Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?
A. Shortcut
B. URL
C.
... [Show More] Attachment
D. FTP - gShortcut
gyWhich of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?
A. Chrome OS
B. Windows 7 Home
C. Mac OS X
D. iOS - gMac OS X
gyA technician is trying to access a users files and is unable to open any folder or file. Which of the following BEST describes the situation?
A. The folders contain older versions of the files.
B. The files are corrupted.
C. The technician needs to change the file attributes.
D. The technician does not have permissions. - gThe technician does not have permissions
gyA username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select 2)
A. Use only public computers to access the website
B. Create a complex password
C. Change the default password
D. Write the password down
E. Use the original password - gCreate a complex password, Change the default password
gyWhich of the following components provides the FASTEST medium for hosting and storing an operating system?
A. Blu-Ray disc
B. 7200RPM HDD
C. SSD
D. DVD-RW - gSSD
gyAn RoHS label on hardware indicates which of the following?
A. The hardware produces EMI when used.
B. The hardware is certified to be energy efficient.
C. The hardware provides battery backup for power outages.
D. The hardware needs to be properly disposed. - gThe hardware needs to be properly disposed.
gyWhich of the following settings will a user configure as part of the initial operating system
setup wizard? (Select TWO).
A. Backup schedule
B. Accessibility options
C. Multiple user accounts
D. Time zone
E. Computer name - gTime zone, Computer name
gyAfter initial OS and application installation on a laptop, an application warns that it will only
work 24 more times. Which of the following should be done NEXT?
A. The application has to be registered to the user.
B. The application must be upgraded to a 64-bit version.
C. The application must be activated.
D. The application needs to be reinstalled. - gThe application must be activated.
gyWhich of the following should be performed after a backup has been completed?
A. Delete the backup
B. Verify the backup
C. Save the backup
D. Schedule the backup - gVerify the backup
gyWhich of the following connections provide data with the MOST secure protection from
interception?
A. Wired
B. WiFi
C. IR
D. Cellular - gWired
gyA technician is configuring a wireless router for a small office and the business owner
would like the wireless network to be secured using the strongest encryption possible.
Which of the following should the technician choose?
A. WPA2
B. WAP
C. WPA
D. WEP - gWPA2
gyWhich of the following is the MOST sensitive Personally Identifiable Information (PII) and
should be shared cautiously and only with trusted resources?
A. Email address
B. Phone number
C. Mother's maiden name
D. Last name - gMother's maiden name
gyWhich of the following operating systems is available for free and can be modified by
anyone?
A. Windows
B. Linux
C. Mac OS
D. Chrome OS - gLinux
gyA user is browsing the Internet when suddenly a threatening message appears on screen
demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?
A. Ransomware
B. Adware
C. Spyware
D. Virus - gRansomware
gyWhich of t [Show Less]