
ITF+ TS B4
Authored by Paul Pesce
Instructional Technology
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your friend Andrew has confirmed that someone has been using his password to log in to his social media account. He believes that two bank accounts may also have been compromised. Which of the following password best practices has Andrew MOST likely violated?
Password age
Password length
Password reuse
Password history
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon.
Which of the following steps have you forgotten in your troubleshooting process?
Implement the solution.
Verify system functionality.
Perform a backup.
Create an action plan.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the best definition of a bit?
A single 1 or 0 in a digital signal
An electrical signal in a wire
A physical signal that becomes a digital signal
A measure of computer graphics and sound
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users.
Which of the following is the BEST approach to solving these problems?
Approach each problem separately.
Try to find the relationship between the problems.
Create an action plan for each problem.
Back up the system hosting the financial application.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How much power can a USB 3.0 dedicated charging port supply?
2.5W
4.5W
15W
7.5W *choose
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?
Read & Execute
Modify *choose
Read
Full Control
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Diane has a few files on her computer that she does not want anyone to read. She has placed strict file permissions on them, which will help accomplish this goal. Which other security feature could she use to guarantee no one else can read these files?
Hide
Zip
Encryption
Compression
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
PARCIAL TIC PROF. EN MUSICA
Quiz
•
University
25 questions
Princípios de Redes I
Quiz
•
University
25 questions
Computación
Quiz
•
University
25 questions
Agama Islam kls 4
Quiz
•
1st Grade - University
25 questions
Komputer dan Jaringan Dasar
Quiz
•
University
25 questions
TRY OUT UAS ELEMEN MESIN 1 TME
Quiz
•
University
25 questions
تقنية رقمية 3
Quiz
•
12th Grade - University
25 questions
1er PARCIAL TIC - SEDE SAUJIL
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade