Which of the following is a file on a computer that links to another program or file
somewhere else on the same computer?
A. Shortcut
B. URL
C.
... [Show More] Attachment
D. FTP
A
Which of the following operating systems is MOST likely to be found on a desktop where its
primary functions include professional video and audio editing?
A. Chrome OS
B. Windows 7 Home
C. Mac OS X
D. iOS
C
A technician is trying to access a users files and is unable to open any folder or file. Which
of the following BEST describes the situation?
A. The folders contain older versions of the files.
B. The files are corrupted.
C. The technician needs to change the file attributes.
D. The technician does not have permissions.
D
A user has a username and password to log onto a banking website. The user would like to
keep access to the account as secure as possible. Which of the following security best
practices should the user follow? (Select TWO).
A. Use only public computers to access the website
B. Create a complex password
C. Change the default password
D. Write the password down
E. Use the original password
B C
Which of the following components provides the FASTEST medium for hosting and storing
an operating system?
A. Blu-Ray disc
B. 7200RPM HDD
C. SSD
D. DVD-RW
C
An RoHS label on hardware indicates which of the following?
A. The hardware produces EMI when used.
B. The hardware is certified to be energy efficient.
C. The hardware provides battery backup for power outages.
D. The hardware needs to be properly disposed.
D
Which of the following settings will a user configure as part of the initial operating system
setup wizard? (Select TWO).
A. Backup schedule
B. Accessibility options
C. Multiple user accounts
D. Time zone
E. Computer name
D E
After initial OS and application installation on a laptop, an application warns that it will only
work 24 more times. Which of the following should be done NEXT?
A. The application has to be registered to the user.
B. The application must be upgraded to a 64-bit version.
C. The application must be activated.
D. The application needs to be reinstalled.
C
Which of the following should be performed after a backup has been completed?
A. Delete the backup
B. Verify the backup
C. Save the backup
D. Schedule the backup
B
Which of the following connections provide data with the MOST secure protection from
interception?
A. Wired
B. WiFi
C. IR
D. Cellular
A
A technician is configuring a wireless router for a small office and the business owner
would like the wireless network to be secured using the strongest encryption possible.
Which of the following should the technician choose?
A. WPA2
B. WAP
C. WPA
D. WEP
A
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and
should be shared cautiously and only with trusted resources?
A. Email address
B. Phone number
C. Mother's maiden name
D. Last name
C
Which of the following operating systems is available for free and can be modified by
anyone?
A. Windows
B. Linux
C. Mac OS
D. Chrome OS
B
A user is browsing the Internet when suddenly a threatening message appears on screen
demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?
A. Ransomware
B. Adware
C. Spyware
D. Virus
A
Which of the following features of a smartphone controls the screen orientation?
A. Gyroscope
B. NFC
C. Accelerometer
D. GPS
A
Which of the following printer types uses a powder based consumable with a lower cost per
page compared to other printers?
A. Thermal
B. Laser
C. Dot matrix
D. Inkjet
B
Which of the following components are used to store data? (Select TWO).
A. Motherboard
B. RAM
C. CPU
D. GPU
E. SSD
B E
A user has downloaded an application file with the .dmg file extension. Which of the
following operating systems can be used with this file by default?
A. iOS
B. Windows
C. Mac OS
D. Chrome OS
C
Which of the following operating systems is very lightweight and relies heavily on Internet
applications?
A. Chrome OS
B. Windows
C. Linux
D. Blackberry OS
A
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an
Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar
website. She clears all temporary files and deletes the history, but this continues to occur.
Which of the following is the cause of the problem?
A. The company has configured a policy on her computer that forces her to stay on their website.
B. Her computer is infected with adware and is redirecting her browser to another site.
C. The memory of the browser is corrupt, and she needs to have the browser reinstalled.
D. She did not reboot her computer after clearing the temporary files.
B [Show Less]