Q43. The local network is up, but the computers cannot access the Internet. Your Internet configuration includes a modem, gateway (router), and a switch as separate devices. What should you do?
Do nothing. Wait until service is restored.
Restart all computers on the network.
Restart the gateway (router).
Restart the modem.
Q44. You notice that a program crashes at a specific time. Which tool can you use in Windows to discover the cause?
Task Manager
Event Viewer
Perfomance Monitor
Resource Monitor
Q45. While planning a conference at a center in the mountains, you call ahead to ensure that it has broadband Internet access. Which connection type would be an unsuitable choice?
DSL
fiber optic
cable
dial-up
Q46. What is a fixed-disk?
mass storage that has been repaired
nonremovable mass storage
any internal mass storage device
any mass storage device that is not a SSD
Q47. What are the long-term and short-term categories of storage in a computer?
Q49. Which is the standard color coding for audio jacks?
Gray: microphone / Black: speakers
Red: microphone / Green: speakers
Green: microphone / Pink: speakers
Green: speakers / Pink: microphone
Q50. Which key assists limited keyboard layouts (such as on a laptop) with accessing the full range of keys?
Alt (Windows) or Option (Mac)
Meta
Fn
Shift
Q51. You power up your computer and it starts in Safe Mode. What should you do?
Restart the computer
Work as you normally do until the problem is resolved
Reconfigure the startup sequence so that the system starts again normally
Determine the cause and address the issue
Idea behind the answer: let's go for a quick restart to see whether the problem fixes itself or not, then only try to determine the cause and address the issue.
Q52. Which security tool can be doubled up to offer additional protection without being redundant?
account protection
firewall
antivirus
backup
Q53. The mouse pointer is behaving erratically. What should you do first?
Use the keyboard instead
Restart the computer
Clean the mouse, specifically its optical sensor, and ensure that you are using it on the proper surface
Disassemble the mouse to look for loose parts or corrosion
Q54. How many wire pairs are in a CAT-5 cable?
8
4
5
16
Q55. What is the difference between a USB hub and a powered USB hub?
The powered hub has a power supply and is suitable for running powered peripherals.
A powered USB hub is found on the computer case; all other hubs are non-powered.
The powered hub supplies 12V of power, whereas the standard hub only 5V.
Powered hubs are external to the computer case.
Q56. Which of the following users has the smartest approach to online security?
Jarred uses a unique password for each site.
Jen uses the same password on each site, but with two-factor authentication.
Jason uses a unique password for each site along with two-factor authentication.
Jackie uses the same password on each site, but with a different user name.
Q57. Which is an example of a phishing attack?
Yousef sees an onscreen notification indicating that an operating system is pending and instructing him to click a link to continue.
After visiting a website, Carla notices that her computer is running slowly.
Bob receives an email from his bank, asking him to click a link to verify his account.
Ellen's email inbox is flooded with unwanted advertising.
Q58. You receive a malware warning regarding a specific file. Which approach should you take to ensure that you do not have false positive?
Restart in Safe Mode to remove the file.
Remove the file.
Run a thorough scan to validate the results.
Quarantine the file.
Q59. What are the best tools to use for cleaning a computer?
Handheld vacuum cleaner, air can, soft flashlight.
air can, microfiber cloth, alcohol wipes, flashlight.
air can, screwdriver, soft cloth, household cleaner.
Q60. A computer power supply is measured in _.
watts
hertz
amperes
volts
Q61. If you had a 255.255.255.0 subnet mask, how many usable IP addresses would you have for hosts?
24
255
254
256
Q62. Tania was told to change a setting in the UEFI. How is it accessed?
by using the System Configuration Utility (MSCONFIG)
from the BIOS
from the computer's startup menu
on the network
Q63. What is the technical reason why you must properly eject media?
File I/O is buffered. If you remove the media before the buffer is cleared, files remain open and potentially corrupt.
The Storage Inventory Manager (SIM) can lose its drive references, which may corrupt other storage in the system.
The drive must receive the eject signal and turn itself off, dropping the DTR signal and indicating the media is safe to remove.
The computer must stop the 5-volt signal to media, otherwise the drive may short.
Q64. Which part of the network assigns an IP address?
the modem using TCP/IP protocol
the gateway/router using DHCP
the device's NIC based on the MAC address
IP addresses are always assigned manually
Q65. Expansion cards follow which current interface standard?
MCA
PCMCIA
ISA
PCIe
Q66. Which action triggers a UAC warning?
all settings changes in Windows
any unauthorized access to the computer system
an attempt to change a setting with consequences that affect the entire system
any action involving the user account, such as a password reset
Q67. Which choice is not a current mass storage type?
SSD
MO
HDD
NVMe
Q68. Which statement most accurately describes the north-bridge or host-bridge?
It is a high priority connection to the processor, also called the Memory Controller Hub.
It has been integrated into the southbridge to provide support for the CPU.
It is the peripheral and I/O controller, connected to the processor via the southbridge.
It provides mathematical and 3D physics support for the CPU in the absence of a GPU.
Q69. Which characters are not allowed in a filename?
anything other than a letter, number, or space
spaces, periods, and commas
\, /, :, ?, and *
!, ^, &, (,), and "
Q70. What is the most direct way to change the desktop background in Windows OS?
Alter your user account settings or preferences.
Right-click a blank part of the desktop.
Run programs full-screen.
Use Settings (Windows) or Preferences (Mac).
Q71. Which I/O components are typically found in a chipset on the motherboard?
USB, SATA and internal communications
display adapter, networking, audio, and basic I/O
the processor, RAM, and expansion cards
I/O components are not on the motherboard. They are located on the rear of the case
Q72. What does the acronym RAID refer to?
Redudant Array of Independent Disk
Repeating Architecture for Internal Drives
Recoverable Advanced Integration and Duplication
Replicated Array of Internal Devices
Q73. What is an example of a top-level domain (TLD)?
NET
HTTP
//
DNS
Q74. Jan is setting up a coffee shop's wireless network. Given the number of Wi-Fi networks within range, which are the best choices for a 2.4GHz Wi-Fi channel?
3, 6, 9
3, 10, 12
1, 6, 11
1, 2, 8
Q75. When elevated access is required, what steps must a user take?
Type the administrator account password.
Hold the Shift key and try again.
Sign out and sign in again with an administrator account.
User account permissions are elevated in Settings or Preferences.
Q76. What is a duplex printer?
a printer that also acts as a scanner, copier. and fax machine
a printer with automatic and manual feeding mechanism
a printer than can print on both sides of a sheet of paper
a printer has two paper trays
Q77. Which choice is not an internal computer upgrade?