1.
Which of the following is NOT required to configure an e-mail client?
Correct Answer
A. Modem/router ID number
Explanation
The modem/router ID number is not required to configure an e-mail client. The modem/router ID number is used to connect to the internet and is not directly related to the configuration of an e-mail client. The other options, such as incoming server information, username and password, and outgoing server information, are all necessary for configuring an e-mail client as they are used to establish the connection and authenticate the user.
2.
If browser security settings are too restrictive, this may cause issues viewing certain types of content.
Correct Answer
A. True
Explanation
If a browser's security settings are set to be too restrictive, it can lead to difficulties in viewing certain types of content. This is because the strict security settings may block or disable certain features or plugins that are necessary for displaying specific content, such as videos, animations, or interactive elements. Therefore, it is true that overly restrictive browser security settings can cause problems when trying to view certain types of content.
3.
Which of the following is NOT a typical browser error?
Correct Answer
A. "Insufficient memory, page cannot load correctly"
Explanation
The given answer "Insufficient memory, page cannot load correctly" is not a typical browser error because it is related to the device's memory and not specifically to the browser. Typical browser errors include "Page cannot be displayed," "Internet Explorer cannot open the search page," and "Unable to contact server," which are all specific to browser functionality and connectivity issues.
4.
Safe mode is a way of loading Windows that only loads core components the operating system requires to function.
Correct Answer
A. True
Explanation
Safe mode is a special troubleshooting mode in Windows that loads only essential system components and drivers. It is designed to help diagnose and fix issues with the operating system. By loading only the core components required for the system to function, safe mode allows users to isolate and identify any problematic software or drivers that may be causing issues. Therefore, the statement that safe mode only loads core components required for the operating system to function is true.
5.
Which of the following is true of firewalls?
Correct Answer
A. All items listed
Explanation
Firewalls have the capability to inspect any information that enters or exits a computer, which helps in detecting and blocking any potentially harmful or unauthorized data. Improperly configured firewalls can indeed interfere with internet applications, as they may block legitimate traffic or allow malicious traffic to pass through. Lastly, firewalls are specifically designed to prevent unauthorized electronic access to a networked computer system, acting as a barrier between the internal network and external threats.
6.
After troubleshooting connectivity issues, what are the next steps you should take to resolve e-mail problems?
Correct Answer
A. All items listed
Explanation
After troubleshooting connectivity issues, the next steps to resolve e-mail problems would be to reset the customer's password, reconfigure the e-mail client, and disable any third-party firewalls. These steps are necessary as resetting the password can help resolve any authentication issues, reconfiguring the e-mail client ensures that the settings are correct, and disabling third-party firewalls can eliminate any potential blocking of the e-mail service. By performing all these actions, it increases the chances of resolving the e-mail problems successfully.
7.
Which of the following is true of a computer virus?
Correct Answer
A. All items listed
Explanation
All items listed are true of a computer virus. A computer virus is often harmful to the host computer as it can corrupt files, steal personal information, or cause system crashes. It changes the way the computer operates without user permission by modifying system settings or disabling certain functions. Additionally, a computer virus hides within documents or programs and spreads as a side-effect of user action, such as opening an infected email attachment or downloading a malicious file.
8.
Which of the following is a typical customer complaint about e-mail?
Correct Answer
A. Why is my e-mail coming back after I send it?
Explanation
The typical customer complaint about e-mail is when their e-mail comes back after they send it. This could be due to various reasons such as incorrect email address, full mailbox of the recipient, or technical issues with the email server. This issue can cause frustration for the customer as their message is not reaching the intended recipient.
9.
Which of the following is a symptom of a damaged browser?
Correct Answer
A. Browser gives an error and then closes.
Explanation
A browser giving an error and then closing is a symptom of a damaged browser. This indicates that there may be an issue with the browser software or its components, causing it to malfunction and shut down unexpectedly. This can be caused by various factors such as corrupted files, incompatible extensions, or conflicts with other software installed on the device. When a browser encounters such errors and closes abruptly, it is often a sign that there is a problem with the browser itself.
10.
When troubleshooting a browser, which of the following should you do?
Correct Answer
A. Disable any parental control software.
Explanation
When troubleshooting a browser, one of the steps you should take is to disable any parental control software. Parental control software can restrict certain websites or features, which may cause issues with the browser's functionality. By disabling this software, you can eliminate it as a potential cause of the problem and determine if it is interfering with the browser's performance.
11.
A proxy server allows users on a network to view pages indirectly. Incorrect proxy settings can cause browser issues.
Correct Answer
A. True
Explanation
A proxy server acts as an intermediary between a user's device and the internet. It allows users to access web pages indirectly by forwarding their requests to the server. If the proxy settings are incorrect, it can lead to browser issues because the browser won't be able to connect to the internet through the proxy server properly. Hence, the statement is true.
12.
Which of the following describes a default browser?
Correct Answer
A. Preferred browser set by user to view web content
Explanation
A default browser refers to the preferred browser that a user has set to view web content. This means that when the user clicks on a link or opens a web page, it will automatically open in their chosen default browser. It is not necessarily the browser installed along with the operating system or modem drivers, as those may vary depending on the device and setup. The default browser is a personal choice made by the user for their convenience and ease of accessing web content.
13.
Which of the following is a spyware indicator?
Correct Answer
A. All items listed
Explanation
The correct answer is "All items listed" because each of the indicators mentioned - sudden appearance of new search toolbars, desktop shortcuts, or program menu items, advertisements appearing when not connected to the internet, and unexpected redirection to another website - are common signs of spyware. When all of these indicators are present, it strongly suggests that the computer has been infected with spyware.
14.
Which of the following e-mail clients are supported by AT&T?
Correct Answer
A. All items listed
Explanation
All items listed, including Entourage, Apple Mail, and Outlook 2000 and later, are supported by AT&T as e-mail clients.
15.
Which of the following types of blocking and firewall software are known to cause browser issues?
Correct Answer
A. All items listed
Explanation
All of the items listed (America Online Parental Controls, Internet Boost, and Zone Alarm) are known to cause browser issues. These types of blocking and firewall software often have strict security measures that can interfere with the normal functioning of a web browser. They may block certain websites, restrict access to certain features, or cause conflicts with other software installed on the computer, leading to browser issues such as slow loading times, error messages, or crashes. It is important to be aware of these potential issues when using such software and to adjust the settings accordingly to avoid any problems.