The most widely used personal computers are __ notebooks and laptops laptops smartphones tablets
What advantage does the current generation possess in the field of digital repair? a limited exposure to technology a lack of curiosity for technology an innate understanding of technology
What type of update does not allow a user to refuse or delay security updates? security preventative forced mandatory
9. Zoe wants to use an image file that will allow her to preserve all of the original information. What file format should she use? doc files JPEGS RAW files MP3s
6. Many beginners like to use program autoexposure because the camera sets up everything for them with the exception of 150, white balance, and flash functions. True False
What is the primary function of the Task Manager in Microsoft Windows systems? To install new software To create new user accounts To monitor performance and manage services To update the operating system
II. Choice part 9 __ is people who use internet to exploit younger for sexual A. Cyber bullying B Cyber predator C .Phishing D. All 10.which of the following is stoping regular user from connecting to the service? A. Denial of service B. Virus C.Keylogger D. Worms 11. Which of the following is protecting computer system on network? A. Information B Cyber security C Fire D.Worms 12. __ is enables authorised user to acess infn without any interference? A. Confidentiality B Intgrity C.Data D . Avialibility 13. __ is recording the movement on keyboard and stealing password? A. Trojan horse B Adware C Keylogger D. Phishing 14. Which of the following is not artificail threats A Botrets B. Fire C. Temprature D all 15. There are __ type of computer security A.3 B.5 C. 4 D.2
Multiple Choice Question Disk speed is measured by the __ speed. head rotational access
Which of the following elements is part of a database back-end? A. The database for the entire store B. The server hosting the data C. The interface where a user shops and makes selections D. the database management system being used
The first computer program to win the Loebner prize was named Deep Blue. True False
What is the primary function of a router in a network? Providing high-speed links between Internet Exchange Points (IXPs) Implementing the Internet Protocol (IP) to distinguish and forward data between networks Modulating and demodulating signals for communication over telephone lines Establishing the physical connection to the WAN interface
The lead for a company's vulnerability management program is looking at the mobile aspect of the company's program. They started with end of life devices, then addressed patching statuses, and are now looking at hardening. Which of the following has the widest variety of change and will prove the most difficult? Android iPadOS Windows ios
What is the primary purpose of documenting "Lessons Learned" in IT support processes? To ensure all tickets are closed on time. To track the number of incidents handled by each technician. To identify and assign blame for incidents. To improve future processes and prevent recurring issues.
A non-tech-sawy laptop user orders a new hard drive from a large online retailer to install in the laptop. When the drive arrives, the user discovers that it is physically too big to install. What size drive did the user order? 1.8 inch 7 mm 3.5 inch 9.5 mm
Which of the following BEST describes the primary characteristic of Fiber to the Curb (FTTC) and Fiber to the Premises (FTTP) internet connections? They are exclusively used for cellular internet connections. They rely on fiber optic cables to deliver high-speed internet connections. They use legacy copper telephone lines for data transmission. They use coaxial cables to connect the ISP to the customer's premises.
Fill in the Blank Question Many Al and computer science degree paths have inter-related requirements, including coursework in computer programing especially $\square $
A user is having difficulty navigating between multiple open applications on their Windows 10 computer.They want to quickly switch between program windows without using the mouse. Which of the following actions should the user take? Use the keyboard shortcut $Alt+Tab$ Open the Control Panel and navigate to "Task Manager." Press the Windows logo key to open the Start menu. Right-click on the desktop and select "Switch Applications:
What is the goal of SafeCode? (1 point) to ensure software Integrity to reduce the developers working on a project to demonstrate security vulnerabilities to introduce new technology
A client administrator plans an upgrade from Windows 10 to Windows 11 in the environment but has to plan from a budgetary perspective. What type of hardware requirement will the administrator need to consider? User training App compatibility TPM chip Network protocol support
A security manager wants to create a step-by-step list of the completed actions for any given task to comply with policy. What is the manager creating? SOP Confidentiality Elasticity Scalability