Software Troubleshooting Flashcards
If there is no sound coming from your device, what is a quick way to test for an issue with your speakers?
Plug in some headphones.
Explanation:
If you are getting audio through your headphones, but the device does not otherwise produce sound, then you probably have a problem with your speakers.
How can a user prevent someone from tracking his or her location when using a mobile device?
Disable location service on the mobile device.
Explanation:
Cellphones track everywhere you go, storing this for later use. Users should consider disabling location service in the settings of their devices.
What tool is available to mobile device users to ensure that applications used are secure?
an app scanner
Explanation:
App scanners allow users to see if applications have been successfully used by others and they come from legitimate vendors. Apple iPhone apps, purchased through the Apple store, have been approved by Apple and users can be relatively certain the application is legitimate. However, Android users can purchase apps from third-party vendors, since they are considered open sources. These apps are more likely to be insecure.
What can be done to recover a cell phone that appears to be completely locked up?
Perform a hard reset of the device.
Explanation:
A hard reset on a cell phone is similar to rebooting a PC.
On an iPhone, hold down the Power and Home buttons for 10 seconds.
On a newer version iPhone without a homescreen button, press volume up, press volume down, and press and hold side button for 10 seconds.
On an Android device, there are numerous ways to perform a hard reset, depending on the model.
What is a quick way to check your signal strength and see how fast your Internet connectivity is?
Run a speed test.
Explanation:
A speed test is a quick way to see how strong your connection is and to check the bandwidth of that connection. It will show you the exact speeds you are getting for download and upload at that moment in time. It also typically shows ping response times as well.
A user purchased a new cell phone and wants to sell his old, used iPhone on the Internet. What precautions should he take before selling his used phone?
Perform a factory reset.
Explanation:
Factory reset removes all personal information from the device. Prior to a factory reset, the user should sync the device to either his PC or iCloud.
The touch screen on your cell phone is unresponsive. What can you do to resolve this issue?
Complete a restart of the device.
Explanation:
Just like a PC, a cell phone needs sufficient system resources to function properly. If there are too many applications launched, they would use up system resources, which could cause the problem. You can resolve this by holding down the power button to restart your device or, depending on the device model, remove the battery.
This is the name for an unsolicited e-mail you receive, typically trying to sell a service or product.
spam
Explanation:
Consider adding a spam filter to your system to prevent spam e-mail messages.
The first step in the best practice procedure for malware removal is to ____.
identify malware symptoms
Explanation:
Be able to identify the various symptoms relating to malware. Also be sure to review the seven-step process outlined by CompTIA®.
What device provides a data path to USB attached peripherals?
USB controller
Explanation:
When a peripheral is attached via USB, the USB controller controls the power supply and the data path to the peripheral. The 2.0 ports can accommodate five concurrent 100 mA loads, while 3.0 can run six 150 mA loads.
What Windows command will scan all protected system files and replace any corrupted file?
System File Check (SFC)
Explanation:
To run SFC, you will need to be at an elevated command prompt.
What is it called when the RTC on a motherboard begins to shift?
time drift
Explanation:
The real-time clock (RTC) is on the motherboard. When the RTC begins to shift or lose time, it is referred to as time drift.
What Windows tool provides a comprehensive view of all the different events occurring in the operating system?
Event Viewer
Explanation:
Not only does Windows Event Viewer display operating system events, but it also contains logs of various system events for troubleshooting.
What is the procedure for entering Safe Mode in Windows 10?
Press F8 during system boot.
Explanation:
Safe Mode will boot the system into basic functions and is used for troubleshooting.
What is the name of the attack in which malware disguises itself as an antivirus program?
Rogue antivirus
Explanation:
Rogue antivirus is an attack in which a piece of malware is disguised as a legitimate antivirus program.