Pre Test Flashcards
(194 cards)
Which of these is a device that can be written or drawn on,and the content will be converted from analog input to digital images on the computer?
A Digitizer
B Backlight
C Inverter
D Webcam
Answer A is correct.
A digitizer is a device that can be wr itten or drawn on,and the content will be converted from analog input to digital images on the computer.Digitizers take input from a user’s finger or a wr iting utensil,such as a stylus.”
Answer B is incorrect.A backlight is a small lamp placed behind,above,or to the side of an LCD (liquid crystal display) display.The light from the lamp is diffused across the screen,producing brightness.The laptop display uses a CCFL (cold cathode fluorescent lamp) as its backlight.”
Answer D is incorrect. Webcams are nearly universal on laptops today. The most common placement is right above the display on the laptop,although some are below the screen. Most laptops with webcams will also have a smaller circle to the left of the lens, which has a light that turns on to illuminate the user when the webcam is on.
Answer C is incorrect. The inverter is a small circuit board installed behind the LCD panel that takes DC (direct current) and inverts it to AC (alternating current) for the backlight. Ifyou are having problems with flickering screens or dimness,it’s more likely that the inverter is the problem,not the backlight itself.”
Which of these is not an overarching criterion for a safe work environment?
A The company and its employees understand how to respond to accidents or near-miss accidents if or when they occur.
B The company and its employees have identified all significant hazards in the work setting.
C Preventive measures have been taken to address each significant hazard.
D Disposa l regulations have identified all significant hazards or near-miss accidents if or when they occur.
Answer D is correct.
-There are three overarching criteria for a safe work environment:
-The company and its employees have identified all significant hazards in the work setting.
Preventive measures have been taken to address each significant hazard.
-The company and its employees understand how to respond to accidents or near-miss accidents if or when they occur.
An organization has maintained partial or full backups that are kept at the computer center for immediate recovery purposes.Which of these is the organization using?
A Working copies
B Disk defragmenter
C Off-site storage
D On-site storage
Answer A is correct.
Working copies backups,sometimes referred to as shadow copies,are partial or full backups that are kept at the computer center for immediate recovery purposes.Working copies are frequently the most recent backups that have been made.
Answer D is incorrect. On-site storage refers to a location on the site of the computer center that is used to store information locally.On-site storage containers allow computer cartridges,tapes,and other backup media to be stored in a reasonably protected environment in the building.
Answer C is incorrect. Off-site storage refers to a location away from the computer center where paper copies and backup media are kept in the event the primary site suffers a catastrophe.
Answer B is incorrect.Disk defragmenter has existed in almost all versions of Windows,and its ability to take file data has become spread out over the disk and put it all in the same location,a process known as defragmenting.This process decreases the time it takes to retrieve files.
Ann is using theinkjet printing process to print a document.To initiate the process,she first clicked the Print button.Then,the software that she is using sends the data to be printed to the printer driver that she has selected.What will be the next step?
A If the printer has not printed in a while,the printer’s control circuits activate a cleaning cycle.
B The printer stores the received data in its onboard print buffer memory.
C The printer driver sends theinformationto the printer via whatever connection method is being used (USB,network,serial,and so on).
D The printer driver uses a page-description language to convert the data being printed into a format that the printer can understand.
Answer D is correct.
The following steps take place whenever the users click the Print buttonin the favorite software:
1.The users click the Print button (or similar) that initiates the printing process.
2. The software from which the users are printing sends the data to be printed to the printer driver that they have selected.
3.The printer dr ver uses a page-description language to convert the data being printed into a format that the printer can understand.The dr ver also ensures that the printer is ready to print.
4. The printer dr ver sends the information to the printer via whatever connection method is being used (USB (Universal Serial Bus). network,serial,and so on).
5. The printer stores the received data in its onboard print buffer memory.
6. If the printer has not printed in a while,the printer’s control circuits activate a cleaning cycle.
7.Once the printer is ready to print,the control circuitry activates the paper feed motor.”
8. Once the paper is positioned properly,the print head stepper motor uses the print head belt and carriage to move the print head across the page,little by little.”
9.The motor is moved one small step,and the print head sprays the dots of ink on the paper in the pattern dictated by the control circuitry.
10.Then,the stepper motor moves the print head with another small step; the process repeats all the way across the page.
11.Once the page is finished,the feed stepper motor is actuated and ejects the page from the printer into the output tray.”
12. Once printing is complete and the finalpageis ejected from the printer, the print head is parked (locked into rest position), and the print process is finished.
Which of the following Linux commands displays the contents of a file?
A find
B cat
C grep
D nano
Answer B is correct.
The cat command displays the contents of a file.It can also be used to concatenate multiple files.
Answer C is incorrect. The grep command searches for regular expressions in a text file.
Answer D is incorrect. The nano command is a text-based editor for files.
Answer A is incorrect. The find command searches for text in a file hierarchy.
A company has a network consisting of a hundred computers,including a Domain Name System server and a Dynamic Host Configuration Protocol server. All client computers run on Windows 8.John,a technician,wants to know the host name, IP address,and physical address configurations of the computer he is using. Which of the following commands will house to obtain the required information?
A tracert
B netstat
C ipconfig
D telnet
Answer C is correct.
The pc onf g command is the TCP/IP (Transmission Control Protocol/Internet Protocol) utility that verifies network settings and connections.It is one of
“the first tools to be used when you experience problems accessing resources because it will show you whether an address has beenissued to the machine. The ipconfig /al command is used to view the full TCP/IP configuration,including the host name, IP address,and physical address configurations of”
the computer.
Answer B is incorrect. The netstat command is the TCP/IP utility that shows the status of each active network connection. It displays statistics for both
“TCP and UDP (User Datagram Protocol),including the protocol,local address, foreign address,and the TCP connection state.”
Answer Dis incorrect. The telnet command is a command-line connectivity tool that starts terminal emulation with a remote host running the telnet
“server service.It allows users to communicate with a remote computer,offers the ability to run programs remotely,and facilitates remote administration.”
Answer A is incorrect. The tracert command is a route-tracing Windows utility that displays the path an IP packet takes to reach its destination.It shows
FQDN (fully qualified domain name) and the IP address of each gateway along the route to the remote host.
A user reports to a technician that her Windows 7 PC is running very slow.The technician advised her to check for the processes running on the machine. Which of the following utilities should she use to view this detail?
A Task Scheduler
B Task Manager
C msconfig
D Event Viewer
Answer B is correct.
The user should use the Task Manager utility to check for the processes running on her machine.Task Manager is a basic system diagnostic and
“performance monitoring tool. It can be used to monitor or terminate applications and processes,view current CPU and memory usage statist cs,monitor network connection utilization,set the priority of various processes ( f programs share resources),and manage logged-on local users.”
Answer A is incorrect. Task Scheduler allows a user to create and manage certain system tasks that will be automatically carried out by the computer at
specified times.
“Answer Dis incorrect. Event Viewer keeps a log of all recorded system and application events. It includes sign-on attempts,shutdown signals,system”
“crashes,device driver errors, and many more scenarios that can help you to identify where problems exist.”
“Answer C is incorrect. msconfig is a command-line tool that opens the System Configuration Utility dialog box,which can be used to troubleshoot and”
“resolve startup errors,resolve unwanted prompts by third-party users, find and resolve problems with running services, and resolve the errors regarding boot”
paths configured on multi-boot computers.
Which statement is true about the dead pixels?
A These are lines on the screen that never fire or light up.
B These are spots on the screen that may fire or light up.
C These are spots on the screen that never fire or light up.
D These are lines on the screen that may fire or light up.
Answer C is correct.
Dead pixels are spots on the screen that never fire or light up.The users can check for these spots by setting the background to white and seeing if any
spots don’t light up.The only solution for dead pixels is to replace the monitor.
You are dealing with customers on the phone.Which of the following rules should you adhere to?
Each correct answer represents a complete solution. Choose all that apply.
A Avoid arguing with customers.
B Vent about customers on social media.
C Avoid using jargon,abbreviations, and acronyms.
D Maintain a positive attitude.
Answers A, C,and D are correct.”
“If you are dealing with customers on the phone,you should adhere to the following rules:”
“» Use standard language and avoid using jargon,abbreviations, and acronyms.”
» Listen to your customers and take notes.
» Maintain a positive attitude and tone of voice.
» Avoid arguing with customers or becoming defensive.
» Don’t vent about customers on social media.
» Avoid being judgmental and/or insulting or calling the customer names.
» Clarify the customer’s statements and ask pertinent quest ons.
Which of the following statements is true about a chipset?
A A collection of chips or circuits that are responsible for managing the communications with the rest of the computer
B A collection of chips or circuits that perform interface and peripheral functions for the processor
C A collection of chips or circuits that are responsible for providing support to the slower onboard peripherals
D A collection of chips or circuits that perform peripheral functions with the resources given to the computer
Answer B is correct.
A chip set is a collection of chips or circuits that perform interface and peripheral functions for the processor.This collection of chips is the circuitry that
“provides interfaces for memory,expansion cards,and onboard peripherals,and it generally dictates how a motherboard will communicate with the installed peripherals.”
Answers C and A are incorrect. The South bridge subset of the chip set is responsible for providing support to the slower onboard peripherals and managing
their communications with the rest of the computer and the resources given to them.
Which of the following statements is true about lumen?
A It is a unit of measure for the total amount of visible light that the projector gives off,based on what the human eye can perceive and also on”
invisible wavelengths.
B It is a unit of measure for the total amount of visible light that the projector gives off,based solely on what the human eye can perceive and not on invisible wavelengths.
C It is a unit of measure for the total amount of visible light that the projector gives off,based solely on what the human eye cannot perceive.
D It is a unit of measure for the total amount of visible light that the projector gives off,based solely on invisible wavelengths.
Answer B is correct.
“A lumen (Im)is a unit of measure for the total amount of visible light that the projector gives off,based solely on what the human eye can perceive and not”
on invisible wavelengths. Sometimes the brightness is even more of a selling point than the maximum resolution supported by the system because of the chosen environment in which it operates.
Which of these is a bandwidth optimization technology that allows various divisions of an office,which are located at different locations, to share files from a server and access the content locally rather than over WAN?
A Bitlocker
B RDP host
C EFS
D Branch Cache
Answer Dis correct.
“Branch Cache is a bandwidth-optimization technology that allows various divisions of an office,which are located at different locations,to share files from a”
“server and access the content locally rather than over WAN (wide area network). Branch Cache fetches content from the main office or hosted cloud content servers and caches the content at branch office locations, allowing client computers at branch offices to access the content locally.
Answer B is incorrect. The RDP (Remote Desktop Protocol) host feature allows the computer to serve as a host for remote desktop connections.
Answer A is incorrect. The Bitlocker feature protects entire drives and volumes with full disk encryption when it is enabled.
Answer C is incorrect. The EFS (encrypting file system) feature allows users to protect specific files and folders from unauthorized access.
Which of the following Linux commands is used to configure an Ethernet address?
A chmod
B passwd
C ifconflg
D ipconflg
Answer C is correct.
The f c onf g command is used to configure an Ethernet address for networkinterfaces of Linux servers and workstations. It is also used to view the
“current TCP/IP (Transmission Control Protocol/Internet Protocol) configuration of a system, including the IP address and the net mask address.The following are some of the options used with the ifconfig command:”
» up:Activates the specified interface
» down:Deactivates the specified interface
“Answer D is incorrect. The ipconfig command is similar to the ifconfig command,but it is used in Windows-based operating systems. It verifies”
“network settings and connections. This command displays the current TCP/IP configuration,such as the IP address,subnet mask,default gateway,and so on,of a networked computer.”
Answer A is incorrect. The chmod command enables the users to modify the default permissions of a file or directory.
Answer B is incorrect. The passwd command changes a uses password.Entering passwd username will allow the users to change the password of the
specified user name.
Which of these is an internal policy used to protect an organization’s resources from employee abuse?
A SSH
B ORM
C AUP
D PII
Answer C is correct.
AUP (acceptable use policy) is an internalpolicy used to protect an organization’s resources from employee abuse. It is a document that outlines a set of
“rules to be followed by users or customers of some computing resources.which could be a computer network,website,or large computer system.”
“Answer A is incorrect. SSH (Secure Shell) is a protocolthat enables a user or an application to log on to another device over a network, execute commands,”
and manage files.
Answer D is incorrect. Pll (personally identifiable informat on) is any data that could potentially be used to identify a particular person.
Answer B is incorrect. ORM (digital rights management) is a systematic approach to copyright protection for digital media.
A technician would like to connect to a computer using a remote desktop. Which of the following ports does remote desktop use by default?
A 3389
B 68
C 53
D 443
Answer A is correct.
RDP (Remote Desktop Protocol) is a proprietary protocolcreated by Microsoft for connecting to and managing devices that are not necessarily located at
the same place as the administrator.It uses port 3389 and works onthe Application layer (Layer 7) of the OSI (Open Systems Interconnect on) model. It allows a user to remotely log into a networked device.
Answer C is incorrect. DNS (Domain Name Server) uses port 53 as the default port.A DNS server provides name resolution services for users accessing
“Internet resources. Name resolution allows users to use familiar web names,such as WWW .ucer t f y .com,instead of using IP addresses to access websites.”
Answer B is incorrect. DHCP (Dynamic Host Configuration Protocol) uses port 68.A DHCP server runs software that automatically assigns IP addresses to
client stations logging on to a TCP/IP (Transmission Control Protocol/Internet Protocol) network.
Answer D is incorrect. HTIPS (Hypertext Transfer ProtocolSecure) uses port 443 as the default port. It is used to secure web pages and sites that include
encrypt on services.
You have purchased a new Android phone.You have entered a type of passcode that will allow you to unlock your device.Which of the following locks have you used?
A Pattern
B Face
C Fingerprint
D Swipe
Answer A is correct.
The pattern lockis a type of passcode that allows you to unlock your device.
Answer Dis incorrect. Swipe lock works by displaying nine dots in a matrix of 3 x 3. You then swipe with your finger with the registered pattern to unlock the
phone. Itis not really alock at all. It allows you to unlock the phone easily by swiping on the screen.This locking method is to really prevent pocket dialing of someone by accident.
Answer C is incorrect. The fingerprint lock is a biometric-type lock that uses your fingerpr int to unlock the device. It is the most securebiometric method for
a device.
Answer B is incorrect. The face lockis a biometric-type lock that allows you to use your face to unlock your device.There are a high number of false
positives that makes the face lockless secure than the fingerprint lock.
Which of the following statements is true about a laser printer?
Each correct answer represents a complete solution. Choose all that apply.
A It uses light as the by-product of the printing process.
B High humidity can cause printer paper to st ck together.
C The laser printer’s toner cartridge contains a corona wire.
D It can generate a lot of heat.
Answers B and D are correct.
“Laser printers can generate alot of heat. Therefore,the users need to ensure that theirlaser printer is ina well-vent ilated area. A lso,high humidity can cause”
“printer paper to stick together.The sticky paper leads to paperjams.Humidity over 80 or 90 percent can cause issues. The laser printer’s toner cartridge contains a photosensitive drum. Exposing that drum to light could ruin the drum.While the drum is encased in plastic,it’s best to avoid exposing the printer or toner cartridges to extreme light sources. Laser printers that use corona wires produce ozone as a by-product of the printing process.Inoffices,ozone can cause respiratory problems in small concentrations,and it can be seriously dangerous to people inlarge amounts.Ozone is also a very effective oxidizer and can cause damage to printer components.”
Which of these uses a single connector to deliver both video and audio without using any conversion adapter?
A DVI
B SATA
C HDMI
D VGA
Answer C is correct.
HDMI (High-Definition Multimedia Interface)is a proprietary audio/video interface for transferring uncompressed video data and compressed or
“uncompressed digital audio data from a display controller to a compatible peripheraldevice,such as a display monitor, a video projector, a digital TV,or a digitalaudio device,over a single HOMIcable.”
Answer A is incorrect. OVI(DigitalVisual Interface) is a video display interface used to connect a display device to a computer. It is a video standard for
transferring both analog and digitalvideo signals.
Answer D is incorrect. VGA (Video Graphics Array) is an old standard used to connect a display device to a computer.VGA andits associated evolutionary
“standards,such as Super Video Graphics Array (SVGA), are analog standards.”
Answer B is incorrect. The most common hard drive connector usedtoday is SATA (SerialAdvanced Technology Attachment).The SATA cable is flat and the
“connector is keyed to fit into the motherboard header.SATA data cables have a 7-pin connector, have 15 pins,and are wider than the data connector.”
Which of the following statements is true about IP filtering?
A It helps securethe internal network from an external network.
B It helps securethe internal network from anotherinternalnetwork.
C It helps secure the external network from another external network.
D It helps securethe external network from an internal network.
Answer A is correct.
IP filtering,also known as firewallrules,helps securethe internal network from an external network. The external network could be the Internet,or it could be a network less trusted than the internalnetwork,such as a wireless network.
Which of these should not be done if wireless networking isn’t working on a laptop?
A Ensure that the network card is turned on.
B Reboot the laptop.
C Check the strength of the signal.
D Make sure that the wireless card is enabled through Windows.
Answer B is correct.
“If wireless networking isn’t working on a laptop,do the following:”
1.Ensure that the network card is turned on. Most laptops have an externalswitch or button on the front or side or above the keyboard that can toggle the network card on and off.
“2. Next,make sure that the wireless cardis enabled through Windows.”
“3.At last,check the strength of the signal.”
Which of these is the act of mirroring all unique changes and additions of data from one device to the other?
A On-demand self-service
B Cloud computing
C Synchronization
D Elasticity
Answer C is correct.
Synchronization is the act of mirroring all unique changes and additions of data from one device to the other. It means that the same copy of the data
“(music,pictures,contacts,or whatever) is on both the mobile device and the desktop.”
Answer D is incorrect. Elast city is the ability to quickly increase or decrease the number of resources from a cloud service provider to meet changing
demands.
Answer B is incorrect. Cloud computing is a model for providing or purchasing off-premise computing services over the Internet.
Answer A is incorrect. On-demand self-service is a cloud term referring to the ability of clients to obtain additionalresources immediately without the
intervention of a cloud service provider.
Which of the following features is a password management system built into macOS X and stores passwords and account information for users?
A Mission Control
B First Aid
C Secure Erase
D Keychain
Answer Dis correct.
Keychainis a password management system built into macOS X. It stores passwords and account informat on for users.When the users access any
“password-protected resource,such as a website,an email,or a server,they are provided with the option to save the password.The passwordis saved in the keychain.”
Answer A is incorrect. Mission Controlenables the users to see all open windows and spaces on Mac.
Answer C is incorrect. Secure Eraseis used on mechanicaldrives and can be used to erase an entire hard disk or partition or just to erase the free space.
“When a file is deleted from the recycle binin Windows rather than deleting the actual file,the space the file is occupying is simply marked as free so that another file can come and use those blocks on the hard drive. The file is still not deleted and its contents may be recovered.Secure Erase can be used to erase this free space to ensure that the data is permanently deleted.”
Answer B is incorrect. First Aidis a disk utility on Mac that assists withfixing disk problems.
You have been tasked with limiting the number of users who can connect to a network printer located centrally within an office environment. Which of the following tools will you use to complete this task?
A LDAP
B RDP
C ACL
D VPN
Answer C is correct.
“ACL (access control list)is a set of data (user names, passwords,time and date, IP addresses,MAC addresses,and so on) that is used to control access to”
“a resource,such as a computer,file,printer,or network.ACLs are commonly implemented as MAC (media access control) address filtering on wireless routers and access points. When a wireless client attempts to access the network,that client’s MAC address is compared to the list of authorized MACs and access is granted or restricted based on the result.”
Answer D is incorrect. VPN (virtual pr vate network)is a private communication network transmitted across a public network connection such as the
“Internet. With VPN,a company can extend a virtual LAN ( ocalarea network) segment to employees working from home or other remote locations by transmitting data securely across the Internet.”
Answer B is incorrect. RDP (Remote Desktop Protocol)is a proprietary protocolcreated by Microsoft for connecting to and managing devices not
necessarily located at the same place as the administrator.
Answer A is incorrect. LDAP (Lightweight Directory Access Protocol) is a network protocol used to access network directory databases,which store”
information about authorized users and their pr vileges as well as other organizationalinformation.
What is the process to standardize the methods and procedures used to handle modification in the company?
A Documented business process
B Change management
C Scope of change
D Patch management
Answer B is correct.
Change management is the process to standardize the methods and procedures usedto handle modification in the company. It is a process often found in
“large corporations,publicly held corporations,and industries,such as financial services,that have regulatory requirements.”
Answer D is incorrect. Patch management is the pract ce of monitoring,obtaining,evaluating,testing,and deploying software patches and updates.”
Answer C is incorrect. The scope of change details how many systems the proposed change will affect.
Answer A is incorrect. The documented business process is incorporated into the change management plan document.