Questions from Troubleshooting


Q: Unlike recorded sounds, ______________ uses specialized text files that tell the

Unlike recorded sounds, ______________ uses specialized text files that tell the sound card which sounds to play.

See Answer

Q: 1. Two wireless nodes that are communicating directly with each other

1. Two wireless nodes that are communicating directly with each other, without any intermediary systems or hardware, are using what wireless mode? A. Ad hoc B. Bluetooth C. Infrastructure D. 802.11ac...

See Answer

Q: 1. What is the name for the router that your PC

1. What is the name for the router that your PC uses to connect to your Internet service provider? A. Loopback address B. Backbone C. IP address D. Default gateway 2. A Virtual Private Network create...

See Answer

Q: 1. Which of the following statements best describes hard drives typically

1. Which of the following statements best describes hard drives typically found in laptops? A. They are 2.5-inch SATA drives, but they do not hold as much data as the 3.5-inch hard drives found in des...

See Answer

Q: 1. Which operating system powers an Apple mobile device?

1. Which operating system powers an Apple mobile device? A. Android B. iOS C. OS X D. Windows Mobile 2. Which feature of some mobile devices allows you to place phone calls over an 802.11 network? A....

See Answer

Q: 1. After five minutes of struggling with a painfully sluggish device

1. After five minutes of struggling with a painfully sluggish device, you finally manage to close the offending application. What’s the best next step? A. Reopen the application and hope it doesn’t fr...

See Answer

Q: 1. Which part of a laser printer applies a positive charge

1. Which part of a laser printer applies a positive charge to the paper that attracts the toner particles to it? A. Erase lamp B. Transfer roller C. Laser D. Primary corona 2. Janet just bought a new...

See Answer

Q: 1. What is the process of using or manipulating people to

1. What is the process of using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social engineering 2. Which of the following might offer g...

See Answer

Q: 1. What process determines the identity of a user?

1. What process determines the identity of a user? A. Authentication B. Authorization C. Identification D. Indemnification 2. Which of the following user account types can create other user accounts?...

See Answer

Q: 1. Which command pauses after displaying a screen’s worth of directory

1. Which command pauses after displaying a screen’s worth of directory contents? (Choose two.) A. dir p B. ls | more C. ls -p D. dir /p 2. Which of the following commands will delete all of the files...

See Answer