1. Which part of a laser printer applies a positive charge to the paper that attracts the toner particles to it? A. Erase lamp B. Transfer roller C. Laser D. Primary corona 2. Janet just bought a new computer. She wants to install her three-yearold inkjet printer on the new system but has lost the driver disc. She can’t get on the Internet to download the latest drivers. What should she do for drivers? A. Install a driver for a similar printer. B. She’s stuck until she can get on the Internet. C. She can use the Mac drivers. D. She can install the printer without drivers. 3. John just installed a second printer on his system. When he prints in Microsoft Word, the job goes to the wrong printer. What does he need to do to get print jobs always to go to one printer or the other? A. He needs to set the primary printer. B. He needs to set the main printer. C. He needs to set the default printer. D. He needs to set the system printer. 4. Frank’s color inkjet printer no longer prints the color yellow, though it prints all the other colors just fine. The printer worked fine last month, the last time he printed in color. Which of the following is the most likely problem? A. He turned off the yellow nozzle. B. He has run out of yellow ink. C. He has a corrupt printer driver. D. His printer is set to monochrome mode. 5. Beth’s laser printer is printing tiny specks on the paper. What should she do first? A. Wipe the paper with bleach. B. Run the printer maintenance program. C. Clean the nozzles. D. Vacuum the printer. 6. Ursula’s laser printer has stopped working and is displaying this error message: “Error 81 – Service.” What should she do first? A. Update the printer’s firmware. B. Reinstall the printer driver. C. Try to find the error in the user’s guide or maintenance program or online. D. Turn off the printer and call the manufacturer’s help line. 7. Kevin’s inkjet printer isn’t printing blue (cyan). He checks the ink levels and sees that there’s plenty of ink. What should he consider next? A. A printhead is jammed. B. A laser is blocked. C. A nozzle is clogged. D. An ink cartridge is missing. 8. The output from Diane’s laser printer is fading evenly. What should she suspect first? A. A laser is blocked. B. The printer is out of toner. C. A nozzle is clogged. D. Her printer is dirty. 9. The dye-sublimation printing technique is an example of what method of color printing? A. CMYK B. Thermal wax transfer C. RGB D. Direct thermal 10. The output from your inkjet printer appears much darker than what you see on your screen. What is the problem? A. You are using a paperweight that is not supported in the MSDS. B. The printer and monitor need to be calibrated. C. The color ink cartridges are almost empty. D. The black ink cartridge is almost empty. 11. What is the best way to make a printer available to everyone on your network and maintain the highest level of availability? A. Use a FireWire printer connected to a user’s PC and share that printer on the network. B. Use a USB printer connected to a user’s PC and share that printer on the network. C. Use a network printer connected directly to the network. D. Use a mechanical switch box with the printer. 12. Sheila in accounting needs to print receipts in duplicate. The white copy stays with accounting and the pink copy goes to the customer. What type of printer should you install? A. Inkjet B. Impact C. Laser D. Thermal wax transfer 13. Your multifunction device fails to print your print jobs and instead displays a MEM OVERFLOW error. What can you do to rectify the problem? (Select two.) A. Install more RAM in the printer. B. Install more RAM in the computer. C. Upgrade the RIP. D. Disable RET. 14. What is the proper order of the laser printer imaging process? A. Process, clean, charge, expose, develop, transfer, and fuse B. Process, charge, expose, develop, transfer, fuse, and clean C. Clean, expose, develop, transfer, fuse, process, and charge D. Clean, charge, expose, develop, process, fuse, and transfer 15. The number that defines how many shades of gray per dot a scanner can save is referred to as what? A. Resolution B. DPI C. Color depth D. Grayscale depth
> When you insert an optical disc into your PC, Windows uses the _______ and _________ features to start the disc automatically.
> Most attacks on computer data are accomplished through _____________.
> The process of keeping software updated in a safe and timely fashion is known as_____________ .
> Mac OS X uses __________ and most Linux distributions use ______ to run all sorts of tasks automatically in the background.
> You can use ___________ to disable certain graphical flourishes, such as animations, transparencies, and more.
> In Windows Vista and 7, Microsoft occasionally packaged several updates for Windows together into a(n) _____________ .
> If installing a new driver causes problems in your system, ____________ enables you to roll back the driver to a previously installed version.
> To change which programs and services start with Windows 8/8.1/10, you would use the __________ .
> In Mac OS X, you access updates through the __________ pane in System Preferences
> The __________ tool enables you to create a__________ , a snapshot of your computer’s configuration at a specific point in time.
> In Windows, you use the ____________ applet to uninstall, change, or repair programs.
> ________________ requires a special Trusted Platform Module (TPM) on the motherboard to verify on boot that the computer has not changed.
> Although not all ____________ is malicious, it can lead to data destruction.
> The _________ command enables you to change the owner and the group with which a file or folder is associated in Linux and Mac OS X.
> By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called___________ .
> _______________ enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrators do certain things that could potentially harm the computer.
> A(n) __________ is a collection of user accounts that share the same access capabilities.
> When you create a new file or folder on an NTFS partition, you become the _______ of that file or folder.
> The process that defines what resources an authenticated user may access and what he or she may do with those resources is called ___________ .
> To log on to a standalone Windows PC, you need a(n)______________ .
> The _____________ enables you to scramble a file or folder and thus hide the contents from anyone, even an administrator.
> The _____________ enables you to manage user accounts in Windows.
> You can open the ___________ directly by pressing CTRL-SHIFT-ESC.
> Enable __________ to create Event Viewer entries when a specific file is accessed.
> The __________ tracks everything about your computer, from file types to user preferences.
> Windows 8.1 uses ________ to boot the OS.
> You can right-click on a user in the __________ tab of the Task Manager to disconnect them.
> When you open the Registry Editor, you will see the five _________ on the left side of the window.
> The Performance Monitor requires a ________ and an _________ to create logs about resource usage.
> The ___________ tab in the Task Manager displays overall CPU and memory usage.
> __________ is a command-line version of the Task Manager.
> When programmers need to use objects across multiple applications, they turn to _________ .
> The __________ tab in Task Manager shows applications that will run on boot.
> Windows tracks the installation progress with a set of text files called _________ .
> Antivirus software uses updatable __________ to identify a virus by its______________.
> During the Windows installation, you will need to agree to a legal document called the ____________ .
> If you wish to have only one OS and keep the applications and configuration of the current system, you should choose to do a(n) _______________ of the new OS.
> A(n) ________ is a fix for a single problem with the OS, while a(n) _________ is a combination of fixes.
> If you have a new hard drive with nothing on it, you will likely choose to do a(n) ____________ .
> If you want to share files and printers over your home network, you can set up a(n) ________ .
> _________ cases are used to make your computer blend in with the rest of your home theater equipment.
> A(n) ___________ is a box that you hook up to your PC with inputs that enable you to connect professional microphones and instruments.
> Windows uses the ____________ tool for migrating user files and settings.
> A(n) __________ is a system designed to handle only very basic applications with an absolute minimum amount of hardware required by the operating system.
> A series of instructions telling a computer how to read a compressed file is called a(n)______ .
> A(n) __________ masquerades as a legitimate program, yet does something different than what is expected when executed.
> 1. Which command pauses after displaying a screen’s worth of directory contents? (Choose two.) A. dir p B. ls | more C. ls -p D. dir /p 2. Which of the following commands will delete all of the files in a directory in Terminal? A. del *.* B. del all C.
> 1. What process determines the identity of a user? A. Authentication B. Authorization C. Identification D. Indemnification 2. Which of the following user account types can create other user accounts? A. Administrator B. Limited user C. Restricted user D
> 1. What is the process of using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social engineering 2. Which of the following might offer good hardware authentication? A. Strong password B. Enc
> 1. After five minutes of struggling with a painfully sluggish device, you finally manage to close the offending application. What’s the best next step? A. Reopen the application and hope it doesn’t freeze again. B. Uninstall the application and look for
> 1. Which operating system powers an Apple mobile device? A. Android B. iOS C. OS X D. Windows Mobile 2. Which feature of some mobile devices allows you to place phone calls over an 802.11 network? A. Roaming B. Airplane mode C. Mobile hotspot D. Wi-Fi c
> 1. Which of the following statements best describes hard drives typically found in laptops? A. They are 2.5-inch SATA drives, but they do not hold as much data as the 3.5-inch hard drives found in desktops. B. They are 3.5-inch ATA drives just like those
> 1. What is the name for the router that your PC uses to connect to your Internet service provider? A. Loopback address B. Backbone C. IP address D. Default gateway 2. A Virtual Private Network creates a(n) _______________ through the Internet. A. Tunnel
> 1. Two wireless nodes that are communicating directly with each other, without any intermediary systems or hardware, are using what wireless mode? A. Ad hoc B. Bluetooth C. Infrastructure D. 802.11ac 2. What device centrally connects wireless network no
> Unlike recorded sounds, ______________ uses specialized text files that tell the sound card which sounds to play.
> 1. Everything worked fine on your 1000BaseT network yesterday, but today no one can connect to the server. The server seems to be in good running order. Which of the following is the most likely problem? A. Someone changed all of the passwords for server
> 1. How many bits are in a MAC address? A. 24 B. 36 C. 48 D. 64 2. What is the minimum CAT level cable required for a 100BaseT network? A. CAT 1 B. CAT 5 C. CAT 5e D. CAT 6 3. A typical CAT 6 cable uses which connector? A. RJ-11 B. RJ-45 C. Plenum D. PV
> 1. If one of the colors is missing on the monitor and you cannot fix the problem by adjusting the front controls, you should then check for __________________. A. A refresh rate that is set higher than that recommended by the manufacturer B. A corrupted
> 1. Tom is installing a Windows 10 virtual machine onto a VMware Workstation. Which of the following does he need? A. A valid Windows 10 installation media B. The IP address for the virtual machine host C. A disk image of another computer’s installed Wind
> 1. Which utility is useful in identifying a program that is hogging the processor? A. Task Manager B. Device Manager C. System Monitor D. System Information 2. Which Windows utility uses points in time that allow you to return your system to a previous
> 1. What tool enables you to modify which programs start when Windows 8.1 starts? A. msstartup B. msinfo32 C. msconfig D. Task Manager 2. Mark loaded a new video card on his system, but now everything looks very bad. What should he do first? A. Go to Eve
> 1. Which of the following tabs is not found in the Task Manager? A. Users B. Processes C. Services D. Objects 2. Which of the following root keys contains the data for a system’s nonuser- specific configurations? A. HKEY_LOCAL_MACHINE B. HKEY_USERS C. H
> 1. What is a thin client? A. computer with a 32-bit-wide address bus B. A portable computer C. A system designed to handle only very basic applications with the minimum hardware required by the operating system D. A computer in a narrow, small form-facto
> How many devices can a single USB host controller support? A. 2 B. 4 C. 63 D. 127 2. What is the maximum USB cable length as defined by the USB 2.0 specification? A. 4.5 feet B. 4.5 meters C. 5 feet D. 5 meters 3. Which of the following is a high-speed
> A(n) ___________ is useful when scanning a page from a book.
> A(n) _____________ captures digital images on removable media; a(n) ________ transmits digital images across the Internet for video communication.
> The _______________ is responsible for cleaning the photosensitive drum of electrical charge.
> A printer’s speed is rated in _____________ .
> The resolution of a printer is measured in _____________ .
> Windows uses the ______________ component of the operating system to handle print functions.
> Adobe systems’ ___________ is a device-independent printer language capable of high-resolution graphics and scalable fonts.
> The _______________ on a standard laser printer contains a pressure roller and a heated roller.
> Laser printers use lasers to create the print image on a(n)______________________.
> A scanner’s ability to produce color, hue, and shade is defined by its ____________ .
> A printer that creates an image on paper by physically striking an ink ribbon against the paper’s surface is known as a(n)___________.
> You can __________ a stolen device in order to remove any confidential documents before the thief has a chance to break into the device.
> Bar code readers read standard _______________ bar codes, primarily to track inventory.
> Protect your data from access by putting a good __________ on the device, which requires you to enter a series of letters, numbers, or motion patterns to unlock the mobile device each time you press the power button.
> Android devices can use ___________ to terminate a single running application and all of its services or background processes.
> A fingerprint lock is an example of ___________________.
> A(n) ______________ policy enables individual employees to use personal mobile devices at work.
> Knowledge, possession, and inherence are the primary elements of_________________ .
> A factory reset is also known as a(n) ___________ or a(n)____________ .
> In order to protect against password guessing, _____________ may occur after too many failed attempts to unlock the lock screen.
> ___________ , _____________, and _______________are processes for removing restrictions and gaining elevated access to Android, iOS, and Windows Phone devices.
> Much like a reboot on a regular computer, a(n) __________ restarts a device.
> App developers use a mobile operating system’s _____________ to build apps for devices running the OS.
> A(n) ______________ is a monitor with some type of sensing device across its face that detects the location and duration of contact, usually by a finger or stylus.
> The _____________ system can send a(n) ___________ such as an AMBER alert to devices in the relevant area.
> A wearable device that counts your steps or measures your heart rate is called a(n)___________.
> When you want to buy software for an Android device, you buy from ___________..
> The _____________ enables a mobile device to determine where you are on a map.
> A(n) ___________ is a standalone device designed to be easier to use for the purpose of reading.
> The feature that enables a user to rotate a tablet and have the screen rotate with the device is called a(n)____________.
> A(n) __________ is a compromise between the functionality of a(n) ________ and the greater screen space of a(n)__________.
> Swiping your finger across the screen on a mobile device to switch the screen to the next item, such as the next page in an eBook, is one example of the role ________ play in the user interface.
> All mobile operating systems have a(n) ____________ that enables users to interact with the device.
> Laptops using ______________ are less expensive because the video card has less built-in memory, but the RAM it borrows from the system results in less memory available to programs.
> A(n) ____________ scans the chip embedded in such devices as ID badges to enhance access and security.
> Windows enables ____________ for storing and automatically syncing files and folders between a portable and a file server.