No student devices needed. Know more
20 questions
Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?
Shortcut
URL
Attachment
FTP
Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?
Chrome OS
Windows 7 Home
Mac OS X
iOS
A technician is trying to access a users files and is unable to open any folder or file. Which of the following BEST describes the situation?
The folders contain older versions of the files.
The files are corrupted.
The technician needs to change the file attributes.
The technician does not have permissions.
A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible.
Which of the following security practices should the user follow? (Select TWO).
Use only public computers to access the website
Create a complex password
Write the password down
Use the original password
Which of the following components provides the FASTEST medium for hosting and storing an operating system?
Blu-Ray disc
7200RPM HDD
SSD
DVD-RW
An RoHS label on hardware indicates which of the following?
The hardware produces EMI when used.
The hardware is certified to be energy efficient.
The hardware provides battery backup for power outages.
The hardware needs to be properly disposed.
Which of the following settings will a user configure as part of the initial operating system setup wizard? (Select TWO).
Backup schedule
Accessibility options
Multiple user accounts
Time zone
Computer name
After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?
The application has to be registered to the user.
The application must be upgraded to a 64-bit version.
The application must be activated.
The application needs to be reinstalled.
Which of the following should be performed after a backup has been completed?
Delete the backup
Verify the backup
Save the backup
Schedule the backup
Which of the following connections provide data with the MOST secure protection from
interception?
Wired
WiFi
IR
Cellular
A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible.
Which of the following should the technician choose?
WPA2
WAP
WPA
WEP
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?
Email address
Phone number
Last name
All personal data
Which of the following operating systems is available for free and can be modified by anyone?
Windows
Linux
Mac OS
Chrome OS
A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?
Ransomware
Adware
Spyware
Virus
Which of the following features of a smartphone controls the screen orientation?
Gyroscope
NFC
Accelerometer
GPS
Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?
Thermal
Laser
Dot matrix
Inkjet
Which of the following components are used to store data? (Select TWO).
Motherboard
RAM
CPU
GPU
SSD
A user has downloaded an application file with the .dmg file extension. Which of the
following operating systems can be used with this file by default?
iOS
Windows
Mac OS
Chrome OS
Which of the following operating systems is very lightweight and relies heavily on Internet applications?
Chrome OS
Windows
Linux
Blackberry OS
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur.
Which of the following is the cause of the problem?
The company has configured a policy on her computer that forces her to stay on their website.
Her computer is infected with adware and is redirecting her browser to another site.
The memory of the browser is corrupt, and she needs to have the browser reinstalled.
She did not reboot her computer after clearing the temporary files.
Explore all questions with a free account