Assessment Test Flashcards

1
Q

Which of the following optical discs will store the most data?

A. CD-ROM

B. DVD-ROM DL

C. DVD-ROM DS

D. RS-ROM

A

C. DVD-ROM DS

A double-sided DVD-ROM can store more data than a dual-layer DVD-ROM, and both can store much more than a CD-ROM. There is no RS-ROM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following devices are used to permanently store user data in a computer? Choose two.

A. HDD

B. RAM

C. ROM

D. SSD

A

A. HDD

D. SSD

Hard disk drives (HDD) are used to permanently store user data. Solid state drives (SSD) are one type of hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following on your computer is considered firmware?

A. RAM

B. SSD

C. CMOS

D. BIOS

A

D. BIOS

The Basic Input/Output System (BIOS) is firmware. It’s stored on a hardware chip called the CMOS. See Chapter 1 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was the first widely adopted video connector standard?

A. CGA

B. VGA

C. XGA

D. DVI

A

B. VGA

VGA was the first widely used video connector standard, and it was released in 1987. See Chapter 2 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of removable storage is often used in digital cameras?

A. Flash drive

B. NAS

C. Memory card

D. Mobile media card

A

C. Memory card

Digital cameras use memory cards. The most popular form of memory card in the market today is the SD card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following devices is considered an input device?

A. Scanner

B. Printer

C. Touchscreen

D. Flash drive

A

A. Scanner

Scanners are input devices. Printers produce output. Touchscreens and flash drives are both input and output devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which operating system named its versions after large cats?

A. iOS

B. OS X

C. Android

D. Chrome OS

A

B. OS X

Apple’s OS X was named for large cats. Now versions are named after locations in California.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your computer has a 64-bit CPU. Which statement is true regarding which operating systems you can install on it?

A. 64-bit operating systems only.

B. 64-bit or 32-bit operating systems.

C. 32-bit operating systems only.

D. It depends on how much RAM your system has.

A

B. 64-bit or 32-bit operating systems.

A 64-bit processor can handle 32-bit or 64-bit OSs. It is a waste of power to use a 32-bit OS on it, but it will work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens to a file on your hard drive when you move it from one directory to another in Windows?

A. It gets erased from the original location and re-created in the new location.

B. It is maintained in the original location and re-created in the new location.

C. Nothing happens to the file; the metadata gets changed pointing to the new directory.

D. Nothing happens to the file.

A

C. Nothing happens to the file; the metadata gets changed pointing to the new directory.

Moving a file is analogous to a cut and paste. It takes the file from one folder and places it in another within Windows. However, on the hard drive the only thing that happens is the file gets associated with a new folder. It does not physically move.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A .flac file is an example of what type of file?

A. Image

B. Video

C. Audio

D. Compressed

A

C. Audio

The .flac extension is for audio files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are configuring some Windows computers for an office, and the manager tells you that employees should not be able to play the games. What should you do?

A. Uninstall the games from within Control Panel.

B. Uninstall the games from within Windows Update.

C. In the Start menu, right-click the Games folder and select Delete.

D. Delete and reinstall Windows, and deselect the games upon reinstallation.

A

A. Uninstall the games from within Control Panel.

Games and other software components can be added and removed from within Control Panel. See Chapter 4 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A common compression format file extension seen on UNIX and Linux computers is what?

A. .rar

B. .dmg

C. .iso

D. .gz

A

D. .gz

The .gz extension is used by gzip, which is a UNIX- and Linux-compatible compression utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of software is used to create 3-D drawings for construction projects?

A. CAD

B. Graphic design

C. PDF

D. Specialized

A

A. CAD

Computer Aided Design (CAD) software is designed to create 2-D and 3-D drawings for construction projects. CAD is a type of specialized software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You open your web browser and type in www.google.com, but your computer can’t find the website. Your neighbor’s computer finds it just fine. What is most likely the cause?

A. Incorrect DNS configuration.

B. Incorrect DHCP configuration.

C. Incorrect WPA2 configuration.

D. The website is down.

A

A. Incorrect DNS configuration.

DNS servers resolve host names to IP addresses. It’s possible that your computer has the wrong address for the DNS server. DHCP automatically configures TCP/IP clients, and WPA2 is a security protocol. If the website was down, your neighbor would not be able to access it either.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your friend Marcos asks you which of the following is the most secure. What do you tell him?

A. 802.11n

B. Infrared

C. Fiber-optic

D. UTP

A

C. Fiber-optic

Wired connections are more secure than wireless ones. Fiber-optic cable is also immune to wiretaps, which makes it more secure than UTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement?

A. WPA2

B. WPA

C. NAT

D. WEP

A

A. WPA2

WPA2 is the most secure wireless security protocol in use today.

17
Q

Which of the following types of networks features decentralized security and resource administration?

A. LAN

B. WAN

C. Peer-to-peer

D. Client-server

A

C. Peer-to-peer

A peer-to-peer network is one where all computers are equals. Each one is responsible for setting its own security and resource sharing.

18
Q

You need to install a local storage solution that multiple users can easily access and has its own file-management software. Which option should you choose?

A. NAS

B. DAS

C. Network drive

D. Cloud

A

A. NAS

Network attached storage (NAS) is an external hard drive (or multiple hard drives) complete with its own file management and sharing software.

19
Q

Which of the following is an advantage of using a workgroup instead of a homegroup?

A. It’s more secure because it requires a password.

B. It has guaranteed compatibility because all computers must be running Windows 7 or newer.

C. It’s more secure because all clients must be on the same local network.

D. It’s more flexible because multiple operating systems can join it.

A

D. It’s more flexible because multiple operating systems can join it.

Homegroups require their clients to be running Windows 7 or newer, and they are more secure than workgroups because a password is needed to join. An advantage of a workgroup is that multiple client OSs can participate, such as OS X.

20
Q

Angela has an iPhone with a biometric scanner enabled. She powered the device off, and just turned it back on. What methods can she use to unlock her phone?

A. Fingerprint only

B. Passcode only

C. Fingerprint or passcode

D. Fingerprint, passcode, or iris scan

A

B. Passcode only

With biometrics enabled, you can use either the passcode or your fingerprint to access a locked device. However, if it was just powered off, the only option is to enter the passcode.

21
Q

You are setting up a new Wi-Fi connection on your iPad. What is the first step in the process?

A. Enter the wireless password.

B. Verify the Internet connection.

C. Verify wireless capabilities.

D. Locate SSID.

E. Turn on Wi-Fi.

A

C. Verify wireless capabilities.

The proper steps in order are to verify wireless capabilities, turn on Wi-Fi, locate SSID, enter the wireless password, and verify the Internet connection.

22
Q

What type of security is involved when pairing two Bluetooth devices together?

A. SSL certificates are exchanged.

B. A PIN is provided by the Bluetooth device.

C. The Bluetooth security layer negotiates the security mechanism.

D. There is no security involved.

A

B. A PIN is provided by the Bluetooth device.

When pairing two Bluetooth devices, you need to enter the PIN into your mobile device that allows it to connect to the Bluetooth device.

23
Q

Which of the following are considered physical security risks? (Choose two.)

A. Dumpster diving

B. Phishing

C. Software theft

D. Password cracking

A

A. Dumpster diving

C. Software theft

Examples of physical security risks include hardware damage and theft, software and license theft, shoulder surfing, and dumpster diving.

24
Q

What is the primary difference between a computer virus and a worm?

A. A virus can replicate itself to infect another computer.

B. A worm can replicate itself to infect another computer.

C. Viruses only damage operating systems while worms damage software applications.

D. Viruses can’t cause total system crashes whereas worms can.

A

B. A worm can replicate itself to infect another computer.

Viruses and worms are similar in the damage they do. The major difference is that while a virus needs a host to replicate and spread, a worm can replicate itself and spread without user intervention.

25
Q

You are online and you see a link to a free virus-scanning program appear. You click it, and after a few minutes your computer starts behaving erratically. What happened?

A. The virus scanner found a virus and is deleting it.

B. The link is attempting to crack your password.

C. The link was a phishing attempt.

D. The link was a Trojan horse.

A

D. The link was a Trojan horse.

The link was most likely a Trojan horse, which pretends to be a beneficial program but then does damage to your computer. It most likely installed malware on your system.

26
Q

Which of the following are considered device hardening techniques? (Choose two.)

A. Disabling Bluetooth

B. Requiring complex passwords

C. Enabling single sign-on

D. Installing antispyware software

A

A. Disabling Bluetooth

D. Installing antispyware software

Device hardening makes it harder for attackers to gain access to your system by reducing the potential areas of attack. Two examples of device hardening are disabling unused or unneeded services and installing antimalware.

27
Q

For security purposes, which of the following user accounts are disabled by default?

A. Guest

B. Users

C. Power Users

D. Administrator

A

A. Guest

The Guest account is disabled by default and should remain disabled if it is not being used. See Chapter 9 for more information.

28
Q

You are browsing the Internet to purchase a gift for a friend. What two things should you look for to ensure it’s safe to enter your credit card information? (Choose two.)

A. Security seal of approval

B. RSA Secure Access symbol

C. A lock symbol

D. HTTPS://

A

C. A lock symbol

D. HTTPS://

Secure websites will start with HTTPS:// instead of HTTP://. In addition, there will be a lock symbol near the address in the address bar.

29
Q

You are helping a friend choose the right laptop for their needs. Which of the following are criteria that should be important for choosing the laptop? (Choose two.)

A. Display size

B. Weight

C. CPU speed

D. Memory

A

A. Display size

B. Weight

Processor speed and memory are important for all computers. The display size and weight are considerations that are more specifically related to laptops than desktop computers.

30
Q

Your office recently purchased five new workstations, and you are responsible for setting them up properly. After unpacking them, what is the next step you should perform?

A. Configure the Internet connection.

B. Configure localization settings.

C. Power on the computer.

D. Plug in the cables.

A

D. Plug in the cables.

The first step in setting up a workstation is to plug in the cables.

31
Q

You are setting up a workstation for your neighbor. After following the operating system setup wizard, what is the next step to take in the setup process?

A. Configure peripherals.

B. Create user accounts.

C. Install security software.

D. Uninstall unneeded software.

A

C. Install security software.

After performing the initial setup of the operating system, the next step is to install security software. The security software is the second most important piece of software on the computer, so it should be taken care of immediately after the OS setup.

32
Q

You just installed a new HP printer on your Dell computer, and it’s not printing. What is the first source to check for information on the problem?

A. Dell’s website

B. HP’s website

C. Google search

D. Internet technical community groups

A

B. HP’s website

Always check the manufacturer’s website first. Since it’s an HP printer, check their site and not Dell’s.

33
Q

When configuring a backup solution for your computer, you decide that speed is the most important factor. Which storage option should you choose?

A. Locally attached storage

B. Network attached storage

C. Cloud storage

D. Offline storage

A

A. Locally attached storage

When choosing a backup solution, know that locally attached storage devices will always be faster than network storage or cloud-based solutions.

34
Q

You have just completed a backup of your PC onto an optical disc. What is the next step you need to take?

A. Store the backup in a secure location.

B. Burn the disc to ensure the data is saved.

C. Test the backup to verify it works.

D. Copy the backup data to a cloud.

A

C. Test the backup to verify it works.

After completing a backup, you should verify that the backup is working properly.

35
Q

You are conducting an ergonomic assessment of your working environment. What should be true of the monitor placement?

A. The bottom of the monitor should be level with your eyes.

B. The top of the monitor should be level with your eyes.

C. The center of the monitor should be level with your eyes.

D. Monitor position does not matter in ergonomic assessments.

A

B. The top of the monitor should be level with your eyes.

When placing a computer monitor, the top of the monitor should be at or slightly below eye level for the user.

36
Q

At home, you are walking across a carpeted floor and touch a door handle. The handle shocks you and it stings a little. What caused this shock?

A. RoHS

B. EMI

C. ESD

D. UPS

A

C. ESD

The shock is caused by static electricity, which is also known as electrostatic discharge (ESD).

37
Q

You need to purchase a device for your desktop computer so that if you lose power in your house, the computer can still operate until you shut it down safely. What do you need?

A. Surge suppressor

B. Power replicator

C. Power strip

D. UPS

A

D. UPS

An uninterruptable power supply contains batteries that allow your computer to operate even if there is no power coming to it.