Tb143 Unit 5-7 Study Guide

33 Questions | Total Attempts: 46

SettingsSettingsSettings
Please wait...
Study Guide Quizzes & Trivia

If you fancy yourself a computer fanatic and are up to answering specifically designed questions that gauge your knowledge on TB143. It is a simple set of questions and therefore, it will be easy to answer.


Questions and Answers
  • 1. 
    Which file system can be used by all Microsoft operating systems?
    • A. 

      FAT16

    • B. 

      NTFS

    • C. 

      DOS

    • D. 

      Windows

  • 2. 
    Which of the following file types will save the most file space after you compress them?  
    • A. 

      JPEG

    • B. 

      MP3

    • C. 

      TXT

    • D. 

      Archive

  • 3. 
    Creating a backup of your data files can be made easier if you:
    • A. 

      Save image files to diskette

    • B. 

      Place the data files in a separate partition

    • C. 

      Create a System and Restore disk

    • D. 

      Login as a standard user

  • 4. 
    Which of the following will allow you to recover the data when a computer has been stolen from an office?
    • A. 

      A backup copy of the data.

    • B. 

      Police Report

    • C. 

      Administrator priviledges

    • D. 

      Remote access software

  • 5. 
    How often should you backup data?
    • A. 

      Whenever you shut down the server

    • B. 

      Once a year

    • C. 

      Every five minutes

    • D. 

      At least once a day

  • 6. 
    The ______________   type of backup stores only those files that changed since the last backup?
  • 7. 
    What is the purpose of a signed driver?
    • A. 

      Secures delivery of parcel packages.

    • B. 

      It serves as a reliable and tested command interpreter between Windows and a hardware device.

    • C. 

      It authenicates the URL and server of secure access web site or secured web application

    • D. 

      Allows the driver software to be installed on a computer.

  • 8. 
    Windows uses an update process to patch program code problems. Which update setting will automatically download patches but wait for you to install them?  
    • A. 

      Automatic

    • B. 

      Download Updates

    • C. 

      Notify

    • D. 

      Turn Off

  • 9. 
    What is virtual memory and how is virtual memory created in Windows?
  • 10. 
    Your three-week old computer is hit with a nasty virus. You have secured your data files on a separate hard drive, but the system partition has an enormous amount of data corruption. Which of the following tools would be the best choice to fix this system?
    • A. 

      LINUX install disk

    • B. 

      Windows install CDs

    • C. 

      DOS boot disk

    • D. 

      System Restore CD

  • 11. 
    While trying out a registry hack, you find that you have made a major mistake. Windows won’t finish its startup process, and you can’t get into the registry to undo your mistake. You decide to press F8 as you reboot, the _______________________ would be a first choice tool to fix the system?
  • 12. 
    How much current can a USB port on the back of a computer supply?  
    • A. 

      50 mA at .5 volts

    • B. 

      500 mA at 5 volts

    • C. 

      USB 1.0 at 12mbps

    • D. 

      USB 2.0 at 480mbps

  • 13. 
    It is possible to use a USB or IEEE-1394 device to boot a computer and bypass its internal security devices. 
    • A. 

      True

    • B. 

      False

  • 14. 
    Renaming the Administrator account would:
    • A. 

      Prevent access to the computer.

    • B. 

      Give administrator priviledges to the guest account

    • C. 

      Automatically be done in a domain environment

    • D. 

      Close one potential security hole

  • 15. 
    Microsoft’s term for an account on a computer that is not attached to a network is:
    • A. 

      Standalone account

    • B. 

      Workgroup account

    • C. 

      Local account

    • D. 

      Domain account

  • 16. 
    What is a hacker most likely not going to steal from a networked computer?
    • A. 

      Passwords and account logins

    • B. 

      Video game hacks

    • C. 

      Credit card numbers

    • D. 

      Personnel information

  • 17. 
    The process of verifying that the person typing is the actual authorized user is called ______________________.
  • 18. 
    What is the purpose of a strong password?
    • A. 

      It prevents unauthorized users from guessing their way into a system.

    • B. 

      It demonstrates system integrity and stability.

    • C. 

      It provides a mnemonic device for users to remember passwords

    • D. 

      It overwrites weaker passwords

  • 19. 
    What is the most reliable and secure way to share resources between computers?
    • A. 

      Copy files to and from diskettes

    • B. 

      File transfer protocol with anonymous username

    • C. 

      Modem connection over public telephone network

    • D. 

      Create a user account on a Windows NT-based domain network

  • 20. 
    A software program is recording your keystrokes in an attempt to gather your password for your online bank. This type of program is usually described as:
    • A. 

      A virus

    • B. 

      Spyware

    • C. 

      Trojan horse

    • D. 

      Honeypot

  • 21. 
    You receive an urgent e-mail message from your online bank, warning you that without immediate action, your account is going to be disabled. If you click the provided link, then verify your account information, your money will be safe. Such a warning is most likely an example of Phishing.
    • A. 

      True

    • B. 

      False

  • 22. 
    What type of virus uses the programming and scripting features found in applications?
    • A. 

      Phishing

    • B. 

      Key Logger

    • C. 

      Spyware

    • D. 

      Macro

  • 23. 
    All of the USB connectors on the front of your desktop are in use, but you need a file from your flash drive. You run an extension USB cable from a connector that is never used on the back of the computer, but the USB port does not work. Which of the following would be most important when describing this problem to tech support?  
    • A. 

      That you have multiple USB connections on the front of the PC

    • B. 

      That it is an unused USB port

    • C. 

      That your flash drive is USB 2.0

    • D. 

      That your PC is powered on.

  • 24. 
    A computer that reboots at random times and intervals is most likely experiencing:  
    • A. 

      A software problem

    • B. 

      A hardware problem

    • C. 

      A user error

    • D. 

      Automatic software upgrades

  • 25. 
    You are into your second day of trying to figure out why a vital application will not start on your computer. In the meantime, your deadline is approaching and no progress is being made. You should: 
    • A. 

      Tell your boss you can't get it done

    • B. 

      Throw the computer out the window

    • C. 

      Complete your project on paper

    • D. 

      Call tech support

Back to Top Back to top