A+
Past Tickets
N+
Everyday
?
100
What should be  your first step in troubleshooting?

Identifying the problem

100

Chromebook display is sideways

`Ctrl` + `Shift` + `Refresh`

100

Device designed to filter and transfer data packets between similar types of computer networks is called

Router

100

Best way to remove malware from computer

OS Reinstallation

100

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

Malware

200

Slow startup times on a laptop, what hardware would you replace first to make it faster

Hard Drive

200

Log in to Raptor

Google Account

200

data-link layer device designed to forward frames between network segments?

Switch
200

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is called:

Phishing

200

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Rootkit

300

Which technology allows a mobile device to determine its geographic location using signals from satellites?

GPS

300

Student now showing up in Mystery Science, where do you check?

Clever or Aeries

300

An infrastructure device designed for connecting wireless client devices to a network is commonly referred to as:

Access Point (AP)

300

Phishing scams targeting people holding high positions in an organization or business are known as:

Whaling

300

Malicious software collecting information about users without their knowledge/consent is called:

Spyware

400

MAC addresses can be represented by how many hexadecimal characters?

12

400

I don't see my classroom in Think Central for math, only ELA. When I toggle students, I only see a previous year's class.

Rostering issue, call support

400

a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?

Firewall

400

A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:

Zero-day attack

400

A type of virus that infects the storage drive area containing the necessary data and code used to start the OS is known as:

Boot Sector Virus

500

Which component of a computer is responsible for processing and rendering graphics, particularly in gaming and graphic design?

GPU

500

How to create GoGuardian classroom

Manually by email or code given to students

500

dedicated device designed for supplying power over Ethernet cabling?

PoE Injector

500

What is tailgating?

Gaining unauthorized access to restricted areas by following another person

500

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is referred to as:

Ransomware

M
e
n
u