Search Header Logo

Hardware WebXam

Authored by Zachary Gaietto

Computers

9th - 12th Grade

Used 7+ times

Hardware WebXam
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You are helping your friend troubleshoot his home network because this network speed has diminished. He recently turned his home into a smart home and his family cannot stream high-definition video anymore. What is most likely the cause?

Internet service provider outage
too much bandwidth from provider
smart devices are demanding too much energy
too many Network connected devices

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which has a solid copper center core and an outer dielectric insulator and a metallic Shield?

Shielded twisted pair
coaxial cable
unshielded twisted pair
single core fiber optic

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a method of verifying whether a computer can function within expected performance standards?

Bottom up
benchmarking
troubleshooting
needs analysis

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You have purchased a new printer and your computer is not automatically finding the drivers. Where would you go to find the proper drivers for the printer?

Operating systems website
social media website
printer manufacturer's website
computer manufacturer's website

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You work as an IT administrator. Your company has just purchased a new division. Your boss has tasked you with physically securing and tracking their equipment. Employees in the new division all use the same make and model laptop and they work with highly sensitive consumer medical data. During your equipment audit, you discover some Hardware that is unaccounted for and missing from the building. What is the best way to prevent unauthorized access to the office?

Install security cameras
install keypad entry for all Doors
Implement sign in sheet process
place standard key lock in each door

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You work as an IT administrator. Your company has just purchased a new division. Your boss has tasked you with physically securing and tracking their equipment. Employees in the new division all use the same make and model laptop and they work with highly sensitive consumer medical data. During your equipment audit, you discover some Hardware that is unaccounted for and missing from the building.What is the best way to audit the remaining laptops

use serial numbers and asset tags on the devices
use name tags on the devices
tell employees to take home their laptops daily
tell employees to leave devices at their desks

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You have been asked to write a software program to sell products for a commercial client. Your coding skills are not very strong, so you decide to use an online development tool. You determine that customer transactions will be felicitated by a third-party payment processor framework. At what point in the development process should you consider end user security?

After all  testing is completed
during every step of the process
commercial client is responsible for customer security
It is solely the responsibility of the third-party processor

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?