose of the twists in twisted-pair cable?
The twists help boost the wire's signal and make the cable less suseptible to EMI - Electro Magnetic Interference.
In what type of network topology is coaxial cable most commonly used?
Coax is most often used in Bus network designs.
The two common types of coax cabling are thinnet and thicknet.
What is the difference between CSMA/CD and token passing?
These are both methods of line or network contention - a means of obtaining access to the network.
CSMA/CD listens for traffic. If no traffic is detected, then the computer may send data.
Token Passing uses a token where sending computers must have access to the token before sending data.
What is the difference between half and full duplex?
Half duplex only allows unidirectional transmission. Data can only travel in one direction at a time.
Full duplex allows bidirectional communication. Data can traverse a segment in both directions at the same time.
What is the purpose of the Registry under all versions of Windows operating systems?
The registry is a central repository database for all settings, user and application configurations.
The registry is where all system information is stored.
Under Windows 9x, what are the name(s) of the file(s) used by the registry?
system.dat
user.dat
How does virtual memory work?
Virtual memory is disk space allocated by the operating system to be used as memory.
Virtual memory is much slower than traditional memory but provides better overall multitasking performance in Windows operating
systems.
Under Windows, what are the two ways a file can be deleted?
1. highlighting the file and press the DEL key.
2. right-clicking the file and selecting delete.
What is the effect of deleting a file under Windows and holding down the Shift key during the process?
The Shift key makes the file deletion permanent. This way the file cannot be recovered from the recycle bin.
Which tool under Windows is used to add/delete/modify
hardware settings?
The Device Manager.
All versions of Windows have a version of Device Manager.
What are differences between System, Application, and Data files?
System files are required for the operating system to run
properly. Application files are required for the operation of specific

applications.
Data files are user files created by applications.
What is the purpose of the IO.SYS file under Windows 9x?
The IO.SYS file provides the operating system with details

about the hardware installed on the computer and is required to boot the
system properly.
Do the Windows 9x operating systems support the
AUTOEXEC.BAT and CONFIG.SYS configuration files?
Yes.
Mainly for backwards compatibility with legacy DOS and Windows 3.x applications.
Which of the following files are required to boot a Windows 9x operating system? system.dat user.dat
system.ini win.ini
config.sys autoexec.bat
user.dat
The system.dat and user.dat files are required.
The remaining files are NOT required and are used for
backward compatibility with older legacy applications
What is the difference between extended and expanded
memory?
Extended memory is all memory above the first 1MB
Expanded memory is used swap memory between extended
and upper memory so that it can be used by the processor.
What is the purpose of the boot.ini file under the NT
operating system?
The boot.ini file allows multiple or dual-boot configurations when the computer contains mutiple operating systems.
The boot.ini file presents the operating system choices upon startup.
How many partitions can be created using FDISK under
Windows 9x?
2 partitions can be created with Windows 9x.
NT 4.0 supports up to 4 partitions and NT 2000/XP support beyond 4 partitions.
Which type of disk parition is required to boot the operating system?
There must be at least one primary partition for the system to be bootable.
Note: the drive must be active to boot the operating system as well.
What are the file systems supported by Windows operating systems?
FAT FAT16
FAT32 NTFS4
NTFS5
When are the FAT file systems used verses the NTFS file
systems?
The FAT file systems is typically used in Windows 9x
systems. Windows NT and XP operating systems use the NTFS file systems.
Which file system natively supports compression and
encryption?
NTFS5 supports compression and encryption under
Windows 2000 and Windows XP.
Which Windows operating system requires the most RAM?
Windows XP.
XP requires 64MB minimum and 128MB recommended.
What does a startup disk contain?
A startup disk contains just enough of the OS's components
and system files to start up.
You are installing Windows 9x. Which utility should be used to create disk partitions?
FDISK.EXE
FDISK is used to create disk partitions.
What makes a primary partition bootable?
To boot an OS from any primary partition it must be marked as active.
Windows 9x logs hardware detection during installation in a log file. What is the name of this file?
DETCRASH.LOG
This file keeps track of a all successful and unsuccessful hardware installation.
The DETLOG.TXT is a readable text file of the DETCRASH.LOG
What are the two primary methods of installing Windows NT, 2000 and XP?
Windows NT, 2000 and XP can all be installed using a
Bootable CD ROM or bootable setup disks. The bootable CD ROM is the preferred method since future
versions of Windows will not support startup disks.
Windows 9x allows the creation of two partitions per disk with support for FAT16 and FAT32. How many partitions and file systems do NT, 2000 and XP support?
Windows NT, 2000 and XP operating systems support up to 4 partitions per disk.
File systems supported by these operating systems include:
FAT16, FAT32 and NTFS.
You want to upgrade from Windows 95 to Windows XP.
What are the two ways of performing this upgrade?
Upgrading from Windows 95 to XP directly is not supported.
The system must upgraded from 95 to 98 first, then upgrade
to Windows XP. The other alternative is a clean XP installation.
You are about to upgrade a Windows NT 3.51 workstation
to XP. Are there any problems with this upgrade?
Yes, upgrading from NT 3.51 to XP directly is not supported. The system must be upgraded to NT 4.0 first then upgraded again to XP.
The alternative is a clean Windows XP installation.
What is recommended about dual-boot installations with
regards to partitions?
Each operating system should be installed on a seperate
partition. It is important to note Windows 9x cannot read NTFS partitions
Which portion of a the hard drive is read first when booting an operating system?
The MBR, Master Boot Record on the primary partition
marked as active is read first.
What is the purpose of booting in safe mode?
Safe mode loads the OS with minimal drivers only.
Drivers for the mouse, keyboard and standard VGA
Safe mode is good for troubleshooting driver problems.
You have created a Windows 9x startup disk with the FORMAT A: /S command. What system files does this command install on the startup disk?
The startup disk will be bootable and contain the IO.SYS, MSDOS.SYS and COMMAND.COM files. These are the bare minimum files required to boot the operating system.
What is the purpose of the NTLDR?
The NTLDR is the NT loader. It is responsible for controlling the boot process until the kernel is loaded.
Under NT, 2000 and XP what is the purpose of the BOOT.INI file?
The BOOT.INI file provides a boot menu for dual-boot
operating system configurations between Windows 9x, NT, 2000 and XP.
This boot menu is displayed upon startup before any
operating system loads.
Which utility is common to all Windows operating systems
and allows for hardware installation and driver
installation/update?
The Device Manager.
From Device Manager, all installed hardware can be
observed. Drivers for new and existing hardware can also be
updated/changed.
Windows detects most hardware and automatically installs the correct drivers. Where can drivers be obtained for
unsupported hardware?
The hardware manufacturer should include the drivers with the hardware or drivers can frequently be downloaded from the manufacturer's
website. The Device Manager utility would be used to install the

drivers.
What is the purpose of a .PIF file under Windows?
A PIF, Program Information File, is used to control a
non-native Windows application's behavior.
PIFs are commonly used to configure applications to run in full-screen or in a Window.
You are troubleshooting an NT 2000 machine because it is
displaying a "BOOT: Couldn't find NTLDR" message. What
does this message indicate?
The NTLDR file is either corrupt or missing. The NTLDR file should be replaced from a startup disk or CD.
If Windows 9x, NT, 2000 or XP fails to display the gui, what action should be taken?
Most likely the Video Driver is corrupt. Boot up in safe mode which will use a standard VGA driver. This will allow minimal operation so the non VGA driver can be replaced or updated.
You have a Windows 98 machine that displays "HIMEM.SYS not loaded" What should you do to remedy this error message?
Most likely, the HIMEM.SYS file is missing or corrupt. The

machine will not boot into the GUI but will boot to a
command prompt. Copy the HIMEM.SYS file to the C:\WINDOWS directory
from a setup disk.
What is the purpose of an ERD under Windows NT 4.0?
The ERD, Emergency Repair Disk is used to backup and
repair the registry.
You are troubleshooting an NT machine that is having
application problems. Which tool should be used to see if any application errors
have been logged?
Event Viewer.
Event Viewer will display the logging information of three
seperate logs: system, application, and security.
Which utility will give you a wealth of system configuration information?
WINMSD
WINMSD contains hardware, software, enviornment and
applications information. WINMSD is also common to
Windows 9x and higher.
What is the most common cause of a GPF, General Protection Fault?
GPFs are most often caused by faulty or corrupt hardware
drivers.
An application continues to cause errors on a Windows
machine. What steps should be taken?
The application could have a bug known by the manufacturer. Check to see if there are any patches or upgrades for the
application. As a last resort, remove the application.
You suspect a machine has a virus. But the virus software
doesn't detect one. What could be the next step?
The virus software may be outdated. Obtain an updated
version of the software and rescan the machine.
In a peer-to-peer network all resources are visible to a user but they are prompted for a password upon attempting access. What type of security is this?
Share Level Security.
Under share level security each network resource is password protected.
What is the difference between user-level security and share-level security?
User-level security is client/server based in nature. share-level security is peer-to-peer based networking.
How can share resources be discovered on a peer-to-peer
network under Windows?
Double-click Network Neighborhood, locate the appropriate computer, and use explorer to navigate the resource(s).
Which protocol was designed for Novell networks?
IPX/SPX
What are the common TCP/IP required settings for a
Windows computer?
IP address
subnet mask
Gateway
DNS
You run into a rare AppleTalk network while consulting. Is
there any problem upgrading several machines to Windows
XP and running AppleTalk per the customers request?
Yes.
AppleTalk support was dropped with Windows XP. An
alternative protocol such as TCP/IP, should be
recommended.