1. What is a thin client? A. computer with a 32-bit-wide address bus B. A portable computer C. A system designed to handle only very basic applications with the minimum hardware required by the operating system D. A computer in a narrow, small form-factor case 2. What three functions does a home server PC provide? (Select three.) A. Media streaming B. File sharing C. Web hosting D. Print sharing 3. What’s a good guide to use when deciding on hardware for a basic thick client? A. Buy whatever is on sale. B. Always start with the most expensive hardware. C. Check the recommended requirements for the OS you want to use. D. Check the MSDS for the OS you want to use. 4. How do you share a printer in Windows? A. Open Device Manager, right-click on the printer, select Properties, and select Share this printer. B. You have to install special drivers for your printer. C. Open the Devices and Printers applet in the Control Panel, rightclick on the printer, select Printer properties, and then check the Share this printer checkbox on the Sharing tab. D. You have to have Windows Home Server in order to share printers. 5. What program that comes with some versions of Windows turns your PC into a home theater PC? A. Kodi B. Windows Media Center C. Plex D. Windows Home Theater 6. What is the most important component for building a virtualization workstation? A. CPU B. Power supply C. RAM D. Large monitor 7. What three things does a video editing workstation benefit from? (Select three.) A. High-end motherboard B. Fast, multicore CPU C. Lots of RAM D. Professional-level GPU 8. Which of the following are Microsoft compatibility tools that enable you to scan your current hardware to see if it can handle upgrading to a new version of Windows? (Select two.) A. Windows Upgrade Advisor B. Hardware Compatibility Upgrader (HCU) C. Upgrade Assistant D. Hardware State Migration Tool (HSMT) 9. What is the most common boot method for installing Windows 8? A. Boot to a Windows DVD B. Boot to a Windows CD-ROM C. Boot to a PXE drive D. Boot to a recovery partition 10. When you install an operating system alongside an existing operating system, what do you create? A. A clean installation B. An upgrade installation C. A multiboot installation D. A network installation 11. If you do not complete the activation process for Windows 7, what will happen to your computer? A. Nothing. Activation is optional. B. The computer will work fine for 30 days and then Windows will be disabled. C. Microsoft will not know how to contact you to provide upgrade information. D. It will work if you check the “I promise to pay for Windows later”box. 12. If Windows locks up during the installation, how can you determine at what point it locked up? A. Reboot and start the installation process. Pay attention to the text in the lower third of the screen and write down the error message revealed. B. Push the Reset button to restart the installation process. Pay attention to the text in the lower third of the screen and write down the error message revealed. C. Reboot and start the installation process. After it starts, press the ESC key to cancel the installation process and show the previous installation notes. D. Review the setuperr.log files to track any errors discovered. 13. Which term describes a combination of many updates and fixes in Windows Vista/7? A. Hot fix B. Hot pack C. Service pack D. Service release 14. Your boss has tasked you to load identical images onto a series of Mac OS X workstations to get the classroom ready for the new group of students. In such a scenario, what’s the best tool to use? A. MultiBoot B. NetBoot C. OS Push D. User State Migration Tool 15. Your boss has decided to retire several systems and tasks you to make absolutely sure the data on the drives is obliterated. In such a scenario, how could you best demonstrate that you have fulfilled the task? A. Run a software utility to wipe the drives. Show the boss the empty drives. B. Partition and format the drives. Show the boss the empty drives. C. Take the drives to a professional hard drive disposal service and request incineration. D. Take the drives to a professional hard drive disposal service and insist on a certificate of destruction when they finish the job.
> By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called___________ .
> _______________ enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrators do certain things that could potentially harm the computer.
> A(n) __________ is a collection of user accounts that share the same access capabilities.
> When you create a new file or folder on an NTFS partition, you become the _______ of that file or folder.
> The process that defines what resources an authenticated user may access and what he or she may do with those resources is called ___________ .
> To log on to a standalone Windows PC, you need a(n)______________ .
> The _____________ enables you to scramble a file or folder and thus hide the contents from anyone, even an administrator.
> The _____________ enables you to manage user accounts in Windows.
> You can open the ___________ directly by pressing CTRL-SHIFT-ESC.
> Enable __________ to create Event Viewer entries when a specific file is accessed.
> The __________ tracks everything about your computer, from file types to user preferences.
> Windows 8.1 uses ________ to boot the OS.
> You can right-click on a user in the __________ tab of the Task Manager to disconnect them.
> When you open the Registry Editor, you will see the five _________ on the left side of the window.
> The Performance Monitor requires a ________ and an _________ to create logs about resource usage.
> The ___________ tab in the Task Manager displays overall CPU and memory usage.
> __________ is a command-line version of the Task Manager.
> When programmers need to use objects across multiple applications, they turn to _________ .
> The __________ tab in Task Manager shows applications that will run on boot.
> Windows tracks the installation progress with a set of text files called _________ .
> Antivirus software uses updatable __________ to identify a virus by its______________.
> During the Windows installation, you will need to agree to a legal document called the ____________ .
> If you wish to have only one OS and keep the applications and configuration of the current system, you should choose to do a(n) _______________ of the new OS.
> A(n) ________ is a fix for a single problem with the OS, while a(n) _________ is a combination of fixes.
> If you have a new hard drive with nothing on it, you will likely choose to do a(n) ____________ .
> If you want to share files and printers over your home network, you can set up a(n) ________ .
> _________ cases are used to make your computer blend in with the rest of your home theater equipment.
> A(n) ___________ is a box that you hook up to your PC with inputs that enable you to connect professional microphones and instruments.
> Windows uses the ____________ tool for migrating user files and settings.
> A(n) __________ is a system designed to handle only very basic applications with an absolute minimum amount of hardware required by the operating system.
> A series of instructions telling a computer how to read a compressed file is called a(n)______ .
> A(n) __________ masquerades as a legitimate program, yet does something different than what is expected when executed.
> 1. Which command pauses after displaying a screen’s worth of directory contents? (Choose two.) A. dir p B. ls | more C. ls -p D. dir /p 2. Which of the following commands will delete all of the files in a directory in Terminal? A. del *.* B. del all C.
> 1. What process determines the identity of a user? A. Authentication B. Authorization C. Identification D. Indemnification 2. Which of the following user account types can create other user accounts? A. Administrator B. Limited user C. Restricted user D
> 1. What is the process of using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social engineering 2. Which of the following might offer good hardware authentication? A. Strong password B. Enc
> 1. Which part of a laser printer applies a positive charge to the paper that attracts the toner particles to it? A. Erase lamp B. Transfer roller C. Laser D. Primary corona 2. Janet just bought a new computer. She wants to install her three-yearold inkj
> 1. After five minutes of struggling with a painfully sluggish device, you finally manage to close the offending application. What’s the best next step? A. Reopen the application and hope it doesn’t freeze again. B. Uninstall the application and look for
> 1. Which operating system powers an Apple mobile device? A. Android B. iOS C. OS X D. Windows Mobile 2. Which feature of some mobile devices allows you to place phone calls over an 802.11 network? A. Roaming B. Airplane mode C. Mobile hotspot D. Wi-Fi c
> 1. Which of the following statements best describes hard drives typically found in laptops? A. They are 2.5-inch SATA drives, but they do not hold as much data as the 3.5-inch hard drives found in desktops. B. They are 3.5-inch ATA drives just like those
> 1. What is the name for the router that your PC uses to connect to your Internet service provider? A. Loopback address B. Backbone C. IP address D. Default gateway 2. A Virtual Private Network creates a(n) _______________ through the Internet. A. Tunnel
> 1. Two wireless nodes that are communicating directly with each other, without any intermediary systems or hardware, are using what wireless mode? A. Ad hoc B. Bluetooth C. Infrastructure D. 802.11ac 2. What device centrally connects wireless network no
> Unlike recorded sounds, ______________ uses specialized text files that tell the sound card which sounds to play.
> 1. Everything worked fine on your 1000BaseT network yesterday, but today no one can connect to the server. The server seems to be in good running order. Which of the following is the most likely problem? A. Someone changed all of the passwords for server
> 1. How many bits are in a MAC address? A. 24 B. 36 C. 48 D. 64 2. What is the minimum CAT level cable required for a 100BaseT network? A. CAT 1 B. CAT 5 C. CAT 5e D. CAT 6 3. A typical CAT 6 cable uses which connector? A. RJ-11 B. RJ-45 C. Plenum D. PV
> 1. If one of the colors is missing on the monitor and you cannot fix the problem by adjusting the front controls, you should then check for __________________. A. A refresh rate that is set higher than that recommended by the manufacturer B. A corrupted
> 1. Tom is installing a Windows 10 virtual machine onto a VMware Workstation. Which of the following does he need? A. A valid Windows 10 installation media B. The IP address for the virtual machine host C. A disk image of another computer’s installed Wind
> 1. Which utility is useful in identifying a program that is hogging the processor? A. Task Manager B. Device Manager C. System Monitor D. System Information 2. Which Windows utility uses points in time that allow you to return your system to a previous
> 1. What tool enables you to modify which programs start when Windows 8.1 starts? A. msstartup B. msinfo32 C. msconfig D. Task Manager 2. Mark loaded a new video card on his system, but now everything looks very bad. What should he do first? A. Go to Eve
> 1. Which of the following tabs is not found in the Task Manager? A. Users B. Processes C. Services D. Objects 2. Which of the following root keys contains the data for a system’s nonuser- specific configurations? A. HKEY_LOCAL_MACHINE B. HKEY_USERS C. H
> How many devices can a single USB host controller support? A. 2 B. 4 C. 63 D. 127 2. What is the maximum USB cable length as defined by the USB 2.0 specification? A. 4.5 feet B. 4.5 meters C. 5 feet D. 5 meters 3. Which of the following is a high-speed
> A(n) ___________ is useful when scanning a page from a book.
> A(n) _____________ captures digital images on removable media; a(n) ________ transmits digital images across the Internet for video communication.
> The _______________ is responsible for cleaning the photosensitive drum of electrical charge.
> A printer’s speed is rated in _____________ .
> The resolution of a printer is measured in _____________ .
> Windows uses the ______________ component of the operating system to handle print functions.
> Adobe systems’ ___________ is a device-independent printer language capable of high-resolution graphics and scalable fonts.
> The _______________ on a standard laser printer contains a pressure roller and a heated roller.
> Laser printers use lasers to create the print image on a(n)______________________.
> A scanner’s ability to produce color, hue, and shade is defined by its ____________ .
> A printer that creates an image on paper by physically striking an ink ribbon against the paper’s surface is known as a(n)___________.
> You can __________ a stolen device in order to remove any confidential documents before the thief has a chance to break into the device.
> Bar code readers read standard _______________ bar codes, primarily to track inventory.
> Protect your data from access by putting a good __________ on the device, which requires you to enter a series of letters, numbers, or motion patterns to unlock the mobile device each time you press the power button.
> Android devices can use ___________ to terminate a single running application and all of its services or background processes.
> A fingerprint lock is an example of ___________________.
> A(n) ______________ policy enables individual employees to use personal mobile devices at work.
> Knowledge, possession, and inherence are the primary elements of_________________ .
> A factory reset is also known as a(n) ___________ or a(n)____________ .
> In order to protect against password guessing, _____________ may occur after too many failed attempts to unlock the lock screen.
> ___________ , _____________, and _______________are processes for removing restrictions and gaining elevated access to Android, iOS, and Windows Phone devices.
> Much like a reboot on a regular computer, a(n) __________ restarts a device.
> App developers use a mobile operating system’s _____________ to build apps for devices running the OS.
> A(n) ______________ is a monitor with some type of sensing device across its face that detects the location and duration of contact, usually by a finger or stylus.
> The _____________ system can send a(n) ___________ such as an AMBER alert to devices in the relevant area.
> A wearable device that counts your steps or measures your heart rate is called a(n)___________.
> When you want to buy software for an Android device, you buy from ___________..
> The _____________ enables a mobile device to determine where you are on a map.
> A(n) ___________ is a standalone device designed to be easier to use for the purpose of reading.
> The feature that enables a user to rotate a tablet and have the screen rotate with the device is called a(n)____________.
> A(n) __________ is a compromise between the functionality of a(n) ________ and the greater screen space of a(n)__________.
> Swiping your finger across the screen on a mobile device to switch the screen to the next item, such as the next page in an eBook, is one example of the role ________ play in the user interface.
> All mobile operating systems have a(n) ____________ that enables users to interact with the device.
> Laptops using ______________ are less expensive because the video card has less built-in memory, but the RAM it borrows from the system results in less memory available to programs.
> A(n) ____________ scans the chip embedded in such devices as ID badges to enhance access and security.
> Windows enables ____________ for storing and automatically syncing files and folders between a portable and a file server.
> Today’s laptops use _____________ for batteries because that battery chemistry provides the highest energy density for the weight.
> A(n) __________ plugs into a single (often proprietary) port on the portable computer and offers legacy and modern single and multifunction ports, as well as features like an optical drive or expansion card slots.
> ________________ is a(n) external expansion slot on older laptops.
> Intel set up the _____________ specifications for super thin, super light, and super efficient laptops with integrated graphics and no optical drive.
> Many newer laptops feature ____________ screens offering richer color, higher contrast, and wider viewing angles.
> The _______________ enables laptop keyboards to do more than two functions on a single key.
> Most laptops today have one or more __________ or _________ slots for internal expansion cards such as Wi-Fi NICs.
> A typical clamshell-style portable computer with built-in LCD monitor, keyboard, and input device is most commonly called a laptop or_____________.
> A(n) _______________ enables you to access a remote network over the Internet securely.
> The ______________ standard connects computing devices with a Mini DisplayPort connector.
> Apple developed the ________________ to support file sharing between Macintosh computers on early LANs.
> The service that provides the structure for the World Wide Web, allowing documents to be sent across the Web, is ________________.
> By using an anonymous logon, _____________ allows you to send and receive files from a public site.
> A(n) ______________ is software that enables multiple connections to go to the Internet through one protected PC.