IT Foundations - D-316 - Lesson 8 Practice Questions
A user utilizing an external mouse complains that when typing on a laptop keyboard, the cursor slowly moves across the screen. What actions can the help desk perform to prevent this behavior from happening? (Select all that apply.)
A. Adjust the sensitivity setting. B. Disable the touchpad. C. Update the driver. On a laptop, if touchpad sensitivity is too high, typing can cause vibrations that move the cursor. A sensitivity setting can adjust mouse behavior. On a laptop, the user's hand placement may hover extremely close to the touchpad, thus causing the mouse to move while typing. Although not ideal, the help desk can disable the touchpad either through software or a function key on the laptop. It is possible that a driver update is required for the mouse to behave normally. Software drivers often fix glitches and provide updates to functionality. A keyboard replacement is not likely an action the help desk would take. Although typing on the keyboard is causing the issue, the problem is more likely to be with the touchpad.
An organization that does not support the autodiscovery feature for email servers is deploying new phones to its team. A user is configuring their email server on their new device. What options could the user enter in the incoming mail server field to implement a proper configuration? (Select all that apply.)
A. FQDN B. IP address When configuring corporate email, the user will enter the fully qualified domain name (FQDN) or IP address of the Internet Mail Access Protocol (IMAP) or Post Office Protocol (POP3) server. When configuring corporate email, the user will enter the IP address or the FQDN of the Internet Mail Access Protocol (IMAP) or Post Office Protocol (POP3) server. When configuring corporate email, the user will enter the address of the Simple Mail Transfer Protocol (SMTP) server in the outgoing mail server field. When configuring corporate email, the secure (TLS enabled) or unsecured ports used for IMAP, POP3, and SMTP would normally be set to default.
A company uses cell phones that do not have SIM cards and can only be managed by a specific network provider. The company wants to buy 3G cell phones that have SIM cards so they can switch to any chosen provider. What network type best suits the company's needs?
A. GSM Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider. Code division multiple access (CDMA) means that the provider directly manages the handset and there is no removable SIM card. A preferred roaming list (PRL) provides the information that the cellular radio needs to connect to the network and a user can trigger an update to the list in the device's settings or by dialing a code. Long-term evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA cellular networks. LTE Advanced provides 4G standard network access.
A traveling user looks to purchase a smartphone that has a high tolerance for differing environments. This includes indoor and outdoor use. What ingress protection (IP) rating does the user look for when wanting to protect the device from solids as best as possible?
A. IP67 Some mobile-device cases provide a degree of waterproofing. Waterproofing is rated on the ingress protection (IP) scale. The first (6) is a rating for repelling solids. In this case, dustproof. With an ingress protection (IP) scale, the first number located after "IP" is used for solids rating. A 5 is a dust-protected rating which is not as protective as a 6. When using an ingress protection (IP) scale, two numbers are designated after "IP." The first digit is for solids rating and the second is for liquids. In an ingress protection (IP) scale, the second value (8) is for liquids, 8 being protected from immersion beyond 1 m. The X means there is no rating.
A user states that a mobile phone does not hold a very good charge. What might the cause be? (Select all that apply.)
A. Improper battery charging B. Lack of power management C. An aging battery An improper charging routine will reduce the usable life of a battery. Following manufacturer instructions on the proper charging and discharging of the battery is recommended. Making use of power management features included with a device/OS to prolong battery life is a good practice. As batteries age, the maximum charge they can sustain decreases, so short battery life will usually indicate that the battery needs replacing. Symptoms such as the touch screen not responding to input indicate a problem with the digitizer. This would not affect battery life.
A technician needs to replace a solid-state drive (SSD) in a user's laptop. The technician requested the purchasing department to order a drive that has higher bus speeds than other SSDs and fits into a PCI Express bus. Which drive type does the purchasing department order?
A. M.2 An M.2 SSD usually interfaces with the PCI Express bus, allowing much higher bus speeds than SATA. M.2 adapters can be of different lengths. A card with a Mini-SATA (mSATA) interface might house an SSD. These cards resemble Mini PCIe cards but are not physically compatible with Mini PCIe slots. Laptop hard disk drives (HDDs) are usually 2.5" form factor, though sometimes they use 1.8" form factor. These drives use a traditional SATA connector. The uSATA connector is the same as the mSATA connector, and they sometimes use the names interchangeably.
A user's device allows them to bypass the screen lock using biometric authentication. Which of the following are biometric authentication methods the user can configure? (Select all that apply.)
B. Fingerprint reader C. Facial recognition D. Voice recognition A fingerprint reader is an example of an authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system. Facial recognition is a biometric authentication method stored as a digital data template, and a smartphone can use it to authenticate a user. Voice recognition is an additional method of biometric authentication. A personal identification number (PIN) is not a biometric authentication method, but the user can use it as an authentication method or as part of two-factor authentication (2FA).
A Windows-based laptop has an internal battery that requires tools to access and remove. What steps should a repair technician take prior to opening the laptop to install a replacement? (Select all that apply.)
B. Power the laptop off. C. Disconnect the AC power Before inserting or removing any battery pack, it is recommended and best to turn the machine off. This will prevent issues with the operating system and is a best practice for safety. When working on a laptop to replace any physical component, it is recommended to unplug the laptop from the AC wall outlet for safety purposes. Discharging a battery will drain what available charge remains. This is not a required step when replacing a laptop battery. Charging a battery will provide the battery with the maximum amount of power the battery can maintain. Charging the battery is not required.
A user notices that a smartphone is not functioning properly as internal diagnostics show a majority of the RAM being used continuously with certain applications. What symptoms should a technician look for?
B. Resource Usage Poorly coded apps and malware can cause high resource usage which potentially leads to overheating problems for a device. Rogue or poorly developed apps can become unresponsive and might not shut down properly when closed. This can often cause a power drain on a device. Data usage means that the device has reached a data transmission limit or over-limit unexpectedly. Most devices have an option to monitor data usage. Malware can be a problem on mobile devices. Malware activity is a cause for problems but is not the symptom of problems.
A network technician trains a new employee on the company devices they received during orientation. Which devices will have both a front and rear camera? (Select all that apply.)
B. Smartphone C. Tablet Smartphones have both front-facing and rear-facing camera lenses, both of which can function either as a still camera or as a webcam for video recording and streaming. Tablets have both front-facing and rear-facing camera lenses, both of which can function either as a still camera or as a webcam for video recording and streaming. A digital camera allows for video recording or web conferencing and users can also take still pictures with them. A webcam is a type of digital camera used to stream and record video. The front and rear cameras on smartphones and tablets can function as webcams.
A user would like to take advantage of biometric technology for a quicker and more secure login to a laptop. The user discovers the laptop has no built-in technology for biometrics. What solution does the IT department offer?
B. Use a Peripheral Device If a laptop does not have an integrated fingerprint scanner, it is possible to obtain models that connect to a universal serial bus (USB) port. An external webcam may also be used. A near-field communication (NFC) scanner on a laptop is primarily used to pair peripheral devices or to establish a connection to a smartphone. A keyboard on a laptop can be replaced. In this case, a replacement will not suffice. A fingerprint reader is a separate component. A touchpad on a laptop can be replaced. However, a touchpad is a separate internal component from a fingerprint reader.
A warehouse user reports an issue with a laptop to the IT helpdesk. The issue is that the laptop becomes very hot after only a few minutes of use whether it is plugged in or not. The user states that laptop use is under the usual circumstances. What does IT conclude the likely problem to be?
C. Dust and Debris Dust trapped in laptop cooling vents acts as an insulator and can prevent proper cooling. It can also slow or stop the fan. The vents are likely the issue due to the warehouse environment. A faulty AC adapter can cause a number of issues with a laptop. However, in this case, the problem exists even when the laptop is not plugged in. A battery discharging can cause a laptop to feel warm or hot, however, in this case, the temperature is out of the norm. The room temperature can impact the operating temperature of a device. In this case, the user reports no out-of-the-ordinary circumstances.
A network technician is working from a coffee shop and does not want to use their insecure wireless connection. What can the technician enable on his smartphone to provide his laptop with his own Wi-Fi connectivity?
C. Hotspot A hotspot is using the cellular data plan of a mobile device to provide internet access to a laptop or PC. A USB, Bluetooth, or Wi-Fi (a mobile hotspot) can tether the PC to the mobile device. Airplane mode is a toggle found on mobile devices enabling the user to disable and enable wireless functionality quickly. Cellular data networking means connecting to the internet via the device's cellular radio and the handset's network provider. A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, use a wireless headset, and so on.
A network technician is purchasing new displays for the graphics design team. Which type of thin-film transistor (TFT) will be optimal for supporting that type of work?
C. In Plane-Switching In-plane switching (IPS) uses crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles making it the best TFT option for graphics design work. Twisted nematic (TN) crystals twist or untwist in response to the voltage level. This is the earliest type of TFT technology . A touch screen is also known as a digitizer because of the way it converts analog touch input to digital software instructions. The digitizer is in between a layer of protective glass and the display panel. Vertical alignment (VA) uses crystals that tilt rather than twist or rotate. This technology supports a wide color gamut and the best contrast-ratio performance.
Enterprises use different deployment models to specify how they provision mobile devices and apps for employees. Which function of enterprise management allows the organization to perform remote wipes on devices?
C. MDM Mobile device management (MDM) sets device policies for authentication, feature use (camera and microphone), and connectivity. MDM can also allow device resets and remote wipes. An app store is a feature of mobile computing that provides a managed interface for installing third-party software apps. Enterprise mobility management (EMM) is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise. Mobile application management (MAM) sets policies for apps that can process corporate data and prevents data transfer to personal apps.
A technician plans a memory upgrade for a fleet of computers for sales users. When evaluating the various types of memory modules, what module types are commonly used for ultraportable laptops? (Select all that apply.)
C. Mini-DIMM D. Micro-DIMM A mini-DIMM has a smaller form factor than a small outline DIMM (SODIMM) form factor and is used in compact and ultraportable devices. A micro-DIMM has a much smaller form factor than a small outline DIMMs (SODIMM). A micro-DIMM is used with ultraportable devices. A dynamic inline memory module (DIMM) is a memory form factor that is used in desktop systems. Laptop memory is packaged in small outline DIMMs (SODIMMs). A SODIMM is like a DIMM only it has a smaller form factor for laptop use rather than on a desktop. However, SODIMM is not used in ultra-portable laptops.
A non-tech savvy laptop user orders a new hard drive from a large online retailer to install in the laptop. When the drive arrives, the user discovers that it is physically too big to install. What size drive did the user order?
D. 3.5in A 3.5" disk drive is the traditional drive size that is used in desktop systems. These are magnetic drives. Laptop HDDs are usually 2.5" form factor, though sometimes the 1.8" form factor is used. The 1.8" drive is used in smaller and more compact laptops. A standard 2.5" drive has a z-height of 9.5 mm. The z-height is a measurement derived from the size of the internal components. An ultraportable laptop might require a 7 mm (thin) or 5 mm (ultrathin) drive. These drives are the smallest traditional drive sizes.
A user purchased their first smartphone and wants to download useful apps to it. What must the user do before they can use the app store?
D. Configure an account The owner of a mobile device configures an account when they use the device for the first time. This account manages the apps installed on the device and represents the user on the app store. Apps run in a sandbox and have only the privileges granted by the user. An app will normally prompt when it needs to obtain permissions. An owner account can allow app settings and data to synchronize between multiple devices. For example, a user can access their contacts list from both their mobile device and their laptop. Most commercial email providers allow the OS to auto-discover email connection settings. Autodiscover means that the mail service has published special domain name system (DNS) records that identify how to connect.
A mobile device user is traveling out of the area and left their device somewhere outside. The user wants to track where they last had their mobile device in order to retrace their steps and find the device. Which of the following options is the system that relies solely on satellite communication to pinpoint a device's location and help the user find their device?
D. Global Positioning System Global Positioning System (GPS) is a means of determining the device's latitude and longitude based on information received from orbital satellites via a GPS sensor. Geolocation is the use of network attributes to identify (or estimate) the physical position of a device. A mobile device operates a location service to determine its current position. Location service is a feature of mobile computing that identifies or estimates the device's geographical position using GPS and/or network data. Near-field communication allows for very short-range data transmission - usually up to 20 cm/8 in. This type of communication system is best suited for chip readers and would not assist in locating a device.
A user returned a new laptop to the helpdesk with complaints that the screen was too dark and that the desktop image they put on it burned into the display. What kind of display does the laptop have?
D. OLED In an organic light-emitting diode (OLED) display, or technically an advanced matrix OLED (AMOLED), the panel does not require a separate backlight but the screen is darker and images burn into the screen easier. A touch screen is a display screen combined with a digitizer that is responsive to touch input. Smartphone, tablet, and hybrid tablet/laptop form factors all use touch screens. Light-emitting diodes (LED) are small, low-power lamps used both as diagnostic indicators, the backlight for a TFT display, and (as an organic LED array) in high-quality flat panels. A thin-film transistor (TFT) is a specific display technology used to implement modern flat-panel LCD displays. The liquid crystal elements and transistors sit on the TFT.