FC0-U51 Flashcards
(283 cards)
Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?
Shortcut
URL
Attachment
FTP
Shortcut
Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?
Chrome OS
Windows 7 Home
Mac OS X
iOS
Mac OS X
A technician is trying to access a user’s files and is unable to open any folder or file. Which of the following BEST describes the situation?
The folders contain older versions of the files.
The files are corrupted.
The technician needs to change the file attributes.
The technician does not have permissions.
The technician does not have permissions.
A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).
Use only public computers to access the website
Create a complex password
Change the default password
Write the password down
Use the original password
Create a complex password
Change the default password
Which of the following components provides the FASTEST medium for hosting and storing an operating system?
Blu-Ray disc
7200RPM HDD
SSD
DVD-RW
SSD
An RoHS label on hardware indicates which of the following?
The hardware produces EMI when used
The hardware is certified to be energy efficient
The hardware provides battery backup for power outages
The hardware needs to be properly disposed
The hardware needs to be properly disposed
Which of the following settings will a user configure as part of the initial operating system setup wizard? Choose 2
Backup schedule
Accessibility options
Multiple user accounts
Time zone
Computer name
Time zone
Computer name
After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?
The application has to be registered to the user.
The application must be upgraded to a 64-bit version.
The application must be activated.
The application needs to be reinstalled.
The application must be activated.
Which of the following should be performed after a backup has been completed?
Delete the backup
Verify the backup
Save the backup
Schedule the backup
Verify the backup
Which of the following connections provide data with the MOST secure protection from interception?
Wired
WiFi
IR
Cellular
Wired
A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible. Which of the following should the technician choose?
WPA2
WAP
WPA
WEP
WPA2
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?
Email address
Phone number
Mother’s maiden name
Last name
Mother’s maiden name
Which of the following operating systems is available for free and can be modified by anyone?
Windows
Linux
Mac OS
Chrome OS
Linux
A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following BEST describes this type of malware infection?
Ransomware
Adware
Spyware
Virus
Ransomware
Which of the following features of a smartphone controls the screen orientation?
Gyroscope
NFC
Accelerometer
GPS
Gyroscope
Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?
Thermal
Laser
Dot matrix
Inkjet
Laser
Which of the following components are used to store data? (Select TWO).
Motherboard
RAM
CPU
GPU
SSD
RAM
SSD
A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?
iOS
Windows
Mac OS
Chrome OS
Mac OS
Which of the following operating systems is very lightweight and relies heavily on Internet applications?
Chrome OS
Windows
Linux
Blackberry OS
Chrome OS
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website, She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?
The company has configured a policy on her computer that forces her to stay on their website.
Her computer is infected with adware and is redirecting her browser to another site.
The memory of the browser is corrupt and she needs to have the browser reinstalled.
She did not reboot her computer after clearing the temporary files.
Her computer is infected with adware and is redirecting her browser to another site.
Ann, a user, wishes to free space in her documents folders. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?
Date modified
File path
Size
Extension
Size
A user has finished setting up a new computer. Now the operating system requires activation, but the user discovers the computer has no Internet connection, Which of the following should the user do FIRST?
Contact technical support.
Reboot the computer.
Check the Ethernet cable.
Review the manufacturer’s website.
Check the Ethernet cable.
Which of the following will allow a user to move a file from one folder to another using the LEAST number of steps, while ensuring that the file is removed from its original location?
Open the file from its original location, save it to the new location, and delete it from the original location.
Cut the file from its original location and paste it to the new location.
Rename the file in its original location to a name that is not already taken in the new location.
Copy the file from its original location and paste it to the new location.
Cut the file from its original location and paste it to the new location.
Which of the following software package types is designed to accept input from multiple users?
Utility
Operating system
Specialized
Collaborative
Collaborative