Search Header Logo

Module 9 2/2 Network Concepts and Operating Systems

Authored by AA :

Computers

10th Grade

Used 3+ times

Module 9 2/2 Network Concepts and Operating Systems
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your mobile device is displaying messages informing you that your device is infected with malware. The instructions tell you to install another app to properly remove the malware. What should you do?

Back up all user data and perform a factory reset.

Go ahead and install the app to clean the device.

Follow the instructions in the message and verify the app site is legitimate.

Disregard the message and check for a compromised app.

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Your company wants to purchase a device that will allow it to give customers a 3D tour of its facility. What kind of device would you recommend for this type of 3D tour?

Mobile VR headset

AR headset

Tethered VR headset

No current technology will allow a 3D tour.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?

SSH

VPN

IMEI

POP3

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet?

Google

Yahoo

OneDrive

iCloud

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process?

Enter the pin code.

Discover the device.

Sign in to Bluetooth.

Test the connection.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones?

POP3

IMAP

VPN

Bluetooth

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices' security certificates. What type of security does the cloud-base service employ?

Mutual authentication

VPN

IMAP

Tethering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?