Chapter 19 - Hardware Support A+, Hardware Final Prep
During the charging process of a laser printer, the drum is conditioned by a roller that places an electrical charge of what voltage onto the surface of the drum? -100V +300V -600V +1200V
-600V
All parts of an Android application are published as a package of files wrapped into one file utilizing what file extension? .zip .img .iso .apk
.apk
What mobile operating system is the Fire OS used by Amazon's Kindle Fire devices based on? Symbian BlackBerry OS Java Micro Edition Android
Android
When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in? Administrators Guests Backup Operators Anonymous users
Anonymous users
Switches are slowly being replaced by hubs, which are newer technology. True or False
False
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. True or False
False
The User Datagram Protocol (UDP) guarantees delivery of data to its destination. True or False
False
The developing, transferring, fusing, and cleaning steps of the laser printing process use the printer components that undergo the most wear. True or False
False
To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional. True or False
False
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. True or False
False
When using static IP addressing, software automatically configures the network connection on each device. True or False
False
iOS was developed by and continues to be maintained by a consortium of companies. True or False
False
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True or False
True
Some advanced printers have print server programs included in the printer firmware itself. True or False
True
The act of jailbreaking a phone was once illegal, but was made legal by the U.S. Copyright Office and the Library of Congress. True or False
True
The current release of SMB is CIFS, also called SMB2. True or False
True
The default value of the security level in IE is Medium-high. True or False
True
The iOS operating system utilizes a closed-source, or vendor specific / commercial license. True or False
True
Using Group Policy, you can set security policies to help secure a workstation. True or False
True
In the T568B wiring scheme, what two color pairs are used for transmit and receive on a 100BaseT network? White/green, green White/brown, brown White/orange, orange White/blue, blue
White/green, green White/orange, orange
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path? \\sharedfolder\server \server\sharedfolder \\server\sharedfolder /sharedfolder/server
\\server\sharedfolder
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? -a USB port -an authentication key on the hard drive -a TPM chip on the motherboard -a PIN on the BIOS
a TPM chip on the motherboard
What is a hypervisor? a program that manages VMs another name for a thin client technology that enhances processor support for VMs a fat client running an HAV
a program that manages VMs
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? ATA Secure Erase low-level format degausser magnetic data filter
degausser
What are valid recommendations for for a high-end audio/video editing workstation? (Choose all that apply.) -install at least 4 GB RAM -install a motherboard capable of using memory running at 1600 MHz or better -install a sound card -install a CD drive
install a motherboard capable of using memory running at 1600 MHz or better install a sound card
What command can be used to display IP addresses assigned to all network connections on a system? msconfig netstat ipconfig netcfg32
ipconfig
What two commands are used to display TCP/IP configuration on Windows and Unix / Linux / Mac OS X operating systems, respectively? net show ipconfig show ip stat ifconfig
ipconfig ifconfig
What command can be used to flush the local DNS cache on a Windows computer? nslookup -f ipconfig /flushdns dns dump service dnscache restart
ipconfig /flushdns
What statement regarding crossover cables is accurate? -it's normally used to connect a computer to a hub or switch -you use the T568B wiring standard on both ends -it is required to connect two Gigabit Ethernet switches together -it can be used to connect two PCs together
it can be used to connect two PCs together
Which statement regarding 10-Gigabit Ethernet is accurate? you can use Cat-5e or Cat-6 cabling it is a good choice for backbone networks it is sometimes called Fast Ethernet coaxial is a good choice for cabling
it is a good choice for backbone networks
What statement is true regarding the Guest account in Windows 7? -it is disabled by default -it automatically has a complex password -you cannot rename it -it has administrative access
it is disabled by default
What statement regarding satellite connections is accurate? -it provides higher throughput than other connections -it is only available in metropolitan areas -it provides low latency connection -it requires line of sight connectivity
it requires line of sight connectivity
If loose toner comes out with your printout, the fuser is not reaching the proper temperature and professional service is required. True or False
True
Laser printers automatically calibrate themselves periodically. True or False
True
What cable system utilizes a fiber-optic cable? 10GBaseT 1000BaseFX 10Base2 10Base5
1000BaseFX
What version of Ethernet utilizes a fiber-optic cable and has a transmission speed of 100 Mbps? 100BaseTX 100BaseFX 1000BaseFX 100BaseCX
100BaseFX
Home Theater PCs often make use of what type of user interface? command line interface (CLI) 10-foot user interface Aero text user interface (TUI)
10-foot user interface
What TCP port is utilized by an SSH server listening for connections? 20 21 22 23
22
The Remote Desktop and Remote Assistance applications utilize what port for remote access? 22 23 110 3389
3389
What port is utilized by the Remote Desktop service? 22 23 3389 1729
3389
A Bluetooth PIN code requires the entry of a PIN that is how many digits in length? 4 6 8 12
4
How much storage is offered by iCloud Drive for no cost? 5 GB 10 GB 20 GB 100 GB
5 GB
What wireless networking radio frequency yields faster speeds but offers shorter range? 2.4 GHz 5 GHz 7 GHz 11 GHz
5 GHz
What port is utilized by secure IMAP (IMAPS)? 110 143 995 993
993
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address? APIPA random IP address public IP address dynamic IP address
APIPA
If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached? General Configuration Alternate Configuration Secondary Configuration Fallback Configuration
Alternate Configuration
What products are considered to be set-top boxes? (Choose all that apply.) Amazon Fire TV Chromecast Roku Chromebox
Amazon Fire TV Chromecast Roku
What are the two most popular web server applications? Nginx Tomcat Apache IIS
Apache IIS
What are the names of the application stores for iOS and Google Android devices respectively? iOS AppDrive App Store Google Store Google Play
App Store Google Play
To which group does Windows give access to folders that you create which are not part of your user profile? Power Users Guests Authenticated Users Anonymous Users
Authenticated Users
Releases of Android are named after animals, such as Lion, Leopard, or Puma. True or False
False
What component on a smart phone requires pairing with another device? GPS WiFi Bluetooth SIM card
Bluetooth
What wireless methods exist for connecting to a printer? (Choose all that apply.) Bluetooth ZigBee WiFi infrastructure mode WiFi ad-hoc mode
Bluetooth WiFi infrastructure mode WiFi ad-hoc mode
What cell phone technology is the most popular in the United States? GSM CDMA EDGE SIM
CDMA
If you're looking to install Gigabit Ethernet, what cabling system would you use? coaxial thinnet Cat-6 RG-59
Cat-6
What name is given to the Windows Phone 8.1 virtual assistant? Spartan John Cortana Chief
Cortana
What keystroke should you press to get a logon window if you don't use the welcome screen? Alt+F1 Ctrl+Ins+Home Alt+F5+End Ctrl+Alt+Delete
Ctrl+Alt+Delete
What two applications are an example of a mail server and a mail client application, respectively? Exchange Maverick Outlook Firefox
Exchange Outlook
10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters. True or False
False
A WLAN covers a large geographical area and is made up of many smaller networks. True or False
False
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure. True or False
False
A setting called airplane mode lowers the output power of the Wi-Fi and Bluetooth antennas allowing these networks to function, but at a reduced range. True or False
False
After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or False
False
On a peer-to-peer network, authentication is the responsibility of the domain. True or False
False
On the IE General tab you can block cookies. True or False
False
Phone cords are a type of twisted-pair cable and use an RJ-45 connector. True or False
False
What company acquired Android code in 2005 and has a leadership role in its development? Apple Symbian Google Yahoo
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group? Administrators group Backup Operators group Power Users group Guests group
Guests group
When all users on a network require the same access to all resources, what type of network model should you use? Domain Homegroup Workgroup Guestgroup
Homegroup
What identifies a SIM card if the card is used? IMEI IMSI ICCID ICCEI
ICCID
What unique number is used to identify each mobile phone or tablet device worldwide? IMSI IMEI ICCID MAC address
IMEI
What is the name of the 32-bit or 128-bit number that is used to identify a device on a network? port number protocol number IP address IP version
IP address
What type of LED monitor provides the most accurate color for video editing workstations? CRT TN IPS MC
IPS
What type of printer is slower than a laser printer, and also tends to smudge on inexpensive paper? Laser Dye-sublimation Thermal Inkjet
Inkjet
Applications on the Android OS are mostly written in what programming language? PHP Objective-C Java Python
Java
What software program is an example of password management software? (Choose all that apply.) KeePass LastPass Dashlane PassLock
KeePass LastPass Dashlane
Most new Android devices are shipping with what version of Android? Froyo Gingerbread KitKat Lollipop (*older versions, but this is what the textbook says)
KitKat Lollipop
What are two examples of HTPC software? Kodi Chromecast Roku Plex
Kodi Plex
What kind of printer works by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning. Inkjet Thermal Dye-sublimation Laser
Laser
What technology can be used to locate a device such as a laptop after it has been stolen? Management software LoJack Trojan Multifactor Trace software
LoJack
What network type covers a large campus or city? PAN WLAN MAN WAN
MAN
Windows 10 features what new web browser, which is designed to replace Internet Explorer? Microsoft Spartan Microsoft Slim Microsoft Edge Microsoft Plus
Microsoft Edge
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect? SMTP PNRP SNMP LDAP
PNRP
What two protocols are used to deliver mail messages? POP3 SNMP SMTP IMAP4
POP3 IMAP4
What type of permission should you set to control access to files and folders by local and network users? -sharing on FAT32 volumes only -NTFS on NTFS volumes only -NTFS on exFAT or NTFS volumes -sharing on NTFS or exFAT volumes
NTFS on NTFS volumes only
What software programming languages can be used for an iOS app? (Choose all that apply.) Objective-C C C++ Java
Objective-C C C++
A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology known by what name? REt REx VART eRT
REt
What two different types of coaxial cable have been used for cable TV? RJ-45 RG-6 RG-59 RG-PVC
RG-6 RG-59
What does a 1000BaseT NIC use to connect to a network cable? HDMI port RJ-45 port 10BaseT port Half duplex port
RJ-45
What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.) Full control Read execute Write
Read Write
What is the more secure alternative to the SMTP mail protocol? SMTP IMAP POP S/MIME
S/MIME
What DSL technology provides equal bandwidth in both directions? ADSL VDSL SDSL HDSL
SDSL
Outgoing mail is normally sent using what mail delivery protocol? SMTP IMAP4 POP3 SSL
SMTP
What functions as the name of a wireless network? secure key MAC address Network ID SSID
SSID
Originally developed by IBM, what protocol is used by Windows to share files and printers on a network? -Server Message Block (SMB) -Lightweight Directory Access Protocol (LDAP) -File Transfer Protocol (FTP) -Hypertext Transfer Protocol (HTTP)
Server Message Block (SMB)
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network. True or False
True
What two U.S. carriers offer a feature called Wi-Fi calling? ATandT Sprint T-Mobile Verizon
Sprint T-Mobile
What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors? T568A T568B TIA/EIA 586 T568C
T568A T568B
What protocol makes a connection, checks whether the data is received, and resends it if it is not? TCP UDP IP DNS
TCP
For heavy business use, the best practice is to purchase one machine for one purpose, instead of bundling many functions into a single machine. True or False
True
A punchdown tool is used to wire twisted-pair cabling to a keystone jack. True or False
True
A printer that utilizes a ribbon that contains wax-based ink is known as what type of printer? Inkjet Laser Thermal transfer Dye-sublimation
Thermal transfer
A root certificate is the original certificate issued by the CA. True or False
True
If you want to be able to power up a computer remotely, what feature should you use? QoS RDP RemoteApp Wake-on LAN
Wake-on LAN
What device handles access to another network for a client computer if it does not have a better option? firewall default gateway network switch network hub
default gateway
What statement about user accounts and groups is NOT true? -a user account can belong to only one group at a time -by default, standard users accounts belong to the Users group -Guest group has limited rights on the system -Backup Operators group can restore any files regardless of the group's permissions to those files
a user account can belong to only one group at a time
Where is the Favorites tray on an Android device? above the Action Bar in the Notifications window under Chrome settings on the Google Play screen
above the Action Bar
What must you do before using a new iPad or iPod touch? register it activate it install iOS on it install iTunes on it
activate it
What is the accelerometer used for in mobile devices? -adjusting the screen orientation -geotracking -synchronizing data -locating the nearest cell tower
adjusting the screen orientation
Regarding the use of Group Policy, what statement is NOT accurate? -policies can be applied to a computer -all policies are applied before the logon screen appears -Group Policy is available in Windows Professional edition -you can set the QoS level for an application using Group Policy
all policies are applied before the logon screen appears
When using the Windows Encrypted File System, what statement is accurate? -files can be marked for encryption, but not folders -an encrypted file moved to an unencrypted folder remains encrypted -EFS only works on NTFS and FAT32 -you need to download special software to use EFS
an encrypted file moved to an unencrypted folder remains encrypted
What type of device do you need if you want to connect two network segments together such as a wireless network and a wired network? hub NAS repeater bridge
bridge
Which of the following is NOT true about Remote Desktop? -the client can be running any version of Windows 7 -by default all users can access Remote Desktop -Windows firewall can block Remote Desktop connections -you can start the remote desktop client using the mstsc command
by default all users can access Remote Desktop
What statement regarding passwords on Windows is accurate? -it's best to write your password down so you don't get locked out of your computer -passwords cannot be longer than 14 characters -by default, accounts with a blank password cannot logon remotely -letters and numbers are allowed, but no symbols such as '@' or '!'
by default, accounts with a blank password cannot logon remotely
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody item inventory evidence tracking list
chain of custody
What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) -computer authentication using TPM -user authentication using a certificate -user authentication using a USB flash drive -computer and user authentication using a PIN and TPM
computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM
What two terms are used to describe the User Datagram Protocol (UDP)? connectionless protocol connection oriented protocol best effort protocol reliable protocol
connectionless protocol best effort protocol
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? copyright license user agreement cease and desist order
copyright
What two types of thermal printer exist? impact thermal printer direct thermal printer thermal transfer printer thermal laser printer
direct thermal printer thermal transfer printer
What task can't be performed from the IE General tab? change the home page disable file downloads delete browsing history manage the IE cache
disable file downloads
A printer that is able to print on both sides of the paper is known as what type of printer? duplex simplex duo complex
duplex
What type of IP address is configured by a server when a device first initiates a connection to the network? default dynamic static configured
dynamic
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network? hub switch firewall VPN
firewall
What functions might be provided by a SOHO router besides the normal duty of routing packets between networks? (Choose all that apply). directory server firewall wireless access point email server
firewall wireless access point
What is the unit of information called when a network adapter adds the source and destination MAC address to the segment of data before it is transmitted on the network? frame packet bit segment
frame
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term? simplex mode half duplex auto transit full duplex
full duplex
What statement regarding the construction of a gaming computer is accurate? -in order to ensure adequate cooling, air cooling should be used -the use of a single low-end video card is adequate for the needs of most gamers -gaming computers benefit from powerful multicore processors -modern motherboards have no need for an external sound card
gaming computers benefit from powerful multicore processors
What does jailbreaking do? -allows you to download games for free from Google Play -allows you download music for free from iTunes -give you administrative privileges to Android -give you root privileges to iOS
give you root privileges to iOS
Unicast addresses include what types of addresses? (Choose all that apply). global address anycast address multicast address link-local address
global address link-local address
All dual core or higher processors and all motherboards sold today support what technology capable of enhancing the processor support for virtual machines? 128-bit processing hardware-assisted virtualization enhance multimedia instruction set execute disable bit
hardware-assisted virtualization
A SIM card is used for which of the following? -holding data related to your cellular carrier -holding your iTunes information -controlling the sensitivity of your touch screen -backing up your data and applications
holding data related to your cellular carrier
Which devices utilize an operating system based on the Mac OS X operating system? (Choose all that apply.) iPhone iPad iPod touch Samsung Galaxy
iPhone iPad iPod touch
What command can be used to take full access of a file? takeown attrib perms icacls
icacls
When utilizing both share and NTFS permissions, what statement is inaccurate? -if both permissions are used, the least restrictive permission between the two applies -if NTFS permissions conflict between a user and group the least restrictive permission applies -when you copy a file, the file takes on the permissions of the destination folder -inherited permissions pass from parent folder to child file or folder
if both permissions are used, the least restrictive permission between the two applies
What command will display a list of active and inactive network interfaces on Unix, Linux, and Mac OS X? ipconfig -a ifconfig -a netsh show interfaces ip list network
ifconfig -a
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? rootkits malware signatures static updates Windows updates
malware signatures
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle
man-in-the-middle
What command launches the Remote Desktop client for Windows? rdp rdesktop vnc mstsc
mstsc
Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor biometric asymmetric symmetric
multifactor
What command manages user accounts on the local system in Windows? net user net localuser useradd netsh user
net user
In order to terminate multiple network cables that converge in one location such as an electrical closet or server room, what should you use? patch panel RJ-45 jack terminal adapter loopback port
patch panel
What part of a printer pushes forward a sheet of paper from the paper tray? transfer belt separation pad pickup roller transfer roller
pickup roller
What does the presence of the Cydia app on an iOS device indicate? a rootkit has been installed on the device the device is infected with a worm the device has been jailbroken there is spyware software installed on the device
the device has been jailbroken
What statement regarding the cleaning of a laser printer is accurate? -for best results, use ammonia-based cleaners -use compressed air to blow out loose toner -wipe the rollers on a laser printer with a dry cloth -use an antistatic vacuum cleaner to pick up toner
wipe the rollers on a laser printer with a dry cloth
What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) -press Ctrl+End and click Logon Screen -press Windows key + L -press Ctrl+Alt+Delete and click Lock this Computer -press F1 and click Sleep
press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer
When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data? -private data for each user should be kept in their C:\Users folder -all users have access to the folders in the C:\Users folder -C:\Users\Public should only be used by the Guess account -only Administrators and Guest have access to C:\Users\Public
private data for each user should be kept in their C:\Users folder
What kind of a computer intercepts requests that a browser makes of a server and can cache received content? DNS server VPN server proxy server Web server
proxy server
How are IP addresses available to the Internet classified? public private non-routable standard
public
CryptoLocker is an example of what type of malware? zero-day attack worm ransomware man-in-the-middle
ransomware
What inputs would be considered to be part of a biometric device? (Choose all that apply.) keystrokes retina fingerprint voice
retina fingerprint voice
What statement about controlling access to folders and files is accurate? -permissions refer to the tasks an account is allowed to do in the system -account configuration should keep in mind the principle of highest privilege -rights are assigned to accounts -in Windows, accounts have no rights assignments until you configure them
rights are assigned to accounts
What can you do if you want to obtain administrator privileges to an Android device? delete the normal user account logon as Admin root the device reboot into recovery mode
root the device
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? Trojan horse rootkit adware worm
rootkit
What term describes a dedicated device or computer that can control several printers connected to a network? queue server manager client
server
What tool can you use to stop and restart the Windows print spooler? service console task manager performance monitor msconfig
service console
A person that secretly peaks at your monitor screen while you work may be doing what? tailgating screen capping shoulder surfing social engineering
shoulder surfing
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? retinal scanner LoJack token smart card TPM
smart card
Which physical topology uses a centralized device to manage traffic on the network? mesh ring bus star bus
star bus
What two terms describe the type of network cable that is used for connecting a computer to a switch or other network device? crossover cable power over Ethernet cable straight-through cable patch cable
straight-through cable patch cable
How is the network portion and the host portion of an IP address identified? dynamic address DHCP address default gateway subnet mask
subnet mask
What type of network device keeps a table of the MAC addresses of the devices connected to it? hub router NIC switch
switch
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? shoulder surfing tailgating social engineering session hijacking
tailgating
What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? AFP telnet SSH SNMP
telnet SSH
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? -Windows POP technology -the BIOS -a feature available on some DVD drive -your USB keyboard
the BIOS
How do you know if a printer needs routine maintenance? -the number of days since the last maintenance -the printer stops working if the maintenance period has expired -the number of pages the printer has printed since the last maintenance -the LED display shows the number of days before maintenance is required
the number of pages the printer has printed since the last maintenance
When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.) -the password should be at least eight characters long -you should not use adjacent keys on the keyboard, such as asdf -you should combine uppercase and lower case letters, numbers, and symbols -you can use words from a foreign language to make the password more secure
the password should be at least eight characters long you should not use adjacent keys on the keyboard, such as asdf you should combine uppercase and lower case letters, numbers, and symbols
When using Group Policy to configure QoS, what options are available? (Choose all that apply.) -the priority is a number from 0 to 63 -outbound traffic can be throttled -you must choose a specific application to apply the policy -you can choose the protocol (either IP or ICMP) for the policy
the priority is a number from 0 to 63 outbound traffic can be throttled
Why are there twists in the wires that are used for network cabling? -the twists increase the cable strength -the twists reduce crosstalk -the twists make is easier to punchdown the cable -the twists reduce the amount of copper needed
the twists reduce crosstalk
What is a valid reason for wanting to configure a proxy server in Internet Explorer? -to increase the security of the connection -to connect to secured websites on a corporate network VPN -to improve website performance -to surf anonymously
to connect to secured websites on a corporate network VPN
Under what circumstance might you use an Ethernet loopback plug? to test a USB port to capture network packets to test a network cable to find the max speed of a connection
to test a network cable
If you are experiencing issues reaching a target destination network, and you need to to display each hop to the destination, what command should you use? ipconfig ifconfig tracert nslookup
tracert
What part of a laser printer puts a positive charge on the paper in order to pull the toner from the drum onto the paper? transfer roller transfer belt pickup roller charging block
transfer roller
Packets are delivered to a single node on a network when using what type of IPv6 address? anycast address default gateway address multicast address unicast address
unicast address
Before replacing an image drum, what should you do first? -unplug it and allow the printer to cool down -send several test pages to the printer right before replacing the drum -empty the paper tray -reset the printer to factory defaults
unplug it and allow the printer to cool down
What is the first thing you should do to get toner dust off your clothes? clean immediately with hot water use a hot hair dryer to blow it off throw the clothes in the dryer set on high heat use a can of compressed air to blow off the toner
use a can of compressed air to blow off the toner
Siri is an example of what technology? app backup software virtual assistant virtual container mobile application wizard
virtual assistant
The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network? public encrypted network virtual private network private encrypted network virtual prevention network
virtual private network
Which of the following are true about NTFS permissions? (Choose all that apply.) -inherited permissions override explicit permissions -when a subfolder is created, it is assigned the permissions of its parent folder -it is not possible to change the owner of a file -if NTFS permissions conflict locally, the more liberal permission applies
when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies
What should you never do when working on a laser printer? work alone use a toner vacuum unplug the printer wait for the printer to cool
work alone
Which of the following is true about cable Internet? -you share the cable infrastructure with your neighbors -you need filters on every phone jack -fiber optic cabling is required -provides up to 2.3 Mbps of bandwidth
you share the cable infrastructure with your neighbors