Assessment Test Flashcards
Which of the following optical discs will store the most data?
A. CD-ROM
B. DVD-ROM DL
C. DVD-ROM DS
D. RS-ROM
C. DVD-ROM DS
A double-sided DVD-ROM can store more data than a dual-layer DVD-ROM, and both can store much more than a CD-ROM. There is no RS-ROM.
Which of the following devices are used to permanently store user data in a computer? Choose two.
A. HDD
B. RAM
C. ROM
D. SSD
A. HDD
D. SSD
Hard disk drives (HDD) are used to permanently store user data. Solid state drives (SSD) are one type of hard drive.
Which of the following on your computer is considered firmware?
A. RAM
B. SSD
C. CMOS
D. BIOS
D. BIOS
The Basic Input/Output System (BIOS) is firmware. It’s stored on a hardware chip called the CMOS. See Chapter 1 for more information.
What was the first widely adopted video connector standard?
A. CGA
B. VGA
C. XGA
D. DVI
B. VGA
VGA was the first widely used video connector standard, and it was released in 1987. See Chapter 2 for more information.
What type of removable storage is often used in digital cameras?
A. Flash drive
B. NAS
C. Memory card
D. Mobile media card
C. Memory card
Digital cameras use memory cards. The most popular form of memory card in the market today is the SD card.
Which of the following devices is considered an input device?
A. Scanner
B. Printer
C. Touchscreen
D. Flash drive
A. Scanner
Scanners are input devices. Printers produce output. Touchscreens and flash drives are both input and output devices.
Which operating system named its versions after large cats?
A. iOS
B. OS X
C. Android
D. Chrome OS
B. OS X
Apple’s OS X was named for large cats. Now versions are named after locations in California.
Your computer has a 64-bit CPU. Which statement is true regarding which operating systems you can install on it?
A. 64-bit operating systems only.
B. 64-bit or 32-bit operating systems.
C. 32-bit operating systems only.
D. It depends on how much RAM your system has.
B. 64-bit or 32-bit operating systems.
A 64-bit processor can handle 32-bit or 64-bit OSs. It is a waste of power to use a 32-bit OS on it, but it will work.
What happens to a file on your hard drive when you move it from one directory to another in Windows?
A. It gets erased from the original location and re-created in the new location.
B. It is maintained in the original location and re-created in the new location.
C. Nothing happens to the file; the metadata gets changed pointing to the new directory.
D. Nothing happens to the file.
C. Nothing happens to the file; the metadata gets changed pointing to the new directory.
Moving a file is analogous to a cut and paste. It takes the file from one folder and places it in another within Windows. However, on the hard drive the only thing that happens is the file gets associated with a new folder. It does not physically move.
A .flac file is an example of what type of file?
A. Image
B. Video
C. Audio
D. Compressed
C. Audio
The .flac extension is for audio files.
You are configuring some Windows computers for an office, and the manager tells you that employees should not be able to play the games. What should you do?
A. Uninstall the games from within Control Panel.
B. Uninstall the games from within Windows Update.
C. In the Start menu, right-click the Games folder and select Delete.
D. Delete and reinstall Windows, and deselect the games upon reinstallation.
A. Uninstall the games from within Control Panel.
Games and other software components can be added and removed from within Control Panel. See Chapter 4 for more information.
A common compression format file extension seen on UNIX and Linux computers is what?
A. .rar
B. .dmg
C. .iso
D. .gz
D. .gz
The .gz extension is used by gzip, which is a UNIX- and Linux-compatible compression utility.
What type of software is used to create 3-D drawings for construction projects?
A. CAD
B. Graphic design
C. PDF
D. Specialized
A. CAD
Computer Aided Design (CAD) software is designed to create 2-D and 3-D drawings for construction projects. CAD is a type of specialized software.
You open your web browser and type in www.google.com, but your computer can’t find the website. Your neighbor’s computer finds it just fine. What is most likely the cause?
A. Incorrect DNS configuration.
B. Incorrect DHCP configuration.
C. Incorrect WPA2 configuration.
D. The website is down.
A. Incorrect DNS configuration.
DNS servers resolve host names to IP addresses. It’s possible that your computer has the wrong address for the DNS server. DHCP automatically configures TCP/IP clients, and WPA2 is a security protocol. If the website was down, your neighbor would not be able to access it either.
Your friend Marcos asks you which of the following is the most secure. What do you tell him?
A. 802.11n
B. Infrared
C. Fiber-optic
D. UTP
C. Fiber-optic
Wired connections are more secure than wireless ones. Fiber-optic cable is also immune to wiretaps, which makes it more secure than UTP.
Your need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement?
A. WPA2
B. WPA
C. NAT
D. WEP
A. WPA2
WPA2 is the most secure wireless security protocol in use today.
Which of the following types of networks features decentralized security and resource administration?
A. LAN
B. WAN
C. Peer-to-peer
D. Client-server
C. Peer-to-peer
A peer-to-peer network is one where all computers are equals. Each one is responsible for setting its own security and resource sharing.
You need to install a local storage solution that multiple users can easily access and has its own file-management software. Which option should you choose?
A. NAS
B. DAS
C. Network drive
D. Cloud
A. NAS
Network attached storage (NAS) is an external hard drive (or multiple hard drives) complete with its own file management and sharing software.
Which of the following is an advantage of using a workgroup instead of a homegroup?
A. It’s more secure because it requires a password.
B. It has guaranteed compatibility because all computers must be running Windows 7 or newer.
C. It’s more secure because all clients must be on the same local network.
D. It’s more flexible because multiple operating systems can join it.
D. It’s more flexible because multiple operating systems can join it.
Homegroups require their clients to be running Windows 7 or newer, and they are more secure than workgroups because a password is needed to join. An advantage of a workgroup is that multiple client OSs can participate, such as OS X.
Angela has an iPhone with a biometric scanner enabled. She powered the device off, and just turned it back on. What methods can she use to unlock her phone?
A. Fingerprint only
B. Passcode only
C. Fingerprint or passcode
D. Fingerprint, passcode, or iris scan
B. Passcode only
With biometrics enabled, you can use either the passcode or your fingerprint to access a locked device. However, if it was just powered off, the only option is to enter the passcode.
You are setting up a new Wi-Fi connection on your iPad. What is the first step in the process?
A. Enter the wireless password.
B. Verify the Internet connection.
C. Verify wireless capabilities.
D. Locate SSID.
E. Turn on Wi-Fi.
C. Verify wireless capabilities.
The proper steps in order are to verify wireless capabilities, turn on Wi-Fi, locate SSID, enter the wireless password, and verify the Internet connection.
What type of security is involved when pairing two Bluetooth devices together?
A. SSL certificates are exchanged.
B. A PIN is provided by the Bluetooth device.
C. The Bluetooth security layer negotiates the security mechanism.
D. There is no security involved.
B. A PIN is provided by the Bluetooth device.
When pairing two Bluetooth devices, you need to enter the PIN into your mobile device that allows it to connect to the Bluetooth device.
Which of the following are considered physical security risks? (Choose two.)
A. Dumpster diving
B. Phishing
C. Software theft
D. Password cracking
A. Dumpster diving
C. Software theft
Examples of physical security risks include hardware damage and theft, software and license theft, shoulder surfing, and dumpster diving.
What is the primary difference between a computer virus and a worm?
A. A virus can replicate itself to infect another computer.
B. A worm can replicate itself to infect another computer.
C. Viruses only damage operating systems while worms damage software applications.
D. Viruses can’t cause total system crashes whereas worms can.
B. A worm can replicate itself to infect another computer.
Viruses and worms are similar in the damage they do. The major difference is that while a virus needs a host to replicate and spread, a worm can replicate itself and spread without user intervention.