Which of the following alternative technologies allows a computer to run multiple operating systems without partitioning the hard drive?
Which of the following operating systems is very lightweight and relies heavily on Internet applications?
Which of the following file formats contain other files within them? (Select TWO).
By default, which of the following types of operating systems can automatically detect a user’s location while the user is traveling in a bus?
Which of the following features of a smartphone controls the screen orientation?
A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following?
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?
Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?
A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?
An employee’s new computer came with a free 30-day trial version of antivirus software. The employee’s company provides enterprise antivirus software from a different vendor. Which of the following should the employee do in order to use a full version of antivirus software?
Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?
A user working on a laptop notices the mouse cursor frequently moves to random locations in a document while typing. Which of the following should the user do FIRST to help resolve this issue?
Which of the following can a user configure on an operating system so that an audible sound is made when an error message is displayed?
After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?
Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?
A user, Joe, is concerned about the safety of his personal information on a website. Which of the following can Joe look for to ensure that his personal information is not at risk? (Select TWO).
Which of the following allows for hands-free operation of a wireless device?
Which of the following internal components is used for temporary data storage in a workstation?
Which of the following storage methods is MOST likely used in corporate settings to save large amounts of data in a secured manner?
Which of the following data connections can span the FARTHEST distance?
Which of the following is considered an open-source operating system?
Which of the following computer components are used to store data? (Select TWO).
When considering backup media, which of the following holds the MOST data?
Which of the following is considered an optical storage medium?
Which of the following is the function of a CPU?
Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).
Which of the following could be described as both an input and output device?
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?