Hardware
Software
Networking
Information Technology
CyberSecurity
100

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform?

Establish a plan of action to solve the problem and identify potential effects

100

When composing an email message, why might you want to use the Bcc field?

To copy the email confidentially

100

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?

Device Manager

100

Which invention made it possible to have an entire computer on a single circuit board?

Microchip

100

Would prevent an unauthorized person from remotely accessing your computer?

Firewall

200

Divides a single physical disk into multiple logical drives called volumes?

Partitioning

200

Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do?

Install the latest driver

200

The tool you would use to check connectivity between two computers?

Ping

200

How many bits are in a single byte?

8

200

Which component of a successful access control framework is the process of proving that you are who you say you are?

Authentication

300

Which of the following would be the MOST LIKELY cause for a computer to perform sluggishly?

Hard drive

300

The name of the narrow strip along the bottom of the Windows environment?

Taskbar

300

How many ping packets are sent by default in a successful ping request?

4

300

Which one of the encoding schemes would MOST likely be used to represent an emoji?

Unicode

300

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________.

Spam

400

The top cause of motherboard failure?

Physical damage

400

Which permission option lets a user view files but not change them?

Read

400

Software that requires a monthly subscription fee is often called _______________.

Software as a Service (SAAS)

400

How many possible values would an 8-bit audio sample have?

256

400

Software that is Microsoft's anti-malware product that is preinstalled on most new computers?

Windows Defender

500

Faster than other devices. No moving parts. Last longer than other storage devices.

Solid state drive (SSD)

500

Command that is used to navigate to different folders in Command Prompt?

cd

500

Utility used to find the path between two computers?

Tracert

500

Which notational systems is MOST likely used to represent a MAC address?

Hexadecimal

500

Which Internet protocol is used to transmit encrypted data?

HTTPS