A(n) ___________ is a standalone device designed to be easier to use for the purpose of reading.
> A series of instructions telling a computer how to read a compressed file is called a(n)______ .
> A(n) __________ masquerades as a legitimate program, yet does something different than what is expected when executed.
> 1. Which command pauses after displaying a screen’s worth of directory contents? (Choose two.) A. dir p B. ls | more C. ls -p D. dir /p 2. Which of the following commands will delete all of the files in a directory in Terminal? A. del *.* B. del all C.
> 1. What process determines the identity of a user? A. Authentication B. Authorization C. Identification D. Indemnification 2. Which of the following user account types can create other user accounts? A. Administrator B. Limited user C. Restricted user D
> 1. What is the process of using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social engineering 2. Which of the following might offer good hardware authentication? A. Strong password B. Enc
> 1. Which part of a laser printer applies a positive charge to the paper that attracts the toner particles to it? A. Erase lamp B. Transfer roller C. Laser D. Primary corona 2. Janet just bought a new computer. She wants to install her three-yearold inkj
> 1. After five minutes of struggling with a painfully sluggish device, you finally manage to close the offending application. What’s the best next step? A. Reopen the application and hope it doesn’t freeze again. B. Uninstall the application and look for
> 1. Which operating system powers an Apple mobile device? A. Android B. iOS C. OS X D. Windows Mobile 2. Which feature of some mobile devices allows you to place phone calls over an 802.11 network? A. Roaming B. Airplane mode C. Mobile hotspot D. Wi-Fi c
> 1. Which of the following statements best describes hard drives typically found in laptops? A. They are 2.5-inch SATA drives, but they do not hold as much data as the 3.5-inch hard drives found in desktops. B. They are 3.5-inch ATA drives just like those
> 1. What is the name for the router that your PC uses to connect to your Internet service provider? A. Loopback address B. Backbone C. IP address D. Default gateway 2. A Virtual Private Network creates a(n) _______________ through the Internet. A. Tunnel
> 1. Two wireless nodes that are communicating directly with each other, without any intermediary systems or hardware, are using what wireless mode? A. Ad hoc B. Bluetooth C. Infrastructure D. 802.11ac 2. What device centrally connects wireless network no
> Unlike recorded sounds, ______________ uses specialized text files that tell the sound card which sounds to play.
> 1. Everything worked fine on your 1000BaseT network yesterday, but today no one can connect to the server. The server seems to be in good running order. Which of the following is the most likely problem? A. Someone changed all of the passwords for server
> 1. How many bits are in a MAC address? A. 24 B. 36 C. 48 D. 64 2. What is the minimum CAT level cable required for a 100BaseT network? A. CAT 1 B. CAT 5 C. CAT 5e D. CAT 6 3. A typical CAT 6 cable uses which connector? A. RJ-11 B. RJ-45 C. Plenum D. PV
> 1. If one of the colors is missing on the monitor and you cannot fix the problem by adjusting the front controls, you should then check for __________________. A. A refresh rate that is set higher than that recommended by the manufacturer B. A corrupted
> 1. Tom is installing a Windows 10 virtual machine onto a VMware Workstation. Which of the following does he need? A. A valid Windows 10 installation media B. The IP address for the virtual machine host C. A disk image of another computer’s installed Wind
> 1. Which utility is useful in identifying a program that is hogging the processor? A. Task Manager B. Device Manager C. System Monitor D. System Information 2. Which Windows utility uses points in time that allow you to return your system to a previous
> 1. What tool enables you to modify which programs start when Windows 8.1 starts? A. msstartup B. msinfo32 C. msconfig D. Task Manager 2. Mark loaded a new video card on his system, but now everything looks very bad. What should he do first? A. Go to Eve
> 1. Which of the following tabs is not found in the Task Manager? A. Users B. Processes C. Services D. Objects 2. Which of the following root keys contains the data for a system’s nonuser- specific configurations? A. HKEY_LOCAL_MACHINE B. HKEY_USERS C. H
> 1. What is a thin client? A. computer with a 32-bit-wide address bus B. A portable computer C. A system designed to handle only very basic applications with the minimum hardware required by the operating system D. A computer in a narrow, small form-facto
> How many devices can a single USB host controller support? A. 2 B. 4 C. 63 D. 127 2. What is the maximum USB cable length as defined by the USB 2.0 specification? A. 4.5 feet B. 4.5 meters C. 5 feet D. 5 meters 3. Which of the following is a high-speed
> A(n) ___________ is useful when scanning a page from a book.
> A(n) _____________ captures digital images on removable media; a(n) ________ transmits digital images across the Internet for video communication.
> The _______________ is responsible for cleaning the photosensitive drum of electrical charge.
> A printer’s speed is rated in _____________ .
> The resolution of a printer is measured in _____________ .
> Windows uses the ______________ component of the operating system to handle print functions.
> Adobe systems’ ___________ is a device-independent printer language capable of high-resolution graphics and scalable fonts.
> The _______________ on a standard laser printer contains a pressure roller and a heated roller.
> Laser printers use lasers to create the print image on a(n)______________________.
> A scanner’s ability to produce color, hue, and shade is defined by its ____________ .
> A printer that creates an image on paper by physically striking an ink ribbon against the paper’s surface is known as a(n)___________.
> You can __________ a stolen device in order to remove any confidential documents before the thief has a chance to break into the device.
> Bar code readers read standard _______________ bar codes, primarily to track inventory.
> Protect your data from access by putting a good __________ on the device, which requires you to enter a series of letters, numbers, or motion patterns to unlock the mobile device each time you press the power button.
> Android devices can use ___________ to terminate a single running application and all of its services or background processes.
> A fingerprint lock is an example of ___________________.
> A(n) ______________ policy enables individual employees to use personal mobile devices at work.
> Knowledge, possession, and inherence are the primary elements of_________________ .
> A factory reset is also known as a(n) ___________ or a(n)____________ .
> In order to protect against password guessing, _____________ may occur after too many failed attempts to unlock the lock screen.
> ___________ , _____________, and _______________are processes for removing restrictions and gaining elevated access to Android, iOS, and Windows Phone devices.
> Much like a reboot on a regular computer, a(n) __________ restarts a device.
> App developers use a mobile operating system’s _____________ to build apps for devices running the OS.
> A(n) ______________ is a monitor with some type of sensing device across its face that detects the location and duration of contact, usually by a finger or stylus.
> The _____________ system can send a(n) ___________ such as an AMBER alert to devices in the relevant area.
> A wearable device that counts your steps or measures your heart rate is called a(n)___________.
> When you want to buy software for an Android device, you buy from ___________..
> The _____________ enables a mobile device to determine where you are on a map.
> The feature that enables a user to rotate a tablet and have the screen rotate with the device is called a(n)____________.
> A(n) __________ is a compromise between the functionality of a(n) ________ and the greater screen space of a(n)__________.
> Swiping your finger across the screen on a mobile device to switch the screen to the next item, such as the next page in an eBook, is one example of the role ________ play in the user interface.
> All mobile operating systems have a(n) ____________ that enables users to interact with the device.
> Laptops using ______________ are less expensive because the video card has less built-in memory, but the RAM it borrows from the system results in less memory available to programs.
> A(n) ____________ scans the chip embedded in such devices as ID badges to enhance access and security.
> Windows enables ____________ for storing and automatically syncing files and folders between a portable and a file server.
> Today’s laptops use _____________ for batteries because that battery chemistry provides the highest energy density for the weight.
> A(n) __________ plugs into a single (often proprietary) port on the portable computer and offers legacy and modern single and multifunction ports, as well as features like an optical drive or expansion card slots.
> ________________ is a(n) external expansion slot on older laptops.
> Intel set up the _____________ specifications for super thin, super light, and super efficient laptops with integrated graphics and no optical drive.
> Many newer laptops feature ____________ screens offering richer color, higher contrast, and wider viewing angles.
> The _______________ enables laptop keyboards to do more than two functions on a single key.
> Most laptops today have one or more __________ or _________ slots for internal expansion cards such as Wi-Fi NICs.
> A typical clamshell-style portable computer with built-in LCD monitor, keyboard, and input device is most commonly called a laptop or_____________.
> A(n) _______________ enables you to access a remote network over the Internet securely.
> The ______________ standard connects computing devices with a Mini DisplayPort connector.
> Apple developed the ________________ to support file sharing between Macintosh computers on early LANs.
> The service that provides the structure for the World Wide Web, allowing documents to be sent across the Web, is ________________.
> By using an anonymous logon, _____________ allows you to send and receive files from a public site.
> A(n) ______________ is software that enables multiple connections to go to the Internet through one protected PC.
> The most common method used to encrypt information, such as credit card numbers, on the Internet is _______________.
> Internet Explorer is a(n) _____________.
> The time it takes for a packet to travel to its destination and back is called ___________.
> Using UDP port 161, ________________ enables remote management of network devices.
> You can access the Internet by leasing a connection from a(n) ______________.
> The ______________ feature enables devices on 802.11n networks to make multiple simultaneous connections, allowing for a theoretical throughput of 600 Mbps.
> A(n) ____________ FireWire device transfers data at up to 800 Mbps.
> If you need to share an Internet connection or connect to a wired network through your wireless network, you would use ____________.
> The wireless Ethernet standard that runs at speeds up to 54 Mbps but has limited range because it uses the 5-GHz frequency is ___________.
> Of the three common wireless encryption protocols, _____________ is the least secure.
> The 802.11 protocol is more commonly known as ________.
> Computers are in ___________ when they connect directly together without using a WAP.
> The wireless Ethernet standard that operates at a maximum of 54 Mbps on the 2.4-GHz frequency is __________.
> Establishing a unique ____________ or network name helps ensure that only wireless network devices configured similarly are permitted access to the network.
> 802.11 implements________________ , which proactively avoids network packet collisions rather than simply detecting them when they occur.
> A technology for setting up wireless PANs and connecting to some peripherals is called____________.
> When troubleshooting a NIC, you’ll need to crawl behind your computer and look for a __________ , which should be on or blinking.
> While a CD-ROM disc holds about 650 MB of data, a(n) __________ stores from 4.37 GB to 15.9 GB, depending on the number of sides and layers used.
> A(n) _______________ server enables computers to obtain IP addresses automatically.
> Special computers, called ____________ servers, keep databases of IP addresses and their corresponding names.
> A(n) ________ is a device that has at least two IP addresses: one that connects to your LAN’s switch and one that connects to the “next network.”
> A computer on a(n) ______________ network gets a 128-bit address.
> A computer on a(n) ____________ network gets a 32-bit address.
> A NIC uses a value called the __________ to distinguish which part of the IP address identifies the network ID and which part of the address identifies the host.
> The command-line utility called __________ enables one machine to check whether it can communicate with another machine.
> To test a possibly broken Ethernet port, plug in a(n)_____________ .
> HTTP and SSH are both examples of special sharing functions called___________ .
> The central location that all cabling runs to is called the_______________ .
> A(n) ___________ device transfers data at up to 12 Mbps on the universal serial bus.
> All the cabling from individual work areas runs via ____________ to a central location.