Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

A product key is a code used to register a person to an operating system
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

Before installing a new operating system, users are asked to select their settings. What are three settings users must choose?
Remaining cards (99)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Inform.Tech. Exam

QuestionAnswer
A product key is a code used to register a person to an operating system False.
Before installing a new operating system, users are asked to select their settings. What are three settings users must choose? Language to install, time and currency format, keyboard or input method.
Which account type uses an email to sign in? Microsoft account.
What three options are given to users when signing into a Microsoft system for the first time? Customizing their experience, privacy settings, linking a phone.
Which Windows account type has the highest level of control? Administrator.
When activated. the night light toggle keeps the computer's screen on all night. False.
Which Multiple displays setting creates a panoramic display? Extend these displays.
What are two items located in the start menu? Search bar, pinned apps and folders.
How can users display apps alphabetically in the Windows 11 start menu? Select All Apps in the start menu.
Which power mode keeps a computer powered and the apps open and ready for use? Sleep.
On a Windows 10 computer, which three options are available when a user selects their account name at the bottom of the Start menu? Change account settings, sign out, lock.
How can users customize a taskbar? Showing it on multiple displays, changing the location on the screen, locking it.
Apps snapped into position cannot be resized without being closed first. False
Which function allows users to view more than one app simultaneously in Windows 10 and 11? Snap.
User can select Ease of Access and _______ to alter the length of time a notification appears. Display.
Which accessibility settings are offered for the mouse pointer? Color, Visual feedback, Size.
Which two color filters are offered under Ease of Access? Red-green, grayscale.
In what ways can users display visual alerts? Flash the title bar of the active window, Flash the entire screen, Flash the active window.
Dimming window content in Closed caption settings dims which window? Caption Window.
Which section of Ease of Access includes Magnifier? Vision.
One way to reduce the risk of repetitive strain injuries is to use the on-screen keyboard. False.
A ________ or other input device can be used to interact with an on-screen keyboard. Mouse.
Pausing Windows updates offers users unlimited freedom from updates. False.
In Advanced options on the Windows Update page, users can select an end date for __________. Paused updates.
Which updates are used to repair specific vulnerabilities in an operating system? Patches.
What are the purposes of the Microsoft store? Purchase and install applications, Purchase and install music, Purchase and install games.
Which of these are Microsoft user account types? Administrative users, Standard users, Child users.
What does an HDMI connector transmit? Both digital video and audio.
Which data types are transmitted by Display port connectors? Digital audio, Digital video.
Which type of data is transmitted by VGA connectors? Analog video.
What does USB stand for? Universal serial bus.
Which peripherals are commonly connected to computers with USB connectors? Keyboards, Tablets, Mice.
Which of these are USB connector types? USB-C, USB-A, Micro-USB.
Which service allows a user to access documents while offline and automatically updates them when they back online? Sync center.
Which drop down arrow should a user select to set the document permission to Viewing? Editing.
When creating a virtual machine, users select the operating system they want to use. True.
Which providers offer virtual machine management? Hyper-V Manager, Microsoft Azure, Oracle Virtual Boxes.
Advanced Sharing on the Sharing tab of the Properties menu allows users to Allow or Deny which permission levels? Change, Read, Full Control.
Which permissions take precedence in a shared folder? The most restrictive.
A set of guidelines that determine how long data will be stored. Data retention policy.
A bilateral agreement between parties to communicate expectations. Memorandum of understanding (MOU).
A document listing specific rules and consequences users must agree to for access to a corporate network. Acceptable Use Policy (AUP).
A security feature for erasing mobile devices. Remote wipe.
Determines what data should be archived. Data retention policy.
Possession of and responsibility for information. Data ownership.
A document stipulating constraints and practices users must observe. Acceptable Use Policy (AUP).
A security feature commonly used to remove personal data stored on a lost or stolen mobile device. Remote wipe.
Create one or more copies of selected data. Full backup.
Automatically create copies of data as it changes. Mirror backup.
Only back up data that is new or different since the initial full backup. Differential backup.
Only back up data that is new or different since the last backup. Incremental backup.
Which of these authentication tools are biometric? Fingerprints, retina scans, voice readers.
What could be used as a secondary form of authentication to establish high-security multifactor authentication for the company? Fingerprints.
Which of these are considered favorable in a password? Symbols, Numbers, Uppercase letters.
Malicious software that allows a third party to collect data and track activity on a computer. Spyware.
Malicious software that self-replicates and spreads throughout a network. Worms.
Malicious code that spreads itself, infecting devices to damage or steal data. Viruses.
Malicious computer programs similar to viruses that users must execute. Trojan horses.
Which of these is a type of social engineering attack? Phishing.
Which actions will reduce the risk of a virus or malware infection? Enabling Windows Defender, Visiting websites with HTTPS protocol.
Spyware that is used to capture keystrokes, including during sign in. Keyloggers.
Software that runs like a virus or trojan horse and can copy personal information, transmit credit card numbers, passwords, and other information Adware.
Malicious code that systematically encrypts the hard drive, locking out legitimate users Ransomware.
Which of these are mitigation techniques used to protect against computer threats? Windows Defender, Antivirus software, Antimalware software.
The move toward working from home has lightened the load for IT and security departments. False.
Which of these sites offer downloadable MDM software? iTunes, Google Play store, MDM server
Companies often implement security guidelines only for top-level employees transporting mobile devices outside the office. False.
Which lock screen options found on a mobile device would help ensure its data is secure if lost or stolen? Biometric lock, Pin lock, Pattern lock.
Windows troubleshooters are a last resort; you need a new computer if they cannot fix the issues. False.
Position 1. Local policy.
Position 2. Site policy.
Position 3. Domain Group Policy.
Position 4. Organizational unit groups.
Which Group Policy type covers passwords and lockout policies? Domain policy.
The Command Prompt can be opened by using the _______ keyboard shortcut and then typing _________. Windows+R; cmd
What does the gpresult /r command do? Show policies applied to user's groups.
Which two actions occur when a device is reset? Applications a user has installed on the device are removed, Applications a manufacturer has installed on the device are removed.
A limited amount of drivers and files are used, there is no networking, and the desktop is not loaded. Windows Safe Mode with Command Prompt.
Only loads the minimum amount of drivers required to connect to other computers during startup. Safe Mode with Networking.
Windows creates a special file that logs and generates a list of drivers that are used during each step of the reboot process. Boot logging.
Loads the last successful set of driver and registry settings used to start and shut down your computer previously. Last Known Good Configuration.
After uninstalling an application, one should restart the computer to remove any leftover ___________. Files.
What does an unavailable Roll Back Driver option indicate? Windows does not have a previous version of the driver to roll back to.
Uninstalling a device removes the driver from a computer's _______. Operating system.
What can an Automatic Private IP Addressing (APIPA) address indicate? The cable is not connected or functioning properly, The network card is configured incorrectly.
What command should one use when troubleshooting a device capable of joining a domain? ipconfig /all.
What does a red exclamation mark next to a device indicate when viewing USB Connector Managers? A port error.
Where should a user go to see if a device has the most recent driver installed? Device Manager.
What should a user do to troubleshoot a computer not recognizing a device after updating the drivers? Switch the connector to a different port, Only plug in the device or devices that are needed, Remove the connector from the port, restart the computer, and plug it back in.
Large collection of public networks. Internet.
Internal network of devices. Intranet.
A network with limited, authenticated public access. Extranet.
Utilized by home and small office networks in which each device is responsible for managing access to its own resources. Peer-to-peer network.
Utilized by medium and large-sized businesses that require a central server for hosting user accounts, devices, and permissions. Client-server network.
Provides VMs the same access permissions of the host PC . External.
Provides VMs access to other VMs and the host machine. Internal.
Provides VMs access only to other VMs. Private.
A user accidentally sends sensitive data to all the devices in a company network. Which type of data transmission is described in the scenario? Broadcast.
Which statements are true of Type ll hypervisors? Type ll hypervisors allocate system resources such as RAM to virtual machines, Type ll hypervisors are located within existing operating systems such as Windows 10 Pro.
What remote tool allows someone to see what a remote user is doing when connected to a machine? Remote Assistance.
Created by: mlmurray
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards