A+ Core 1 Skills Quiz: Lessons 7 & 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A salesperson is giving advice to a new mobile device user about proper and improper charging routines. Which two options are improper routines when charging a device? -Charging a device near extreme heat -Ensuring plenty of ventilation around the unit -Using the manufacturer provided charger -Leaving the device unattended while charging

-Charging a device near extreme heat -Leaving the device unattended while charging Using the wrong battery charging cord or exposing a battery to extreme heat increases the danger of fire or explosion or can result in a swollen battery. Allowing batteries to charge unsupervised should only occur when exercising extreme caution for example, overnight. The user should monitor charging lithium ion Li-ion batteries for overheating and protection from the elements. Especially when left unattended, charging Li-ion batteries should have plenty of ventilation surrounding the unit to prevent overheating and fire. The manufacturer recommends using the manufacturer provided charging adapter and cable when possible. Underpowered or overpowered chargers may cause issues with the battery.

Multiple companies working together on a contract for an extended time decide that resources in a single cloud platform would work best during the project's duration. What cloud type do the companies utilize? -Public cloud -Private cloud -Hybrid cloud -Community cloud

-Community cloud A community cloud is where several organizations share the costs of either a hosted private or fully private cloud. Hybrid is a cloud computing solution that implements some sort of hybrid public & private community. A public or multitenant cloud is a service offered over the internet by cloud service providers CSPs to cloud consumers, often referred to as tenants. A private cloud is a cloud infrastructure that is completely private to and owned by the organization. There is likely to be one business unit dedicated to managing the cloud while other business units use it.

A user purchased their first smartphone and wants to download useful apps to it. What must the user do before they can use the app store? -Autodiscover -Grant privileges -Synchronize between multiple devices -Configure an account

-Configure an account The owner of a mobile device configures an account when they use the device for the first time. This account manages the apps installed on the device and represents the user on the app store. Apps run in a sandbox and have only the privileges granted by the user. An app will normally prompt when it needs to obtain permissions. An owner account can allow app settings and data to synchronize between multiple devices. For example, a user can access their contacts list from both their mobile device and their laptop. Most commercial email providers allow the OS to auto discover email connection settings. Autodiscover means that the mail service has published special domain name system DNS records that identify how to connect.

A developer wants to ensure that no matter on what server an administrator deploys their application, it has all the libraries and dependencies needed for the application to operate properly. How can the developer accomplish this? -Client side virtualization -Server side virtualization -Application virtualization -Container virtualization

-Container virtualization Container virtualization enforces resource separation at the OS level and includes the variables and libraries required by the application process in the container. Client side virtualization refers to any solution designed to run on ordinary desktops or workstations. Each user will be interacting with the virtualization host directly. Server side virtualization means deploying a server role as a virtual machine. For server computers and applications, the main use of virtualization is better hardware utilization through server consolidation. Application virtualization means that the client either accesses an application hosted on a server or streams the application from the server ensuring that they are always using the latest version.

A warehouse user reports an issue with a laptop to the IT helpdesk. The issue is that the laptop becomes very hot after only a few minutes of use whether it is plugged in or not. The user states that laptop use is under the usual circumstances. What does IT conclude the likely problem to be? -Battery discharging -Dust and debris -Faulty AC adapter -Room temperature

-Dust and debris Dust trapped in laptop cooling vents acts as an insulator and can prevent proper cooling. It can also slow or stop the fan. The vents are likely the issue due to the warehouse environment. A faulty AC adapter can cause a number of issues with a laptop. However, in this case, the problem exists even when the laptop is not plugged in. A battery discharging can cause a laptop to feel warm or hot, however, in this case, the temperature is out of the norm. The room temperature can impact the operating temperature of a device. In this case, the user reports no out of the ordinary circumstances.

Laptops can easily overheat, especially the bottom surface. This overheating can be dangerous for both the user and the device. For instance, overheating can cause swollen batteries or poor battery health. Which three can increase the risk of a laptop overheating? -Using a cooling pad -Dust trapped in the vents -Placing directly on a user's lap -Placing on soft surfaces

-Dust trapped in the vents -Placing directly on a user's lap -Placing on soft surfaces Dust that accumulates in vents acts as an insulator, preventing efficient cooling. In general, temperatures approaching 40°C are too hot. When not adequately ventilated, a laptop's bottom surface gets heated. For example, this may easily happen when placing computers on soft surfaces. When not adequately ventilated, a laptop's bottom surface gets heated. When people place computers on their laps or in situations where there is not enough space between the vents and a wall, this can happen easily. Laptop cooling or chiller pads are attachments that sit beneath the laptop to increase airflow and prevent the user from a burn caused by the device overheating.

A user is having trouble with the Bluetooth connectivity of a device. Recommend two steps to diagnose the issue. -Ensure airplane mode is not enabled. -Update wireless drivers. -Check for malware. -Use an app to check battery utilization.

-Ensure airplane mode is not enabled. -Update wireless drivers. Check the status of function key toggles on a laptop, or use the notification shade toggles on a mobile device to check if the user did not enable airplane mode or that the specific radio is not disabled. If a user has trouble restoring from hibernation or sleep mode, consider rebooting the device or reconnecting it, checking for an updated wireless controller and device drivers. When technology exhibits certain signs, such as fast power drainage or more network usage than usual, a technician should check to see if malware has compromised it. Battery and power issues can affect wireless connectivity. However, this is rarely the source of wireless connectivity issues and is more likely to cause merely a weak signal.

A network engineer at a company is installing wireless access points in the office. There will be only one WiFi option available, as the building is far enough away from others. What should the engineer do to ensure there are no dead zones in the office? -Power consumption -Inverter -Radio frequency -Equipment placement

-Equipment placement The location of wireless equipment can influence users' ability to connect to them. It is important to map out before installing equipment to prevent dead zones. Radio frequency is not necessarily a concern regarding dead zone issues. It may be important to check for interference purposes. Power consumption is not necessarily an issue for wireless connectivity. Newer wireless technologies have improved power consumption, but that is unrelated to the ability to connect devices. An inverter is unrelated to wireless connectivity unless there is a need to convert power sources or power standards.

A company switched cellular carriers and realized their existing cell phones are not compatible because they do not have a slot for a SIM card. What cellular standard do the phones not support? -1G -GSM -5G -CDMA

-GSM Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider. Code division multiple access (CDMA) means that the handset is directly managed by the provider and there is no removable SIM card. 5G cellular technology has expected speeds of 1Gbps. However, real world speeds range from about 50 Mbs to 300 Mbs. Some expanded networks have ultra-wideband improvements with the intended goal of faster speeds. Most cellular providers no longer support 1G cellular technology.

A company uses cell phones that do not have SIM cards and that Verizon manages. The company wants to upgrade to cell phones that have SIM cards so they can switch to any chosen provider. In which network type does the company want to upgrade? -PRL -GSM -LTE -CDMA

-GSM Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module SIM card to use an unlocked handset with their chosen network provider. Code division multiple access (CDMA) means that the provider directly manages the handset and there is no removable SIM card. A preferred roaming list (PRL) provides the information that the cellular radio needs to connect to the network and a user can trigger an update to the list in the device's settings or by dialing a code. Long-term evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA cellular networks. LTE Advanced provides 4G standard network access.

A company is looking to upgrade the performance of its computers as cost effectively as possible. What computer component can be cheaply upgraded to improve read write times? -Processor -Keyboard -Hard drive -Battery

-Hard drive The main component of a computer used to store data is the hard drive. Hard drives come in multiple forms, such as a magnetic spinning drive or solid state drive. Laptop computers use removable, rechargeable Lithium ion Li-ion battery packs. Li-ion batteries are typically available in 6, 9, or 12 cell versions. The processor or central processing unit executes instructions from the various programs on a computer. The faster the processor, the more the computer can accomplish. Keyboards are one of the main input devices used to enter characters on a computer. They are typically mechanical in nature and tend to be subject to failure due to dust, dirt, and liquids.

A network technician is working from a coffee shop and does not want to use their insecure wireless connection. What can the technician enable on his smartphone to provide his laptop with his own WiFi connectivity? -Hotspot -Bluetooth -Cellular data networking -Airplane mode

-Hotspot A hotspot is using the cellular data plan of a mobile device to provide internet access to a laptop or PC. A USB, Bluetooth, or WiFi mobile hotspot can tether the PC to the mobile device. Airplane mode is a toggle found on mobile devices enabling the user to disable and enable wireless functionality quickly. Cellular data networking means connecting to the internet via the device's cellular radio and the handset's network provider. A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, use a wireless headset, and so on.

An employee brings the company provided laptop to the IT department for repair. The employee claims it is a broken laptop as the cursor will not stop moving around when trying to type. Since the laptop is not very old, what should the technician do first to try and resolve the issue? -Replace the hinges on the laptop screen. -Install up-to-date drivers and configure input options. -Try a different charging cord. -Send the device in for warranty repair.

-Install up-to-date drivers and configure input options. Typing on a laptop might generate vibrations that move the cursor if the touchpad sensitivity is too high. Install the most recent drivers and tailor input choices to users' preferences. It is typical for the plastics around a laptop casing to crack or break and the hinges on the lid to wear out. If the hinges can no longer support the screen, the technician must replace them. If the technician cannot identify a cause, drift issues will likely require warranty repair. The manufacturer recommends using the manufacturer provided charging adapter and cable when possible. Underpowered or overpowered chargers may cause issues with the battery. However, this should not affect the cursor.

A technician needs to replace a solid state disk SSD in a user's laptop. The technician requested the purchasing department to order a drive that fits into a PCI Express bus. Which drive type does the purchasing department order? -mSATA -SATA -uSATA -M.2

-M.2 An M.2 SSD usually interfaces with the PCI Express bus, allowing much higher bus speeds than SATA. M.2 adapters can be of different lengths. A card with a Mini SATA mSATA interface might house an SSD. These cards resemble Mini PCIe cards but are not physically compatible with Mini PCIe slots. Laptop hard disk drives HDDs are usually 2.5 form factor, though sometimes they use 1.8 form factor. These drives use a traditional SATA connector. The uSATA connector is the same as the mSATA connector, and they sometimes use the names interchangeably.

Enterprises use different deployment models to specify how they provision mobile devices and apps for employees. Which function of enterprise management allows the organization to perform remote wipes on devices? -EMM -MAM -MDM -App store

-MDM Mobile device management (MDM) sets device policies for authentication, feature use camera and microphone, and connectivity. MDM can also allow device resets and remote wipes. An app store is a feature of mobile computing that provides a managed interface for installing third party software apps. Enterprise mobility management (EMM) is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise. Mobile application management (MAM) sets policies for apps that can process corporate data and prevents data transfer to personal apps.

A user reports that their computer runs slow when using Excel. They have an SSD and an Intel Core i7. What computer component could the support team upgrade to improve performance? -Battery -Keyboard -Hard Drive -Memory

-Memory System memory uses a type of memory technology called random access memory RAM. Program code is loaded into RAM so that it can be accessed and executed by the processor. The main component of a computer is to store data on the hard drive. Hard drives come in multiple forms, such as a magnetic spinning drive or solid state drive. Laptop computers use removable, rechargeable Lithium ion Li-ion battery packs. Li-ion batteries are typically available in 6, 9, or 12 cell versions. Keyboards are one of the main input devices used to enter characters on a computer. They are typically mechanical in nature and tend to be subject to failure due to dust, dirt, and liquids.

A network technician gathers requirements to implement virtualization. Which three resource requirements will the technician need to consider? -Memory above what the OS requires -A virtual network environment -Virtualization support enabled on the CPU -Minimal storage

-Memory above what the OS requires -A virtual network environment -Virtualization support enabled on the CPU Most virtualization software requires a central processing unit (CPU) with virtualization support enabled as the performance of the virtual machines will be impaired if hardware assisted virtualization is not available. Each guest OS requires sufficient system memory over and above what the host OS hypervisor requires to support the VMs. A hypervisor will be able to create a virtual network environment through which all the VMs can communicate, and a network shared by the host and by VMs on the same host and on other hosts. Virtual machines will need mass storage as each guest OS takes up a substantial amount of disk space. The host stores each of the VM's hard disks as an image file on the host.

An IT administrator at a large company receives an alert that disk usage for a cloud-based service is over an established data transfer quota. Which service does the company utilize that triggers such an alert? -Rapid elasticity -Metered utilization -High availability -Shared resources

-Metered utilization The end user is interested in and pays for only the services provided by the cloud. The per use billing for resources consumed by the cloud is metered utilization. Pooling shared resources means that the hardware making up the cloud provider's data center is not dedicated or reserved to a single customer account. Rapid elasticity refers to the system's ability to handle changes to demand in real time. A system with high elasticity will not experience loss of service or performance if demand suddenly doubles. High availability (HA) means that the service experiences very little downtime. For example, a service with Five Nines or 99.999 availability experiences only 5 minutes and 15 seconds annual downtime.

A small company is looking to manage its devices and email subscriptions under one license per user. What kind of Office license would allow for a Windows license as well as an email license? -Office 365 Business -Microsoft 365 -Office 2019 -Office 365

-Microsoft 365 Microsoft 365 is the subscription that allows for Office application installs, Windows licensing, and other Office 365 services. Office 365 subscriptions alone cannot be bundled with Windows licenses. It would require a second subscription or purchase to get the same functionality as Microsoft 365. Purchasing a license of Office 2019 allows for only installing the desktop applications, such as Word, Excel, Outlook, and PowerPoint. It does not provide continual upgrade support or Windows licensing. Office 365 Business is a specifically tailored license of Office 365 for small businesses and does not bundle a Windows license.

A technician set up a new security system that uses a mobile device app to unlock doors. What technology enables a mobile device to communicate with another and can be used for store purchases or security access? -WiFi -Bluetooth -Near field communication -Lightning

-Near field communication Near field communications (NFC) is a peer-to-peer version of RFID that is, an NFC device can work as both tag and reader to exchange information with other NFC devices. Bluetooth is used to connect peripheral devices to PCs and mobiles and share data between two systems. Many portable devices, such as smartphones, tablets, wearable tech, audio speakers, and headphones, now use Bluetooth connectivity. WiFi is the brand name for the IEEE 802.11 standards that can be used to implement a wireless local area network (WLAN). Lightning is a proprietary connector and interface used by Apple iPhone and iPad devices. The Lightning connector is reversible.

A network technician configures a foundational cloud setup that will allow the developers to start all application development using a standardized server and database setup. What type of cloud service model is the technician configuring? -SaaS -IaaS -PaaS -DaaS

-PaaS Platform as a service (PaaS) would deploy servers and storage network infrastructure as per IaaS but also provide a multi-tier web application database platform on top. Software as a service (SaaS) provisions software licenses for a given number of seats so that a business would access software hosted on a supplier's servers on a pay you go arrangement. Infrastructure as a service (IaaS) is a means of provisioning IT resources, such as servers, load balancers, and storage area network SAN components, quickly. Provisioning virtual desktop infrastructure (VDI) as a cloud service is known as desktop as a service (DaaS).

A cloud administrator configures a cloud instance to increase its resources during times of high utilization and decrease its resources when peak utilization times end. What cloud characteristic does this represent? -Rapid elasticity -HA -Scalability -Metered utilization

-Rapid elasticity The per use billing for resources consumed by the cloud is metered utilization. The metering measurement is based on the type of resources such as storage, processing, bandwidth, or active users. High availability (HA) means that the service experiences very little downtime. Downtime can occur as a result of scheduled maintenance and unexpected outages. Scalability means that the costs involved in supplying the service to more users are linear. Technicians can achieve scalability by adding nodes or by adding resources to each node. Rapid elasticity refers to the system's ability to handle changes to demand in real time. A system with high elasticity will not experience loss of service or performance if demand suddenly increases.

A company is looking to buy budget monitors. A sales representative mentioned that a specific model would work best for them because it uses a technology that is less common but was one of the original types of LCD technologies. What kind of monitor technology is the salesperson referring? -TN -IPS -OLED -VA

-TN Twisted nematic (TN) crystals twist or untwist in response to the voltage level. TN is the earliest type of TFT technology, and users may still find it in budget displays. Vertical alignment (VA) uses crystals that tilt rather than twist or rotate. This technology supports a wide color gamut and the best contrast ratio performance. In plane switching (IPS) uses crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles. In an organic LED OLED display, a separate LED generates each pixel. OLED allows much better contrast ratios and allows the display to be thinner, lighter, and consume less power.

network technician installs virtual machines in hypervisor software that runs on a host operating system OS. What kind of hypervisor setup is this? Select the best two answers. -Type 2 -Guest OS -Bare metal -Type 1

-Type 2 -Guest OS In Type 2 hypervisors, the hypervisor application installs onto a host OS, and the computer must have resources to run the host OS, the hypervisor, and the guest operating systems. In a guest OS or host-based system, the hypervisor application is itself installed onto a host OS. The hypervisor software must support the host OS. A Type 1 hypervisor installs directly onto the computer and manages access to the host hardware without going through a host OS. A bare metal virtual platform means that a Type 1 hypervisor installs directly onto the computer and manages access to the host hardware without going through a host OS.


Ensembles d'études connexes

Sigmund Freud Stages of Psychosexual Development

View Set

Chapter 25: The Urinary System A&P

View Set

Across Five Aprils - Chapters 1 & 2

View Set

Chapter Three: Verbal Communication Skills

View Set

Ch. 38: Peripheral Vascular Disease NCLEX Questions

View Set