CBT (ITF+-Computer Basics) Leave a Comment / By Reward / June 16, 2023 Welcome to your CBT (ITF+-Computer Basics) What type of computer, also called a notebook, has a monitor that folds down to cover the keyboard for transport? Server Laptop GPS Mainframe What would be an appropriate use for a supercomputer? Playing online games Running a high-volume web site Tallying census results Managing a large business's accounting department Which of these is a workstation operating system? iOS Windows Phone Windows Android Which of these operating systems cannot run on a desktop PC with an Intel processor? Linux iOS Google Chrome OS Windows What kind of OS enables users to interact with it using a pointer and graphics? Command line GUI Decentralized Centralized A version of Linux packaged with add-ons and utilities for a particular purpose is known as a: Distro GUI Version Service Pack A BlackBerry is a type of smartphone known for what distinctive feature that most other modern smartphones lack? Graphical screen Internet connectivity Touchscreen Hardware keyboard What operating system is used on an iPad? macOS Windows Android iOS What kind of network is used to connect individual computers in a single physical location? WAN LAN Internet Remote Listening to music using an online service like Spotify is an example of what? Cloud computing Virtualization Streaming media Telepresence You are running virtual machines on a single physical server. The server operating system does not run any other applications and is dedicated to virtualization. What type of hypervisor is this? Type 1 Type 2 Type 3 Type 4 Which factor distinguishes IoT devices from standard computing devices such as laptops and smartphones? They must run as virtual machines on a Type 1 hypervisor. They are specialized devices. They must run as virtual machines on a Type 2 hypervisor. They are kept isolated from the Internet. How are information and data different? Data is processed information. Information is processed data. Data does not need to be backed up. Information does not need to be backed up. Which of these is not part of the data processing sequence? Networking Processing Output Input What is another name for a CPU? Microprocessor Intel System memory Chipset Which of these is not a feature of a CPU? Multicore 64-bit processing L1 cache DDR Why is passive cooling not usually used for a CPU? Draws too much power Not effective enough Moving parts break down Uses too much RAM What is the main advantage of liquid cooling over air cooling? Less expensive Safer More effective Uses less power In what type of computer is SODIMM memory used? Laptop Desktop Server Smartphone In what two ways are DDR3 DIMMs better than DDR2 DIMMs? (Choose two.) Less expensive More reliable Uses less power Faster What manages and controls the speed of a motherboard's buses? RAM CPU Chipset L1 cache What are the two functions of a desktop PC's power supply? (Choose two.) Steps down the voltage Increases the voltage Converts AC to DC Converts DC to AC What is the reason for different color wires on a power supply? The wire color determines the appropriate component for the connector. Each wire color represents a different voltage. Certain color wires deliver AC power, and certain ones deliver DC power. Certain color wires deliver higher-quality power than others. You are reconfiguring a cloud virtual machine with additional vCPUs and additional RAM. Which term best describes your actions? Scaling down Scaling in Scaling up Scaling out A video card on a modern motherboard would run best in which type of slot? PCI PCIe VGA DVI Which port is used exclusively for external hard drives? FireWire USB eSATA PS/2 Which of these external ports is not obsolete? FireWire Legacy parallel Legacy serial PS/2 What type of connector does a modem use? PS/2 RJ-45 3.5 mm RJ-11 The USB connector that plugs into a full-size printer is: Type-A Type-B Mini-B Micro-B Which of these is not a flat-panel display? OLED LCD Plasma CRT Which of these ports are physically identical? USB Type-A and USB Type-B Thunderbolt and Mini DisplayPort DisplayPort and FireWire DVI and VGA What is the purpose of a wheel on a mouse? Scrolling the display Greater precision of pointer movement Right-clicking alternative Locating the pointer A video camera that works only when connected to a computer is a: Scanner Digital video camera Megapixel camera Webcam A receipt printer on a cash register is likely to be what kind of printer? Inkjet Laser LED Thermal A video card on a modern motherboard would run best in which type of slot? PCI PCIe VGA DVI Which port is used exclusively for external hard drives? FireWire USB eSATA PS/2 Which of these external ports is not obsolete? FireWire Legacy parallel Legacy serial PS/2 What type of connector does a modem use? PS/2 RJ-45 3.5 mm RJ-11 The USB connector that plugs into a full-size printer is: Type-A Type-B Mini-B Micro-B Which of these is not a flat-panel display? OLED LCD Plasma CRT Which of these ports are physically identical? USB Type-A and USB Type-B Thunderbolt and Mini DisplayPort DisplayPort and FireWire DVI and VGA What is the purpose of a wheel on a mouse? Scrolling the display Greater precision of pointer movement Right-clicking alternative Locating the pointer A video camera that works only when connected to a computer is a: Scanner Digital video camera Megapixel camera Webcam A receipt printer on a cash register is likely to be what kind of printer? Inkjet Laser LED Thermal Which of the following practices are being employed? (Choose two) Password lookout. . Password expiration. Password history Password age. Password length. Password complexity. Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?. Trademark Contract Copyright Patent An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?. Document the findings Disconnect the peripherals Restart the computer Contact other users. Which of the following BEST describes an application running on a typical operating system Task. Process Function. Thread 49. A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?. A. Compression B. Encryption C. Permission D. Auditing A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?. Compression Encryption Permission Auditing Which of the following BEST describes a kilobyte?. A kilobyte is a measurement of power (e.g., 100KW). A Kilobyte is a measurement of processor speed (e.g., 2.4KHZ). A kilobyte is a measurement of throughput (e.g., 100kbps). A kilobyte is a measurement. Which of the following BEST describes the practice of providing user credentials when logging onto the network?. Output. Storage. Input. Processing. Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?. Laptop Server Workstation Mobile phone. Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?. Email previewing. Patching. Clear browsing cache. Kill process. A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?. Integrity. Authentication. Accounting. Non-repudiation Which of the following security concerns is a threat to confidentiality. Service outage. Replay attack. Dumpster diving. Denial of service. Which of the following actions is the FINAL step in the standard troubleshooting methodology?. Implement preventive measures. Create a new theory of cause. Research the problem online. Document the solution and cause. A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the BEST choice to accomplish this task?. WLAN card. Bluetooth module. Infrared port. Thunderbolt cable. Which of the following are the basic computing operations? Input, process, and feedback. Input, output, storage, and feedback. Input, process, and output. Input, process, output, and storage. Which of the following is a compiled language?. PowerShell Perl Jscript Java. A small company wants to set up a server that is accessible from the company network as well as the internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?. The employees’ home ISP speeds. The quality of the computer used to connect. The geographical location of the employees. A security method of allowing connections. A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician NEXT step? Implement the solution. Establish a plan of action. Document lessons learned. Verify full system functionality. Which of the following is primarily a confidentiality concern? Impersonating. Altering. Destructing. Eavesdropping. Which of the following network protocols will MOST likely be used when sending and receiving internet email? (Choose two). ICMP POP3 SNMP SMTP E. SFTP F. DHCP. A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site? Duplicate. Gather information. Establish a plan of action. Find the root cause. A UPS provides protection against. Denial of service. Wiretapping. Replay attack. Power outages. Which of the following is an advantage of installing an application to the cloud? Internet access is not required. Service is not required. Support is not required. Data is not stored locally. Which of the following software license models allows a developer to modify the original code and release its own version of the application? Proprietary software. Open source software. Cross-platform software. Commercial software. A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function? Permission. Driver. Ink cartridge. USB cable. An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? Web application. Cloud application Client-server application Standalone application. Which of the following statements BEST describes binary? A notational system used to represent internet protocol addressing. A notational system used to represent an “on” or “off” state. A notational system used to represent media access control. A notational system used to represent a storage unit of measurement. A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST? Check knowledge base. Search local logs. Research possible theories. Question users. A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task? Flash drive Optical drive. Hard disk drive. Solid state drive. Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem? Ann has a compatibility problem with the camera. The power interruption caused the camera to malfunction. Ann’s internet connection and wireless router are still down. A firmware update needs to be applied to the camera. The broadcast signal from a recently installed wireless access point is not as strong an expected. Which of the following actions would BEST improve the signal strength? Enable WPA-2-Enterprise. Use WIFI Protected Setup. Update from 802.11b to 802.11g. Ensure sources of EMI are removed. A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document? Patent Copyright Watermark. Trademark Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed? Social engineering Password reuse Phishing Snooping. A Systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: an embedded OS. . a storage area network network attached storage a type 1 hypervisor A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy? Game console Server Workstation Laptop. Which of the following is MOST likely used to represent international text data? Hexadecimal ASCII Octal Unicode A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two). Trademark Copyright NDA EULA Patent For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of: replication. fault tolerance prioritization redundancy. In which of the following situations should there be come expectation of privacy? Sending email and pictures to a close relative. Posting a comment on a friend’s social media page. Posting a comment on a video sharing site Submitting personal information on a school enrollment site. Which of the following storage devices have a spinning disk? (choose two.) RAM HDD Flash drive SSD ROM Optical drive. Which of these is not a flat-panel display? OLED LCD Plasma CRT CDN means.................. DDOS means Distributed Denial-of-Service Distribution of Denial-of-Service Distributing of Denial-of-Service Distributed Denial-of-Savy Which of the following is the main purpose of a CDN? To improve the performance of websites To increase the availability of websites To reduce the costs of hosting websites All of the above What is the main advantage of using a CDN? Increased website availability Reduced website costs Shorter loading times for users All of the above What is the term used to describe the network of servers that make up a CDN? Point of Presence (PoP) Part of Presence (PoP) Point-CDN of Presence Program of projects Which of the following technologies is commonly used for building the user interface of a web application? HTML Java Python SQL What does IoT stand for? Internet of Technology Internet of Things Internet of Telecommunication Internet of Transfers Which of the following is NOT a characteristic of IoT devices? Connectivity Interoperability Intelligence Invisibility What does PWA stand for? Do PWAs require installation from app stores? Yes No Give vivid explanation of CDN Give vivid explanation Explain what you know by Web Apps. Your explanation should include its characteristics Explain vividly Explain what you know by PWA. Your explanation should include its characteristics Explain vividly Explain what you know by IOT. Your explanation should include its characteristics Explain vividly Time's upTime is Up!