-
A
- Reset administrator password.
- Set network name.
- Set network security.
- Set network password.
-
B
- Reset administrator password.
- Set network name.
- Set network password.
-
C
- Set network name.
- Set network password.
- Assign DNS servers.
-
D
- Change administrator account name.
- Set network password.
- Set network name.
- Assign DNS servers.
- Yes. The DisplayPort cable plugs directly into the USB connector.
- Yes. An adapter or dongle may be required.
- No. While you can rig a connection, video quality will be poor.
- No. The two standards are incompatible.
- the location where expansion cards can connect to peripherals
- a cluster of ports and connectors found on the back of the computer case
- the switches that turn on, sleep, and turn off the computer
- the portion of the motherboard where non-power cables connect
- Edit the Registry key that controls the boot sequence.
- Hold the Shift key as Windows boots.
- Check the MSCONFIG utility to ensure that Normal boot is selected.
- Fix the issue in Safe Mode that is causing the system to restart in this mode.
- resolution
- color temperature
- contrast
- brightness
Q6. Assuming that the gateway, modem, and switch are separate units, in what order should a small office or home office LAN be restarted?
-
A
- Modem
- Gateway
- Switch
-
B
- Modem
- Switch
- Gateway
-
C
- Gateway
- Switch
-
The order is not important.
Q7. A client needs to secure their cafe's wireless network, which is used only by employees. What is the best approach for a finite list of devices?
- Limit access to specific MAC addresses.
- Do not broadcast the SSID.
- Apply a metered connection.
- Apply a password.
- WAN
- USB
- LAN
- uplink
Q9. The recent Windows update introduced some quirks in the system. How can you enter the Windows Recovery Environment to recover from the update?
- Hold the Shift key when selecting the Restart command.
- Restart in Safe Mode where the Recovery item is located on the Start menu.
- Press the any key at the boot screen.
- Go to the Task Manager Startup tab.
-
basic I/O graphics NIC battery expansion slots
-
basic I/O cooling NIC graphics expansion slots
-
basic I/O graphics NIC mass storage expansion slots
-
basic I/O graphics NIC power supply expansion slots
- Repeating Architecture for Internal Drives
- Recoverable Advanced Integration and Duplication
- Redundant Array of Independent Disks
- Replicated Array of Internal Devices
- motherboard
- I/O panel
- power supply
- primary mass storage
Q13. Your computer boots at very low resolution that cannot be increased through display settings. What is the most likely solution?
- The connection between the display and the computer is loose.
- You need to reinstall the display drivers.
- You need to replace your monitor.
- Some of your RAM is failing.
- tracert
- netstat
- ping
- cURL
- No. Incognito mode only prevents the site from appearing in your browser history.
- Yes. Incognito mode encrypts data packets, making it difficult for websites to track your activity.
- No. Some websites track by ID, and if you sign into a site even in incognito, your activity is known.
- Yes. Incognito mode blocks all cookies and tracking IDs and suppresses browser history.
- The new processor is compatible with the current motherboard.
- The new processor is the same type as the old.
- The new processor is compatible with the operating system.
- The new processor fits into the old processor's slot.
- Secure Sockets Layer drive
- solid-state drive
- serial attached storage device
- SCSI drive
Q18. A Bluetooth peripheral is prompting for a passcode to complete the pairing/connection process. What is the peripheral, most likely?
- keyboard
- all of these answers
- mouse
- headset
Q19. Walt's computer is several years old and he wants to ensure that the system works until he gets a replacement. What should he do first?
- Run a file check daily.
- Obtain an extended warranty.
- Back up his data.
- Ensure that the system is protected against malware.
- The drive is where the data is stored and the media is the data itself.
- A drive is hardware that reads media.
- These are two terms for the same thing: storage.
- The terms apply only to removable storage, where the drive is the slot and the media is the thumb drive or media card inserted into the slot.
reference: a drive is a device capable of interacting with data recorded on a media; this media can be removable or non-removable.
- in an expansion slot
- attached to the front of the case
- in a drive cage
- on the motherboard
- It is built from a cluster of smaller, easier-to-install power supplies.
- Its power output can be varied to save electricity.
- Its cables are detachable.
- It has dedicated power reserved for different computer components.
- MSCONFIG
- Task Manager
- the Computer Management Console
- the UEFI
Q24. Angela ran a diagnostic that shows an ever-decreasing amount of memory in her computer. What could be the problem?
- DRAM is failing.
- A program has a memory leak.
- There is no problem. It's normal for available memory to decrease the longer you use the system.
- Another user has signed into the system
- Edison
- Molex
- SATA
- PCI
- Turn off and unplug the computer.
- Disconnect all of the cables.
- Close your programs, sign out of your account, and turn off the computer.
- Ground yourself.
Q27. On a trackpad, what gesture commonly replaces "center mouse wheel" for things like scrolling through documents?
- pinch outward
- scroll with thumb instead
- two-finger swipe
- force click and drag
- BIOS
- RJ-45
- NIC
- Router
- CAT-5 or CAT-6 Ethernet cable
- thin pair or twisted pair
- asynchronous digital (AD) cable
- coax cable
Q30. Miguel is working on the computer, and Jen needs to use it for a moment. What can Miguel do to provide for an easy transition?
- Shut down the system.
- Sign out.
- Restart the computer.
- Let Jen take over.
Q31. A _ allows you to plug computers into a central location to communicate on the same local area network.
- server
- layer 2 switch
- wireless access point
- firewall
Q32. After plugging in an external 3.5mm microphone, you stop hearing sound from the speakers. What is the most likely source of the problem?
- You have plugged the microphone into the 3.5mm audio output jack.
- The sound is muted.
- The sound card has crashed.
- The computer has connected to a nearby Bluetooth headset.
- all of these answers.
- You cannot reach any websites.
- The power is out.
- The lights on the modem are off.
- Restart the computer.
- Sign out.
- Wait or set the application aside until it quits eventually on its own.
- Use the Task Manager (Windows) or use Force Quit (Mac).
Q35. How can you tell that the website you are visiting is sending and receiving data that has been encrypted?
- The URL is HTTPS.
- You are using an incognito window.
- The site requires a login and password.
- You can't tell because a website's security settings are not readily apparent in a browser window.
- multiple hosts interacting with a single computer
- an application consisting of cooperating programs across the Internet
- any program run by a user
- a subscription service on the web
Q37. The primary mass storage device is divided into two partitions. What would explain this arrangement?
- There is one partition for the operating system and a separate partition for user data.
- All drives contain a second partition for the MBR (Master Boot Record).
- The drive is partitioned to maintain compatibility with older versions of the operating system.
- The system has two users who are each getting a partition.
- fan, paste, processor, socket
- fan, processor, socket
- fan, paste, processor, paste, socket
- fan, processor, paste, socket
Q39. The operating system tells you that a file is busy. What is the fastest way to attempt to make the file un-busy?
- Run a disk-checking utility.
- Close open programs.
- Restart the computer.
- Review the output of the netstat utility to check for incoming connections to the file.
Q40. Which service allows clients to work remotely and supplies the clients with an IP address on the same local area network as the offce?
- DNS
- FTP
- VPN
- HTTP
- Back up all files.
- Save data and close programs.
- Remove the older driver.
- Sign out of the operating system.
- migration
- An official term does not exist, though it is colloquieally referred to as a "brain transplant."
- profile transfer
- account cloning
Q43. The local network is up, but the computers cannot access the Internet. Your Internet configuration includes a modem, gateway (router), and a switch as separate devices. What should you do?
- Do nothing. Wait until service is restored.
- Restart all computers on the network.
- Restart the gateway (router).
- Restart the modem.
Q44. You notice that a program crashes at a specific time. Which tool can you use in Windows to discover the cause?
- Task Manager
- Event Viewer
- Perfomance Monitor
- Resource Monitor
Q45. While planning a conference at a center in the mountains, you call ahead to ensure that it has broadband Internet access. Which connection type would be an unsuitable choice?
- DSL
- fiber optic
- cable
- dial-up
- mass storage that has been repaired
- nonremovable mass storage
- any internal mass storage device
- any mass storage device that is not a SSD
- memory and permanent (drive) storage
- SSD and HDD
- RAM and ROM
- standard memory and cache memory
- Service Set Identifier, a wireless network's name
- an older security protocol for Wi-Fi networks
- the server-side ID used to identify devices on a network
- the MAC address broadcast for a wireless network
- Gray: microphone / Black: speakers
- Red: microphone / Green: speakers
- Green: microphone / Pink: speakers
- Green: speakers / Pink: microphone
Q50. Which key assists limited keyboard layouts (such as on a laptop) with accessing the full range of keys?
- Alt (Windows) or Option (Mac)
- Meta
- Fn
- Shift
- Restart the computer
- Work as you normally do until the problem is resolved
- Reconfigure the startup sequence so that the system starts again normally
- Determine the cause and address the issue
Idea behind the answer: let's go for a quick restart to see whether the problem fixes itself or not, then only try to determine the cause and address the issue.
- account protection
- firewall
- antivirus
- backup
- Use the keyboard instead
- Restart the computer
- Clean the mouse, specifically its optical sensor, and ensure that you are using it on the proper surface
- Disassemble the mouse to look for loose parts or corrosion
- 8
- 4
- 5
- 16
- The powered hub has a power supply and is suitable for running powered peripherals.
- A powered USB hub is found on the computer case; all other hubs are non-powered.
- The powered hub supplies 12V of power, whereas the standard hub only 5V.
- Powered hubs are external to the computer case.
- Jarred uses a unique password for each site.
- Jen uses the same password on each site, but with two-factor authentication.
- Jason uses a unique password for each site along with two-factor authentication.
- Jackie uses the same password on each site, but with a different user name.
- Yousef sees an onscreen notification indicating that an operating system is pending and instructing him to click a link to continue.
- After visiting a website, Carla notices that her computer is running slowly.
- Bob receives an email from his bank, asking him to click a link to verify his account.
- Ellen's email inbox is flooded with unwanted advertising.
Q58. You receive a malware warning regarding a specific file. Which approach should you take to ensure you do not have false positive?
- Restart in Safe Mode to remove the file.
- Remove the file.
- Run a thorough scan to validate the results.
- Quarantine the file.
- Handheld vacuum cleaner, air can, soft flashlight.
- air can, microfiber cloth, alcohol wipes, flashlight.
- handheld vacuum cleaner, ammonia, alcohol, microfiber cloth.
- air can, screwdriver, soft cloth, household cleaner.
- watts
- hertz
- amperes
- volts
- 24
- 255
- 254
- 256
- by using the System Configuration Utility (MSCONFIG)
- from the BIOS
- from the computer's startup menu
- on the network
- File I/O is buffered. If you remove the media before the buffer is cleared, files remain open and potentially corrupt.
- The Storage Inventory Manager (SIM) can lose its drive references, which may corrupt other storage in the system.
- The drive must receive the eject signal and turn itself off, dropping the DTR signal and indicating the media is safe to remove.
- The computer must stop the 5-volt signal to media, otherwise the drive may short.
- the modem using TCP/IP protocol
- the gateway/router using DHCP
- the device's NIC based on the MAC address
- IP addresses are always assigned manually
- MCA
- PCMCIA
- ISA
- PCIe