Which of the following is a feature of a basic power strip?
A. Protects against lightning strikes
B. Provides multiple outlets for power
C. Generates power for devices
D. Provides battery backup for devices
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur.
Which of the following is the cause of the problem?
A. The company has configured a policy on her computer that forces her to stay on their website.
B. Her computer is infected with adware and is redirecting her browser to another site.
C. The memory of the browser is corrupt, and she needs to have the browser reinstalled.
D. She did not reboot her computer after clearing the temporary files.
A technician is setting up a computer that was shipped. After everything is plugged in, the computer will not turn on.
Which of the following should the technician do FIRST to identify the issue?
A. Check for physical damage on the computer.
B. Search for a solution on the Internet.
C. Reference the manufacturer's documentation.
D. Ensure the power supply is set at the correct voltage.
A printer is migrated between offices. All the wires are connected properly, but the new workstation cannot find the printer. Which of the following should the technician install?
A. OS
B. Updates
C. Drivers
D. Application
A technician needs to troubleshoot a user's computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?
A. Password confidentiality
B. Password complexity
C. Password reuse
D. Password expiration
Which of the following application types is MOST often used for doing a mail merge?
A. PDF software
B. Word processor
C. Presentation software
D. Personal information manager
Which of the following connectors is MOST often used to connect a computer to a network?
A. RJ-45
B. RJ-11
C. IDE
D. eSATA
Which of the following BEST describes malicious software that demands the end-user pay a fee or face the destruction of their files?
A. Trojan
B. Virus
C. Spyware
D. Ransomware
Which of the following would be the MOST efficient way to transport a file from one location on a local hard drive to a different location on the same hard drive?
A. Rename
B. Cut
C. Move
D. Save
Rick works as a Network Administrator for Company Inc. He takes a backup of some important compressed files on an NTFS partition, using the Windows 2000 Backup utility. Rick restores these files in a FAT32 partition. He finds that the restored files do not have the compression attribute.
What is the most likely cause?
A. The FAT32 partition is corrupt and requires to be reformatted.
B. A FAT32 partition does not support compression.
C. The Windows 2000 Backup utility decompresses compressed files while taking a backup.
D. The backup of files that are saved on an NTFS partition cannot be restored in a FAT32 partition.