100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Master the CompTIA IT Fundamentals Exam (I): Your Path to IT Certification- Exam Question and Answers [100% Correct] 2025/2026

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
02-09-2025
Written in
2025/2026

Master the CompTIA IT Fundamentals Exam (I): Your Path to IT Certification- Exam Question and Answers [100% Correct] 2025/2026 Which of the following computer file types serves as a shortcut to access a different program or file? A. File link B. Shortcut C. URL D. Application link Shortcut In which of the following operating systems would you most likely find software dedicated to professional video and audio production? A. Ubuntu B. Mac OS X C. Windows 10 Pro D. Android OS Mac OS X A technician cannot access a user’s files, and none of the folders or files open. What is the most likely cause of this problem? A. Corrupted file system B. Incorrect file extensions C. Missing user permissions D. Damaged hardware Missing user permissions When trying to secure access to an online banking account, which two actions are considered best practice for maintaining a secure login? A. Use easily memorable passwords B. Change the default password 1 C. Write down the password in a secure location D. Enable two-factor authentication E. Create a complex password Change the default password, Create a complex password Which of the following storage devices offers the quickest performance for an operating system installation? A. 7200 RPM Hard Drive B. Optical Drive (DVD) C. SSD D. Flash Drive SSD What does an RoHS certification on a hardware device indicate? A. The hardware has been certified for reduced energy consumption B. The device must be disposed of in a particular manner C. The hardware is guaranteed to work with all systems D. The hardware operates free from electromagnetic interference in a particular manner The device must be disposed of When initially setting up a new operating system, which two options must a user configure? A. Set up a backup schedule B. Select the time zone C. Create multiple user accounts D. Set the computer name E. Adjust accessibility settings Set the time zone, Set the computer name What should a user do if an application warns it will only work for 24 more uses? A. The user should reinstall the application B. The user must activate the application C. The user should switch to a 64-bit version 2 D. The user needs to upgrade to a premium version The user must activate the application What action should follow after completing a backup? A. Encrypt the backup file B. Verify the backup C. Delete the backup D. Schedule the backup for the next run Verify the backup Which connection method offers the highest level of security for data protection? A. Bluetooth B. Wired connection C. Wi-Fi D. Satellite connection Wired connection To secure a wireless network in an office with the best encryption, which option should the technician select? A. WEP B. WPA C. WPA2 D. WAP WPA2 Which of the following is the most sensitive type of Personally Identifiable Information (PII) and should be shared only with trusted individuals? A. Social security number B. Mother's maiden name C. Date of birth D. Email address Mother's maiden name Which of the following is a free, open-source operating system that anyone can modify? 3 A. Windows 10 B. Linux C. Chrome OS D. macOS Linux What type of malware is characterized by a message demanding a ransom to prevent system damage or data loss? A. Spyware B. Ransomware C. Trojan horse D. Adware Ransomware Which smartphone sensor is responsible for detecting changes in screen orientation? A. Accelerometer B. Gyroscope C. GPS D. NFC Gyroscope Which type of printer uses powdered consumables and provides a lower cost per page than inkjet printers? A. Inkjet printer B. Laser printer C. Thermal printer D. Dot matrix printer Laser printer Which of the following components store data? A. CPU B. RAM C. GPU 4 D. SSD RAM, SSD A user has downloaded a file with the .dmg extension. Which operating system is compatible with this f ile type? A. Mac OS B. Windows C. Linux D. iOS Mac OS Which of the following operating systems is very lightweight and relies heavily on Internet applications? A. Chrome OS B. Windows C. Linux D. Blackberry OS Chrome OS Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem? A. The company has configured a policy on her computer that forces her to stay on their website. B. Her computer is infected with adware and is redirecting her browser to another site. C. The memory of the browser is corrupt, and she needs to have the browser reinstalled. D. She did not reboot her computer after clearing the temporary files. with adware and is redirecting her browser to another site Her computer is infected Ann, a user, wishes to free space in her documents folder. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files? 5 A. Date modified B. File path C. Size D. Extension Size A user has finished setting up a new computer. Now the operating system requires activation, but the user discovers the computer has no Internet connection. Which of the following should the user do FIRST? A. Contact technical support. B. Reboot the computer. C. Check the Ethernet cable. D. Review manufacturer's website. Check the Ethernet cable Which of the following will allow a user to move a file from one folder to another using the LEAST number of steps, while ensuring that the file is removed from its original location? A. Open the file from its original location, save it to the new location, and delete it from the original location. B. Cut the file from its original location and paste it to the new location. C. Rename the file in its original location to a name that is not already taken in the new location. D. Copy the file from its original location and paste it to the new location. original location and paste it to the new location Cut the file from its Which of the following software package types is designed to accept input from multiple users? A. Utility B. Operating system C. Specialized D. Collaborative Collaborative 6 Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not f ix the problem. Which of the following is the cause? A. The monitor power cable is unplugged. B. The video cable has become disconnected. C. The video driver is not installed. D. The operating system has encountered a stop error. E. The screen saver has activated. The video cable has become disconnected. Which of the following are examples of keyboard connectors? (Select TWO). A. USB B. RJ-11 C. Serial D. FireWire E. PS/2 USB, PS/2 A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following? A. Schedule automatic updates. B. Enable installed OS features. C. Update hardware drivers. D. Reinstall productivity applications. Enable installed OS features. A user is at the office and has a cellular phone that previously functioned properly. The phone is powered on with a fully charged battery. However, the phone does not have connectivity. Which of the following describes the problem? A. Phone is disconnected from WiFi B. Provider is conducting system testing 7 C. MAC address is bad D. Phone is in airplane mode Phone is in airplane mode Which of the following alternative technologies allows a computer to run multiple operating systems without partitioning the hard drive? A. Web applications B. Dual boot C. Telepresence D. Virtualization Virtualization Which of the following is a 15-pin video connection? A. DVI B. S-video C. Component D. HDMI E. VGA VGA Which of the following is considered an optical storage medium? A. SSD B. Blu-Ray C. Flash drive D. Memory card Blu-Ray Which of the following are best practices when it comes to using a computer in a public location? (Select TWO). A. Notify the administrator when finished. B. Use strong passwords. C. Turn off the computer when finished. 8 D. Disable the save password function on web pages. E. Make sure to clean the keyboard when finished. F. Make sure to log out of websites when done. Make sure to log out of websites when done Diable the save password function on web pages, Which of the following is a feature of a basic power strip? A. Protects against lightning strikes B. Provides multiple outlets for power C. Generates power for devices D. Provides battery backup for devices question_answerVIEW ANSWER Provides multiple outlets for power Which of the following connectors consists of three separate plugs for video? A. Display port B. S-video C. Thunderbolt D. Component Component Which of the following technologies allows people to communicate all over the world inexpensively? A. Virtualization B. SSID C. Kinetics D. VoIP VoIP Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement? A. Large USB flash drive connected to a PC B. Medium capacity SATA hard drive 9 C. Network attached storage appliance D. Firewall with security management Network attached storage appliance Which of the following would BEST be described as password best practices? (Select THREE). A. Use of long passwords B. Sharing passwords with a trusted source C. Limiting password reuse D. Keeping default passwords E. Use of special characters F. Writing down difficult passwords characters Use of long passwords, Limiting password reuse, Use of special Which of the following is MOST likely required during installation in order to legally install software? A. Automatic updates B. Service level agreement C. License key D. Antivirus software License key A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required? A. 8-bit B. 16-bit C. 32-bit D. 64-bit 64-bit hich of the following BEST describes the pros and cons of a home wired network? A. Low throughput, low mobility, high availability, high latency, high security 10 B. High throughput, high mobility, low availability, low latency, high security C. High throughput, low mobility, high availability, low latency, high security D. Low throughput, high mobility, low availability, high latency, low security mobility, high availability, low latency, high security High throughput, low Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate? A. Standard B. Guest C. Administrator D. Power user Guest A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat? A. Malware B. Social engineering C. Spam D. Physical security Social engineering Where can a user find the latest updates, upgrades, or firmware for an electronic device that the vendor supports? A. Internet search engine B. Internet forum C. Technical community groups D. OEM website OEM website A user needs to download tax documents from a financial website. Which of the following is 11 the website MOST likely to use for transmission of the tax document to the users browser? A. HTTP B. HTTPS C. SFTP D. FTP HTTPS When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO). A. IP address B. User's password C. Computer's name D. Subnet mask E. HTTP port F. Fax number IP address, Subnet mask Which of the following is a reason that a user might upgrade a video card driver? (Select TWO). A. To decrease the screen resolution B. To access monitor standby mode C. To fix an error message D. To use additional features E. To adjust the brightness/contrast To fix an error message, To use additional features Before purchasing a new video card for a PC, which of the following should be checked to ensure there will be enough electricity for the video card to function properly? A. GPU B. CPU C. GUI 12 D. PSU PSU A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue? A. The computer does not have current antivirus software installed B. The computer needs to have its components upgraded C. The downloaded toolbars are filling the browser screen D. The owner was not using complex passwords screen The downloaded toolbars are filling the browser Which of the following are considered input devices for a computer? (Select TWO). A. Mouse B. Printer C. Speakers D. Microphone E. Monitor Mouse, Monitor While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website? A. It stores data in cache or cookies, but not both. B. It requires login credentials for some sections. C. It contains both secure and non-secure parts. D. It is best viewed with a different browser. It contains both secure and non-secure parts. By default, which of the following types of operating systems can automatically detect a users location while the user is traveling in a bus? A. Server 13 B. Desktop workstation C. Virtual server D. Mobile Mobile A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?A. Dumpster diving B. Shoulder surfing C. Phishing D. Social engineering Shoulder Surfing Which of the following is the function of a CPU? A. Encrypts data for remote transmission B. Performs data computation C. Supplies electricity to components D. Provides storage location for files Performs data computation A technician is setting up a computer that was shipped. After everything is plugged in, the computer will not turn on. Which of the following should the technician do FIRST to identify the issue? A. Check for physical damage on the computer. B. Search for a solution on the Internet. C. Reference the manufacturer's documentation. D. Ensure the power supply is set at the correct voltage. correct voltage Ensure the power supplies is set at the A user installing a printer can connect it to which of the following ports? (Select FOUR). A. PS/2 B. VGA 14 C. DVI D. USB E. FireWire F. Serial G. RJ-11 H. Parallel USB, FireWire, Serial, Parallel When operating under optimal network conditions, which of the following has the HIGHEST reliability? A. Bluetooth B. Wired C. Cellular D. WiFi Wired When setting up a new workstation, which of the following should be configured during the initial OS setup wizard? A. Additional software B. Date and time settings C. Peripheral devices D. Security software Date and time settings When applying ergonomics to a workstation area, which of the following are the MOST important to consider? (Select TWO). A. Proper sitting position B. Amount of time computer will be used C. Clarity of the display D. Proper keyboard and mouse height E. Number of speakers in sound system 15 Proper sitting position, Proper keyboard and mouse F. Brightness and contrast of the display height Which of the following allows for the FASTEST printer connections? A. Bluetooth B. USB C. Parallel D. Serial USB A user has purchased some new software from a vendor and wants to install it on all of the Windows computers in the house. Which of the following will help the user accomplish the task and ensure compliance with the software vendor? A. Copy and paste the program between computers. B. Purchase a multi-user license. C. Purchase a single-user license. D. Use remote desktop to share the program between computers. Purchase a multi-user license. An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access. Which of the following BEST protects against data theft in this instance? A. Security software B. Full disk encryption C. Cable lock D. Username and password E. Patching the OS and third party software Full disk encryption Which of the following printers requires a special type of paper in order to print? A. Impact B. Thermal C. Inkjet 16 D. Laser Thermal Which of the following file formats contain other files within them? (Select TWO). A. tiff B. dmg C. png D. mp3 E. iso F. flac dmg, iso A users laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another users laptop. How could the user have prevented this breach? A. Disable file and print sharing on the laptop. B. Delete unused drives from network. C. Remove shared keys from the key ring. D. Set the read-only attribute on the files. Disable file and print sharing on the laptop. Which of the following is the BEST reason to backup data? A. To ensure data encryption B. To ensure data stability C. To ensure data security D. To ensure data availability To ensure data availability A users operating system is set to automatically update as updates are released. However, last weeks updates failed to download. Which of the following should the user do FIRST to install the updates? A. Reference the OS manufacturer's website. 17 B. Run a virus scan to remove viruses. C. Reinstall the operating system. D. Change the automatic update schedule. E. Manually download the updates. Manually download the updates. An employees new computer came with a free 30-day trial version of antivirus software. The employees company provides enterprise antivirus software from a different vendor. Which of the following should the employee do in order to use a full version of antivirus software? A. Enter the company product key for the antivirus software, enabling the full version. B. Uninstall the current version antivirus software and install the company version. C. Verify Internet connectivity and run online virus scanning software. D. Update the trial antivirus software to the latest version. software and install the company version. Uninstall the current version antivirus A user is setting up an older wireless access point that has only WEP for encryption. Which of the following additional steps will help to secure the network? (Select TWO). A. Disable SSID broadcast. B. Refresh the MAC address. C. Filter the MAC address. D. Refresh the IP address. E. Use CAT6 cables. Disable SSID broadcast, Filter the MAC address Which of the following is the BEST example of productivity software? A. Word processing software B. Entertainment software C. Image editing software D. Anti-malware software Word processing software 18 A technician has just finished setting up a SOHO wireless router but the client does not want the PC on the wireless network for security reasons. The technician connects an RJ- 45 cable to the computer and the router, but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem? A. Change the IP address on the computer to match the router. B. Reseat the power cable on the computer and reboot. C. Check for link light activity on the computer and the router. D. Change the hostname of the router to match the computer's network. activity on the computer and the router. Check for link light A user is configuring a SOHO wireless router. The user should change the routers default administrator password for which of the following reasons? A. To prevent improper data transmission encryption B. To prevent unauthorized configuration changes C. To prevent social engineering attacks D. To increase wireless signal strength To prevent unauthorized configuration changes Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information? A. Hacking B. Phishing C. Spam D. Cracking Phishing Joe, a user, needs to store a large amount of data, but does not have enough space on his local computer. Which of the following are the BEST options for him to use? (Select TWO). A. Network attached storage B. External hard drive C. Optical drive 19 D. USB thumb drive E. Another computer Network attached storage, External hard drive Which of the following computer components are used to store data? (Select TWO). A. GPU B. HDD C. RAM D. NIC E. CPU HDD, RAM Which of the following could be described as both an input and output device? A. Flat-screen monitor B. Multi-function printer C. Microphone D. Scanner Multi-function printer A technician has been tasked with changing the settings for a used SOHO router, but does not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue? A. Click "Forgot password." B. Use a password cracker. C. Hold the reset button. D. Use the password: password. Hold the reset button A user learns of an operating system vulnerability that would allow a hacker to access the computer. The user would like to keep the operating system up to date to prevent such vulnerabilities from occurring. Which of the following should the user configure? A. Additional OS features 20 B. Automatic updates C. Software firewall D. Anti-malware software Automatic updates A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution? A. Swap the mouse and keyboard to the other PS/2 ports. B. Remap the mouse and keyboard in the BIOS. C. Update the BIOS to recognize the newer keyboard and mouse. D. Configure the keyboard localization settings. ports. Swap the mouse and keyboard to the other PS/2 Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage? A. Decreased software licensing costs B. Higher security encryption C. Limited storage space for files D. Increased accessibility to files Increased accessibility to files Which of the following data connections would provide a user the BEST Internet availability while traveling? A. Workstation with only RJ-45 connectors B. Smartphone with cellular service C. Laptop with Bluetooth wireless connectivity D. Tablet connected to a SOHO wireless network Smartphone with cellular service A user installed a new scanner on a desktop personal computer without any documentation. The scanner powers on, the lamp turns on, and then the unit stops with a 21 failure light lit. Which of the following should the user do FIRST? A. Go to the scanner manufacturer's website and download the current installation information. B. Check the personal computer manufacturer's support website for information about scanner installation. C. Find a scanner user group website and ask for help. D. Update the scanner firmware and drivers, then reinstall the scanner. question_answerVIEW ANSWER current installation information. Go to the scanner manufacturer's website and download the When considering backup media, which of the following holds the MOST data? A. BD-R B. DVD-R C. DVD-DL D. CD-ROM BD-R Which of the following is an example of ransomware? A. A user is asked to pay a fee for a password to unlock access to their files. B. A user receives an email demanding payment for a trial application that has stopped working. C. A user has opened an Internet browser and is taken to a site that is not the normal home page. D. A user is asked to open an attachment that verifies the price of an item that was not ordered. user is asked to pay a fee for a password to unlock access to their files. Which of the following is a safety feature of cloud-based backups? A. Incremental copy of data B. Local copy of data C. Offsite storage of data D. Full backup of PC data Offsite storage of data Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits? A 22 A. Change the router administrator username. B. Change the router's broadcasting channel. C. Update the unit's firmware. D. Use a complex administrator password. Which of the following has the lowest latency? A. SSD B. NAS C. Blu-Ray D. DVD SSD Update the unit's firmware. Which of the following is the BEST security practice to use when configuring the management options of a wireless router? A. Disable DHCP B. Change the admin password C. Enable SSID D. Enable remote administration Change the admin password When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred? A. Social engineering B. Phishing C. Virus attack D. License theft question_answerVIEW ANSWER License theft A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to 23 mitigate this issue? A. Only browse the Internet on WiFi connections that use WPA2 B. Turn off the guest account in the operating system C. Disable autofill functionality within the web browser D. Remove any legacy browsers from the computer browser Disable autofill functionality within the web Which of the following security threats is classified as license theft? A. Entering the neighbor's software key B. Using software to reveal a password C. Searching through the trash for passwords D. Watching what a user types on screen Entering the neighbor's software key A user, Joe, is concerned about the safety of his personal information on a website. Which of the following can Joe look for to ensure that his personal information is not at risk? (Select TWO). A. HTTP on the browser address bar B. Suspicious ads in the browser C. HTTPS on the browser address bar D. A lock symbol on the browser address bar E. The word secure in the browser address bar on the browser address bar HTTPS on the browser address bar, A lock symbol Which of the following CPU cooling types is BEST in a dusty environment? A. Liquid cooling B. Open case C. Case fan D. Heat sink fan Liquid Cooling 24 The extension .rtf is an example of which of the following file types? A. Document B. Executable C. Audio D. Speadsheet Document A technician wants to keep a router up to date. Which of the following MUST be updated regularly? A. SSID B. Administrator password C. Wireless encryption D. Firmware Firmware A user needs to establish an initial password for an email account. Which of the following is the BEST example of a complex password? A. 01#iWant! B. iWantobeaCosmonau# C. 01c234n56789v9876x21 D. 012iWanttobe210 01#iWant! Which of the following computer connector types was designed specifically for allowing high-speed external hard drive transfers? A. DVI B. USB C. eSATA D. HDMI eSATA Which of the following ports can be used to connect an external hard drive to a computer? 25 (Select TWO). A. MIDI B. PS/2 C. eSATA D. RJ-45 E. USB F. RJ-11 eSATA, USB Which of the following is the component responsible for interconnectivity of internal system devices? A. System case B. Power supply C. Motherboard D. Expansion card Motherboard A user is installing a new scanner on a computer. Which of the following MOST likely needs to be installed in order for this equipment to work? A. License key B. OS update C. Firmware D. Driver Driver To increase security, which of the following is the BEST feature to disable on a mobile device when not in use? A. Wireless B. GPS C. Network D. NFC NFC 26 Which of the following data connection types provides the HIGHEST mobility? A. WiFi B. Cellular C. Direct link D. Wired Cellular Which of the following system utilities allows a user to configure multiple monitors in the OS? A. Color management B. Device manager C. GPU driver D. Display Display Which of the following is MOST important to ensure a computer temperature is maintained within normal limits? A. Maintaining constant power output B. Ensuring sufficient airflow C. Keeping the case open D. Turning the wireless off when not needed Ensuring sufficient airflow Which of the following items require ESD precautions? A. Upgrading to a new touch screen monitor B. Adding a micro SD card to a smartphone C. Installing an compact flash card into a laptop D. Replacing RAM in a personal computer Replacing RAM in personal computer A user's government identification number, birth date, and current address are considered 27 which of the following? A. IMAP B. HTTP C. PII D. HTTPS PII Which of the following is used for telepresence? A. VoIP telephone B. Webcam C. Remote desktop D. Touchscreen Webcam A user, Ann, calls the manufacturer of a software product she purchased, but is denied assistance because the product is no longer supported. Which of the following options is a BEST next choice? A. P2P software sharing service B. Original instruction manual C. Online user forum D. PC manufacturer's website question_answerVIEW ANSWER Online user forum 28

Show more Read less
Institution
CompTIA
Module
CompTIA










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA
Module
CompTIA

Document information

Uploaded on
September 2, 2025
Number of pages
28
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Master the CompTIA IT Fundamentals
Exam (I): Your Path to IT Certification-
Exam Question and Answers [100%
Correct] 2025/2026
Which of the following computer file types serves as a shortcut to access a different program or file?

A. File link

B. Shortcut

C. URL

D. Application link Shortcut



In which of the following operating systems would you most likely find software dedicated to
professional video and audio production?

A. Ubuntu

B. Mac OS X

C. Windows 10 Pro

D. Android OS Mac OS X



A technician cannot access a user’s files, and none of the folders or files open. What is the most likely
cause of this problem?

A. Corrupted file system

B. Incorrect file extensions

C. Missing user permissions

D. Damaged hardware Missing user permissions



When trying to secure access to an online banking account, which two actions are considered best
practice for maintaining a secure login?

A. Use easily memorable passwords

B. Change the default password


1

,C. Write down the password in a secure location

D. Enable two-factor authentication

E. Create a complex password Change the default password, Create a complex password



Which of the following storage devices offers the quickest performance for an operating system
installation?

A. 7200 RPM Hard Drive

B. Optical Drive (DVD)

C. SSD

D. Flash Drive SSD



What does an RoHS certification on a hardware device indicate?

A. The hardware has been certified for reduced energy consumption

B. The device must be disposed of in a particular manner

C. The hardware is guaranteed to work with all systems

D. The hardware operates free from electromagnetic interference The device must be disposed of
in a particular manner



When initially setting up a new operating system, which two options must a user configure?

A. Set up a backup schedule

B. Select the time zone

C. Create multiple user accounts

D. Set the computer name

E. Adjust accessibility settings Set the time zone, Set the computer name



What should a user do if an application warns it will only work for 24 more uses?

A. The user should reinstall the application

B. The user must activate the application

C. The user should switch to a 64-bit version


2

, D. The user needs to upgrade to a premium version The user must activate the application



What action should follow after completing a backup?

A. Encrypt the backup file

B. Verify the backup

C. Delete the backup

D. Schedule the backup for the next run Verify the backup



Which connection method offers the highest level of security for data protection?

A. Bluetooth

B. Wired connection

C. Wi-Fi

D. Satellite connection Wired connection



To secure a wireless network in an office with the best encryption, which option should the technician
select?

A. WEP

B. WPA

C. WPA2

D. WAP WPA2



Which of the following is the most sensitive type of Personally Identifiable Information (PII) and should
be shared only with trusted individuals?

A. Social security number

B. Mother's maiden name

C. Date of birth

D. Email address Mother's maiden name



Which of the following is a free, open-source operating system that anyone can modify?


3
£7.32
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
AcademicPlug

Get to know the seller

Seller avatar
AcademicPlug Yale School Of Medicine
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
7 months
Number of followers
0
Documents
327
Last sold
2 months ago
⚡ACADEMIC PLUG- Your Ultimate Exam Resource Center⚡

Welcome to Academic Plug, your one-stop shop for all things academic success! We specialize in providing high-quality, curated exam resources to help students, professionals, and lifelong learners excel in their studies and certification goals. Whether you're preparing for high school finals, university exams, or global certifications like IELTS, CPA, or SATs — Academic Plug connects you with the documents that matter most: ✅ Past papers ✅ Model answers ✅ Marking schemes ✅ Study guides ✅ Revision notes ✅ Certification prep kits We believe in smarter study, not harder. That’s why Academic Plug is more than a store — it’s your academic ally. With verified documents, organized by subject and exam board, you’ll save time and stay ahead. Plug in. Power up. Pass with confidence.

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions