0% found this document useful (0 votes)
2 views

Reinforcement 1 (1) - Copy

The document consists of a series of questions related to technology and computer systems, covering topics such as color filters, advanced sharing, application software, permissions, location services, malware, and device management. Each question provides multiple-choice answers for selection. The format suggests it is intended for educational or assessment purposes.

Uploaded by

sigmawithmoney
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Reinforcement 1 (1) - Copy

The document consists of a series of questions related to technology and computer systems, covering topics such as color filters, advanced sharing, application software, permissions, location services, malware, and device management. Each question provides multiple-choice answers for selection. The format suggests it is intended for educational or assessment purposes.

Uploaded by

sigmawithmoney
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

REINFORCEMENT 1

Highlight the answer(s) for each question save and send it back to me

NAME___________________
DATE___________________
PERIOD_________________

1. What are Color Filters used for


distinguishing reds from greens
distinguishing black from white
distinguishing loud noises from soft noises
distinguishing red from blue

2. What is the Advanced share used for


For all users to have access

limit the users connect to the folder to five users at a time.


limit users connected to the folder to ten or less at a time
limit users connected to the folder to ten or more at a time

3. Application Software & Operating System

can be configured to occur automatically on most devices


must be configured to occur manually on most devices
must be configured to occur manually on Apple products only
can be configured to occur automatically PC’s only
4. Read & Full Control & Modify

Are considered advanced permissions


are considered basic permissions
are considered multiple permissions
are considered stacked permissions

5. Location Services (on IOS) & Location ( on Android )

ensure mobile device movement is tracked so that a device


can be disabled
ensure mobile device movement is tracked so that a device
can be enabled
ensure mobile device movement is tracked so that a device is
portable
ensure desktop device movement is tracked so that a device
can be disabled

6. Gathers personal information or tracks computer activity


without consent
Animalware
Adware
Spyware
Malware
7. Displays unwanted commercials and product promotions.
Animalware
Adware
Spyware
Malware
8. Self-Replicates and exploits operating system vulnerabilities
Trojan
Worm
Duplicator
Bug

9. Users& Groups are entities where

Files are shared from a cloud server and granted permissions

Files are shared from a desktop server and granted


permissions

Files are shared from a landline server and granted


permissions

Files are shared from a DSL server and granted permissions

10. The default time zone for Windows is


Eastern
Mountain
Central
Pacific

11. What is the magnifier feature used for


Enlargement of text
Translation of text
Reduction of text
Narration of text

12. What happens when Files and Folders are moved within
the same partition

permissions retained as those filed or folders are moved or


copied
permissions changed as those files or folders are moved or
copied
permissions duplicated as those filed or folders are moved or
copied
permissions reimaged as those filed or folders are moved or
copied

13. How do you know when devices have been determined to


be non-compliant

When trying to connect the message says the device is no


longer compatible with the MDM.
When trying to connect the message says the device is
compatible with the MDM.
When trying to connect there is no message of compatibility
with the MDM.
When trying to connect the message says the device is no
longer compatible with the UAC

14. What happens when you Enable Automatic Updates

future important fixes or device drivers for Windows occur


only requested fixes or device drivers for Windows occur
future important fixes or device drivers for Windows with
permission
pre-approved fixes or device drivers for Windows

15. Which is a type of APIPA ip address


169.254.22.23
500.600.22.23
961.254.00.11
555.666.77.88

16. What is Elasticity


Ability to increase or decrease its RAM based on workload
demand.
Ability to decrease its RAM based on workload demand.
Ability to increase its RAM based on workload demand.
Ability to control workload demand remotely

17. Which is multi-factor authentication?

One level of authentication


Simultaneous levels of authentication
Multiple levels of authentication
Biometric authentication

18. Program Files default location


64-bit app installations?
86-bit app installations?
46-bit app installations?
68-bit app installations?

19. Which two are features of the Family options area

Set screen limit times.


Turn on Windows remotely.
Block specific websites.
Enable AI as needed

20. What is an AUP policy

Acquired use policy


Automatic use policy
Acceptable use policy
Acknowledgeable use policy

21. Administrative permissions to standard accounts take


place during

AUP
MOA
UAC
AD
22. What retains existing apps, files and Windows settings?

Transfer installation
Upgrade installation
Retained installation
Redundant installation

23. What formats the destination hard drive to perform a


clean install
Upgrade installation
Purchased installation
Remote installation
Custom installation

24. What can happen during the Widows power sleep mode

when enabled, stores files in RAM while a laptop is inactive


when disabled, stores files in RAM while a laptop is inactive
when enabled, removes files in RAM while a laptop is inactive
when disabled, removes files in RAM while a laptop is inactive

25. What is an advantage of Sticky Keys

The keys are locked until released


user can press multiple key commands one key at a time
user presses one key command one key at a time
user presses multiple key commands using multiple keys at a
time

26. What allows for multiple devices to connect to a single


port
VGA
HDMI
Data port
USB

27. What does the Update & Security in Windows do


enables or disables Windows Defender
enables Windows Defender
Disables Windows Defender
Removes Windows Defender

28. Where do you check the Connection of the Scanner to a


Device

Windows Defender
Device Manager
Control panel
Update and security
29. Where do you search for a new driver
Device Manager
Microsoft store
Control panel
Manufacturer's Website
30. When should a Device be enrolled in the MDM
For Mobile Device to interact with an MDM
For a desktop Device to interact with an MDM
For Mobile Device to interact with an MOU
For Mobile Device to be a part of an AUP

You might also like