Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?
a) Shortcut
b) URL
c) Attachment
d) FTP
a) Shortcut
A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible.
Which of the following should the technician choose?
a) WPA2
b) WAP
c) WPA
d) WEP
a) WPA2
A user is browsing the Internet when suddenly a threatening message appears on screen
demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?
a) Ransomware
b) Adware
c) Spyware
d) Virus
a) Ransomware
A user has downloaded an application file with the .dmg file extension. Which of the
following operating systems can be used with this file by default?
a) iOS
b) Windows
c) Mac OS
d) Chrome OS
c) Mac OS
A user has finished setting up a new computer. Now the operating system requires
activation, but the user discovers the computer has no Internet connection. Which of the
following should the user do FIRST?
a) Contact technical support.
b) Reboot the computer.
c) Check the Ethernet cable.
d) Review manufacturer's website.
c) Check the Ethernet cable.
An RoHS label on hardware indicates which of the following?
a) The hardware produces EMI when used.
b) The hardware is certified to be energy efficient.
c) The hardware provides battery backup for power outages.
d) The hardware needs to be properly disposed.
d) The hardware needs to be properly disposed.
Which of the following operating systems is MOST likely to be found on a desktop where its
primary functions include professional video and audio editing?
a) Chrome OS
b) Windows 7 Home
c) Mac OS X
d) iOS
c) Mac OS X
Which of the following features of a smartphone controls the screen orientation?
a) Gyroscope
b) NFC
c) Accelerometer
d) GPS
a) Gyroscope
Which of the following operating systems is very lightweight and relies heavily on Internet
applications?
a) Chrome OS
b) Windows
c) Linux
d) Blackberry OS
a) Chrome OS
Which of the following will allow a user to move a file from one folder to another using the
LEAST number of steps, while ensuring that the file is removed from its original location?
a) Open the file from its original location, save it to the new location, and delete it from the original location.
b) Cut the file from its original location and paste it to the new location.
c) Rename the file in its original location to a name that is not already taken in the new location.
d) Copy the file from its original location and paste it to the new location.
b) Cut the file from its original location and paste it to the new location.
Which of the following settings will a user configure as part of the initial operating system
setup wizard? (Select TWO).
a) Backup schedule
b) Accessibility options
c) Multiple user accounts
d) Time zone
e) Computer name
d) Time zone
e) Computer name
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and
should be shared cautiously and only with trusted resources?
a) Email address
b) Phone number
c) SSN
d) Last name
c) SSN
A technician is trying to access a users files and is unable to open any folder or file. Which
of the following BEST describes the situation?
a) The folders contain older versions of the files.
b) The files are corrupted.
c) The technician needs to change the file attributes.
d) The technician does not have permissions.
d) The technician does not have permissions.
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an
Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar
website. She clears all temporary files and deletes the history, but this continues to occur.
Which of the following is the cause of the problem?
a) The company has configured a policy on her computer that forces her to stay on their website.
b) Her computer is infected with adware and is redirecting her browser to another site.
c) The memory of the browser is corrupt, and she needs to have the browser reinstalled.
d) She did not reboot her computer after clearing the temporary files.
b) Her computer is infected with adware and is redirecting her browser to another site.
Which of the following software package types is designed to accept input from multiple
users?
a) Utility
b) Operating system
c) Specialized
d) Collaborative
d) Collaborative
Which of the following should be performed after a backup has been completed?
a) Delete the backup
b) Verify the backup
c) Save the backup
d) Schedule the backup
b) Verify the backup
After initial OS and application installation on a laptop, an application warns that it will only
work 24 more times. Which of the following should be done NEXT?
a) The application has to be registered to the user.
b) The application must be upgraded to a 64-bit version.
c) The application must be activated.
d) The application needs to be reinstalled.
c) The application must be activated.
Which of the following printer types uses a powder based consumable with a lower cost per
page compared to other printers?
a) Thermal
b) Laser
c) Dot matrix
d) Inkjet
b) Laser
A user has a username and password to log onto a banking website. The user would like to
keep access to the account as secure as possible. Which of the following security best
practices should the user follow? (Select TWO).
a) Use only public computers to access the website
b) Create a complex password
c) Change the default password
d) Write the password down
e) Use the original password
b) Create a complex password
c) Change the default password
Ann, a user, reports that her computer was working this morning, but now the screen is
blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not
fix the problem. Which of the following is the cause?
a) The monitor power cable is unplugged.
b) The video cable has become disconnected.
c) The video driver is not installed.
d) The operating system has encountered a stop error.
e) The screen saver has activated.
b) The video cable has become disconnected.
Which of the following connections provide data with the MOST secure protection from
interception?
a) Wired
b) WiFi
c) IR
d) Cellular
a) Wired
Which of the following operating systems is available for free and can be modified by
anyone?
a) Windows
b) Linux
c) Mac OS
d) Chrome OS
b) Linux
Which of the following components are used to store data? (Select TWO).
a) Motherboard
b) RAM
c) CPU
d) GPU
e) SSD
b) RAM
e) SSD
Ann, a user, wishes to free space in her documents folder. Which of the following is the
BEST characteristic to sort by in order to ensure that the most space is freed by deleting
the least amount of files?
a) Date modified
b) File path
c) Size
d) Extension
c) Size
Which of the following components provides the FASTEST medium for hosting and storing
an operating system?
a) Blu-Ray disc
b) 7200RPM HDD
c) SSD
d) DVD-RW
c) SSD