Unit 11 Review

Unit 11 Review

9th - 12th Grade

17 Qs

quiz-placeholder

Similar activities

ICT S120 (Prelim Review)

ICT S120 (Prelim Review)

11th Grade

15 Qs

End of unit assessment - Networks

End of unit assessment - Networks

9th Grade

18 Qs

KD 3.1_Aplikasi Pengolah Angka / Spreadsheet

KD 3.1_Aplikasi Pengolah Angka / Spreadsheet

10th Grade

15 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Text and Image representation

Text and Image representation

11th Grade

22 Qs

quizz tkinter

quizz tkinter

11th Grade - University

20 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

PH Infromatika kls IX Bab 4, 5, 6

PH Infromatika kls IX Bab 4, 5, 6

9th Grade

20 Qs

Unit 11 Review

Unit 11 Review

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Anthony DellaRosa

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How many Libraries are created for each user by default on a new Windows 10 installation?

4

6

2

5

2.

MATCH QUESTION

45 sec • 1 pt

Match the commands to the task.

tracert

verifies basic connectivity to the targeted IP or host name

ping

verifies the successful name resolution of a host name

ipconfig

verifies the default gateway configured on a host

nslookup

verifies the route taken by a packet

Answer explanation

Refer to curriculum topic: 11.5.3

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two file attributes in the Windows environment? (Choose two.)

archive

security

details

general

read-only

Answer explanation

Refer to curriculum topic: 11.1.4The file attributes are read-only, archive, hidden, and system. Details, security, and general are tabs on the file Properties applet.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file server. A technician suspects that the group policy setting is incorrect. Which command can the technician use to verify the group policy settings?

gpupdate

runas

rstrui

tasklist

gpresult

Answer explanation

Refer to curriculum topic: 11.4.5 The functions of the listed commands are as follows:

runas - runs a program or tool with different permissions

rstrui - starts the System Restore utility

gpresult - displays group policy settings

gpupdate - refreshes group policy settings

tasklist - displays currently running applications

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

After solving a problem on a computer, a technician checks the event log to ensure that there are no new error messages. At which step of the troubleshooting process is this action taking place?

Determine an exact cause.

Document the findings.

Verify the solution and full system functionality.

Establish a theory of probable cause.

Answer explanation

Refer to curriculum topic: 11.7.1In this situation, the  probable cause has been identified and the exact cause has been acted upon. Documenting the findings is the last action in the process and happens after checking that the problem has been solved by the solution implemented.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?

C:\Application Data

C:\Program Files (x86)

C:\Program Files

C:\Users

Answer explanation

Refer to curriculum topic: 11.1.1The C:\users folder contains all the user profiles. The C:\Application Data folder contains application data related to all users. The 32 bit program files are located in the C:\Program Files(x86) folder while 64 bit program files are located in the C:\Program Files folder.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately?

Remote Assistance

administrative share

VPN

Remote Desktop

Answer explanation

Refer to curriculum topic: 11.5.5A Virtual Private Network (VPN) is used to connect remote sites together securely over a public network.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?