final exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Mark wants to include a string in his computer program that lets users know they have selected the correct option. He wants to include the option in double quotes. However, the entire string also needs to be delimited by double quotes. Which of the following is the string Mark should use to include the option in double quotes?

"Congratulations! \"Launch Audit\" is the correct option."

Emily is using Search on her web browser to try and find a recipe for pecan pie. However, she wants to make sure it's a recipe from her home state of Mississippi. Which of the following search phrases will help her find exactly what she needs?

"Mississippi pecan pie"

network-attached storage

(NAS) Storage devices that are designed to be attached directly to a network, rather than to a workstation or server.

If you install an external device and it's not functioning correctly, consider the following troubleshooting tips:

1. Check all cables and connectors to make sure they're securely seated. 2. If the device requires a separate power source in order to operate, verify that it's plugged in. 3. If you're installing the device on Windows, open Device Manager and make sure the device is listed and enabled. 4. Try installing the device on another computer system to make sure the device works correctly. 5. Update the device driver. 6. If you've recently updated the device driver and the device no longer works, roll back the driver to the previous version or revert the operating system to an earlier restore point.

Questions to confirm credibility of sources include:

1. Does the website have a valid digital certificate? 2. Is the download secure through HTTPS? 3. Does the software have a vendor digital signature? Is that signature trusted by the computer? 4. Have you checked with others on a forum for their experience with the download?

Bluetooth

Allows electronic devices like cell phones and computers to exchange data over short distances using radio waves

A developer is writing a program that will store the value of a single character. Which of the following data types will work BEST to store this value?

Char

.exe, .msi, .app, .bat, .cmd, .vbs, .js, and .ps1 extensions are examples of what kind of files?

Executable files

steps for identifying the problem

Gather information Duplicate the problem, if possible Question users Identify symptoms Determine if anything has changed Approach multiple problems individually

The original desktop computers used floppy disk drives to store programs and user data. What do modern personal computer use for non-volatile, long-term storage?

Hard disk drives

What is the number of instructions a CPU can perform per second measured in?

Hertz

Which of the following notational systems is MOST likely used to represent a MAC address?

Hexadecimal

what notational systems is MOST likely used to represent a MAC address?

Hexadecimal

what is troubleshooting methodology in order

1. Identify the problem 2. Research knowledge base/Internet, if applicable 3. Establish a theory of probable cause 4. Test the theory to determine the cause 5. Establish a plan of action to solve the problem and identify potential effects 6. Implement the solution or escalate as necessary 7. Verify full system functionality and, if applicable, implement preventive measures 8. Document findings/lessons learned, actions, and outcomes

what are characteristics of hard disk drive

1. Relatively inexpensive 2. Fast 3. Can hold a lot of information

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played. Which troubleshooting step should you take first?

1. You should first verify that the speakers are plugged in correctly and powered on. 2. You should also verify that the volume isn't muted in the operating system.

what is the main difference between DisplayPort and HDMI

1. appearance is that HDMI is beveled on two corners and DisplayPort is beveled on only one. 2. DisplayPort has a greater bandwidth than HDMI. While HDMI supports a maximum bandwidth of 18 Gbps, DisplayPort 1.4 has a maximum bandwidth of 32.4 Gbps which supports a much greater resolution. 3. Display port is royalty fee which means you do not have to pay a fee to use the interface

In the decimal number system, you can think of each digit representing a place (or column) in the number. For example, in the decimal number 652, the two, the five, and the six are all in different places and each place can be expressed as 10 to a specific power. Which power of 10 does 6 in the above example represent?

10 to the second power

DisplayPort/Mini DisplayPort

20 pin interface that used to send high-quality, digital video and audio signals. function similar to HDMI

Terabyte (TB)

One terabyte is equal to 1,000 gigabytes.

You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first?

Plug in an external monitor

Which of the following makes sure that all the computer system hardware is in working order before loading the operating system?

Power-On Self-Test (POST)

Processing

Processing occurs after input has been provided to a computer

Copyright

Protections granted by the federal government to creators, writers, and inventors. Copyright includes the rights to reproduce, display, make derivatives, sell, rent, or lend a work.

As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use?

String

An IT manager wants to run a virus scan on a regular basis for all Windows computers in the company office. Which Windows tool should they use?

Task Scheduler

Which of the following are specifically designed to help protect digital products?

Technological Protection Measures (TPM) Digital Rights Management (DRM) tools

The legal protection of rights to ideas and discoveries is called a copyright. What are the other ways that intellectual property can be legally protected?

Trademarks Patents

double quotation marks

Using double quotation marks (") around a search phrase tells the search engine to find an exact match.

Jennifer wants to change the operating system (OS) on her computer from Windows 10 to Linux. Which of the following OS types allow for this kind of OS replacement?

Workstation OS

Technological Protection Measures (TPM)

are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data.

Chipset

chipset provides functions such as graphics, audio, network, and more. If the chipset does not provide a certain function, an expansion card will need to be used.

Access Control List (ACL)

common method used by file system to keep track of which users can read, write, move, or delete a file or folder?

executable file

contain code that can make changes to the computer system. Make sure you know each type of executable file extension. To run an executable file, you must have administrator-level user rights.

Application software

software is designed specifically for the end user and includes video games, web browsers such as Microsoft Edge, database programs, and word processors.

OCR or Optical Character Recognition

software is used to scan text documents and convert them into a document that can be edited on the computer.

home automation

the ability to control everyday items with your voice or cell phone

Data analytics

the process of turning data points into useful information.

Digital Rights Management (DRM)

tools are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data.

Portable Hard Disk Drive

use an external hard disk drive that uses a USB or FireWire connection to the computer.

compact disk /optical drives

use light instead of magnetism to store information. They use microscopic light and dark spots on the bottom surface of the disc.

String data

used to store more than one character, such as a word, a sentence, or a combination of letters and numbers. As such, it would be appropriate for postal codes.

Access Point

works in a similar way to a switch; it recognizes the device that should receive the signal, then forwards the data to where it needs to go.

world wide web or www

world wide web also called web refers to the digital content that is delivered over the internet, usually through a web browser.

As part of the troubleshooting process, you need to establish a plan of action to remove the root cause of the problem without destabilizing other parts of the system. What should your plan of action include?

Detailing steps and the resources needed to implement the solution

ou are vacationing at a friend's cabin on the lake and using the office computer to complete some work-related tasks using a web browser. The browser keeps slowing down after a few minutes of use. You check for extensions (add-ons) and notice that there are several listed. Knowing that extensions can slow down a browser, what should you do to speed up the web browser processing time?

Disable several of the extensions.

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?

Document findings/lessons learned, actions, and outcomes

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?

Duplicate the problem, if possible

Byte

Eight bits together form a byte. The value of a single byte can range from 0 (eight 0s) to 255 (eight 1s).

What precaution should you always take when using a public access point?

Ensure sites are using HTTPS.

access point (AP)

A device that connects wireless clients to wireless networks. Sometimes called wireless access point (WAP).

Firewall

A firewall is the best device to deploy to protect your private network from an untrusted public network. are used to control traffic entering and leaving your trusted network environment.

what statements BEST describes a firewall?

A firewall restricts the flow of data between hosts and networks by checking data packets to make sure they are safe.

Network Media

A general term for all forms of pathways that support network communication.

what companies use arm processors

Apple, HTC, Nokia, Xiaomi, Sony Ericsson, Samsung, nVIDIA Tegra, and others.

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?

Bar graph

Rick and Steve want to share information between their smart phones without connecting to the WiFi network. Which of the following is the least complicated way to accomplish this?

Bluetooth

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?

Boolean

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on?

Both 32-bit and 64-bit systems

Alice is an architect for a large design company. She spends most of her day working in a software program called AutoCAD. What do we call this type of software program?

Business-specific application

what three types of optical drives /compact disk that can be installed in a computer.

CD-ROM DVD Blu-ray

what are features of using an Excel table to store data?

Column sorting and total rows

Before two computers can communicate over a network, some type of network media must be used to connect the computers together. what are examples of network media

Copper wiring Radio signals Fiber optics

Which of the following describes the process of turning data points into useful information?

Data analytics

Martina works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Martina is determining whether the 25-36 age group of customers purchases organic products from the company more frequently than inorganic products. Which of the following describes this step of the analytics process?

Data correlation

A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that variable. Which of the following data types is the BEST for this purpose?

Integer

An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should you take first?

Make sure the power cord is plugged into the wall. Make sure the surge protector is turned on.

When troubleshooting the power supply, always check the following before opening up the computer:

Make sure the power cord is plugged into the wall. Verify any surge protectors are plugged in and in the on position. Make sure the power supply's switch is in the on position. Only after you identify the power supply is the problem should you replace it. The keyboard and mouse being unplugged will not prevent the computer from powering on. Testing the power supply using a multimeter should be done only after the obvious has been ruled out.

ARM processors or Advanced RISC Machine

Most tablets and smartphones use Advanced RISC Machine (ARM) processors. ARM processors use a reduced instruction set. This means they can't do as many types of things as x86 processors. The tradeoff is that they are smaller, consume less power, and generate less heat.

Cliff needs to find a solution to a problem. He has several employees that work on team projects. He wants to find a centralized storage solution that can be used for shared storage, has enough space for even the largest files, is easy to deploy, attaches to his current network infrastructure, and is not too expansive. What device should he choose?

NAS

Gigabyte (GB)

One gigabyte is one billion bytes. Therefore, 1 gigabyte equals 1,000 megabytes.

Kilobyte (KB)

One kilobyte is equal to 1,000 bytes.

Megabyte (MB)

One megabyte is one million bytes of information. Therefore, 1 megabyte equals 1,000 kilobytes.

Mary is a data analyst for a large pharmaceutical company. The company wants to know how their new organic line of over-the-counter cold relief medications is being perceived by customers and what they can do to better promote the product. Mary has collected a significant amount of raw data and has analyzed it to find connections and links between the data points. The insights are significant, and now she needs to inform company management. What is Mary's next step in the data analytics process?

Provide meaningful reporting with a system that includes search features, charts, and graphs.

What is the collective name for creations that are not the intellectual property of anybody?

Public Domain

Which type of port is used on an NIC to connect a computer to the network with unshielded twisted-pair cables?

RJ-45

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

Reports

Greg is a network administrator for a medical supply company and has identified a problem with an access control list (ACL) failing to filter out data packets that have been restricted. What is the next step Greg should take to troubleshoot the ACL problem?

Research knowledge bases and the internet for information related to the problem.

Jonathan has a computer with an older PC bus interface and is getting a fiber optic connection for his home office. Which of the following BEST describes the processing speed environment?

The older PC bus runs at a MHz processing speed, while the fiber optic network equipment runs at a GHz processing speed.

bit

The smallest unit of digital information. Each individual one and zero in a binary sequence is a bit.

Rico, a technician, works for a manufacturer that has been experiencing power outages at one of their warehouses. The warehouse has a number of IP-based security cameras. After the last power outage, the cameras are all powered on but are not accessible from the security office. Which of the following is MOST likely the cause?

The wireless router has either not reconnected to the network or the cameras are not reconnecting.

Legitimate software sources

There are many malware files that are disguised to look like legitimate software downloads. To ensure the software you download is from a reliable source, be sure you are accessing it from credible merchant, vendor app stores. or the Original Equipment Manufacturer (OEM).

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?

Trademark

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. what's the consequences of this decision?

Your company is exposed to litigation by violating the software license agreement. You risk losing your job.

Hard Disk Drive

a common storage device that use thick, magnetic disks encased in a protective housing to store data. Because a hard disk drive is usually installed inside of a computer, it can be difficult to move between systems.

what number system represents 1010101.11

a decimal number with two decimal places that consist of 1s and 0s.

Network Interface Card (NIC)

a hardware component that enables computers to communicate over a network

VGA (Video Graphics Array)

a legacy analog interface that uses a 15-pin connector. The connector is typically blue and has three rows of pins. It is used to connect older or legacy monitors to a computer. VGA is not efficient at supporting high resolutions.

Strings

a program are commonly delimited by single or double quotes

Network Attached Storage (NAS)

a server that is placed on a network with the sole purpose of providing storage to users, computers, and devices attached to the network

server

a special computer running unique tools, such as a server processor, ECC memory, and a powerful operating system. Servers provide services to client computers.

IoT or Internet of Things

a term used for the ever-growing array of items that integrate processing and networking capabilities. Someday, almost everything we purchase, from clothing to appliances to vehicles, will be connected over the internet.

integer

data type is used for whole numbers. These include both positive and negative numbers, as well as zero.

Task Scheduler

is a Windows app used to automatically start an application or run a script based on events. Some tasks that are commonly scheduled to run at regular intervals include backups, malware scans, and system updates.

Boolean

is used to store a true or false value and cannot be used to store characters or numbers.

Hexadecimal

number system uses sixteen digits - the numerals 0 through 9 and the letters A through F. MAC addresses are typically composed of six groups of two hexadecimal digits separated by hyphens or colons.

hexadecimal

number system uses sixteen digits - the numerals 0 through 9 and the letters A through F. MAC addresses are typically composed of six groups of two hexadecimal digits separated by hyphens or colons.

XGA standard

provided resolutions up to 1024x768, color depths up to 32-bits, and higher refresh rates when it was released. Most modern display systems use a variation of the XGA standard today.


Conjuntos de estudio relacionados

Ch. 13 Cognitive Interventions in Psychiatric Nursing

View Set

NonWestern Art History - Pacific, Africa, Americas

View Set

FIN4424 Test 1 Conceptual Questions

View Set

U.S. History Industrial Revolution

View Set

CHAPTER 24- THE FETAL HEAD AND BRAIN (Penny)

View Set

3.1 & 3.2 Study Guide Waves, Layers, & Continental Drift SG

View Set