Search Header Logo

220-1002 uC 04072021

Authored by Jose Manuel Rios

Computers

University

Used 6+ times

220-1002 uC 04072021
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

39 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have recently bought a new tablet and need to dispose of your old tablet. The old tablet has a non-removal battery. What of the following could you do with your old tablet?


Each correct answer represents a complete solution. Choose all that apply.

Check for viability for donation to charity.

Perform a factory reset.

Send for recycling to the device vendor.

Smash the device to destroy it.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Jenny, a support analyst, has been given the task to contribute to knowledge-based articles. What points should she keep in mind while contributing?


Each correct answer represents a complete solution. Choose all that apply.

The knowledge base should be kept up to date.

Diagrams, screenshots, or other graphics should not be used.

The knowledge base as a whole should be easy to navigate.

Articles should be written with the target audience in mind.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is most likely the reason for running the Disk Defragmenter utility on a Windows 8.1 computer?

To format a hard disk drive

To troubleshoot system problems

To improve the read performance of a hard disk drive

To fix a memory problem

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jenny, a user, needs to secure her smartphone. She has been suggested to use one of the screen locking methods. Which of the following types of screen locks is the least secure?

Fingerprint

Face recognition

Password

PIN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John, a user, after working keeps his laptop in a mode in which the content of the RAM is saved to the hard drive and the laptop powers off, so it won't use any power or very little power. What is this power option known as?

Hibernate

Sleep

None of these

Shut down

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following steps of the change management process do the changes are made and tested?

Implementation

Change request

Identification

Preparation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of security threat that executes the command received from another computer into your computer is known as:

man-in-the-middle.

phishing.

botnet.

logic bomb.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?