2.99 See Answer

Question: 1. Which utility is useful in identifying


1. Which utility is useful in identifying a program that is hogging the processor?
A. Task Manager
B. Device Manager
C. System Monitor
D. System Information

2. Which Windows utility uses points in time that allow you to return your system to a previous date and state?
A. System Configuration utility
B. Snapshot Manager
C. System Restore
D. GRUB or LILO

3. Scott’s Windows 8.1 computer isn’t performing as well as it once did. What option can he use to reset his system without deleting any personal files or changing any settings?
A. Reset your PC
B. Refresh your PC
C. Restore your computer
D. System Refresh

4. What can device drivers and failing hardware in Mac OS X and Linux cause?
A. Spinning windmill
B. Blue Screen of Death (BSoD)
C. Kernel panic
D. Terminal emulation

5. You’ve just installed a software update, rebooted, and now your system experiences random crashes. Which too in Windows 8.1 enables you to see various event messages and warnings that might give you a better sense of what is causing problems?
A. Action Center
B. Device Manager
C. System Restore
D. Recovery Console

6. John’s computer has an error that says bootmgr is corrupted. What tool can he use to fix this problem?
A. bcdedit
B. chkdsk
C. config.sys
D. regedit

7. What does Microsoft call the 32- or 64-bit installation environment in Windows 7?
A. WinEE
B. WinPE
C. WinRE
D. Recovery Console

8. Ralph suspects a bad RAM stick is causing Windows to fail to boot. What default Windows tool can he use to check the RAM?
A. MEMMAKER
B. Memtest86+
C. Windows RAM Diagnostic Tool
D. Windows Memory Diagnostic Tool

9. Which of the following commands will repair a damaged master boot record in a Windows 8.1 PC?
A. bootrec /fixboot
B. bootrec /fixmbr
C. fixboot
D. fixmbr

10. Ellen tries to boot into Windows 7, but the computer crashes at the logon screen. What tool should she use first to try to fix the problem?
A. Boot to the Windows DVD, get to WinRE, and type clean at the diskpart prompt
B. Boot to the Windows DVD, get to WinRE, and run Startup Repair
C. Reboot the PC, press F8 to open the Advanced Startup Options menu, and select Safe Mode
D. Reboot the PC, press F8 to open WinRE, and select Safe Mode

11. Which feature in Windows 7 enables you to right-click a file or folder and restore previous versions of that file or folder?
A. Reversion
B. System Protection
C. System Revert
D. Undelete

12. Which of the following can cause a computer to lock up or unexpectedly shut down? (Select two.)
A. Bad RAM
B. Poorly written application
C. Windows Installer
D. Windows remote shutdown

13. Bob is concerned that his new PCIe video capture card device driver is causing startup problems. Which utility enables him to see if Windows recognizes the driver?
A. Device Manager
B. Event Viewer
C. System Information
D. Task Manager

14. Tom notices after his system starts up that a critical service has not started, even though it is configured to do so. Given such a scenario, where should he look first to see why it failed to start.
A. Device Manager
B. Event Viewer
C. System Information
D. Task Manager

15. Which of the following problems would most likely cause a Blue Screen of Death in Windows 8.1? (Select two.)
A. Resolution too high
B. Kernel panic
C. Bad RAM
D. Incompatible device driver


> ________________ requires a special Trusted Platform Module (TPM) on the motherboard to verify on boot that the computer has not changed.

> Although not all ____________ is malicious, it can lead to data destruction.

> The _________ command enables you to change the owner and the group with which a file or folder is associated in Linux and Mac OS X.

> By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called___________ .

> _______________ enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrators do certain things that could potentially harm the computer.

> A(n) __________ is a collection of user accounts that share the same access capabilities.

> When you create a new file or folder on an NTFS partition, you become the _______ of that file or folder.

> The process that defines what resources an authenticated user may access and what he or she may do with those resources is called ___________ .

> To log on to a standalone Windows PC, you need a(n)______________ .

> The _____________ enables you to scramble a file or folder and thus hide the contents from anyone, even an administrator.

> The _____________ enables you to manage user accounts in Windows.

> You can open the ___________ directly by pressing CTRL-SHIFT-ESC.

> Enable __________ to create Event Viewer entries when a specific file is accessed.

> The __________ tracks everything about your computer, from file types to user preferences.

> Windows 8.1 uses ________ to boot the OS.

> You can right-click on a user in the __________ tab of the Task Manager to disconnect them.

> When you open the Registry Editor, you will see the five _________ on the left side of the window.

> The Performance Monitor requires a ________ and an _________ to create logs about resource usage.

> The ___________ tab in the Task Manager displays overall CPU and memory usage.

> __________ is a command-line version of the Task Manager.

> When programmers need to use objects across multiple applications, they turn to _________ .

> The __________ tab in Task Manager shows applications that will run on boot.

> Windows tracks the installation progress with a set of text files called _________ .

> Antivirus software uses updatable __________ to identify a virus by its______________.

> During the Windows installation, you will need to agree to a legal document called the ____________ .

> If you wish to have only one OS and keep the applications and configuration of the current system, you should choose to do a(n) _______________ of the new OS.

> A(n) ________ is a fix for a single problem with the OS, while a(n) _________ is a combination of fixes.

> If you have a new hard drive with nothing on it, you will likely choose to do a(n) ____________ .

> If you want to share files and printers over your home network, you can set up a(n) ________ .

> _________ cases are used to make your computer blend in with the rest of your home theater equipment.

> A(n) ___________ is a box that you hook up to your PC with inputs that enable you to connect professional microphones and instruments.

> Windows uses the ____________ tool for migrating user files and settings.

> A(n) __________ is a system designed to handle only very basic applications with an absolute minimum amount of hardware required by the operating system.

> A series of instructions telling a computer how to read a compressed file is called a(n)______ .

> A(n) __________ masquerades as a legitimate program, yet does something different than what is expected when executed.

> 1. Which command pauses after displaying a screen’s worth of directory contents? (Choose two.) A. dir p B. ls | more C. ls -p D. dir /p 2. Which of the following commands will delete all of the files in a directory in Terminal? A. del *.* B. del all C.

> 1. What process determines the identity of a user? A. Authentication B. Authorization C. Identification D. Indemnification 2. Which of the following user account types can create other user accounts? A. Administrator B. Limited user C. Restricted user D

> 1. What is the process of using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social engineering 2. Which of the following might offer good hardware authentication? A. Strong password B. Enc

> 1. Which part of a laser printer applies a positive charge to the paper that attracts the toner particles to it? A. Erase lamp B. Transfer roller C. Laser D. Primary corona 2. Janet just bought a new computer. She wants to install her three-yearold inkj

> 1. After five minutes of struggling with a painfully sluggish device, you finally manage to close the offending application. What’s the best next step? A. Reopen the application and hope it doesn’t freeze again. B. Uninstall the application and look for

> 1. Which operating system powers an Apple mobile device? A. Android B. iOS C. OS X D. Windows Mobile 2. Which feature of some mobile devices allows you to place phone calls over an 802.11 network? A. Roaming B. Airplane mode C. Mobile hotspot D. Wi-Fi c

> 1. Which of the following statements best describes hard drives typically found in laptops? A. They are 2.5-inch SATA drives, but they do not hold as much data as the 3.5-inch hard drives found in desktops. B. They are 3.5-inch ATA drives just like those

> 1. What is the name for the router that your PC uses to connect to your Internet service provider? A. Loopback address B. Backbone C. IP address D. Default gateway 2. A Virtual Private Network creates a(n) _______________ through the Internet. A. Tunnel

> 1. Two wireless nodes that are communicating directly with each other, without any intermediary systems or hardware, are using what wireless mode? A. Ad hoc B. Bluetooth C. Infrastructure D. 802.11ac 2. What device centrally connects wireless network no

> Unlike recorded sounds, ______________ uses specialized text files that tell the sound card which sounds to play.

> 1. Everything worked fine on your 1000BaseT network yesterday, but today no one can connect to the server. The server seems to be in good running order. Which of the following is the most likely problem? A. Someone changed all of the passwords for server

> 1. How many bits are in a MAC address? A. 24 B. 36 C. 48 D. 64 2. What is the minimum CAT level cable required for a 100BaseT network? A. CAT 1 B. CAT 5 C. CAT 5e D. CAT 6 3. A typical CAT 6 cable uses which connector? A. RJ-11 B. RJ-45 C. Plenum D. PV

> 1. If one of the colors is missing on the monitor and you cannot fix the problem by adjusting the front controls, you should then check for __________________. A. A refresh rate that is set higher than that recommended by the manufacturer B. A corrupted

> 1. Tom is installing a Windows 10 virtual machine onto a VMware Workstation. Which of the following does he need? A. A valid Windows 10 installation media B. The IP address for the virtual machine host C. A disk image of another computer’s installed Wind

> 1. What tool enables you to modify which programs start when Windows 8.1 starts? A. msstartup B. msinfo32 C. msconfig D. Task Manager 2. Mark loaded a new video card on his system, but now everything looks very bad. What should he do first? A. Go to Eve

> 1. Which of the following tabs is not found in the Task Manager? A. Users B. Processes C. Services D. Objects 2. Which of the following root keys contains the data for a system’s nonuser- specific configurations? A. HKEY_LOCAL_MACHINE B. HKEY_USERS C. H

> 1. What is a thin client? A. computer with a 32-bit-wide address bus B. A portable computer C. A system designed to handle only very basic applications with the minimum hardware required by the operating system D. A computer in a narrow, small form-facto

> How many devices can a single USB host controller support? A. 2 B. 4 C. 63 D. 127 2. What is the maximum USB cable length as defined by the USB 2.0 specification? A. 4.5 feet B. 4.5 meters C. 5 feet D. 5 meters 3. Which of the following is a high-speed

> A(n) ___________ is useful when scanning a page from a book.

> A(n) _____________ captures digital images on removable media; a(n) ________ transmits digital images across the Internet for video communication.

> The _______________ is responsible for cleaning the photosensitive drum of electrical charge.

> A printer’s speed is rated in _____________ .

> The resolution of a printer is measured in _____________ .

> Windows uses the ______________ component of the operating system to handle print functions.

> Adobe systems’ ___________ is a device-independent printer language capable of high-resolution graphics and scalable fonts.

> The _______________ on a standard laser printer contains a pressure roller and a heated roller.

> Laser printers use lasers to create the print image on a(n)______________________.

> A scanner’s ability to produce color, hue, and shade is defined by its ____________ .

> A printer that creates an image on paper by physically striking an ink ribbon against the paper’s surface is known as a(n)___________.

> You can __________ a stolen device in order to remove any confidential documents before the thief has a chance to break into the device.

> Bar code readers read standard _______________ bar codes, primarily to track inventory.

> Protect your data from access by putting a good __________ on the device, which requires you to enter a series of letters, numbers, or motion patterns to unlock the mobile device each time you press the power button.

> Android devices can use ___________ to terminate a single running application and all of its services or background processes.

> A fingerprint lock is an example of ___________________.

> A(n) ______________ policy enables individual employees to use personal mobile devices at work.

> Knowledge, possession, and inherence are the primary elements of_________________ .

> A factory reset is also known as a(n) ___________ or a(n)____________ .

> In order to protect against password guessing, _____________ may occur after too many failed attempts to unlock the lock screen.

> ___________ , _____________, and _______________are processes for removing restrictions and gaining elevated access to Android, iOS, and Windows Phone devices.

> Much like a reboot on a regular computer, a(n) __________ restarts a device.

> App developers use a mobile operating system’s _____________ to build apps for devices running the OS.

> A(n) ______________ is a monitor with some type of sensing device across its face that detects the location and duration of contact, usually by a finger or stylus.

> The _____________ system can send a(n) ___________ such as an AMBER alert to devices in the relevant area.

> A wearable device that counts your steps or measures your heart rate is called a(n)___________.

> When you want to buy software for an Android device, you buy from ___________..

> The _____________ enables a mobile device to determine where you are on a map.

> A(n) ___________ is a standalone device designed to be easier to use for the purpose of reading.

> The feature that enables a user to rotate a tablet and have the screen rotate with the device is called a(n)____________.

> A(n) __________ is a compromise between the functionality of a(n) ________ and the greater screen space of a(n)__________.

> Swiping your finger across the screen on a mobile device to switch the screen to the next item, such as the next page in an eBook, is one example of the role ________ play in the user interface.

> All mobile operating systems have a(n) ____________ that enables users to interact with the device.

> Laptops using ______________ are less expensive because the video card has less built-in memory, but the RAM it borrows from the system results in less memory available to programs.

> A(n) ____________ scans the chip embedded in such devices as ID badges to enhance access and security.

> Windows enables ____________ for storing and automatically syncing files and folders between a portable and a file server.

> Today’s laptops use _____________ for batteries because that battery chemistry provides the highest energy density for the weight.

> A(n) __________ plugs into a single (often proprietary) port on the portable computer and offers legacy and modern single and multifunction ports, as well as features like an optical drive or expansion card slots.

> ________________ is a(n) external expansion slot on older laptops.

> Intel set up the _____________ specifications for super thin, super light, and super efficient laptops with integrated graphics and no optical drive.

> Many newer laptops feature ____________ screens offering richer color, higher contrast, and wider viewing angles.

> The _______________ enables laptop keyboards to do more than two functions on a single key.

> Most laptops today have one or more __________ or _________ slots for internal expansion cards such as Wi-Fi NICs.

> A typical clamshell-style portable computer with built-in LCD monitor, keyboard, and input device is most commonly called a laptop or_____________.

> A(n) _______________ enables you to access a remote network over the Internet securely.

> The ______________ standard connects computing devices with a Mini DisplayPort connector.

> Apple developed the ________________ to support file sharing between Macintosh computers on early LANs.

2.99

See Answer