IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS |
---|---|---|---|---|
Which of the following are examples of keyboard connectors? (Select TWO).
A. USB B. RJ-11 C. Serial D. FireWire E. PS/2
E. PS/2
|
Which of the following is considered an optical storage medium?
A. SSD B. Blu-Ray C. Flash drive D. Memory card
B. Blu-Ray
|
Several users want to share a common folder with high availability. Which of the following
devices is BEST to use for this requirement? A. Large USB flash drive connected to a PC B. Medium capacity SATA hard drive C. Network attached storage appliance D. Firewall with security management
C. Network attached storage appliance
|
Joe, a user, wishes to allow his roommate to access his personal computer for Internet
browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate? A. Standard B. Guest C. Administrator D. Power user
B. Guest
|
Which of the following is a reason that a user might upgrade a video card driver? (Select
TWO). A. To decrease the screen resolution B. To access monitor standby mode C. To fix an error message D. To use additional features E. To adjust the brightness/contrast
C. To fix an error message
D. To use additional features |
A user had to replace the hard drive in a computer. The user would like to install the games
that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following? A. Schedule automatic updates. B. Enable installed OS features. C. Update hardware drivers. D. Reinstall productivity applications.
B. Enable installed OS features.
|
Which of the following are best practices when it comes to using a computer in a public
location? (Select TWO). A. Notify the administrator when finished. B. Use strong passwords. C. Turn off the computer when finished. D. Disable the save password function on web pages. E. Make sure to clean the keyboard when finished. F. Make sure to log out of websites when done.
D. Disable the save password function on web pages.
F. Make sure to log out of websites when done. |
Which of the following would BEST be described as password best practices? (Select
THREE). A. Use of long passwords B. Sharing passwords with a trusted source C. Limiting password reuse D. Keeping default passwords E. Use of special characters F. Writing down difficult passwords
A. Use of long passwords
C. Limiting password reuse E. Use of special characters |
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of
the following describes this type of security threat? A. Malware B. Social engineering C. Spam D. Physical security
B. Social engineering
|
Before purchasing a new video card for a PC, which of the following should be checked to
ensure there will be enough electricity for the video card to function properly? A. GPU B. CPU C. GUI D. PSU
D. PSU
|
A user is at the office and has a cellular phone that previously functioned properly. The
phone is powered on with a fully charged battery. However, the phone does not have connectivity. Which of the following describes the problem? A. Phone is disconnected from WiFi B. Provider is conducting system testing C. MAC address is bad D. Phone is in airplane mode
D. Phone is in airplane mode
|
Which of the following is a feature of a basic power strip?
A. Protects against lightning strikes B. Provides multiple outlets for power C. Generates power for devices D. Provides battery backup for devices
B. Provides multiple outlets for power
|
Which of the following is MOST likely required during installation in order to legally install
software? A. Automatic updates B. Service level agreement C. License key D. Antivirus software
C. License key
|
Where can a user find the latest updates, upgrades, or firmware for an electronic device
that the vendor supports? A. Internet search engine B. Internet forum C. Technical community groups D. OEM website
D. OEM website
|
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she
can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue? A. The computer does not have current antivirus software installed B. The computer needs to have its components upgraded C. The downloaded toolbars are filling the browser screen D. The owner was not using complex passwords
C. The downloaded toolbars are filling the browser screen
|
Which of the following alternative technologies allows a computer to run multiple operating
systems without partitioning the hard drive? A. Web applications B. Dual boot C. Telepresence D. Virtualization
D. Virtualization
|
Which of the following connectors consists of three separate plugs for video?
A. Display port B. S-video C. Thunderbolt D. Component
D. Component
|
A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which
of the following operating system types is required? A. 8-bit B. 16-bit C. 32-bit D. 64-bit
D. 64-bit
|
A user needs to download tax documents from a financial website. Which of the following is
the website MOST likely to use for transmission of the tax document to the users browser? A. HTTP B. HTTPS C. SFTP D. FTP
B. HTTPS
|
Which of the following are considered input devices for a computer? (Select TWO).
A. Mouse B. Printer C. Speakers D. Microphone E. Monitor
A. Mouse
D. Microphone |
Which of the following is a 15-pin video connection?
A. DVI B. S-video C. Component D. HDMI E. VGA
E. VGA
|
Which of the following technologies allows people to communicate all over the world
inexpensively? A. Virtualization B. SSID C. Kinetics D. VoIP
D. VoIP
|
Which of the following BEST describes the pros and cons of a home wired network?
A. Low throughput, low mobility, high availability, high latency, high security B. High throughput, high mobility, low availability, low latency, high security C. High throughput, low mobility, high availability, low latency, high security D. Low throughput, high mobility, low availability, high latency, low security
C. High throughput, low mobility, high availability, low latency, high security
|
When connecting a printer to a network, which of the following is needed to complete the
process? (Select TWO). A. IP address B. User's password C. Computer’s name D. Subnet mask E. HTTP port F. Fax number
A. IP address
D. Subnet mask |
While browsing the Internet, a user receives a warning regarding the display of mixed
content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website? A. It stores data in cache or cookies, but not both. B. It requires login credentials for some sections. C. It contains both secure and non-secure parts. D. It is best viewed with a different browser.
C. It contains both secure and non-secure parts.
|