Operating Systems - Exam 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Match the scripting term to the description.

$X = Variable 9 = Integer Loop = Executes the same commands until a condition is met "sample text" = String "Press any key" = String %Temp% = Windows environment variable 1424 = Integer #Start = PowerShell comment

Match the script file extension to the description.

.bat = Windows batch file .ps1 = Windows PowerShell script file .vbs = VBScript file .sh = Unix or Linux shell script file .py = Python script file .js = JavaScript file

In Linux, where are the commands required for system administration stored?

/sbin

What is the value of X when execution ends in the following pseudocode? Set X As Integer For X = 100 to 0 Step -1 ' This is a comment Next X X = 100

100

Which of the following best describes a variable when implemented in a script?

A container for storing data values that can be assigned, referenced, and manipulated.

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

Accelerometer

Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone. What setting can Tracy use on her phone to make sure she is not interrupted during the meeting?

Airplane mode.

Which of the following operating systems can be modified and the source code redistributed?

Android

You want a method of authentication for company-owned mobile devices in which users are required to use two-step authentication. Which of the following will best assist you in meeting this requirement?

Authenticator apps

A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process?

Back up all user data.

A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks. Which of the following steps should the user take next to resolve this issue?

Check for OS updates.

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install. Which of the following steps should the user take next?

Check for sufficient available storage space.

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades. Which of the following is the best action to take to resolve this issue?

Close or disable all unused running apps.

Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers. What will help Derek improve the sound coming from his smartphone's speakers while he is at the campsite?

Connect to a Bluetooth speaker.

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device?

Data transmission over limit

A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device. Which of the following is the first step a technician should take in resolving this issue?

Determine if any other devices are experiencing the same issue.

A user is complaining that her mobile device is too dim to read when in a dimly lit room. Which of the following actions should you take first?

Disable the auto-brightness option.

Your mobile device is displaying messages informing you that your device is infected with malware. The instructions tell you to install another app to properly remove the malware. What should you do?

Disregard the message and check for a compromised app.

Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet. ​ What can Dennis do that will allow the children to watch a video on the Internet while in the car?

Enable a hotspot on his smartphone.

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

End-of-life

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process?

Enter the pin code.

A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems?

First Aid

Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?

Gestures

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone. Which commercial email provider should Angela use for her new Android phone?

Gmail

Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his needs. He wants it to be connected to his Google account. Which smart speaker would you recommend?

Home

Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones?

IMAP

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?

Install apps only from trusted sources.

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same. What type of cable will John need to purchase to replace the iPad's charger cable?

Lightning

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1- ECHO This batch file deletes the temp files 2- DEL %TEMP%\*.* /Q 3- REM The temp files were deleted 4- PAUSE Which of the lines is a comment?

Line 3

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?

Linux

A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively?

Live USB or CD

A customer has several mobile device users who have a habit of misplacing their devices during the workday. Which of the following security methods will most benefit these users?

Locator applications

Which of the following are closed source, proprietary operating systems? (Select TWO.)

Mac OS X High Sierra Windows 10 Home

A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls. Which of the following is the most likely reason for the dropped calls?

Malware is interfering with the calls.

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account. Which of the following describes the security method being used?

Multifactor authentication

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices' security certificates. What type of security does the cloud-base service employ?

Mutual authentication

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?

NFC

A technician needs to boot macOS over the network using an image stored on a server.

NetBoot

The touch screen on a mobile device is not responding to input. Which of the following is the best step to take to resolve this issue?

Perform a factory reset on the device.

Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories. What should Dylan recommend to his company to help track the inventories?

RFID tags

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

Reset the device and restore the data from iCloud or iTunes.

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets. Which of the following is the first step you will take to resolve this issue?

Reset the network settings in the mobile device Settings app.

Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?

SSH is a secure, encrypted alternative to Telnet.

Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT. What should Sara be concerned about when setting up her IoT lights?

Security

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?

Settings app

Spencer would like to purchase a wearable device that allows him to make phone calls and send text messages. Which type of wearable device should Spencer purchase?

Smart watch

A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android mobile devices, some users have iOS devices, and some users have Windows Mobile devices. How can you best answer the manager in regard to his request?

Some apps will work on different OS platforms, but many will not.

Which of the following are natively supported by the Windows, Mac, and Linux operating systems?

Support for reading and writing to FAT32 partitions

Your mobile device appears to be contacting a remote server to upload your personal data. Which of the following should be performed first to protect your personal data?

Switch to airplane mode.

Your company has asked you to do research how it can provide smartphones to its employees. The company wants to give employees access to OneDrive in order to synchronize data. What type of synchronization will you recommend to the company?

Synchronization to the cloud

Your company wants to purchase a device that will allow it to give customers a 3D tour of its facility. What kind of device would you recommend for this type of 3D tour?

Tethered VR headset

Sam cannot figure out why he can't get sound from his tablet's internal speakers and calls you asking for advice. You ask him to check to see if anything is stuck in the aux port. Sam assures you nothing is in the aux port. He also checks to make sure the sound is not muted. What might prevent Sam from getting sound from his tablet?

The audio output is being directed to a Bluetooth speaker.

The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist. Which of the following is the most likely cause for this behavior?

The battery is going bad.

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?

The command needs to be preceded by sudo.

Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual. Which of the following should you consider as a cause for these issues?

The device is infected with malware.

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?

The method for retrieval is dependent on the specific app or device's operating system.

A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data. Which of the following is the most likely cause for this behavior?

The mobile device has malware on it.

You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior?

The mobile device is on a different Wi-Fi network than the TV.

A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior?

The screen protector is interfering with touch response.

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan's smartphone to overheat?

The smartphone is located too close to the car's heat vent.

A user is asking her smartphone to recommend a restaurant, but the app cannot seem to find where the user is located. The device's cellular service is active and functioning. What is the first thing the user should check?

The user should verify location services is enabled on the smartphone.

A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?

Updates are found in the App Store.

How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?

Use a third-party remote access app that uses a browser.

Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?

User guide for the device

Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?

VPN

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device. Which of the following steps should the user take first?

Wait a few minutes for the phone to automatically unlock.

What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code? X = 1 Do ' This is a comment Print X; Loop

X = 1, the Do...Loop is not endless.

Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don't remember sending any of the messages. Which of the following is the reason for this behavior?

Your device is sending spam messages to your contacts.

Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz RF band. The company also wants the device to be at least 50 meters away from the base station. What type of device should the company purchase?

Z-Wave

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?

chown

A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function?

grep

Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet?

iCloud

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?

macOS Recovery

A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?

ps


संबंधित स्टडी सेट्स

Med/Surg Prep U ch. 39, 40, 41, 42

View Set

WWU MKTG 380 Midterm 1 Questions

View Set

Chapter 21: Respiratory Care Modalities

View Set