220-1002 uC 04072021

220-1002 uC 04072021

University

39 Qs

quiz-placeholder

Similar activities

IMK

IMK

University

40 Qs

database

database

University

40 Qs

Midterm Exam

Midterm Exam

University

35 Qs

Latihan Soal AAS Ganjil Kelas 7

Latihan Soal AAS Ganjil Kelas 7

7th Grade - University

40 Qs

Kiem tra thuong xuyen 1

Kiem tra thuong xuyen 1

8th Grade - University

40 Qs

[SMP-IX] ASAS 2024 Ganjil

[SMP-IX] ASAS 2024 Ganjil

9th Grade - University

40 Qs

QUIZ APSIA PRA UTS

QUIZ APSIA PRA UTS

University

40 Qs

OP 4 SPECIAL EXAM MIDTERM

OP 4 SPECIAL EXAM MIDTERM

University

40 Qs

220-1002 uC 04072021

220-1002 uC 04072021

Assessment

Quiz

Computers

University

Medium

Created by

Jose Manuel Rios

Used 6+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have recently bought a new tablet and need to dispose of your old tablet. The old tablet has a non-removal battery. What of the following could you do with your old tablet?


Each correct answer represents a complete solution. Choose all that apply.

Check for viability for donation to charity.

Perform a factory reset.

Send for recycling to the device vendor.

Smash the device to destroy it.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Jenny, a support analyst, has been given the task to contribute to knowledge-based articles. What points should she keep in mind while contributing?


Each correct answer represents a complete solution. Choose all that apply.

The knowledge base should be kept up to date.

Diagrams, screenshots, or other graphics should not be used.

The knowledge base as a whole should be easy to navigate.

Articles should be written with the target audience in mind.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is most likely the reason for running the Disk Defragmenter utility on a Windows 8.1 computer?

To format a hard disk drive

To troubleshoot system problems

To improve the read performance of a hard disk drive

To fix a memory problem

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jenny, a user, needs to secure her smartphone. She has been suggested to use one of the screen locking methods. Which of the following types of screen locks is the least secure?

Fingerprint

Face recognition

Password

PIN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John, a user, after working keeps his laptop in a mode in which the content of the RAM is saved to the hard drive and the laptop powers off, so it won't use any power or very little power. What is this power option known as?

Hibernate

Sleep

None of these

Shut down

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following steps of the change management process do the changes are made and tested?

Implementation

Change request

Identification

Preparation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of security threat that executes the command received from another computer into your computer is known as:

man-in-the-middle.

phishing.

botnet.

logic bomb.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?