Search Header Logo

Computer Hardware and Security

Authored by Fidele Youssaka

Computers

Professional Development

Used 2+ times

Computer Hardware and Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A technician is planning to install a new motherboard in his friend's laptop. What is the most important precaution he should take to avoid any damage during the installation?

He should remove all his jewelry

He should complete an inventory of tools before use

He should practice electrical fire safety

He should connect a proper ESD strap

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

John, a technician, is unable to access external websites from his workstation. What is the MOST likely setting he needs to change on his workstation to resolve this issue?

Default gateway

Host address

Name server

Subnet mask

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are the IT manager of a company. You are concerned about the increasing number of ransomware attacks and the limited storage space in your servers. Which backup method would you choose to best address these concerns?

Full

Differential

Off-site

Grandfather-father-son

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are a project manager and your change request was not approved because there was no backup plan if the implementation failed. What should you update before resubmitting the change request for approval?

Scope of the project

Level of risk

Plan for reverting changes if implementation fails

End user acceptance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

John recently installed a new app on his phone that promised to boost its performance. However, he started experiencing issues with his phone afterwards. What should John do FIRST to resolve this issue?

Reset his phone to factory settings

Uninstall the new application

Upgrade his data plan

Turn off the mobile hotspot

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Imagine you are concerned about someone trying to break into your smartphone by continuously guessing different unlock patterns. Which of the following features would BEST address your concern?

Remote wipe

Anti-malware

Device encryption

Failed login restrictions

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

John, a technician, receives a call from a user reporting an issue. What practice should John use to ensure the ticket is associated with the correct user?

John should ask the user to provide a callback phone number to be added to the ticket

John should assign the ticket to the department's power user

John should register the ticket with a unique user identifier

John should provide the user with a unique ticket number that can be referenced on subsequent calls

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?