Mr. Davids Help Desk Assessment

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Umojo
U
Umojo
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,715
| Attempts: 2,715 | Questions: 56
Please wait...
Question 1 / 56
0 %
0/100
Score 0/100
1. Which of the following programs is not an email client.

Explanation

Mozilla Firefox is not an email client. It is a web browser developed by Mozilla Foundation. While Microsoft Outlook 2003, Windows Live Mail, and Outlook Express 6 are email clients used for managing and sending emails, Mozilla Firefox is primarily used for browsing websites and accessing online content.

Submit
Please wait...
About This Quiz
Mr. Davids Help Desk Assessment - Quiz

THanks for your interest in working at Mr. David's Flooring. In order to assess all the candidates, we ask that you take this assessment test.
Good Luck!

2. Select the URL from the list below.

Explanation

The correct answer is http://www.yahoo.com because it is the only option that is a valid URL. The other options are an email address ([email protected]), a file path (D:\downloads\standard), and an IP address (192.168.0.1), which are not URLs.

Submit
3. What is a network repeater?

Explanation

A network repeater is a device that is used to extend the range of a wired or wireless local area network (LAN). It receives the network signal and amplifies it before transmitting it again, effectively increasing the coverage area of the network. This allows devices that are located far from the main network source to connect and communicate with the network. By repeating and boosting the signal, a network repeater helps to improve the overall network performance and connectivity.

Submit
4. Which is not an operating system?

Explanation

MS-Word is not an operating system. It is a word processing software developed by Microsoft. Operating systems are software that manage computer hardware and software resources and provide common services for computer programs. DOS, Windows, and LINUX are examples of operating systems.

Submit
5. A modem is best defined as...

Explanation

A modem is a device that enables you to establish a connection between your computer and an internet service provider. It acts as a bridge between your computer and the internet, allowing you to send and receive data over the internet. By connecting your PC to the modem, you can access various online services, browse the web, and communicate with others through email, chat, or video calls.

Submit
6. Ping

Explanation

The answer is a computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self-test the Network Interface Card (NIC) of the computer. This is because the term "Ping" is commonly used in computer networking to refer to the act of sending a small packet of data from one computer to another and measuring the time it takes for the packet to be sent and received. This helps in determining the connectivity and latency between the two devices. Additionally, the mention of testing the NIC further reinforces the network testing aspect of "Ping".

Submit
7. What does WAP stand for

Explanation

WAP stands for "wireless access point." A wireless access point is a device that allows wireless devices to connect to a wired network. It acts as a bridge between wireless devices and the network, providing wireless connectivity to devices such as laptops, smartphones, and tablets.

Submit
8. Based on the previous question, "a client calls and exclaims they have forgotten their password."  What is your third action to resolve the issue?

Explanation

The third action to resolve the issue is to remotely login to the system and reset the user's password. This is the most efficient and convenient way to assist the client in regaining access to their account. By remotely logging in, the support personnel can quickly reset the password without the need to physically visit the site or rely on the user's ability to accurately identify their identity. This action ensures a prompt resolution to the problem and minimizes any inconvenience caused to the client.

Submit
9. What is this computer component?

Explanation

A network interface card (NIC) is a computer component that allows a computer to connect to a network. It provides the necessary hardware and software to establish a network connection, enabling the computer to send and receive data over the network. NICs are commonly used in desktop computers, laptops, and servers to connect to local area networks (LANs) or the internet. They typically have an Ethernet port or a wireless adapter, depending on the type of network connection required.

Submit
10. 70% of all system issues can be resolved remotely!

Explanation

70% of all system issues can be resolved remotely. This means that a majority of problems that occur in a system can be fixed without the need for physical intervention or on-site support. This is beneficial as it saves time, resources, and costs associated with dispatching technicians to the location. Remote resolution also allows for faster response times and minimizes downtime, ensuring efficient problem-solving. Therefore, the statement "True" indicates that a significant portion of system issues can indeed be resolved remotely.

Submit
11. What is the function of this device?

Explanation

The correct answer is that the device is used to store large amounts of data in a computer system, and the data is retained on this device even when the computer is turned off. This suggests that the device being referred to is a secondary storage device, such as a hard disk drive or solid-state drive, which is used to store data for long-term use. Unlike temporary storage devices like RAM, the data stored on this device is not lost when the computer is powered off.

Submit
12. What is this device?

Explanation

A wireless router is a device that allows multiple devices to connect to the internet wirelessly. It acts as a central hub for the network, transmitting data between the internet and the connected devices. Unlike a modem, which only connects to the internet, a wireless router also provides a local network for devices to communicate with each other. A video card is a component in a computer that processes and renders images and videos. A motherboard is the main circuit board of a computer, connecting all the components together.

Submit
13. What are the four types of networks?

Explanation

The correct answer is Bus Ring Star Mesh. These are the four types of network topologies commonly used in computer networking. A bus network consists of a single cable that connects all devices in a linear fashion. A ring network forms a closed loop where each device is connected to two other devices. A star network has a central hub or switch that connects all devices. And a mesh network has multiple connections between devices, creating a redundant and fault-tolerant network.

Submit
14. Which of the following is not an internet browser?

Explanation

Thunderbird is not an internet browser. It is actually an email client developed by Mozilla, which allows users to send, receive, and manage their email accounts. While Safari, Firefox, and Opera are all popular internet browsers used to access and navigate the internet, Thunderbird is specifically designed for email communication rather than browsing websites.

Submit
15. What is the shortcut for PASTE?

Explanation

The shortcut for PASTE is Ctrl + V. This combination of keys is commonly used to paste copied or cut content into a document or program. It is a widely recognized shortcut across various operating systems and software applications.

Submit
16. Malware is best defined as...

Explanation

Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. This can include viruses, worms, Trojans, ransomware, adware, and other malicious programs. Its purpose is to gain unauthorized access to sensitive information, disrupt computer operations, or cause harm to the system or its users. It is important to have security measures in place to protect against malware, such as using antivirus software, regularly updating software, and being cautious when downloading or clicking on suspicious links.

Submit
17. Download

Explanation

The correct answer explains that a download refers to the process of receiving data on your PC. This can include various activities such as viewing webpages, receiving emails, watching videos, downloading movies or music, and receiving email attachments. The answer does not provide any additional information or context about downloads.

Submit
18. What does "www" stand for?

Explanation

The correct answer is "World Wide Web." The term "www" stands for World Wide Web, which is a system of interconnected documents and other resources, linked by hyperlinks and URLs. It is a global information space where users can access and share information through websites and webpages.

Submit
19. The internet was invented by

Explanation

The correct answer is the US Department of Defense. The internet was initially developed by the US Department of Defense in the 1960s as a means of communication and information sharing between different military organizations. It was called ARPANET and later evolved into the internet that we know today. Bill Gates, Steve Jobs, and Albert Einstein are not directly associated with the invention of the internet.

Submit
20. What is this computer component?

Explanation

The correct answer is CPU. The CPU, or Central Processing Unit, is a computer component responsible for executing instructions and performing calculations. It is often referred to as the "brain" of the computer, as it carries out the majority of the processing tasks. RAM, Hard Disk, and Motherboard are also computer components, but they serve different functions. RAM is responsible for temporarily storing data that the CPU needs to access quickly, while the Hard Disk stores data for long-term storage. The Motherboard is the main circuit board that connects all the components of the computer together.

Submit
21. The brain of the computer. This part does the calculation, moving and processing of information.

Explanation

The CPU, or Central Processing Unit, is often referred to as the brain of the computer because it is responsible for executing instructions, performing calculations, and processing data. It carries out all the necessary tasks to run programs and operate the computer system. The CPU is the component that performs the actual processing of information, making it a vital part of the computer's functionality.

Submit
22. Select the 3 graphics files from the list below.

Explanation

The correct answer is to select the graphics files from the list. The files with the extensions .jpg, .bmp, and .tiff are commonly used for storing images and graphics. Therefore, selecting untitled.jpg, untitled.bmp, and untitled.tiff would be the appropriate choice as they are the graphics files from the given list.

Submit
23. What are router, modem and Wap types of ?

Explanation

The given answer, "interconnecting devices," is a suitable explanation for the question. It implies that a router, modem, and WAP are all types of devices that facilitate the connection and communication between different networks or devices. These interconnecting devices play a crucial role in establishing and maintaining network connections, allowing data to be transmitted and received efficiently.

Submit
24. One MB is equal to...

Explanation

One MB is equal to 1024KB. In computer systems, memory is often measured in bytes, with kilobytes (KB) and megabytes (MB) being common units. The prefix "kilo" represents 1000, so 1 kilobyte is equal to 1000 bytes. However, in binary systems, memory is often measured in powers of 2, so 1 kilobyte is considered to be 1024 bytes. Therefore, 1 megabyte is equal to 1024 kilobytes, or 1024KB.

Submit
25. Bandwidth

Explanation

Bandwidth refers to the measurement of how much information can be carried in a given time period, typically a second, over a wired or wireless communications link. It represents the capacity or speed at which data can be transferred from the server to the client. This term is commonly used to describe the capacity of an internet connection, indicating the amount of data that can be transmitted within a specific timeframe.

Submit
26. This is a measurement of speed over a network.

Explanation

Megabits per second is the correct answer because it is a common unit used to measure the speed of data transfer over a network. Megabits per second (Mbps) refers to the amount of data that can be transmitted in one second, with one megabit equal to one million bits. This unit is commonly used to describe internet connection speeds and is a standard measurement in the field of networking.

Submit
27. Which one is not an output device?

Explanation

An output device is a device that displays or presents information to the user. In this question, the options given are Printer, Monitor, Modem, and Keyboard. Printer and Monitor are both examples of output devices as they produce visual or printed output. Modem, on the other hand, is a communication device used to connect to the internet and is not primarily used for outputting information. However, the Keyboard is an input device as it is used to input data or commands into a computer rather than displaying or presenting information. Therefore, the correct answer is Keyboard.

Submit
28. Which are layers in the OSI model

Explanation

The correct answer is application layer, presentation layer, and physical layer. These three layers are part of the OSI model, which is a conceptual framework that standardizes the functions of a communication system. The application layer is responsible for providing services to the user, such as email or file transfer. The presentation layer ensures that data is properly formatted and encrypted. The physical layer deals with the actual transmission of data through physical media, such as cables or wireless signals.

Submit
29. What is this computer component?

Explanation

The correct answer is "Chassis". A chassis is the physical frame or enclosure that holds and protects the internal components of a computer. It provides structural support and houses components such as the motherboard, hard drive, and CPU.

Submit
30. An IP address is best defined as...

Explanation

An IP address is a unique numerical identifier assigned to each device connected to a network. It consists of four parts separated by dots, such as 217.247.84.89. This address allows devices to communicate with each other on the internet. It is not related to the location of internet packets or the address of an internet provider. Therefore, the correct answer is that an IP address is a unique number associated with every system connected to a network.

Submit
31. A client calls and exclaims they have forgotten their password.  What is your first action to resolve the issue?

Explanation

The first action to resolve the issue of a client forgetting their password is to positively identify the user's identity. This is important in order to ensure that the person requesting the password reset is indeed the legitimate user and not someone trying to gain unauthorized access to the system. By verifying the user's identity, the support staff can proceed with the appropriate steps to reset the password and provide access to the client.

Submit
32. Based on the previous question, "a client calls and exclaims they have forgotten their password."  What is your second action to resolve the issue?

Explanation

The second action to resolve the issue of a client forgetting their password is to determine if the user is logging into a local machine, domain, or web application. This step is important in order to understand the specific context and system that the user is trying to access. It will help in providing the appropriate instructions or assistance to reset the password and regain access to the system.

Submit
33. How many layers are there in the OSI model

Explanation

The OSI model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role in the process of transmitting data across a network. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Therefore, the correct answer is 7.

Submit
34. __________ groups are a collection of user accounts that are local to one specific workstation or member server.

Explanation

Local groups are a collection of user accounts that are specific to one particular workstation or member server. These groups are used to manage access and permissions on that specific machine. They are not distributed across a network or domain, but rather limited to the local environment. Local groups are typically used to grant or deny access to resources on a single machine, making them an important tool for managing security and user accounts within a specific workstation or server.

Submit
35. What is the first question a computer technician should ask a user that is having issues with a software application after receiving a help desk request by phone or email?

Explanation

The first question a computer technician should ask a user that is having issues with a software application after receiving a help desk request by phone or email is "May I please have your name and phone number?" This is because it is important for the technician to have the user's contact information in order to provide assistance and follow up if needed. Rebooting the computer and asking about the computer's brand are troubleshooting steps that may come later in the conversation, but gathering the user's information is the first priority.

Submit
36. What does ISDN stand for?

Explanation

ISDN stands for Integrated Services Digital Network. It is a telecommunications network that enables the transmission of voice, data, video, and other network services over traditional copper telephone lines. ISDN provides faster and more reliable connections compared to analog systems, allowing for simultaneous voice and data transmission. It has been widely used for internet access, video conferencing, and other communication services.

Submit
37. If you're diagnosing an issue with a printing issue, what is the first step in diagnosing the problem?

Explanation

The first step in diagnosing a printing issue is to ask the user if the printer is turned on. This is because if the printer is not turned on, it will not be able to perform any printing tasks. By confirming if the printer is turned on, it helps to identify if the issue is simply a matter of power supply.

Submit
38. The two built-in user accounts that are created on a Windows Server 2008 computer are the Administrator account and the __________ account.

Explanation

On a Windows Server 2008 computer, the two built-in user accounts are the Administrator account and the Guest account. The Guest account is a limited account that allows temporary access to the system for users who do not have a regular user account. It has restricted permissions and is typically used for temporary or occasional users who need to access the system without full privileges.

Submit
39. Which one of the following best defines the term Operating System?

Explanation

The term Operating System refers to the software that allows computer users to run applications with the hardware of a specific system. It is also the master control program that manages a computer's internal functions and provides a means of control to the computer's operations and file system. Additionally, it is the software that manages the hardware and software interface of a computer. Therefore, all of the given options accurately define the term Operating System.

Submit
40. What does a network bridge do?

Explanation

A network bridge is a device or software that connects multiple network segments at the data link layer (layer 2) of the OSI model. It allows different network segments to communicate with each other by forwarding data packets between them. By doing so, it effectively extends the network and enables devices on different segments to communicate as if they were on the same network. This helps to improve network performance, increase network capacity, and enhance network flexibility.

Submit
41. Which operating system was the successor to Windows 98?

Explanation

Windows ME, which stands for Windows Millennium Edition, was the successor to Windows 98. Windows ME was released in 2000 and was designed for home users, with improvements in multimedia and internet capabilities. It introduced features such as System Restore, Windows Movie Maker, and Windows Media Player 7. Although Windows ME was not as successful as its predecessor, it played a significant role in the evolution of the Windows operating system.

Submit
42. What is the function of a Gateway?

Explanation

A gateway is a networking device that enables connection to other networks. It acts as an entry and exit point for data packets between different networks. It helps in directing traffic by routing data packets to their intended destination. It also performs protocol conversions and ensures compatibility between different networks. By enabling connection to other networks, a gateway allows devices on one network to communicate with devices on another network, facilitating data transfer and communication between different networks.

Submit
43. What identifies software by specifying the directory path where the application is stored in the file system?

Explanation

The correct answer is "path rule". In software, the directory path where the application is stored in the file system is used to identify the software. This path rule helps in locating and accessing the software files and resources. It is a way to specify the exact location of the software within the file system, allowing the operating system or other software components to find and interact with the application correctly.

Submit
44. What policies can be used to ensure that users always have the latest versions of applications?

Explanation

Software installation is the correct answer because it allows users to always have the latest versions of applications. By regularly updating and installing software on users' devices, organizations can ensure that users have access to the most up-to-date features and security patches. This can be done through various methods such as automatic updates, centralized software deployment, or using software distribution tools.

Submit
45. The presentation layer is which layer?

Explanation

The correct answer is 6. In the OSI model, the presentation layer is the sixth layer. This layer is responsible for the formatting and presentation of data to be transmitted between the application layer and the session layer. It ensures that data is properly encoded and formatted so that it can be understood by the receiving system. The presentation layer also handles encryption and decryption of data for secure communication.

Submit
46. What Microsoft Management Console (MMC) snap-in is used to create and modify Group Policies and their settings?

Explanation

The Group Policy Management Console is the correct answer because it is the MMC snap-in used to create and modify Group Policies and their settings. This tool allows administrators to manage Group Policy objects (GPOs) across an Active Directory domain. It provides a centralized interface for configuring and deploying Group Policies, making it easier to manage and control the security and configuration settings for multiple users and computers in a network environment.

Submit
47. What category is used to configure the startup and security settings for services running on a computer?

Explanation

System Services is the correct answer because this category is used to configure the startup and security settings for services running on a computer. System Services include essential functions and processes that are necessary for the operating system to run properly. These services can be configured to start automatically during system startup and their security settings can be adjusted to ensure the proper functioning and protection of the computer.

Submit
48. What command-line tool can be used to manually refresh group policy?

Explanation

The command-line tool "gpupdate.exe" can be used to manually refresh group policy. This tool updates the group policy settings on a local or remote computer, allowing any changes made to the group policy to take effect immediately. By running the "gpupdate.exe" command, the user can ensure that the latest group policy settings are applied without having to wait for the automatic refresh interval.

Submit
49. What is a credit card–sized or token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise?

Explanation

A smart card is a credit card-sized or token-style device that is used with a PIN to enable logon to the enterprise. It is a secure method of authentication that stores and processes data on an embedded microchip. The smart card provides an extra layer of security by requiring both the physical card and the correct PIN to gain access, making it difficult for unauthorized users to impersonate someone else.

Submit
50. What term refers to tracking events that take place on the local computer?

Explanation

The term "auditing" refers to tracking events that take place on the local computer. Auditing involves monitoring and recording activities such as file access, logins, system changes, and other events to ensure compliance, security, and accountability. It helps to identify any unauthorized or suspicious activities, detect potential security breaches, and maintain the integrity of the system.

Submit
51. What command-line tool can be used with a standard user account to reduce the risks associated with the Administrator account?

Explanation

The command-line tool "runas" can be used with a standard user account to reduce the risks associated with the Administrator account. This tool allows a user to run specific commands with different user credentials, such as running administrative tasks without actually logging in as the Administrator. By using "runas", the standard user can perform necessary administrative tasks while minimizing the exposure and potential risks associated with the more powerful Administrator account.

Submit
52. Before deploying software using Group Policy, what must you create?

Explanation

Before deploying software using Group Policy, you must create a distribution share. A distribution share is a network location where the software package is stored and made available for deployment. This share allows client computers to access and install the software package using Group Policy.

Submit
53. Which of the following is not a type of GPO?

Explanation

The answer is "advanced GPO" because it is not a recognized type of Group Policy Object (GPO). GPOs are used in Windows operating systems to manage various settings and configurations for groups of computers or users. The recognized types of GPOs are local GPO, domain GPO, and starter GPO. However, "advanced GPO" is not a commonly used or recognized term in the context of GPOs.

Submit
54. What special identity group is used as a reduced-privilege account to allow applications to run on a server without requiring administrative access?

Explanation

The special identity group used as a reduced-privilege account to allow applications to run on a server without requiring administrative access is "Network Service." This account is specifically designed for running services and processes in a secure manner, with limited permissions to ensure the safety and integrity of the server. It provides the necessary access for network-related tasks while minimizing the risk of unauthorized access or system damage.

Submit
55. What type of file can be written to allow non–Windows Installer–compliant applications to be deployed?

Explanation

A .zap file can be written to allow non-Windows Installer-compliant applications to be deployed. This file contains instructions that the Windows Installer uses to install an application. It can be used to deploy applications that do not have their own installer or are not compatible with the Windows Installer technology. The .zap file specifies the files to be installed, registry entries to be created, and other necessary installation actions.

Submit
56. What Software Restriction Policy properties allow you to determine whether the policies apply to all files or whether library files, such as Dynamic Link Library (DLL), are excluded?

Explanation

The enforcement property in Software Restriction Policy allows you to determine whether the policies apply to all files or whether library files, such as Dynamic Link Library (DLL), are excluded. This property controls the level of enforcement for the policy and determines whether all files are subjected to the restrictions or if certain types of files are exempted from the policy. By adjusting the enforcement property, you can specify whether DLL files and other library files are included or excluded from the policy's restrictions.

Submit
View My Results

Quiz Review Timeline (Updated): Apr 29, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 29, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • May 22, 2012
    Quiz Created by
    Umojo
Cancel
  • All
    All (56)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following programs is not an email client.
Select the URL from the list below.
What is a network repeater?
Which is not an operating system?
A modem is best defined as...
Ping
What does WAP stand for
Based on the previous question, "a client calls and exclaims they...
What is this computer component?
70% of all system issues can be resolved remotely!
What is the function of this device?
What is this device?
What are the four types of networks?
Which of the following is not an internet browser?
What is the shortcut for PASTE?
Malware is best defined as...
Download
What does "www" stand for?
The internet was invented by
What is this computer component?
The brain of the computer. This part does the calculation, moving and...
Select the 3 graphics files from the list below.
What are router, modem and Wap types of ?
One MB is equal to...
Bandwidth
This is a measurement of speed over a network.
Which one is not an output device?
Which are layers in the OSI model
What is this computer component?
An IP address is best defined as...
A client calls and exclaims they have forgotten their password. ...
Based on the previous question, "a client calls and exclaims they...
How many layers are there in the OSI model
__________ groups are a collection of user accounts that are local to...
What is the first question a computer technician should ask a user...
What does ISDN stand for?
If you're diagnosing an issue with a printing issue, what is the...
The two built-in user accounts that are created on a Windows Server...
Which one of the following best defines the term Operating System?
What does a network bridge do?
Which operating system was the successor to Windows 98?
What is the function of a Gateway?
What identifies software by specifying the directory path where the...
What policies can be used to ensure that users always have the latest...
The presentation layer is which layer?
What Microsoft Management Console (MMC) snap-in is used to create and...
What category is used to configure the startup and security settings...
What command-line tool can be used to manually refresh group policy?
What is a credit card–sized or token-style device, such as a USB...
What term refers to tracking events that take place on the local...
What command-line tool can be used with a standard user account to...
Before deploying software using Group Policy, what must you create?
Which of the following is not a type of GPO?
What special identity group is used as a reduced-privilege account to...
What type of file can be written to allow non–Windows...
What Software Restriction Policy properties allow you to determine...
Alert!

Advertisement