Chapter 19 - Hardware Support A+, Hardware Final Prep

¡Supera tus tareas y exámenes ahora con Quizwiz!

During the charging process of a laser printer, the drum is conditioned by a roller that places an electrical charge of what voltage onto the surface of the drum? -100V +300V -600V +1200V

-600V

All parts of an Android application are published as a package of files wrapped into one file utilizing what file extension? .zip .img .iso .apk

.apk

What mobile operating system is the Fire OS used by Amazon's Kindle Fire devices based on? Symbian BlackBerry OS Java Micro Edition Android

Android

When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in? Administrators Guests Backup Operators Anonymous users

Anonymous users

Switches are slowly being replaced by hubs, which are newer technology. True or False

False

The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. True or False

False

The User Datagram Protocol (UDP) guarantees delivery of data to its destination. True or False

False

The developing, transferring, fusing, and cleaning steps of the laser printing process use the printer components that undergo the most wear. True or False

False

To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional. True or False

False

When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. True or False

False

When using static IP addressing, software automatically configures the network connection on each device. True or False

False

iOS was developed by and continues to be maintained by a consortium of companies. True or False

False

Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True or False

True

Some advanced printers have print server programs included in the printer firmware itself. True or False

True

The act of jailbreaking a phone was once illegal, but was made legal by the U.S. Copyright Office and the Library of Congress. True or False

True

The current release of SMB is CIFS, also called SMB2. True or False

True

The default value of the security level in IE is Medium-high. True or False

True

The iOS operating system utilizes a closed-source, or vendor specific / commercial license. True or False

True

Using Group Policy, you can set security policies to help secure a workstation. True or False

True

In the T568B wiring scheme, what two color pairs are used for transmit and receive on a 100BaseT network? White/green, green White/brown, brown White/orange, orange White/blue, blue

White/green, green White/orange, orange

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path? \\sharedfolder\server \server\sharedfolder \\server\sharedfolder /sharedfolder/server

\\server\sharedfolder

If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? -a USB port -an authentication key on the hard drive -a TPM chip on the motherboard -a PIN on the BIOS

a TPM chip on the motherboard

What is a hypervisor? a program that manages VMs another name for a thin client technology that enhances processor support for VMs a fat client running an HAV

a program that manages VMs

What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? ATA Secure Erase low-level format degausser magnetic data filter

degausser

What are valid recommendations for for a high-end audio/video editing workstation? (Choose all that apply.) -install at least 4 GB RAM -install a motherboard capable of using memory running at 1600 MHz or better -install a sound card -install a CD drive

install a motherboard capable of using memory running at 1600 MHz or better install a sound card

What command can be used to display IP addresses assigned to all network connections on a system? msconfig netstat ipconfig netcfg32

ipconfig

What two commands are used to display TCP/IP configuration on Windows and Unix / Linux / Mac OS X operating systems, respectively? net show ipconfig show ip stat ifconfig

ipconfig ifconfig

What command can be used to flush the local DNS cache on a Windows computer? nslookup -f ipconfig /flushdns dns dump service dnscache restart

ipconfig /flushdns

What statement regarding crossover cables is accurate? -it's normally used to connect a computer to a hub or switch -you use the T568B wiring standard on both ends -it is required to connect two Gigabit Ethernet switches together -it can be used to connect two PCs together

it can be used to connect two PCs together

Which statement regarding 10-Gigabit Ethernet is accurate? you can use Cat-5e or Cat-6 cabling it is a good choice for backbone networks it is sometimes called Fast Ethernet coaxial is a good choice for cabling

it is a good choice for backbone networks

What statement is true regarding the Guest account in Windows 7? -it is disabled by default -it automatically has a complex password -you cannot rename it -it has administrative access

it is disabled by default

What statement regarding satellite connections is accurate? -it provides higher throughput than other connections -it is only available in metropolitan areas -it provides low latency connection -it requires line of sight connectivity

it requires line of sight connectivity

If loose toner comes out with your printout, the fuser is not reaching the proper temperature and professional service is required. True or False

True

Laser printers automatically calibrate themselves periodically. True or False

True

What cable system utilizes a fiber-optic cable? 10GBaseT 1000BaseFX 10Base2 10Base5

1000BaseFX

What version of Ethernet utilizes a fiber-optic cable and has a transmission speed of 100 Mbps? 100BaseTX 100BaseFX 1000BaseFX 100BaseCX

100BaseFX

Home Theater PCs often make use of what type of user interface? command line interface (CLI) 10-foot user interface Aero text user interface (TUI)

10-foot user interface

What TCP port is utilized by an SSH server listening for connections? 20 21 22 23

22

The Remote Desktop and Remote Assistance applications utilize what port for remote access? 22 23 110 3389

3389

What port is utilized by the Remote Desktop service? 22 23 3389 1729

3389

A Bluetooth PIN code requires the entry of a PIN that is how many digits in length? 4 6 8 12

4

How much storage is offered by iCloud Drive for no cost? 5 GB 10 GB 20 GB 100 GB

5 GB

What wireless networking radio frequency yields faster speeds but offers shorter range? 2.4 GHz 5 GHz 7 GHz 11 GHz

5 GHz

What port is utilized by secure IMAP (IMAPS)? 110 143 995 993

993

If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address? APIPA random IP address public IP address dynamic IP address

APIPA

If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached? General Configuration Alternate Configuration Secondary Configuration Fallback Configuration

Alternate Configuration

What products are considered to be set-top boxes? (Choose all that apply.) Amazon Fire TV Chromecast Roku Chromebox

Amazon Fire TV Chromecast Roku

What are the two most popular web server applications? Nginx Tomcat Apache IIS

Apache IIS

What are the names of the application stores for iOS and Google Android devices respectively? iOS AppDrive App Store Google Store Google Play

App Store Google Play

To which group does Windows give access to folders that you create which are not part of your user profile? Power Users Guests Authenticated Users Anonymous Users

Authenticated Users

Releases of Android are named after animals, such as Lion, Leopard, or Puma. True or False

False

What component on a smart phone requires pairing with another device? GPS WiFi Bluetooth SIM card

Bluetooth

What wireless methods exist for connecting to a printer? (Choose all that apply.) Bluetooth ZigBee WiFi infrastructure mode WiFi ad-hoc mode

Bluetooth WiFi infrastructure mode WiFi ad-hoc mode

What cell phone technology is the most popular in the United States? GSM CDMA EDGE SIM

CDMA

If you're looking to install Gigabit Ethernet, what cabling system would you use? coaxial thinnet Cat-6 RG-59

Cat-6

What name is given to the Windows Phone 8.1 virtual assistant? Spartan John Cortana Chief

Cortana

What keystroke should you press to get a logon window if you don't use the welcome screen? Alt+F1 Ctrl+Ins+Home Alt+F5+End Ctrl+Alt+Delete

Ctrl+Alt+Delete

What two applications are an example of a mail server and a mail client application, respectively? Exchange Maverick Outlook Firefox

Exchange Outlook

10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters. True or False

False

A WLAN covers a large geographical area and is made up of many smaller networks. True or False

False

A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure. True or False

False

A setting called airplane mode lowers the output power of the Wi-Fi and Bluetooth antennas allowing these networks to function, but at a reduced range. True or False

False

After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or False

False

On a peer-to-peer network, authentication is the responsibility of the domain. True or False

False

On the IE General tab you can block cookies. True or False

False

Phone cords are a type of twisted-pair cable and use an RJ-45 connector. True or False

False

What company acquired Android code in 2005 and has a leadership role in its development? Apple Symbian Google Yahoo

Google

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group? Administrators group Backup Operators group Power Users group Guests group

Guests group

When all users on a network require the same access to all resources, what type of network model should you use? Domain Homegroup Workgroup Guestgroup

Homegroup

What identifies a SIM card if the card is used? IMEI IMSI ICCID ICCEI

ICCID

What unique number is used to identify each mobile phone or tablet device worldwide? IMSI IMEI ICCID MAC address

IMEI

What is the name of the 32-bit or 128-bit number that is used to identify a device on a network? port number protocol number IP address IP version

IP address

What type of LED monitor provides the most accurate color for video editing workstations? CRT TN IPS MC

IPS

What type of printer is slower than a laser printer, and also tends to smudge on inexpensive paper? Laser Dye-sublimation Thermal Inkjet

Inkjet

Applications on the Android OS are mostly written in what programming language? PHP Objective-C Java Python

Java

What software program is an example of password management software? (Choose all that apply.) KeePass LastPass Dashlane PassLock

KeePass LastPass Dashlane

Most new Android devices are shipping with what version of Android? Froyo Gingerbread KitKat Lollipop (*older versions, but this is what the textbook says)

KitKat Lollipop

What are two examples of HTPC software? Kodi Chromecast Roku Plex

Kodi Plex

What kind of printer works by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning. Inkjet Thermal Dye-sublimation Laser

Laser

What technology can be used to locate a device such as a laptop after it has been stolen? Management software LoJack Trojan Multifactor Trace software

LoJack

What network type covers a large campus or city? PAN WLAN MAN WAN

MAN

Windows 10 features what new web browser, which is designed to replace Internet Explorer? Microsoft Spartan Microsoft Slim Microsoft Edge Microsoft Plus

Microsoft Edge

What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect? SMTP PNRP SNMP LDAP

PNRP

What two protocols are used to deliver mail messages? POP3 SNMP SMTP IMAP4

POP3 IMAP4

What type of permission should you set to control access to files and folders by local and network users? -sharing on FAT32 volumes only -NTFS on NTFS volumes only -NTFS on exFAT or NTFS volumes -sharing on NTFS or exFAT volumes

NTFS on NTFS volumes only

What software programming languages can be used for an iOS app? (Choose all that apply.) Objective-C C C++ Java

Objective-C C C++

A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology known by what name? REt REx VART eRT

REt

What two different types of coaxial cable have been used for cable TV? RJ-45 RG-6 RG-59 RG-PVC

RG-6 RG-59

What does a 1000BaseT NIC use to connect to a network cable? HDMI port RJ-45 port 10BaseT port Half duplex port

RJ-45

What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.) Full control Read execute Write

Read Write

What is the more secure alternative to the SMTP mail protocol? SMTP IMAP POP S/MIME

S/MIME

What DSL technology provides equal bandwidth in both directions? ADSL VDSL SDSL HDSL

SDSL

Outgoing mail is normally sent using what mail delivery protocol? SMTP IMAP4 POP3 SSL

SMTP

What functions as the name of a wireless network? secure key MAC address Network ID SSID

SSID

Originally developed by IBM, what protocol is used by Windows to share files and printers on a network? -Server Message Block (SMB) -Lightweight Directory Access Protocol (LDAP) -File Transfer Protocol (FTP) -Hypertext Transfer Protocol (HTTP)

Server Message Block (SMB)

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network. True or False

True

What two U.S. carriers offer a feature called Wi-Fi calling? ATandT Sprint T-Mobile Verizon

Sprint T-Mobile

What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors? T568A T568B TIA/EIA 586 T568C

T568A T568B

What protocol makes a connection, checks whether the data is received, and resends it if it is not? TCP UDP IP DNS

TCP

For heavy business use, the best practice is to purchase one machine for one purpose, instead of bundling many functions into a single machine. True or False

True

A punchdown tool is used to wire twisted-pair cabling to a keystone jack. True or False

True

A printer that utilizes a ribbon that contains wax-based ink is known as what type of printer? Inkjet Laser Thermal transfer Dye-sublimation

Thermal transfer

A root certificate is the original certificate issued by the CA. True or False

True

If you want to be able to power up a computer remotely, what feature should you use? QoS RDP RemoteApp Wake-on LAN

Wake-on LAN

What device handles access to another network for a client computer if it does not have a better option? firewall default gateway network switch network hub

default gateway

What statement about user accounts and groups is NOT true? -a user account can belong to only one group at a time -by default, standard users accounts belong to the Users group -Guest group has limited rights on the system -Backup Operators group can restore any files regardless of the group's permissions to those files

a user account can belong to only one group at a time

Where is the Favorites tray on an Android device? above the Action Bar in the Notifications window under Chrome settings on the Google Play screen

above the Action Bar

What must you do before using a new iPad or iPod touch? register it activate it install iOS on it install iTunes on it

activate it

What is the accelerometer used for in mobile devices? -adjusting the screen orientation -geotracking -synchronizing data -locating the nearest cell tower

adjusting the screen orientation

Regarding the use of Group Policy, what statement is NOT accurate? -policies can be applied to a computer -all policies are applied before the logon screen appears -Group Policy is available in Windows Professional edition -you can set the QoS level for an application using Group Policy

all policies are applied before the logon screen appears

When using the Windows Encrypted File System, what statement is accurate? -files can be marked for encryption, but not folders -an encrypted file moved to an unencrypted folder remains encrypted -EFS only works on NTFS and FAT32 -you need to download special software to use EFS

an encrypted file moved to an unencrypted folder remains encrypted

What type of device do you need if you want to connect two network segments together such as a wireless network and a wired network? hub NAS repeater bridge

bridge

Which of the following is NOT true about Remote Desktop? -the client can be running any version of Windows 7 -by default all users can access Remote Desktop -Windows firewall can block Remote Desktop connections -you can start the remote desktop client using the mstsc command

by default all users can access Remote Desktop

What statement regarding passwords on Windows is accurate? -it's best to write your password down so you don't get locked out of your computer -passwords cannot be longer than 14 characters -by default, accounts with a blank password cannot logon remotely -letters and numbers are allowed, but no symbols such as '@' or '!'

by default, accounts with a blank password cannot logon remotely

Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody item inventory evidence tracking list

chain of custody

What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) -computer authentication using TPM -user authentication using a certificate -user authentication using a USB flash drive -computer and user authentication using a PIN and TPM

computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM

What two terms are used to describe the User Datagram Protocol (UDP)? connectionless protocol connection oriented protocol best effort protocol reliable protocol

connectionless protocol best effort protocol

What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? copyright license user agreement cease and desist order

copyright

What two types of thermal printer exist? impact thermal printer direct thermal printer thermal transfer printer thermal laser printer

direct thermal printer thermal transfer printer

What task can't be performed from the IE General tab? change the home page disable file downloads delete browsing history manage the IE cache

disable file downloads

A printer that is able to print on both sides of the paper is known as what type of printer? duplex simplex duo complex

duplex

What type of IP address is configured by a server when a device first initiates a connection to the network? default dynamic static configured

dynamic

What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network? hub switch firewall VPN

firewall

What functions might be provided by a SOHO router besides the normal duty of routing packets between networks? (Choose all that apply). directory server firewall wireless access point email server

firewall wireless access point

What is the unit of information called when a network adapter adds the source and destination MAC address to the segment of data before it is transmitted on the network? frame packet bit segment

frame

The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term? simplex mode half duplex auto transit full duplex

full duplex

What statement regarding the construction of a gaming computer is accurate? -in order to ensure adequate cooling, air cooling should be used -the use of a single low-end video card is adequate for the needs of most gamers -gaming computers benefit from powerful multicore processors -modern motherboards have no need for an external sound card

gaming computers benefit from powerful multicore processors

What does jailbreaking do? -allows you to download games for free from Google Play -allows you download music for free from iTunes -give you administrative privileges to Android -give you root privileges to iOS

give you root privileges to iOS

Unicast addresses include what types of addresses? (Choose all that apply). global address anycast address multicast address link-local address

global address link-local address

All dual core or higher processors and all motherboards sold today support what technology capable of enhancing the processor support for virtual machines? 128-bit processing hardware-assisted virtualization enhance multimedia instruction set execute disable bit

hardware-assisted virtualization

A SIM card is used for which of the following? -holding data related to your cellular carrier -holding your iTunes information -controlling the sensitivity of your touch screen -backing up your data and applications

holding data related to your cellular carrier

Which devices utilize an operating system based on the Mac OS X operating system? (Choose all that apply.) iPhone iPad iPod touch Samsung Galaxy

iPhone iPad iPod touch

What command can be used to take full access of a file? takeown attrib perms icacls

icacls

When utilizing both share and NTFS permissions, what statement is inaccurate? -if both permissions are used, the least restrictive permission between the two applies -if NTFS permissions conflict between a user and group the least restrictive permission applies -when you copy a file, the file takes on the permissions of the destination folder -inherited permissions pass from parent folder to child file or folder

if both permissions are used, the least restrictive permission between the two applies

What command will display a list of active and inactive network interfaces on Unix, Linux, and Mac OS X? ipconfig -a ifconfig -a netsh show interfaces ip list network

ifconfig -a

Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? rootkits malware signatures static updates Windows updates

malware signatures

When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle

man-in-the-middle

What command launches the Remote Desktop client for Windows? rdp rdesktop vnc mstsc

mstsc

Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor biometric asymmetric symmetric

multifactor

What command manages user accounts on the local system in Windows? net user net localuser useradd netsh user

net user

In order to terminate multiple network cables that converge in one location such as an electrical closet or server room, what should you use? patch panel RJ-45 jack terminal adapter loopback port

patch panel

What part of a printer pushes forward a sheet of paper from the paper tray? transfer belt separation pad pickup roller transfer roller

pickup roller

What does the presence of the Cydia app on an iOS device indicate? a rootkit has been installed on the device the device is infected with a worm the device has been jailbroken there is spyware software installed on the device

the device has been jailbroken

What statement regarding the cleaning of a laser printer is accurate? -for best results, use ammonia-based cleaners -use compressed air to blow out loose toner -wipe the rollers on a laser printer with a dry cloth -use an antistatic vacuum cleaner to pick up toner

wipe the rollers on a laser printer with a dry cloth

What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) -press Ctrl+End and click Logon Screen -press Windows key + L -press Ctrl+Alt+Delete and click Lock this Computer -press F1 and click Sleep

press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer

When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data? -private data for each user should be kept in their C:\Users folder -all users have access to the folders in the C:\Users folder -C:\Users\Public should only be used by the Guess account -only Administrators and Guest have access to C:\Users\Public

private data for each user should be kept in their C:\Users folder

What kind of a computer intercepts requests that a browser makes of a server and can cache received content? DNS server VPN server proxy server Web server

proxy server

How are IP addresses available to the Internet classified? public private non-routable standard

public

CryptoLocker is an example of what type of malware? zero-day attack worm ransomware man-in-the-middle

ransomware

What inputs would be considered to be part of a biometric device? (Choose all that apply.) keystrokes retina fingerprint voice

retina fingerprint voice

What statement about controlling access to folders and files is accurate? -permissions refer to the tasks an account is allowed to do in the system -account configuration should keep in mind the principle of highest privilege -rights are assigned to accounts -in Windows, accounts have no rights assignments until you configure them

rights are assigned to accounts

What can you do if you want to obtain administrator privileges to an Android device? delete the normal user account logon as Admin root the device reboot into recovery mode

root the device

What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? Trojan horse rootkit adware worm

rootkit

What term describes a dedicated device or computer that can control several printers connected to a network? queue server manager client

server

What tool can you use to stop and restart the Windows print spooler? service console task manager performance monitor msconfig

service console

A person that secretly peaks at your monitor screen while you work may be doing what? tailgating screen capping shoulder surfing social engineering

shoulder surfing

One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? retinal scanner LoJack token smart card TPM

smart card

Which physical topology uses a centralized device to manage traffic on the network? mesh ring bus star bus

star bus

What two terms describe the type of network cable that is used for connecting a computer to a switch or other network device? crossover cable power over Ethernet cable straight-through cable patch cable

straight-through cable patch cable

How is the network portion and the host portion of an IP address identified? dynamic address DHCP address default gateway subnet mask

subnet mask

What type of network device keeps a table of the MAC addresses of the devices connected to it? hub router NIC switch

switch

You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? shoulder surfing tailgating social engineering session hijacking

tailgating

What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? AFP telnet SSH SNMP

telnet SSH

If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? -Windows POP technology -the BIOS -a feature available on some DVD drive -your USB keyboard

the BIOS

How do you know if a printer needs routine maintenance? -the number of days since the last maintenance -the printer stops working if the maintenance period has expired -the number of pages the printer has printed since the last maintenance -the LED display shows the number of days before maintenance is required

the number of pages the printer has printed since the last maintenance

When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.) -the password should be at least eight characters long -you should not use adjacent keys on the keyboard, such as asdf -you should combine uppercase and lower case letters, numbers, and symbols -you can use words from a foreign language to make the password more secure

the password should be at least eight characters long you should not use adjacent keys on the keyboard, such as asdf you should combine uppercase and lower case letters, numbers, and symbols

When using Group Policy to configure QoS, what options are available? (Choose all that apply.) -the priority is a number from 0 to 63 -outbound traffic can be throttled -you must choose a specific application to apply the policy -you can choose the protocol (either IP or ICMP) for the policy

the priority is a number from 0 to 63 outbound traffic can be throttled

Why are there twists in the wires that are used for network cabling? -the twists increase the cable strength -the twists reduce crosstalk -the twists make is easier to punchdown the cable -the twists reduce the amount of copper needed

the twists reduce crosstalk

What is a valid reason for wanting to configure a proxy server in Internet Explorer? -to increase the security of the connection -to connect to secured websites on a corporate network VPN -to improve website performance -to surf anonymously

to connect to secured websites on a corporate network VPN

Under what circumstance might you use an Ethernet loopback plug? to test a USB port to capture network packets to test a network cable to find the max speed of a connection

to test a network cable

If you are experiencing issues reaching a target destination network, and you need to to display each hop to the destination, what command should you use? ipconfig ifconfig tracert nslookup

tracert

What part of a laser printer puts a positive charge on the paper in order to pull the toner from the drum onto the paper? transfer roller transfer belt pickup roller charging block

transfer roller

Packets are delivered to a single node on a network when using what type of IPv6 address? anycast address default gateway address multicast address unicast address

unicast address

Before replacing an image drum, what should you do first? -unplug it and allow the printer to cool down -send several test pages to the printer right before replacing the drum -empty the paper tray -reset the printer to factory defaults

unplug it and allow the printer to cool down

What is the first thing you should do to get toner dust off your clothes? clean immediately with hot water use a hot hair dryer to blow it off throw the clothes in the dryer set on high heat use a can of compressed air to blow off the toner

use a can of compressed air to blow off the toner

Siri is an example of what technology? app backup software virtual assistant virtual container mobile application wizard

virtual assistant

The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network? public encrypted network virtual private network private encrypted network virtual prevention network

virtual private network

Which of the following are true about NTFS permissions? (Choose all that apply.) -inherited permissions override explicit permissions -when a subfolder is created, it is assigned the permissions of its parent folder -it is not possible to change the owner of a file -if NTFS permissions conflict locally, the more liberal permission applies

when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies

What should you never do when working on a laser printer? work alone use a toner vacuum unplug the printer wait for the printer to cool

work alone

Which of the following is true about cable Internet? -you share the cable infrastructure with your neighbors -you need filters on every phone jack -fiber optic cabling is required -provides up to 2.3 Mbps of bandwidth

you share the cable infrastructure with your neighbors


Conjuntos de estudio relacionados

Renal- NCLEX Qs and Lecture Notes

View Set

CSE 3: Personal Computers Midterm Study Guide

View Set

Ch 10 Small Business Promotion: Capturing the Eyes of Your Market

View Set