Inform.Tech. Exam
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | False.
🗑
|
||||
Before installing a new operating system, users are asked to select their settings. What are three settings users must choose? | show 🗑
|
||||
Which account type uses an email to sign in? | show 🗑
|
||||
What three options are given to users when signing into a Microsoft system for the first time? | show 🗑
|
||||
show | Administrator.
🗑
|
||||
When activated. the night light toggle keeps the computer's screen on all night. | show 🗑
|
||||
Which Multiple displays setting creates a panoramic display? | show 🗑
|
||||
show | Search bar, pinned apps and folders.
🗑
|
||||
How can users display apps alphabetically in the Windows 11 start menu? | show 🗑
|
||||
Which power mode keeps a computer powered and the apps open and ready for use? | show 🗑
|
||||
On a Windows 10 computer, which three options are available when a user selects their account name at the bottom of the Start menu? | show 🗑
|
||||
show | Showing it on multiple displays, changing the location on the screen, locking it.
🗑
|
||||
show | False
🗑
|
||||
Which function allows users to view more than one app simultaneously in Windows 10 and 11? | show 🗑
|
||||
User can select Ease of Access and _______ to alter the length of time a notification appears. | show 🗑
|
||||
show | Color, Visual feedback, Size.
🗑
|
||||
show | Red-green, grayscale.
🗑
|
||||
In what ways can users display visual alerts? | show 🗑
|
||||
Dimming window content in Closed caption settings dims which window? | show 🗑
|
||||
show | Vision.
🗑
|
||||
One way to reduce the risk of repetitive strain injuries is to use the on-screen keyboard. | show 🗑
|
||||
show | Mouse.
🗑
|
||||
show | False.
🗑
|
||||
In Advanced options on the Windows Update page, users can select an end date for __________. | show 🗑
|
||||
show | Patches.
🗑
|
||||
What are the purposes of the Microsoft store? | show 🗑
|
||||
show | Administrative users, Standard users, Child users.
🗑
|
||||
What does an HDMI connector transmit? | show 🗑
|
||||
show | Digital audio, Digital video.
🗑
|
||||
show | Analog video.
🗑
|
||||
What does USB stand for? | show 🗑
|
||||
show | Keyboards, Tablets, Mice.
🗑
|
||||
Which of these are USB connector types? | show 🗑
|
||||
Which service allows a user to access documents while offline and automatically updates them when they back online? | show 🗑
|
||||
show | Editing.
🗑
|
||||
show | True.
🗑
|
||||
Which providers offer virtual machine management? | show 🗑
|
||||
show | Change, Read, Full Control.
🗑
|
||||
show | The most restrictive.
🗑
|
||||
show | Data retention policy.
🗑
|
||||
A bilateral agreement between parties to communicate expectations. | show 🗑
|
||||
show | Acceptable Use Policy (AUP).
🗑
|
||||
A security feature for erasing mobile devices. | show 🗑
|
||||
Determines what data should be archived. | show 🗑
|
||||
show | Data ownership.
🗑
|
||||
A document stipulating constraints and practices users must observe. | show 🗑
|
||||
A security feature commonly used to remove personal data stored on a lost or stolen mobile device. | show 🗑
|
||||
Create one or more copies of selected data. | show 🗑
|
||||
show | Mirror backup.
🗑
|
||||
show | Differential backup.
🗑
|
||||
Only back up data that is new or different since the last backup. | show 🗑
|
||||
show | Fingerprints, retina scans, voice readers.
🗑
|
||||
What could be used as a secondary form of authentication to establish high-security multifactor authentication for the company? | show 🗑
|
||||
show | Symbols, Numbers, Uppercase letters.
🗑
|
||||
show | Spyware.
🗑
|
||||
show | Worms.
🗑
|
||||
show | Viruses.
🗑
|
||||
show | Trojan horses.
🗑
|
||||
show | Phishing.
🗑
|
||||
Which actions will reduce the risk of a virus or malware infection? | show 🗑
|
||||
Spyware that is used to capture keystrokes, including during sign in. | show 🗑
|
||||
Software that runs like a virus or trojan horse and can copy personal information, transmit credit card numbers, passwords, and other information | show 🗑
|
||||
Malicious code that systematically encrypts the hard drive, locking out legitimate users | show 🗑
|
||||
Which of these are mitigation techniques used to protect against computer threats? | show 🗑
|
||||
The move toward working from home has lightened the load for IT and security departments. | show 🗑
|
||||
Which of these sites offer downloadable MDM software? | show 🗑
|
||||
show | False.
🗑
|
||||
Which lock screen options found on a mobile device would help ensure its data is secure if lost or stolen? | show 🗑
|
||||
Windows troubleshooters are a last resort; you need a new computer if they cannot fix the issues. | show 🗑
|
||||
Position 1. | show 🗑
|
||||
Position 2. | show 🗑
|
||||
show | Domain Group Policy.
🗑
|
||||
show | Organizational unit groups.
🗑
|
||||
Which Group Policy type covers passwords and lockout policies? | show 🗑
|
||||
show | Windows+R; cmd
🗑
|
||||
show | Show policies applied to user's groups.
🗑
|
||||
show | Applications a user has installed on the device are removed, Applications a manufacturer has installed on the device are removed.
🗑
|
||||
A limited amount of drivers and files are used, there is no networking, and the desktop is not loaded. | show 🗑
|
||||
Only loads the minimum amount of drivers required to connect to other computers during startup. | show 🗑
|
||||
show | Boot logging.
🗑
|
||||
show | Last Known Good Configuration.
🗑
|
||||
After uninstalling an application, one should restart the computer to remove any leftover ___________. | show 🗑
|
||||
What does an unavailable Roll Back Driver option indicate? | show 🗑
|
||||
show | Operating system.
🗑
|
||||
What can an Automatic Private IP Addressing (APIPA) address indicate? | show 🗑
|
||||
show | ipconfig /all.
🗑
|
||||
What does a red exclamation mark next to a device indicate when viewing USB Connector Managers? | show 🗑
|
||||
show | Device Manager.
🗑
|
||||
show | Switch the connector to a different port, Only plug in the device or devices that are needed, Remove the connector from the port, restart the computer, and plug it back in.
🗑
|
||||
Large collection of public networks. | show 🗑
|
||||
show | Intranet.
🗑
|
||||
A network with limited, authenticated public access. | show 🗑
|
||||
show | Peer-to-peer network.
🗑
|
||||
Utilized by medium and large-sized businesses that require a central server for hosting user accounts, devices, and permissions. | show 🗑
|
||||
show | External.
🗑
|
||||
show | Internal.
🗑
|
||||
show | Private.
🗑
|
||||
show | Broadcast.
🗑
|
||||
show | Type ll hypervisors allocate system resources such as RAM to virtual machines, Type ll hypervisors are located within existing operating systems such as Windows 10 Pro.
🗑
|
||||
What remote tool allows someone to see what a remote user is doing when connected to a machine? | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
mlmurray