1-11 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Sarah turned on her computer and noticed that some important documents that were stored in her User folder are now missing. Which of the following would be the MOST LIKELY cause?

Malware infection

6.5.8 Explore Network Configuration Information

What is the IPv4 address of the workstation? What is the subnet mask? What is the default gateway address? Use the ipconfig /all command to find the answers to two more questions: What is the address of the first DNS server that the workstation will use for name resolution? How did the computer get its IP configuration information?

Which of the following is the most common type of resume?

Chronological

Match each source on the left to its source type on the right.

A catalog of all the mayor's speeches and news articles about them - Tertiary source The transcript of a speech by the mayor - Primary source A news article about the mayor's speech - Secondary source

10.5.14 Use Windows Defender

Add a file exclusion for D:\Graphics\cat.jpg. Add a process exclusion for welcome.scr. Locate the current threat definition version number. Answer Question 1. Check for updates. Answer Question 2. Perform a quick scan.

6.4.6 Configure a Wireless Infrastructure

Add the cable modem to the Workspace.Use a coaxial cable to connect the modem to the WAN connection.Plug in the modem. Add the wireless router to the Workspace.Use an RJ-45 cable to connect the yellow internet port on the router to the cable modem.Use another RJ-45 cable to connect the computer to one of the blue LAN ports on the wireless router.Plug in the wireless router.

5.3.13 Use a Proxy Server

Address: proxy.corpnet.com Port: 9000

Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series?

Alexa

The process of proving to the computer that you are who you say you are is called ____________.

Authentication

Which component gets things running until the operating system takes over?

BIOS

Databases, authentication, and user accounts are all part of a website's ______________.

Backend

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?

Bar graph

Which of the following computer components typically has the FASTEST performance?

CPU

A computer has power, but there are no beeps and the computer does not boot. Which of the following would be the MOST LIKELY cause?

CPU failure

Which of the following key combinations lets you open Task Manager?

CTRL, ALT, DELETE

Which network type uses a coaxial cable to receive its signal?

Cable

Web browsers save website information in their _________, which helps the site load faster on future visits.

Cache

Which of the following would be the BEST option to help you narrow down choices when identifying a career in IT?

Career Assessment Tests

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer?

Change browser settings to notify before downloading.

Which of the following certifications would you pursue to help you land a job as a network administrator?

Cisco CCNA

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?

Client error

How many pages should a resume be for someone looking for their first job?

1

Which of the following transfer rates is the FASTEST?

1,480 Mbps

Which of the following are characteristics of Bluetooth? (Select two.)

1. 2.4 GHz radio wireless 2. Ad hoc connections

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

1. 802.11g 2. 802.11a

Select the tags you MUST use to have a proper HTML document. (Select three.)

1. <head> 2. <body> 3. <html>

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts. Which of the following policies are BEST to configure? (Select TWO).

1. Account lockout threshold 2. Minimum password length

Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two.)

1. An IDE can autocomplete key words. 2. An IDE has a library of built-in functions.

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

1. Authentication 2. Encryption

Which areas of Information System (IS) technology can lead to better communication with customers? (Select two.)

1. Automation 2. Order management

Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.) IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%.

1. Branching 2. 8%

An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should you take first? (Select two.)

1. Make sure the surge protector is turned on. 2. Make sure the power cord is plugged into the wall.

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which of the following policies are BEST to configure? (Select TWO).

1. Minimum password age 2. Enforce password history

4.2.8 Explore the Windows 10 OS

Configure the screen saver settings.Right-click Start and then select Settings.Maximize the window for better viewing.Select Personalization.From the left pane, select Lock screen.From the right pane, select Screen saver settings.Under Screen Saver, use the drop-down to select Photos.Configure the Wait time to 5 minutes.Select On resume, display logon screen.Select OK to close the Screen Saver Settings dialog.In the top left, select Home to return to the Windows Settings page. Enable Remote Desktop.From Windows Settings, select System.From the left pane, select Remote Desktop.From the right pane, under Enable Remote Desktop, slide the switch to ON.Select Confirm. Use File Explorer to create a folder.Right-click Start and then select File Explorer.From the left pane, expand and select This PC > Data (D:) to open this drive.From the right pane, right-click in white space, and then select New > Folder.In the Name field, type Reports and then press Enter.Close File Explorer. Enable a network adapter.From Windows Settings, select Network & Internet.From the right pane, under Change your network settings, select Change adapter options.Right-click Ethernet and select Enable.Close the Network Connections window.In the top left, select Home to return to the Windows Settings page. Select Score Lab.

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

6.3.4 Set Up an Ethernet Connection

Connect the workstation in Office 1 to the Ethernet local area network using an RJ-45 twisted pair cable. Confirm that the workstation (named Office1) has a connection to the local network and the Internet.

Which of the following is a programming identifier that would be used to define values that don't change?

Constants

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform?

Contain the problem.

7.3.11 Tables and Relationships

Create a new table for customers.At the top of the screen, click the Create tab, then click Table Design.In the first row of the grid, set the field name as CustomerID and the data type as Autonumber. Click the Primary Key button at the top-left corner of the screen to make this field the primary key.In the second row of the grid, set the field name as firstName and the data type as Short Text.In the third row of the grid, set the field name as lastName and the data type as Short Text.At the top-left corner of the screen, click the Save icon. Change the name of the table to Customers and click OK. Create a one-to-many relationship to link the Employees table to the PhoneNumbers table.At the top of the screen, click the Database Tools tab, then click Relationships.On the Show Table dialog box, double-click Employees and PhoneNumbers, then click Close.Drag the EmployeeID field from the Employees table (primary key) to the EmployeeID field of the PhoneNumbers table (foreign key).On the Edit Relationships dialog box, check the box next to Enforce Referential Integrity, then click Create.

7.4.7 Create Queries for a School Database

Create a query to show all grades below 70. This query should include the first and last name fields from the Students table, the courseName field from the Courses table, and the Grade field from the Enrollments table. Save this query and name it Grades Under 70.

Which of the following describes using data analytics to inform business operations?

Data-driven business decisions

Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems?

Database developer

Which process exports a database into a format that can be read by another program like a spreadsheet?

Database dump

7.2.7 Explore an Access Database

Delete Ronald Fisher's record (#12) from the Customers table. In the Orders form, change the order for record 11 from Combo #1 to Combo #2. Print the Total Sales by Product report. Change the name of the Sales This Week query to Total Sales This Week. Delete the Products Under $2 query.

4.4.16 Use Linux Shell Commands

Delete a file as follows:At the prompt, type ls and press Enter to see a listing of the files in the directory.Type rm old_myfile.txt and press Enter.Type Y to remove the file old_myfile.txt.Type ls and press Enter to see that old_myfile.txt is removed from the directory. Add a file as follows:Type touch new_myfile.txt and press Enter to create a new file in the mbrown home directory.Type ls and press Enter to see that the file new_myfile.txt is created. Add a line to a file as follows:Type vi new_myfile.txt and press Enter to use the vi editor to open the file new_myfile.txt for editing.Press the i key to enter insert mode in vi.Type New line for new_myfile.txt.Press the ESC key.Type :wq and press Enter to save and exit the file. Copy a file to a different directory and rename it as follows:Type cp new_myfile.txt /home/mbrown/practice and press Enter to copy the file new_myfile.txt to the practice directory.Type cd /home/mbrown/practice and press Enter to move to the practice directory.Type ls and press Enter to see that new_myfile.txt is in the /home/mbrown/practice directory.

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Delete the email without opening the attachment.

What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications?

Desktop

As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to manually update this new driver?

Device Manager

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?

Device Manager

Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Device drivers

On a flowchart, which of the following represents a decision?

Diamond

4.4.11 Configure NTFS Permissions

Disable permissions inheritance for E:\Marketing Data and E:\Sales Data and convert the existing permissions to explicit permissions. For each of the above folders, remove the Users group from the access control list (ACL). Add the Marketing group to the Marketing Data folder ACL. Add the Sales group to the Sales Data folder ACL. Assign the groups Full Control to their respective folders. Do not change any other permissions assigned to other users or groups.

What does the following JavaScript code snippet do when the code is loaded in a browser?

Displays the text "My JavaScript Button" and a button labeled "Click me!"

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?

Document findings/lessons learned, actions, and outcomes

6.3.8 Use a Wireless Network

Drag the USB wireless adapter from the Shelf and connect it to a USB port on the back of your computer. Switch to the operating system and connect to your secure wireless network using the following information.Network Name: Apt-34Connect automatically: EnabledNetwork Security Key: @SecurePlace&!Allow your PC to be discoverable by other PCs and devices on this network: No

Which of the following is a good general rule to go by when deciding what to wear to an interview?

Dress one step above what the position requires.

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?

Duplicate the problem, if possible

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

Email filtering

10.6.15 Configure File History

Enable File History on the Data (D:) volume. Configure File History to save copies of files every 15 minutes. Retain previous versions of files for 6 months.

10.4.6 Configure File Encryption

Encrypt the D:\Finances folder and all of its contents. Add the Sam user account as an authorized user for the D:\Finances\2019report.xls file.

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform?

Establish a plan of action to solve the problem and identify potential effects

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology?

Establish a theory of probable cause

A short piece of copyrighted music is used in a news story covering the musical artist. Which DMCA provision would MOST LIKELY allow this?

Fair Use

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?

Fair Use

Designations at the end of file names such as .docx and .html are called _____________.

File extensions

Which of the following is the best device to deploy to protect your private network from an untrusted public network?

Firewall

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

Firewall

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?

Firmware

Which of the following should not be used as a primary key in a table?

First name

Which of the following uses persistent memory chips to store data?

Flash drive

A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values?

Float

Marty, a database administrator, has added a foreign key to a table in a database. Which of the following describes the purpose of a foreign key?

For one table to reference records in another table.

6.5.10 Configure TCP/IP Settings

For the host IP address, use the last valid IP address within the subnet: 192.168.20.62. For the subnet mask, use the same subnet mask configured on the router: 255.255.255.224. Configure the default gateway with the following address: 192.168.20.33. Configure the preferred DNS server address as: 198.12.11.2.

Which of the following is the BEST way to handle a program that is unresponsive?

Force-close the program

A value that's used to identify a record from a linked table is called a ________________.

Foreign Key

9.3.5 Use Microsoft Excel Tables to Analyze Data

Format cells A3:D43 as a table with headers. Add a total row to the table, then adjust the total row to show the average life expectancy for each column. Use the second column of data to sort the table from longest to shortest overall life expectancy. Examine the data in the table. Then answer the following questions: The country with the longest overall life expectancy is ________. The country with the shortest overall life expectancy is ___________. In the Americas, how many more years does the average female live than the average male?

Which option should you choose to send an email you've received to a new person?

Foward

In addition to good design sense, what else do web designers need to be proficient in?

Front-end coding languages

Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.

Frontend

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

Full control

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?

Full disk encryption

Which SQL command is used to give a user permission to a specific database object?

GRANT

4.4.6 Assign File Permissions

Give Sam, Susan and John access to the D:\Latin 101 folder Grant the following permissions to the shared folder:Sam: Read/WriteSusan: Read/WriteJohn (TA): Read Copy the lorem.txt file from the Documents\Latin 101 folder to the D:\Latin 101 shared folder to make the file available to the other team members.

Which of the following has the ability to store user data even if the power to the computer is off?

Hard drive

Which of the following would be the MOST LIKELY cause for a computer to perform sluggishly?

Hard drive

Which of the following BEST describes a back-end developer?

He or she accesses information from databases and prevents unauthorized access.

Which of the following BEST describes a front-end developer?

He or she is concerned with the aesthetics of a website.

Which of the following BEST describes a system administrator?

He or she is typically responsible for securing networks and responding to intrusions in smaller organizations.

Which of the following is a common form of social engineering attack?

Hoax virus information emails.

Mike decides to humiliate a former friend by posting embarrassing photos on social media. Which ethical standard did he violate?

Human dignity

3.6.10 Troubleshoot Memory

Identify the two memory modules that are working. Use information available in the BIOS to identify working modules. The computer will not boot with non-working modules. (To enter the BIOS, restart the computer and press F2.) Place the two non-working memory modules on the Shelf. Install the two working modules (DIMM5 and DIMM6) from the shelf to maximize memory usage using the recommended memory configurations for the motherboard. Boot the computer to Windows and use the System option in the Settings app to verify that all installed memory (8 GB) is detected.

Becca is working on a program that will store data. The program will need quick access to data and data persistence is not important. Where should the data be stored?

In memory

4.7.6 Repair Programs

In this lab, your task is use the Apps option in the Settings app to repair the Security Evaluator program.

3.5.14 Format Drives

Insert the flash drive into a USB port in the computer. In Windows, use File Explorer to format the flash drive with the FAT32 file system using Quick Format. Open Windows Powershell and use the convert d: /fs:ntfs command to convert the Data (D:) drive to use NTFS instead of FAT32 without destroying any existing data on the disk.

A security analyst does which of the following?

Inspects the company's network for security breaches and recommends measures to prevent future attacks.

3.5.5 Install SATA Devices

Install both hard drives in the computer. Read the motherboard documentation to identify the location of the internal SATA connectors.Use the Drive Bays view to install the hard drives into free 3.5" drive bays.For each drive, connect one end of a SATA cable to the drive and the other to a red SATA port on the motherboard.Switch to the Motherboard view to plug in the correct SATA power connector from the power supply for both drives. Boot the computer into the BIOS and verify that both drives are detected. (To enter the BIOS, restart the computer and press F2.)

Carrol purchased a new printer and attached it to her workstation with a USB cable. The printer is powered on, but the computer does not recognize the printer. Which of the following should Carrol do NEXT to be able to send print jobs to the printer?

Install the latest printer driver

6.3.15 Create a Home Wireless Network

Install the wireless access point as follows:Place the 802.11b/g/n wireless access point on the computer desk.Use an RJ-45 cable to connect the wireless access point to a free LAN port on the existing router.Use a power adapter to connect the wireless access point through an outlet on the surge protector or wall plate. Configure the new laptop to connect to the wireless network:Slide the wireless switch on the front of the laptop to the On position. This will enable the integrated wireless network interface card on the laptop.Use the default settings as you connect the laptop to the TrendNet-BGN wireless network. Allow the laptop to be discoverable by other devices on the network.

3.5.12 Create Volumes

Install two SATA hard drives in the computer:Use the Motherboard view to install the hard drives into free 3.5" drive bays.For each drive, connect one end of a SATA cable to the drive and the other to a SATA port on the motherboard.For each drive, plug in an available 15-pin SATA power connector from the power supply. Turn on the computer and use Disk Management to initialize both disks using the MBR partition style. Create a volume on Disk 1 with the following properties:Volume size: 300000 MBDrive letter: E:File system: NTFSVolume label: Data Create a second volume using the remaining space on Disk 1 and all of the space on Disk 2 as follows:Drive letter: S:File system: NTFSVolume label: Art

6.6.12 Configure Windows Update

Install updates for other Microsoft products when Windows is updated. Allow the installation of feature updates to be deferred 60 days. Allow quality updates to be deferred 30 days.

Which of the following can be used by a programmer to debug code?

Integrated development environment (IDE)

Which of the following personality traits means that you possess high moral character regardless of whether you're being watched by others?

Integrity

Which of the following companies is a manufacturer of CPUs?

Intel

Which of the following problems would be the MOST difficult to troubleshoot?

Intermittent problem

Which of the following terms describes an organization that connects users to the Internet?

Internet Service Provider

Steve has just installed a new thermostat in his home that allows him to monitor and adjust the temperature from his phone even while he's away. Which future IT trend is this part of?

Internet of Things (IoT)

Alan, a programmer, needs to create an interactive web page. Which of the following programming languages types would he MOST likely use?

Interpreted

Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do? color = input('What is your favorite color?\n')print('Your favorite color is %s.' % color)

It gets input and produces output.

Which of the following BEST describes a flowchart?

It is a visual representation of the logic in a program.

Which of the following BEST describes a customer relationship management (CRM) system?

It organizes notes, activities, and metrics into one system that works altogether.

Which of the following describes the declarative programming paradigm?

It uses a domain-specific language (DSL) to instruct the program what needs to be done.

A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm?

It uses a linear, top-down approach to solving problems.

If you select a file on the desktop and press "Delete" on your keyboard, what happens to the file?

It's moved to the Recycle Bin

Which of the following terms is used to describe a cycle or version that is repeated over and over?

Iterative

Janice installed a printer on her computer and shared it with Steve. Steve configured the printer on his computer and was able to print a test page. Later on that day, Steve attempts to print but gets an error that the printer is not responding. Which of the following would be the MOST LIKELY reason for this?

Janice has turned off her computer

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?

JavaScript

What type of file system is NTFS?

Journaling

Which of the following would a PC repair technician work on?

Laptop

Match the social media platform on the left with the description on the right. Some items can be used more than once or not at all.

Largest social media platform in the world - Facebook Most popular microblogging platform - Twitter Messaging platform that includes built-in photo editing tools - Instagram Social network focused on images - Instagram Provides live video streaming - Facebook

4.5.11 Use Desktop Applications

Launch the Word 2019 application from the Start Menu. Open the file named ipsum.docx located in the Documents folder on your Computer. Make changes of your choosing in the document. Save your changes to ipsum.docx and then close the file. Pin the Word 2019 application to the Start Menu. Drag an Excel 2019 application shortcut from the Start Menu to the desktop.

You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work. Which of the following troubleshooting steps is the BEST to try first?

Make sure the USB device is plugged in properly.

3.6.8 Troubleshoot System Power

Make sure the power cord between the computer and the power strip is plugged in. Make sure the power supply voltage is set to 115V. Make sure the power supply switch is on.

What does JavaScript do?

Makes web pages interactive.

Match each language to its general purpose in a website.

Makes website elements interactive - JavaScript Adds colors, fonts, and other design elements to website - CSS Creates website structure and content - HTML

What is the main difference between a regular technical support specialist and a managed service provider technician?

Managed service provider's services are outsourced as a third party.

Where is the BEST place to obtain the latest printer driver?

Manufacturer's website

Which invention made it possible to have an entire computer on a single circuit board?

Microchip

Which of the following is an example of computer hardware?

Microchip

Which of the following is NOT an example of an operating system?

Microsoft

Owners of internet-enabled cars can use their phones to do which of the following?

Monitor fuel usage

Which of the following job tasks would be something a QA specialist would do?

Monitor software development in order to maintain a high-quality product.

Which of the following is the system administrator's MOST important task?

Monitoring and maintaining system security

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in?

Mosaic

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?

NFC chips

Multiple computers configured to be able to communicate and share information with each other form a ____________.

Network

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?

Network & Internet

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

Network Architect

The accounting department needs to be able to share files, such as spreadsheets, that can be accessed by everyone in the department. Which of the following would work BEST to provide a collaborative workspace?

Network share

Which of the following IT jobs typically do not require as much education or on-the-job experience?

Network technician

Making real and authentic connections with people is known as which of the following?

Networking

Which Creative Commons license type states that a work can be distributed as long as it is not changed?

No Derivative Works

4.5.13 Use Microsoft Word

Open BatArticle.docx from the Documents folder on your computer. Change the margins of the entire document to Narrow (0.5" on the top, bottom, left, and right). Select all text in the document and change the line spacing to single-spaced. Change the font size of the title (Local Company...) to 20 Change the font size of the subtitle (Employees Say...) to 14. Select all five body paragraphs, beginning with MAPLETON -- and ending with ...bat encounters. Change the layout of these paragraphs to be in two columns, keeping the rest of the paragraphs in one column. Run the spell checker and use the top suggestion to correct the first misspelling. Ignore all other spelling suggestions. Save your changes to the document.

6.7.5 Fix a Network Connection 1

Open Network & Internet settings to check the initial status of the network. Answer Question 1. Select Change adapter options to get more information. Answer Question 2. In the top navigation tabs, select Office 1 and plug the workstation into the network. Return to the operating system view and check the status of the network. Answer Question 3. Use Network & Internet settings to view and change the properties of the Ethernet adapter. Since the network does not have a DHCP server, you will need to manually change the TCP/IPv4 properties as follows:IP address: 192.168.0.15 (or another valid address)Subnet mask: 255.255.255.0Default gateway: 192.168.0.5Preferred DNS server: 163.128.80.93 (or another valid address) Verify the final status of the network. Answer Question 4.

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model?

Open Source

4.4.14 Use Windows PowerShell Commands

Open a Windows PowerShell (Admin) window. Change to the E: drive. Use dir or ls to view the folders on the E: drive. Answer question 1: Which folders are on the E: drive? Use md to create a folder called Graphics on the E: drive. Change to the D: drive. Answer question 2: Which folders are on the D: drive? Use cd to change into the Graphics folder. Use copy to copy cat.jpg to the E:\Graphics folder. Change back to the E: drive and verify that the cat.jpg file was copied. Use chkdsk D: to check the file system on the D: Data volume. Use Task Manager to identify the process ID (PID) for the Language Application, then use taskkill /pid #### to stop that process. From the root (C: drive), use net use P: \\CorpFiles\Personnel to map the P: drive to the Personnel shared folder on CorpFiles. Change to the P: drive and look at the folders on the drive. Answer question 3: Which folders does the P: drive contain?

4.5.15 Use Microsoft PowerPoint

Open the SalesTraining.pptx file from the Documents folder on your computer. Add a new Title and Content slide at the end of the presentation. Add the title Sales Goals to the new slide. Change the theme of the presentation to Metropolitan. On slide 3, change the chart type to Clustered Bar. Add a Push transition to all slides. Save your changes to the presentation. Run a slide show from the beginning to the end of the presentation, then exit the slide show.

9.3.9 Use Microsoft Access Reports to Analyze Data

Open the Total Sales by Product report. Then answer the following questions: The restaurant made ________ from selling drinks. The restaurant sold ___________ Double Mapleton Burgers. The restaurant sold a grand total of __________ items.

Which category of system software provides a platform for application software to run on?

Operating System

Which of the following is used to force-close a program on an Apple computer?

Option, Command, Escape

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?

POP3

3.6.14 Troubleshoot SATA Devices

Press the power button on the computer, then press Delete to enter the BIOS. Notice how many SATA drives are being detected. Answer Question 1. Turn off the computer and switch to the motherboard view. Verify that the red data cable is properly connected from the bottom hard drive to the motherboard. Answer Question 2. Verify that power is properly connected from the power supply to the bottom hard drive. Answer Question 3. Use the Power Supply Tester on the shelf to verify that the bottom hard drive is receiving adequate power. Drag the tester to the Workspace. Drag the 20+4 pin power supply connector from the motherboard to the main tester port (far right). Then drag the 15-pin SATA power connector from the bottom hard drive to the SATA port on the tester (bottom left). Answer Question 4. Replace the red data cable on the bottom hard drive with a known good cable one the shelf. Press the power button on the computer, then press Delete to enter the BIOS. Answer Question 5. Return to the Bench view and turn off the computer. Disconnect the data and power cables and replace the bottom hard drive with the new drive on the shelf. After reconnecting the cables, turn the computer back on and verify that both drives are detected in the BIOS. Answer Question 6. If you wish, exit the BIOS, wait for Windows to load, and then run Disk Management to verify that Windows recognizes both disks.

Which component is responsible for reformatting print jobs so that the printer can understand and process them?

Print driver

Windows stores print jobs in a temporary file on the hard drive. What is this file called?

Print queue

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?

Prioritization

In most operating systems, what is a running application called?

Process

A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process?

Processing

Which of the following Scrum artifacts is a central list of work that needs to be done?

Product backlog

What is the person called on an Agile team who gets to decide what goes on the sprint backlog and whether a task is done or not?

Product owner

A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?

Programmatic access

Andy is a very detail-oriented person. Which of the following Information Systems careers would likely be the BEST option for him?

Project manager

Which Information Systems (IS) career can work in other fields such as construction management and engineering?

Project manager

What is the collective name for creations that are not the intellectual property of anybody?

Public Domain

Which method should be used to search for an exact phrase?

Put the search terms in "quotes"

Which database object is essentially questions that we can ask the database?

Queries

Which of the following can be used to ask a database questions and receive the data we're looking for?

Queries

Edward, a database user, would like to gather some specific information from a database and then manipulate the data in a spreadsheet. Edward then wants to save that information in a file format that will be used by another application. Which of the following database features would work BEST to accomplish this?

Query

Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?

Query builder

Which of the following database objects provides a summary of data?

Reports

Which of the following is often the hardest part of troubleshooting?

Reproducing the problem

Which of the following should you do before going to an interview?

Research the company history and culture

3.5.16 Perform Disk Maintenance

Run Disk Cleanup on the C: drive to do the following:Delete setup log files and temporary files.Do not delete thumbnails. Optimize and defragment both the C: drive and D: drive. Configure the C: drive to be optimized and defragmented on a schedule using the following settings:Run the optimization monthly.Choose only the C: drive for automatic optimization.

Mary needs to view all records from the Clients table. Which command should she use?

SELECT * FROM Clients

Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use?

SELECT * FROM Clients WHERE name = Travis

Which of the following digital communication media does NOT require a connection to the Internet?

SMS

What protocol is used to send email messages from a mail client to a mail server?

SMTP

What is the computer language that makes relational databases work?

SQL

Which of the following is used on a wireless network to identify the network name?

SSID

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

10.3.10 Configure iPad Access Control and Authentication

Set a secure passcode on the iPad:Require a passcode: After 15 minutesNew passcode: H@rd2Guess Configure the iPad to erase data after 10 failed passcode attempts.

4.2.10 Change Windows Settings

Set the display resolution to 1600 x 900. Set the screensaver to Ribbons. Configure the screensaver to activate after the system has been idle for 10 minutes. Require the user to log on before resuming.

On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer environment?

Settings

Julie has 3 printers installed on her Windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?

Settings > Devices > Printers & scanners

Which digital assistant was one of the earliest?

Siri

Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device?

Smart door locks

Web services that help people meet, interact, and share content with other people online are called ____________.

Social Media

Which of the following describes the strategy that defines a businesses social media goals and objectives?

Social Media Optimization (SMO)

Which of the following is NOT a drawback of social media?

Social media makes it difficult to keep in touch with friends and family

Speaking in front of a mirror can help to improve which of the following traits?

Social skills

Software that requires a monthly subscription fee is often called _______________.

Software as a service

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations?

Statistical tools and formulas

Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time?

Storage

Which of the following BEST describes what a kilobyte is a measurement of?

Storage space

The flow of goods and services from the producer to the consumer is known as which of the following?

Supply chain

Which of the following is a methodology used by systems analysts?

System Development Life Cycle (SDLC)

Martin's computer suddenly displayed a blue screen and then restarted. Which of the following BEST describes what happened?

System crash

Which Information Systems career analyzes and assesses the performance of existing systems in order to suggest how a business can operate more efficiently?

Systems analyst

Which Information Systems career would MOST LIKELY provide user training for new or modified systems?

Systems analyst

What is the name of the protocol suite used on the Internet?

TCP/IP

An information system is made up of which of the following general components?

Technology, people, and procedures

What are pixels that are the exact same between multiple frames called?

Temporal redundancy

Wikipedia is considered which of the following sources?

Tertiary

Which of the following is considered part of a smart home?

Thermostat

Which of the following is both an advantage and disadvantage of using cryptocurrencies?

They allow for complete privacy.

Which of the following is a disadvantage of notebook systems?

They are more expensive.

Which of the following BEST describes expert systems?

They are programs designed to solve complex problems in specific domains.

4.7.4 Manage Applications

Use Task Manager to prevent the following applications from running at system startup:Compy DVD AppsDIRE Event MonitorinTuneSM66 Win32 Utility Configure compatibility settings for the C:\Program Files (x86)\AccountWizard\AccountWizard.exe application using the following compatibility mode settings:Run in Windows 8 modeRun in 640 x 480 resolutionRun as an administrator every time

Which of the following was the most widely used personal computer application until the mid-90s?

Word processing

The ______________ is an information system that connects documents to each other by hypertext links.

World Wide Web

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

World Wide Web

Which of the following would be the BEST answer to the question, "What is your greatest weakness"?

"I lack patience but this is something I'm working on."

After running the following pseudocode, what will the value of VARIABLE be? Set value of VARIABLE to 5 Increase the value of VARIABLE by 3 If the value of VARIABLE is odd, increase its value by 1 If the value of VARIABLE is even, increase its value by 1 If the value of VARIABLE is odd, increase its value by 1

10

How long should a good elevator pitch be?

30 seconds

How many heading tags are available for heading and subheading when using HTML?

6

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?

802.11n

You want to have a hyperlink to testout.com on your web page. What is the correct HTML syntax to accomplish this?

<a href="www.testout.com">Link to the TestOut homepage</a>

Which of the following tags contains all the elements that will be presented on the visual portion of a website?

<body></body>

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

Which kind of file would be hurt most by a lossy compression algorithm?

A text document

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?

Access point

Which of the following acronyms describes the traditional way to make sure data stays consistent across the entire database?

ACID

Which command is used to add, change, or remove fields on an existing table?

ALTER TABLE

Which of the following should be done to protect your identity when creating a social media profile?

Always review and set privacy settings.

You are working on a program that needs to keep track of many values at the same time. Which of the following would you use?

An array

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?

Satellite

Which Windows tool shows currently running programs and can be used to end a process?

Task Manager

Files that you send along with an email message are called __________.

Attachments

In object-oriented programming, which of the following concepts is used to describe properties?

Attributes

Bill wants to use an image he found online. The license says he can use it but must credit the original creator. Which Creative Commons license was used?

Attribution

Match each feature to whether it influences audio or video quality.

Audio 1. Sampling Rate 2. Bit Depth Video 1. Frame Rate 2. Color Depth 3. Resolution

A software developer wants to provide a compiled executable program to a customer. Which of the following computer languages would provide this capability?

C++

Which data model focuses on high-level concepts?

Conceptual

Which of the following are the four general tasks a user needs to perform for a database to function properly?

Create, Read, Update, Delete

Which of the following is a way for programmers and others to make sense of complex business flows?

Data modeling

Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics?

Data scientist

Which of the following applications can be used for storing, modifying, extracting, and searching data?

Database software

Given the numerical value 1010101.11, which of the following number systems is MOST likely represented?

Decimal

What is one of the things that has set Siri apart from other digital assistants?

Easter eggs

Which of the following careers consists of designing tiny microchips?

Electrical engineer

Which of the following is NOT an example of an information system?

Electrical system

What should a level 1 technician do when they are unable to solve an issue?

Escalate to a higher level of support.

Which type of Information System (IS) is used to help doctors diagnose diseases?

Expert systems

Which of the following keys is used to enter Safe Mode on a Windows computer?

F8

Which of the following BEST describes Computer Science (CS)?

It is the study of computers and computing concepts.

Which network type uses light pulses to transmit data?

Fiber optic

Which of the following Internet technologies provides the FASTEST speeds?

Fiber optic

In a relational database table, columns are better known as ________________.

Fields

In which of the following situations should you expect total privacy?

Financial transactions

Clickable text or images that take you to different sites on the World Wide Web are called __________.

Hyperlinks

Which of the following BEST describes Information Technology (IT)?

IT refers to everything that involves computers.

Which of the following is used to change traffic lights for emergency vehicles?

ITCS

Which of the following lists the basic computing and processing steps in order?

Input, processing, output, and storage

4.3.4 Update Drivers

Insert the USB thumb drive in a free USB port. Use Device Manager to update the driver for the network adapter using the driver on the USB thumb drive. Use Device Manager to update the driver for the scanner by searching Windows Update for the new driver.

Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do?

Install the latest driver

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

Internet

A _________ is a private network that utilizes the same technologies as the Internet.

Intranet

Which of the following BEST describes the ping utility?

It sends a single packet to a specified network address and then waits for a reply.

Abby needs a device that she can take to a client's location and show presentations from. Which of the following devices would be the BEST option for her?

Laptop

Which of the following would be responsible for resetting a user's password?

Level 1 support technician

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?

Line graph

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

Local installation

Which of the following DBMS programs is open source?

MySQL

Which of the following IT jobs includes installing and configuring network media?

Network administrator

Where are values the computer is directly working with at a particular moment in time stored?

On the CPU register

Which of the following typically does NOT save a conversation after it has taken place?

Online chat

10.6.13 Use Backup Software

Save the backup to the Backup (E:) volume. Back up files daily. Keep backup files for 6 months. Back up the entire Data (D:) volume. Make a backup now.

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened.

S/MIME

Which of the following terms is used to describe a lightweight development process with very little overhead?

Scrum

You submitted the same paper from high school for a college class. Which form of plagiarism is this?

Self

Which type of data have elements in common but do not fit into rigid rows and columns in a table?

Semi-structured

Which of the following methods will NOT open a file from the desktop?

Single-click the icon

What is the name of the menu in the bottom left corner of the Windows environment?

Start Menu

Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing?

Startup

7.4.5 Microsoft Access Queries

The Employee Phone Numbers query selects records from ___________ table(s). The Products Under $2 query uses which of the following SQL keywords? In the Total Sales by Product query, the Number Sold field counts records from the _____________ table.

Which of the following is the MOST important skill an internet service technician can possess?

The ability to quickly troubleshoot and fix any issues that may arise from customers

A business wants to set up a database to store customer and order information. They have decided to use a relational database. Which of the following is the main benefit of using a relational database?

The data can be organized into separate tables that are related to each other.

What is the biggest benefit to using a DHCP server in a large network?

They save time for the network administrator.

Which of the following statements is true regarding a network technician?

They troubleshoot reported problems and assist users in resolving network-connection issues.

When composing an email message, why might you want to use the Bcc field?

To copy the email confidentially

Which of the following is a type of input device?

Touchscreen

Which of the following utilities would you use to find the path between two computers?

Tracert

Which kind of connector is pictured here?

USB

Which type of connector is commonly used for keyboards and mice?

USB

Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software?

Utility Software

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?

WPA2

What is the term for code that keeps running as long as a certain condition is met?

While loop

Which of the following operating systems require a file extension to execute a program?

Windows

A NOT NULL __________ is a rule that prevents certain fields in a database from being left blank.

constraint

A pop-up blocker is a web browser feature that _________________.

prevents unwanted advertisements

Which of the following is a valid email address?

[email protected]

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. They use an 802.11n wireless network. The wireless network is broadcasting an SSID of Linksys. The wireless network uses WPA2 with AES security. Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.)

1. Change the SSID to something other than the default. 2. Disable SSID broadcast.

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves.

1. Configure the screen lock to be applied after short period of nonuse. 2. Configure the screen saver to require a password.

Which of the following are optical storage devices? (Select three.)

1. DVD 2. CD 3. BD

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)

1. Details 2. Processes

The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.)

1. IMAP 2. POP3 3. SMTP

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).

1. Lock the screen with some form of authentication 2. Keep the operating system up to date

Rita is a network administrator at a small office supplies company. She has been asked to design and implement a major upgrade of the company's network infrastructure. Which of the following activities will best help Rita to successfully manage this project? (Choose TWO.)

1. Make sure the project requirements are clear and comprehensive 2. Perform a thorough needs assessment for the company

Which of the following are considered asynchronous technologies? (Select two.)

1. Message boards 2. Email

The password policy below incorporates the following: Passwords must include at least one capital letter Passwords must include a mix of letters and numbers Passwords must be different from the past eight passwords Passwords must contain at least one non-alphanumeric character Which of the following password best practices are being used? (Select TWO).

1. Password history 2. Password complexity

You've just received an email message that indicates a new, serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. Based on the email message, which of the following are the next BEST actions to complete? (Select TWO).

1. Run a full anti-malware scan. 2. Verify the information on well-known malicious code threat management Web sites.

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.)

1. Selling user-generated data to other companies 2. Targeted ads

Once you've identified a specific IT career you'd like to pursue, which of the following can BEST help you create a career plan? (Select two.)

1. Set clearly defined goals 2. Compare your current experience with job qualifications

Which of the following are primary sources? (Select two.)

1. The United States Constitution 2. Jane Austen's Pride and Prejudice

Which of the following are features of using an Excel table to store data? (Select two.)

1. Total row 2. Column sorting

Which of the following are considered private technologies? (Select two.)

1. Video conferencing 2. Instant messaging

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.)

1. You risk losing your job. 2. Your company is exposed to litigation by violating the software license agreement.

How many years of prior experience in tech support do most MSP positions require?

2

Which cellular network type was the first kind of network to use encryption?

2G

A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following would represent the storage capacity of a modern hard disk drive (HDD) purchased from a computer store?

3 Terabytes

Which cellular network type was the first to have gigabit-per-second speeds?

4G

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

5 GHz

Which of the following are the proper HTML tags used to create a numbered list?

<ol> <li>Item 1</li> <li>Item 2</li> <li>Item 3</li> </ol>

Which of the following statements is true regarding a VPN?

A VPN masks a user's IP address in order to make their actions untraceable.

A person that can use HTML, CSS, and JavaScript to create websites (as well as service the website and manage user accounts) is known as which of the following?

A full-stack web developer

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office.

Match each term on the left to its definition on the right.

A service or software application that relies on shared resources over the Internet - Cloud computing A software application that accesses web applications and websites - Browser A company that provides access to the Internet - Internet Service Provider An interconnected global public computer network - Internet An information system that connects documents to each other by hypertext links - World Wide Web

Which CPU type would MOST LIKELY be found in a smartphone?

ARM

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

Academic journal

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in?

Accidental

10.6.6 Install a UPS

Add a UPS for your computer: Plug the UPS into the wall outlet and turn it on. Plug the computer and monitor power cables into the battery backup outlets on the UPS. Plug the printer into a surge protection-only outlet on the UPS. Connect the network cables through the UPS to the computer. The cable from the wall connects to the IN port. Connect the USB cable to the UPS and the computer.

6.4.12 Configure a VPN Connection

Add a VPN Connection as follows:VPN provider: Windows (built-in)Connection name: SalesVPNServer name or address: 198.10.20.12VPN type: Secure Socket Tunneling Protocol (SSTP)Type of sign-in info: User name and passwordDon't allow Windows to remember authentication credentials Set VPN security properties to meet the following requirements:VPN type: Secure Socket Tunneling Protocol (SSTP)Authentication: Microsoft: Secured password (EAP-MSCHAP v2) (encryption enabled) Connect to the VPN as follows:Username: VPNUser12Password: Ro@d24#!

6.3.11 Pair Bluetooth Headphones with a Mobile Device

Add the Bluetooth headphones to the Workspace. Place the headphones into pairing mode. Configure your iPad to connect to the headphones:Enable Bluetooth on the iPad.Pair the Bluetooth headphones with the iPad.

Which of the following processes does 3D printing use?

Additive

Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?

Algorithm

Which of the following describes a Man-in-the-Middle attack?

An attacker intercepts communications between two network hosts by impersonating each host.

Which data type uses historical data to make decisions in the present?

Analytical

In which of the following careers does one usually work together in teams to create software programs?

Application developer

A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this?

Application programming interface (API)

Which programming language type is the most basic human-readable and closest to actual machine language?

Assembly

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.

Big Data

Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as?

Big Data

Which of the following is cryptocurrency?

Bitcoin

Dana has performed a transaction online. The transaction is recorded in a public database. Which future IT trend was MOST LIKELY used?

Blockchain technology

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?

Boolean

A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used?

Branching

10.5.8 Configure Remote Wipe

Browse to icloud.com and login using the following credentials: Apple ID: [email protected]: thaiGuy891! Using Find iPhone, select his iPad and erase it. Enter a phone number and message to be displayed on the iPad.

5.3.8 Clear Browser Cache

Browsing history Download history Cookies and other site data Cached images and files Passwords and other sign-in data Autofill form data Site settings Hosted app data

Which of the following is something that an Information Technology (IT) professional would do?

Build and repair computers

Which of the following should an electrical engineer be proficient in using?

CAD software

Mary is interested in moving into a career as a penetration manager. Which of the following IT certifications should she pursue?

CEH

Which hardware component processes data?

CPU

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform?

Check the vendor's website for an updated driver.

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?

Cipher text

What is a disadvantage of using the cloud for data storage?

Cloud storage backups require a reliable internet connection.

Social media marketers need the ability to do what?

Collaborate across teams

What is the first step of the data analytics process?

Collecting raw data

Which operating system function has a steeper learning curve and can potentially break the system without careful use of its operations?

Command line interface (CLI)

6.4.4 Connect a Cable Modem

Connect the components to make the Internet connection.Add the cable modem to the Workspace.Connect the modem to the WAN connection using an RG-6 coaxial cable.Connect the computer to the cable modem using a 10/100 Mbps Ethernet connection (RJ-45 cable).Use the AC to DC power adapter to plug in the modem. Use the Network & Internet Settings dialog to confirm that the computer is properly connected to the Internet.

Which of the following is a benefit of 3D printing over traditional manufacturing?

Consumes less material

Drag the correct HTML tag on the left to its description on the right.

Contains the title of the web page, links to stylesheets, and metadata to help search engines find the page. - <head> Lets the browser know that it should interpret the document as HTML. - <html> Contains all the elements that will be presented on the screen. - <body>

A major capability of Alexa is its ability to do what?

Control smart devices

Small files that a website saves on your computer to remember your preferences are called ______________.

Cookies

Which digital assistant was named after an artificial intelligence in an Xbox video game?

Cortana

4.4.4 Manage Files and Folders

Create a new folder named Latin 101 in the Documents folder on your PC. Copy the D:\ipsum.docx file to the Latin 101 folder you just created in Documents. Delete the lorem.docx file from the Documents folder. Rename the D:\ipsum(draft).docx file to ipsum_draft.docx. Restore the ipsum2.docx file from the Recycle Bin to the Documents folder. Empty the Recycle Bin.

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better fraud protection

What is the general term for software that creates and manages databases?

DBMS

Which of the following terms describes the process of rearranging files on the hard drive so that the computer runs more efficiently?

Defragmentation

Abby wants a high-end computer system for her home office that can be upgraded. Which of the following should she choose?

Desktop

6.7.3 Fix Network Adapter Problems

Disable the Broadcom network adapter until a fix can be found. Enable the RealTek network adapter to take the place of the Broadcom adapter. Update the drivers for the RealTek network adapter using Microsoft Update.

Which of the following describes the firmware in gaming consoles, TVs, and smart cars?

Embedded OS

Match each database object on the left to its description on the right.

Formatted summary of information from a database. - Report User-friendly interface for adding to or retrieving information from a database. - Form Stores raw data in a relational database. - Table Retrieves specific information from a database. Can also be used to update, edit, and delete information. - Query

Which of the following makes it easier for users to enter data into their tables?

Forms

How many ping packets are sent by default in a successful ping request?

Four

Which of the following can recognize different voices that it records and tailor its responses accordingly?

Google Assistant

Which of the following professionals would be MOST likely to create a poster?

Graphic designer

Which of the following should be done before working on hardware in a computer system?

Ground yourself using an ESD wrist strap

Which Internet protocol is used to transmit encrypted data?

HTTPS

Which of the following future trends in Information Technology (IT) refers to an organization automating as many tasks as possible?

Hyper-automation

Which of the following is NOT one of the essential components of an information system?

Hyperlinks

You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using?

Hypervisor Type 1

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IMAP

Which Information Systems (IS) career oversees integrating different technologies and systems within an organization?

IS manager

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take?

Ignore the paper and tell no one of its contents.

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

Improved performance

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe.

5.4.8 Copy Files to OneDrive

In this lab, you need to copy the ipsum.docx file from the Documents folder on your desktop system to the Documents folder within your Microsoft OneDrive account.

Which of the following would be the MINIMUM qualification for a PC technician job?

Industry certification

Which of the following is not an advantage of SSDs over HDDs?

Inexpensive

9.3.7 Use Microsoft Excel Charts to Analyze Data

Insert a new line chart based on the data in A2:B23. Move the chart to a new chart worksheet called Time Progression. Enable the Data Labels option on the chart. Examine the data table on the Gold Medal Winners sheet, along with the chart on the Time Progression sheet. Then answer the following questions: The current Olympic record in the women's 100 meters was set in ________. The current Olympic record holder is ___________. How many times has an existing Olympic record been tied by a winner of the race in subsequent years?

4.4.8 Copy Files from a USB Thumb Drive

Insert the USB thumb drive into a free USB port. Verify that the system detects the device. Copy the lorem.docx file in the Latin 101 folder on the thumb drive to the Latin 101 folder within the Documents folder on your computer. Remove the thumb drive from the USB port. Be sure to stop the device properly in Windows before removing it.

Which of the following BEST describes the ipconfig utility?

It is a utility that displays all current TCP/IP network configuration values.

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?

Looping

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?

MAC address filtering

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection?

Mobile data

Which of the following devices would MOST likely have a 4G connection?

Mobile phone

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

Modem

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?

Modify

What are non-relational databases that deal with Big Data often referred to as?

NoSQL

Diana is using an image she found online in a poster that she is selling, even though the license states she is not allowed to make money off of it. Which license type would Diana MOST LIKELY be violating?

Non-Commercial

Which of the following programming models are built from class templates that have properties, attributes, and methods?

Objects

6.3.13 Configure Network Printing

On Office1:Share the HP LaserJet 3050 PCL 6 printer using the share name HPLaser3050 (no space in the name).While sharing the printer:Allow clients to render print jobs on their own computers.List the printer in the directory. On Office2:Add the shared HPLaser3050 printer connected to Office1 to the list of available printers.Make HPLaser3050 the default printer.

4.3.10 Clear CMOS Settings

On the motherboard, you can remove the battery to clear the CMOS settings. If the motherboard does not have a CMOS battery, there will be a reset button on the motherboard. In this lab, your task is to clear the CMOS settings and then make sure the computer boots into Windows.

Which of the following Application Architecture Model tiers describes office productivity software?

One Tier

6.7.7 Fix a Network Connection 2

Open Windows PowerShell and use the ipconfig command to check the initial status of the Ethernet adapter. Answer Question 1. In the top navigation tabs, select Support Office and check to see if the workstation is plugged into the network. Answer Question 2. Check to see if the network link light on the back of the computer is turned on. Answer Question 3. Remove the faulty network cable from the computer and the wall outlet. To support 100 Mbps or greater speeds, connect the Cat6a cable on the shelf to the computer and the wall outlet. Return to the operating system view and use ipconfig to verify the status of the Ethernet adapter. Answer Question 4.

What is the term for software that anyone can use or modify for free?

Open-source Software

Which of the following commands makes an application shortcut appear on the taskbar?

Pin to taskbar

Which of the following tools would you use to check connectivity between two computers?

Ping

Which of the following components converts AC to DC?

Power supply

A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field?

Primary key

Which of the following is found in one or more columns of data and contains a unique identifier for the row?

Primary key

Where would you go to cancel a print job?

Print queue

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?

Proprietary Software

Match each security policy on the left with the appropriate description on the right.

Provides a high-level overview of the organization's security program. - Organizational Security Policy Specifies that user accounts should be locked after a certain number of failed login attempts. - Password Policy Sets expectations for user privacy when using company resources. - Acceptable Use Policy Identifies a set of rules or standards that define personal behaviors. - Code of Ethics

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?

Proxy settings

Which of the following would you do as a computer forensics expert?

Recover digital evidence, some of which may have been damaged or deleted from storage devices.

10.6.17 Restore Data from File History

Restore the Pictures\Layouts\June2020_Issue.jpg file to the version that was last modified on Monday, March 16, 2020 11:15 AM. Restore the Pictures\Images\brochure.jpg file to the version that was last modified on Monday, March 16, 2020 12:15 PM.

Which of the following is a Digital Millennium Copyright Act (DMCA) provision that protects ISPs from being held liable for the copyright infringement others who use their systems commit?

Safe Harbor

Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. What is that value called?

Sample height

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which service would be most useful when looking for information about your favorite TV show?

Search engine

6.2.11 Install a Network Adapter

Select and install the 1000BaseTX PCIe network interface card, which has with the fastest speed to connect to the local network. Select and install the Cat6a cable to connect the computer to the local area network. In Network & Internet settings, confirm that the workstation is connected to the local network and the internet.

Which of the following would be the BEST thing to do following an interview?

Send a thank you note

Which of the following flow chart concepts is depicted below?

Sequence

Which of the following provides services to hosts on its network?

Server

Match each collaboration tool on the left to its description on the right.

Software that keeps track of progress and assignments for large projects - Resource management Software that allows multiple users to work on a document at the same time - Collaborative editing Online forum where discussions consist of threads in response to an original post - Discussion board Software that keeps track of multiple people's schedules - Calendaring Broadcasting one user's screen to other users - Screen sharing

Which of the following is something a computer scientist would do?

Solve problems in areas like robotics

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________.

Spam

Which tab in Task Manager can be used to manage programs that load with Windows?

Startup

In Windows PowerShell, which key can be used to autocomplete a command?

Tab

What is the name of the narrow strip along the bottom of the Windows environment?

Taskbar

Which of the following schools allows students to receive dedicated training for a specific career?

Technical college

An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?

Text-based flat file

7.3.9 Database Design in Microsoft Access

The locations field on the Employees table is set to the ______________ data type. Which of the following tables are related to the Orders table? __________________ is a foreign key field in the Products table.

What is a web designer responsible for?

The look and feel of a website

Which of the following is the BEST reason to search for articles in an online academic database?

The sources are more likely to be peer reviewed

When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause?

The video may become glitchy.

Which of the following would be a reason a company would outsource their IT support?

To cut cost

What is the main purpose of agile methodologies?

To divide large IT projects into smaller, more manageable projects as part of an iterative process

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?

Tracert

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?

Trademark

Which of the following exist to help consumers know what products they're buying?

Trademarks

Which invention allowed computers to become smaller in size?

Transistors

4.6.5 Install and Configure a Local Printer

Turn off Windows management of the default printer. Add the shared HPLaser2300 printer. Configure the HPLaser2300 printer as the default printer.

10.5.18 Configure Windows Firewall

Turn on the Windows Firewall for the Private network profile. Turn on the Windows Firewall for the Public network profile. Add the Arch98 application to the list of applications allowed to communicate through the firewall for all network types.

What is junk email?

Unwanted, unsolicited email

A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier?

Use the APIs for each operating system.

6.4.9 Manage Mobile Devices

Use the Accounts and Passwords option to go to Tyrell Lewis's email account settings and change the advanced configuration to Use SSL to securely communicate with the IMAP server over server port 993. Connect Tyrell to the CorpNet access point through the Wi-Fi configuration using @CorpNetWeRSecure!& as the password.

What is the best countermeasure against social engineering?

User awareness training

10.3.8 Create a User Account

User information:Username: LibbyPassword: tempP@ss# Security questions:

Drag the system component on the left to the device or program that fits with the system component.

Utility software 1. Backup software 2. Disk cleaner 3.Antivirus software Firmware 1. Camera 2. Television 3. Games console Device drivers 1. Video card 2. Printer

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure?

VPN

Which of the following provides security for wireless networks?

WPA2

4.2.12 Explore iOS

What is the email address of the owner of the iPad? What is the current status of Wi-Fi on the iPad? What is the current status of Bluetooth on the iPad? The General settings show which iOS version is running on the simulated iPad. What iOS version is installed? In Mail settings, how many lines of messages are set to be displayed in the Preview pane? In Safari settings, what is the default Search Engine?

When might it be most helpful to clear your browser's cache of temporary Internet files?

When a website is not functioning as it should

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Zombie/botnet

Which of the following is a proper path name to a shared network printer?

\\computer_name\printer_name

Which of the following commands is used to navigate to different folders in Command Prompt?

cd

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?

import random

Which of the following lines will initiate an Internet search from the address bar of a web browser?

microsoft gov

Mary needs to rename her report.txt file to final_report.txt. Which command will allow her to do this?

ren report.txt final_report.txt

Which of the following is NOT a good response to cyberbullying?

Post the bully's physical address on social media

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Power outage

Which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data?

Predictive healthcare

3.6.12 Troubleshoot Processor Installation

Press the power button on the computer to verify that it will not start. Select the motherboard and view the specifications to identify the location of the CPU socket and fan power connector. Answer Question 1. Close the motherboard specs and verify that the CPU heat sink and fan assembly is installed. Answer Question 2. Answer Question 3. Based on your findings, you will need to replace the CPU.Temporarily remove the heat sink and fan to the Workspace.Remove the bad CPU and place it on the shelf.Install the new AMD AM3 CPU from the shelf onto the motherboard.Re-install the heat sink and fan onto the CPU socket.Verify that the fan power connector is still connected to the motherboard. Turn on the computer and verify that it boots into Windows.

Which of the following components stores values in short-term memory?

RAM

Which of the following is NOT a long-term storage device?

RAM

A typical computer monitor is which type of display?

RGB

Which medium does Wi-Fi use to send data between networks and devices?

Radio waves

Which type of digital picture is made by storing individual pixel values?

Raster

Which permission option lets a user view files but not change them?

Read

10.2.15 Recognize Social Engineering Exploits 2

Read each email in her inbox and determine if it is legitimate. Delete any emails that appear to be hoaxes. Delete any emails that appear to contain malicious attachments. Keep any emails that are safe.

10.2.13 Recognize Social Engineering Exploits 1

Read each email in her inbox and determine if it is legitimate. Delete any emails that appear to be phishing or whaling attacks. Keep any emails that are safe.

Which of the following is the first step in verifying that a problem has been fixed?

Rebooting the system

Which of the following is the correct binary representation of the number 2?

10

To be a proper HTML document, there are a few tags that every web page needs. Put these tags in the proper order.

<html> <head> </head> <body> </body> </html>

Which of the following BEST describes a code of ethics?

A set of rules or standards you adopt that dictate how you act

10.5.4 Enforce Password Settings

Configure password settings so that the user must:Cycle through 8 passwords before reusing an old one.Change the password every 120 days.Keep the password at least 7 days.Create a password at least 10 characters long.Create a password that meets complexity requirements such as using uppercase letters, lowercase letters, numbers, or symbols. Configure the account lockout policy to:Lock out any user who enters four incorrect passwords.Unlock an account automatically after 30 minutes.Configure the number of minutes that must elapse after a failed logon attempt to 15 minutes.

4.6.7 Print a Document

Configure the Canon Inkjet printer to be the default printer. Start Microsoft Word. Open the ipsum.docx file, located in the Documents folder on your Computer, in Microsoft Word. Print ipsum.docx on the Canon Inkjet printer, using the default printing options.

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?

Configure the browser proxy settings.

5.3.10 Configure Browser Settings

Configure the pop-up blocker to block all pop-ups and redirects. Remove the doctorevilskeylogger.com site that is currently allowed to use pop-ups. Configure a new exception to allow pop-ups from mybank.com. Block all location tracking in the browser. Block third-party websites from saving and reading cookie data. Block the virusclickjacking4u.org and darkwebphishing.org sites that are currently allowed to use cookies.

5.7.5 Configure Smart Devices

Create the following rooms for the smart devices in the TestOut Home app:LobbyMain HallOffice 1 Configure the devices in the Lobby as follows:Install the Lobby Camera.Install and configure a smart light switch so you can turn the lights on and off from your iPad. Turn the light on.Install and configure a smart lock so you can lock the front door without leaving your office. Lock the door.Install a smart assistant. Configure the device in the Main Hall as follows:Install and configure the thermostat.Set the temperature to 72 degrees. Configure the devices in Office 1 as follows:Install the Office Camera.Install and configure a smart outlet. Turn the outlet on.

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses?

Crowdsourcing platform

Which of the following is the MOST important skill for a PC technician?

Customer service

Which of the following utilities would you use to automatically assign IP addresses on a network?

DHCP

Which of the following is not an example of wireless networking communications?

DSL

Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data?

Data analyst

Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes?

Data analyst

What is asking specific questions to interpret Big Data called?

Data analytics

Which of the following describes the process of turning data points into useful information?

Data analytics

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?

Data and information

Forensics experts need to be thoroughly familiar with which of the following?

Data encryption methods, operating systems, and programming languages

The concern that Big Data is often obtained without the knowledge or consent of users falls under which Big Data concept?

Data ethics

Which of the following needs to be done before Big Data can be analyzed and interpreted?

Data extraction

What is the technology that aggregates structured data from one or more sources called?

Data warehousing

Which of the following careers is responsible for backing up and securing an organization's databases?

Database administrator

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process?

Perform a backup.

Keyboards, mice, speakers, microphones, and printers are collectively referred to as ____________.

Peripherals

In which of the following should you expect some privacy?

Personally identifiable information entered into a human resource database

When protecting your online identity, which of the following is an internet security threat you need to be aware of?

Phishing attempts

Which of the following is a top cause of motherboard failure?

Physical damage

When working with an application such as Microsoft Excel to generate graphical reports, which of the following chart types would work BEST for data that has relative percentages of a whole?

Pie chart

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?

Plain text

You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first?

Plug in an external monitor

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet

Which installation method is most likely to put your computer at risk of downloading a virus?

Internet installation

Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels?

Internet service technician

If your network does not have a DHCP server, what must you do to access the internet?

Manually change the TCP/IP properties to match your network's settings.

Which type of analytical data can help you make investment decisions?

Market

Which of the following is data temporarily stored on?

Memory chips

Which of the following is NOT an example of a web browser?

Microsoft Word

Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times?

Redundancy

Even if you perform regular backups, what must be done to ensure that you are protected against data loss?

Regularly test restoration procedures.

Which of the following is a disadvantage of a VoIP system?

Relies fully on a stable internet connection

Which option should you use to respond to every single person included on an email?

Replay All

Which option should you use to respond to the sender of an email but not all the recipients?

Reply

Which of the following database features would provide a formatted, easy-to-read listing of the results of a query?

Report

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

Reports

5.6.5 Email Etiquette in Microsoft Outlook

Respond to Gladys Grant's Project Proposal email:Reply to the sender and all other users who received the message.Enter the following text in the body of your reply:Meeting over lunch works well for me!Just below your reply, insert the My Name signature.After including all of the above information, send the email. Respond to Laticia Washington's Important HR Info email:Save the file attachment to your Documents folder.Reply to the sender of the message (Laticia Washington). Do NOT reply to everyone in the company.Since you know James Jordan has the same question, add him as a Cc recipient.Enter the following text to the body of your reply:Hi Laticia,Thanks for the information! Will our FSA plan change?Ima PersonAfter including all of the above information, send the email.

4.3.12 Update Firmware

Restart the computer and press F2 to enter the BIOS. Notice which version of BIOS is currently running. Answer Question 1. Exit the BIOS and use the biosupdater.exe program at the root of C: to update the BIOS. Restart the computer and enter the BIOS again. Notice which version of BIOS is running now. Answer Question 2.

4.3.15 Enable VT in the BIOS

Restart the computer. As the computer boots, press F2 to enter the BIOS configuration utility. Enable VT. Save your changes. Restart the computer to verify the changes you have made.

Which of the following rights is NOT guaranteed by copyright?

Right to avoid criticism

Which of the following Artificial Intelligence (AI) concepts includes self-driving cars?

Robotics

Which of the following statements is true regarding a network architect?

They typically require an industry certification in network design and implementation.

10.6.9 Create RAID Arrays

Turn on the computer. Run Disk Management and initialize the four new disks using MBR as the partition style. Create a new striped volume (RAID0) using all of the space on Disk 1 and Disk 2.Drive letter: EVolume format: NTFSVolume label: Editing Create a mirrored volume (RAID1) using all of the space on Disk 3 and Disk 4.Drive letter: MVolume format: NTFSVolume label: Media

Which connector on the back of a computer is used to attach a mouse to a modern PC system?

USB A

Which of the following encoding schemes would MOST likely be used to represent an emoji?

Unicode

Which of the following is used to identify specific hypertext resources on the World Wide Web?

Uniform Resource Locator

Which type of college would you attend to earn a bachelor's degree?

University

10.4.8 Secure a Home Wireless Network

Use Chrome on Home-PC. Go to 192.168.0.254, and use the following default authentication credentials:Username: adminPassword: password In this lab, your task is to secure the wireless network using the following settings: Change the settings on the wireless access point as follows:Use FlyingFirstClass for the SSID. The SSID name is case sensitive.Use WPA2-PSK authentication, with AES for encryption.Configure H@rd2Guess as the pass phrase. The pass phrase is case sensitive. Change the wireless access point's administrator authentication credentials from their defaults as follows:Username: @dm1nPassword: SomethingSecure!Do not save the credentials in Chrome. Return to the Computer Desk and configure the laptop to connect to the wireless network and save the wireless profile with the settings as listed above.

A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take?

Use Task Manager to end task

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Use data wiping software to clear the hard drives

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

VPN

A developer is creating a program that will store a customer's latest order number. The value will change each time a customer creates a new order. Which of the following would MOST likely be used to store the value?

Variable

Which type of digital picture can be scaled to any size without losing quality?

Vector

Match each protocol on the left to its description on the right.

Verifies that each packet has been transmitted and received correctly - TCP Encrypts and transfers hypertext pages on the World Wide Web - HTTPS Matches unique IP addresses with easy-to-read URLs - DNS Transfers hypertext pages on the World Wide Web - HTTP Divides files into packets and routes them through the Internet to their destination - Internet Protocol Transmits packets in a continuous stream but doesn't verify packets - UDP

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played.

Verify that the volume isn't muted. Verify that speakers are plugged into the correct jack and are powered on.

Which of the following careers typically requires at least a bachelor's degree in telecommunications?

Video production specialist

4.3.17 Create Virtual Machines

Virtual machine name: Test1. Virtual machine location: D:\HYPERV. Generation: Generation 2. Startup memory: 2048 MB - Use Dynamic Memory. Networking connection: Internal. Virtual hard disk name: Test1.vhdx. Virtual hard disk location: D:\HYPERV\Virtual Hard Disks. Virtual hard disk size: 200 GB. Operating system will be installed later. Minimum RAM: 1024 MB. Maximum RAM: 8192 MB.

You need to test a version of macOS but only have a Windows computer. What technology could you use?

Virtualization

Which of the following technologies can be used to make a phone call over an Internet connection?

VoIP

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

WPA2 and AES

Which of the following terms is most often used to describe a sequential or linear process of systems analysis and design?

Waterfall

Which of the following is NOT an element of effective cost control in IT project management?

Waterfall methods

Which of the following is a disadvantage of web applications?

Web applications can carry a monthly or yearly fee.

4.3.8 Find BIOS Settings

Which brand of processor is installed? How much memory is installed in the computer? What is the BIOS version number? How many hard drives are installed? What is the status of the integrated NIC? What is the current status of the USB 3.0 controller?

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?

Wikis

Which software is Microsoft's anti-malware product that is preinstalled on most new computers?

Windows Defender

Every Windows system has a database that stores setting changes such as switching the home page of your web browser. What is this called?

Windows Registry

Which application makes sure your computer has the most recent versions of its system software?

Windows Update

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

Windows update

Which of the following components is NOT required to create a network?

Wireless adapter

Put the following events from computer history in the order they happened:

1. Herman Hollerith develops electronic tabulating machine 2. International Business Machines, or IBM, is formed 3. Scientists at Bell Laboratories invent the transistor 4. Jack Kilby invents the microchip 5. The Apple II is released for home consumers 6. The World Wide Web becomes available to the public 7. Apple releases the iPhone

Arrange the following from smallest to largest.

1. Kilobyte 2. Megabyte 3. Gigabyte 4. Terabyte

Which of the following devices generally include a variety of integrated hardware such as a camera? (Select two.)

1. Laptop 2. Smartphone

Which of the following devices make use of a battery as its main power source? (Select two.)

1. Smartphone 2. Laptop

Which of the following voltages from an ESD discharge would be the minimum to short a computer's hardware components?

100 volts

How many possible values would an 8-bit audio sample have?

256

How many bits are in a single byte?

8

Which of the following is the best definition of a bit?

A single 1 or 0 in a digital signal

Match the storage device types on the left with the description and benefits on the right.

A thick magnetic disk made of aluminum platters. Uses read/write heads to access data stored on the platters. - Hard disk drive (HDD) A flash device with storage capacity similar to a small hard drive. - Solid state drive (SSD) Uses lasers to read and write information stored in the form of pits in their reflective coating. - Optical disc drive Up to several TB in storage capacity and cost per MB is cheap. - Hard disk drive (HDD) Faster than other devices. No moving parts. Last longer than other storage devices. - Solid state drive (SSD) Ideal for music and video. Portable and cheap with a long shelf life. - Optical disc drive

3.4.11 Connect a Monitor

Add the monitor to the Workspace. Use the HDMI video cable to connect the monitor to the computer. Connect the power cord to the monitor and then plug it in. Turn on the monitor and the computer.

Which of the following stores data using microscopic light and dark spots?

Compact disc

The IT staff at a hospital shares genetic information about specific patients with a life insurance company. Which ethical standard was violated?

Confidentiality

3.4.13 Install Peripherals (USB Devices)

Connect the mouse to the computer. Add the USB hub to the Workspace and then connect it to the computer. Connect the scanner to the USB hub. Connect the video camera to the USB hub.

Jeff has been asked to replace a monitor on a workstation. Which of the following device interfaces could he use to connect the new monitor?

DVI

Tina has accepted a position as a graphic designer. She wants a powerful device that she can connect multiple large screens to. Which device would be the BEST option for her?

Desktop computer

Which of the following devices would be easiest to repair?

Desktop computer

Which of the following devices would be the BEST option for a gamer?

Desktop computer

Mary needs someone to make sure her podcast is high quality and sounds polished. Which of the following professionals should she hire?

Digital audio producer

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. After the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue?

Download and install the latest driver from the manufacturer's website.

The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which career?

Graphic designer

You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?

Hard disk

Match each item on the left to its appropriate category on the right.

Hardware 1. Power cable 2. Monitor 3. RAM 4. Video game controller 5. Touchscreen Software 1. Internet browser 2. Operating system 3. Video game

Which of the following notational systems is MOST LIKELY used to represent a MAC address?

Hexadecimal

Which of the following makes videos appear smoother and more fluid?

Higher frame rate

Which of the following BEST describes personal responsibility?

How you act even if no one is watching

Which of the following is primarily operated by a touchscreen?

Mobile device

3.4.15 Set Up a Computer

Plug the power strip into the wall. Plug the computer into the power strip. Connect the following components to the computer: Keyboard Mouse Speakers Add the monitor to the Workspace, then use the appropriate cables to connect it to the computer and to the power strip. Use a network cable to connect the computer to the network port in the wall plate. Use the following tips to complete this lab: Examine the shape and pin pattern for each connector. Match the correct cable connector to the correct computer port. If necessary, zoom in on the back of the computer or device on the Workspace to get a closer look at the connection ports. In some cases, you can match the color of the connector to the color of the port on the computer to identify possible matches. When you are done connecting devices, click the power buttons on the front of the monitor and the computer to verify that the system starts without errors. If you notice problems, recheck all of your connections.

Match each ethical principle on the left to its definition on the right.

Recognizing and respecting the legal claims of others to online data, creative works, and other digital assets - Digital Property Rights Protecting data and information we're not authorized to share - Confidentiality Respecting and honoring the inherent worth and right to privacy of other people - Human Dignity Observing rules of "netiquette" that promote courtesy and respect in online settings - Civility

Which of the following is a lossless compression algorithm?

Run-length encoding

3.3.10 Explore the Motherboard

The purpose of this lab is to help you become familiar with the motherboard and other internal components such as the power supply and internal hard drives. Begin by opening the Motherboard view of the computer. To help you identify various components, select the motherboard and view its detailed specifications. Then answer the following questions: How much memory is installed in the computer? What is the speed of the installed processor? (To view and select the processor, remove the heat sink and fan.) What type of power supply is installed in the system? How many SATA hard drives are installed? Open the Back view of the computer and examine the motherboard connectors. Notice which devices are currently plugged in. Then answer the following questions: How many additional (unused) USB ports are currently available (including black USB 2.0 ports and blue USB 3.0 ports)? What type of video port is currently being used for the monitor?

Which of the following is something that an Information Systems (IS) professional would do?

Turn information into meaningful decisions

Jessica is currently editing a commercial she helped create. Which of the following is MOST LIKELY her profession?

Video production specialist

3.3.14 Upgrade a Video Card

You work at a computer repair store. A customer wants to upgrade the video card in his computer to provide more memory, faster processing power, and additional features. He wants to be able to do the following: Use the computer to watch high-definition movies from a Blu-ray player. Connect his monitor to the computer using a connection designed for high-definition content. In this lab, your task is to complete the following: Disconnect the monitor from the current video card and remove the card from the computer. Install the video card with the HDMI connection. HDMI is an interface used by monitors and digital televisions for high-definition content. Provide power to the video card by selecting the power supply and then dragging a 6-pin PCIe power connector to the power port on the right side of the video card. Connect the computer to the monitor using an HDMI cable. In Windows, configure a resolution of 1920x1080 for full HD content. Even though the monitor supports a higher resolution, this is the resolution for HD content.

3.3.12 Install Memory

You work at a computer repair store. You're building a computer using spare parts. In this lab, your task is to install a DDR4 memory module in the computer. Examine the motherboard and locate the four memory slots near the upper-right corner. If necessary, zoom in or check the motherboard specifications to identify the memory slots. Install a single memory module in the motherboard.


Conjuntos de estudio relacionados

nursing 6 unit 3 Brunner med surg Chapter 69: Management of Patients With Neurologic Infections, Autoimmune Disorders, and Neuropathies

View Set

14. ASU - CIS105 - Computer Applications and IT - Mid-term Exam

View Set

Chapter 32: Disorders of Endocrine Control of Growth and Metabolism

View Set