Last Updated on March 29, 2016 by Admin
ITE Pretest Exam Answers v6.0 2018 2019 Full Score 100%
To pass ITE Pretest Exam, you should review all these question. We provide you accurate answer 100%.
Click here go to Pretest Exam – Online Test
What is an advantage of purchasing a tablet rather than a laptop computer?
- wireless capability
- reduced size/weight
- quicker Internet access
- easier typing capabilities
- faster processing speed
- increased number of possible attached devices
What is a possible hardware upgrade that can be used to add more storage space to a modern smartphone?
- hard disk
- USB flash drive
Explanation:Because of the of cellular phones, a very small storage device is desirable, such as a microSD card. CompactFlash is an older form of storage device; it is is too large for a cellular phone but it is widely used in cameras and video recorders because of its large capacity and fast access speed. Similarly, USB flash drives and hard disk drives are too large for a cellular phone.
Which component would be located inside the computer case?
- USB hard drive
Which two devices are output devices? (Choose two.)
- video camera
Which hardware component must be installed in a PC to provide network connectivity?
- PCI bus
- serial port
- network interface
- expansion slot
Refer to the exhibit. What does the symbol shown represent?
- a folder which is a collection of subfolders and files
- a Word document stored on the disk
- a database file
- a program that is used to navigate the files stored on a disk
How can a section of text in a Notepad document be highlighted to be copied to another location within the document?
- click the Copy icon, then drag the pointer over the text to be copied
- double-click the words to be copied
- move the pointer to the start of the text to be copied, press the Windows key, move the pointer to the end of the text, and click the Copy icon
- click at the start of the text, drag the pointer to the end of the text, then release the button
Refer to the exhibit. Why is Undo in black, while the other items are in gray?
- Commands are shown in black, while edit operations are shown in gray.
- Groups of menu items alternate black and gray to make them easier to find.
- There are no operations to undo, so this operation is unavailable.
- There is no text to cut, copy, paste, or delete, so these operations are unavailable.
Refer to the exhibit. What caused the pictured menu to appear on the user’s screen?
- The user double-clicked a desktop icon.
- The user right-clicked a desktop icon.
- The user highlighted an icon and then pressed Enter.
- The user highlighted an icon and then pressed the Esc key.
Which two operating systems are used in smartphones? (Choose two.)
- OS X
- Snow Leopard
- Windows 7
A student purchased a new WiFi enabled tablet computer. What is required to connect this device to the Internet?
- a 3G or 4G network
- a telephone company
- a wireless LAN
- a mobile phone service provider
Which two general precautions should be followed when using hand tools? (Choose two.)
- Use tools that are the right size and right type.
- Always carry pointed tools by your side with the pointed end up.
- Keep cutting tools sharp and in good condition.
- Carry the tools used most often in your pockets.
Which precaution should be taken before any electronic component is removed from a computer system?
- place the computer on an insulating mat
- make sure that the computer is unplugged
- attach a grounding wire to the case
- use only approved metal tools
Which problem could occur if a screwdriver is used to pry the top off of a computer case?
- The screwdriver could slip and cause harm to the technician or to nearby individuals.
- The screwdriver could cause deformation to the adapter cards.
- The screwdriver could break and short out the motherboard.
- The screwdriver could scratch the case, causing the motherboard to short circuit.
What would be the most environmentally friendly procedure to consider in the design of a server room?
- Share one monitor with several servers.
- Implement power line conditioning and redundancy.
- Filter the air in the room.
- Maintain a constant room temperature throughout the year.
In the event that a mobile device is lost or stolen, which two procedures can help protect private information that is stored on the device? (Choose two.)
- Use a secure email client.
- Encrypt the storage media.
- Enable the device access password.
- Turn off the device when it is not in use.
- Turn off the wireless connection when it is not in use.
What password would be considered a strong password?
The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed?
It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians that each work the same amount of time to perform the refresh?
- 5 hours
- 8 hours
- 10 hours
- 12 hours
A classmate is creating an imaginary language. Here are some words the classmate has created:
stalopheah means good day
stalopjink means goodness
drahplunk means light house
flinsjink means happiness
plunkgrecki means house fly
What would your classmate use to mean “daylight”?
A user is looking for a wireless headphone for listening to songs stored on a smartphone. What wireless technology would the headphone use?
Explanation:Bluetooth is a wireless technology for data exchange over a short distance. It is suitable for connecting devices with simple tasks, such as headsets, keyboards, mice, and printers. Wi-Fi is suitable for variety of applications with high speed wireless connectivity required or preferred. Infrared requires a direct line of sight between the transmitter and the receiver. 3G/4G are cellular network technologies to manage voice calls and data transmission between clients and service providers.
A customer connects a smartphone to a cloud service operated by the service provider. What can the cloud service provide to the customer?
- phone calls
- remote print
- data storage
- device troubleshooting
What is the default subnet mask for the IP address 172.16.4.22?
Explanation:The first octet of the IP address indicates that this is a Class B address. The default subnet mask for a Class B address is 255.255.0.0.
Which network protocol is used to automatically assign an IP address to a computer on a network?
Explanation:A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses, simplifying the addressing process. FTP manages file transfers. SMTP sends email. ICMP is a messaging protocol that is used in troubleshooting. APIPA is Automatic Private IP Addressing, a Windows operating feature that allows DHCP clients to obtain addresses even when a DHCP server is not present.
Match the icon to its likely associated use. (Not all options are used.)
Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?
Explanation:The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output.
Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?
- Windows key
A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?
- Computer Management
- Device Manager
- My Computer
- System Tools
Explanation:Device Manager can be used to view information about a particular piece of hardware, to view the driver version, to update the driver or roll it back, or to disable/enable a particular device.
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?
- Task Manager
- Add or Remove Programs
- Event Viewer
- System Restore
Explanation:Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.
Which action can reduce the risk of ESD damage when computer equipment is being worked on?
- working on a grounded antistatic mat
- lowering the humidity level in the work area
- moving cordless phones away from the work area
- keeping the computer plugged into a surge protector
Explanation:To help prevent ESD damage, use grounded mats on work benches and grounded floor mats in work areas. You can also use an antistatic wrist strap to prevent ESD strikes except when working inside power supplies or CRT monitors.
When should a technician avoid wearing an antistatic wrist strap?
- when installing RAM
- when replacing a power supply unit
- when installing a hard drive
- when opening a computer case
Explanation:A power supply unit or CRT monitor are both able to retain large amounts of power after being turned off. These types of devices are too dangerous to connect an antistatic wrist strap to. Antistatic wrist straps are commonly worn when upgrading RAM or replacing a hard drive.
What can be tested with a digital multimeter?
- wireless signal strength and access point positioning
- basic functionality of computer ports
- copper cable location
- quality of electricity in computer components
Explanation:A digital multimeter can test the integrity of circuits and the quality of electricity in computer components.
A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?
- Grant the users read permissions on all files.
- Give the users administrator rights on their computers.
- Make the users members of a group called Backup Operators.
- Check the Folder is Ready for Archiving box in the properties of each folder.
Explanation:It is better to grant permissions at group level than individual permissions. This way any member of a group would have the respective permissions to carry out the permitted tasks and allows for a tighter control of what the group members can do in a given environment. It also makes it easier to administer the environment.
What characterizes a DDoS attack?
- Many hosts participate in a coordinated attack.
- Infected computers are called daemons.
- It is easy to identify the source of the attack.
- All hosts must be in the same geographic area.
Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled?
- Aim just above the flame, squeeze the lever, and sweep from side to side.
- Aim at the base of the flame, squeeze the lever, and sweep from side to side.
- Aim directly at the center of the flame, squeeze the lever, and sweep from side to side.
- Aim at the base of the flame, squeeze the lever, and sweep from the base to the top of the flame.
- Aim just above the flame, squeeze the lever, and sweep from the top to the base of the flame.
Anyone using a fire extinguisher should remember the basic rules of operation:
P – Pull the pin.
A – Aim at the base of the fire, not at the flames.
S – Squeeze the lever.
S – Sweep the nozzle from side to side.
What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss?
- surge suppressor
- uninterruptible power supply
- standby power supply
- power inverter
Explanation:An uninterruptible power supply or UPS contains a battery backup that provides consistent power through brownouts and blackouts until the battery power is emptied. Many UPS systems can safely shut down a computer prior to the loss of battery power.
Which measure can help control RFI effects on wireless networks?
- Ensure the humidity and temperature levels are set as low as possible.
- Ensure the number of wireless NICs exceeds the number of wireless phones.
- Ensure the wireless network is on a different frequency than the offending source.
- Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Explanation:A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones.
A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
- It cannot communicate outside its own network.
- It can communicate on the local network as well as on the Internet.
- It can communicate with networks inside a particular company with subnets.
- It has a public IP address that has been translated to a private IP address.
Explanation:If a computer is configured with DHCP but it cannot communicate with the DHCP server in order to obtain an IP address, the Windows OS automatically assigns a link-local IP, in the range of 169.254.0.0 to 169.254.255.255. The computer can only communicate with other computers connected to the same 169.254.0.0/16 network and cannot communicate with computers in another network.
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
- The total cost of the new solution is considerably lower.
- Data is more secure in the event of hardware failures.
- Individual users are in control of their own computers and network resources.
- Data resources and access are centrally controlled.
- Personnel costs are lower because a dedicated network administrator is no longer necessary.
Explanation:Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced.