A user has purchased some new software from a vendor and wants to install it on all of the Windows computers in the house. Which of the following will help the user accomplish the task and ensure compliance with the software vendor?
A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?
Which of the following features of a smartphone controls the screen orientation?
When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?
A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?
Which of the following is a common characteristic of open source software?
Which of the following components provides the FASTEST medium for hosting and storing an operating system?
Before purchasing a new video card for a PC, which of the following should be checked to ensure there will be enough electricity for the video card to function properly?
Which of the following allows for the FASTEST printer connections?
Which of the following is a 15-pin video connection?
Which of the following connectors consists of three separate plugs for video?
Which of the following are considered input devices for a computer? (Select TWO).
A user is configuring a SOHO wireless router. The user should change the router’s default administrator password for which of the following reasons?
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?
An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access. Which of the following BEST protects against data theft in this instance?
An attacker cracks a user's password for all social media, email, and bank accounts. The user needs to change the passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening?
A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?
Which of the following is the MOST secure password?
To increase security, which of the following is the BEST feature to disable on a mobile device when not in use?
The manufacturer of a SOHO router has released a security fix for the router. Which of the following methods should be used to apply the fix?
Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?
When storing a document in the cloud, a user needs to be:
Which of the following computer connector types was designed specifically for allowing high-speed external hard drive transfers?
After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?
Ann, a user, wishes to free space in her documents folder. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?
A user working on a laptop notices the mouse cursor frequently moves to random locations in a document while typing. Which of the following should the user do FIRST to help resolve this issue?
A user installed a new scanner on a desktop personal computer without any documentation. The scanner powers on, the lamp turns on, and then the unit stops with a failure light lit. Which of the following should the user do FIRST?
Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?
An RoHS label on hardware indicates which of the following?
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?