IT Essentials (ITE v6.0) Pretest Exam Answers


  1. What is an advantage of purchasing a tablet rather than a laptop computer?
    • wireless capability
    • reduced size/weight
    • quicker Internet access
    • easier typing capabilities
    • faster processing speed
    • increased number of possible attached devices
  2. What is a possible hardware upgrade that can be used to add more storage space to a modern smartphone?
    • microSD
    • hard disk
    • CompactFlash
    • USB flash drive
  3. Which component would be located inside the computer case?
    • monitor
    • printer
    • RAM
    • USB hard drive
  4. Which two devices are output devices? (Choose two.)
    • keyboard
    • monitor
    • mouse
    • printer
    • video camera
  5. Which hardware component must be installed in a PC to provide network connectivity?
    • PCI bus
    • serial port
    • network interface
    • expansion slot
  6. Refer to the exhibit. What does the symbol shown represent?
    ITE Pretest Exam Answer v6 003
    ITE Pretest Exam Answer v6 003
    • a folder which is a collection of subfolders and files
    • a Word document stored on the disk
    • a database file
    • a program that is used to navigate the files stored on a disk
  7. How can a section of text in a Notepad document be highlighted to be copied to another location within the document?
    • click the Copy icon, then drag the pointer over the text to be copied
    • double-click the words to be copied
    • move the pointer to the start of the text to be copied, press the Windows key, move the pointer to the end of the text, and click the Copy icon
    • click at the start of the text, drag the pointer to the end of the text, then release the button
  8. Refer to the exhibit. Why is Undo in black, while the other items are in gray?
    • Commands are shown in black, while edit operations are shown in gray.
    • Groups of menu items alternate black and gray to make them easier to find.
    • There are no operations to undo, so this operation is unavailable.
    • There is no text to cut, copy, paste, or delete, so these operations are unavailable.
  9. Refer to the exhibit. What caused the pictured menu to appear on the user’s screen?
    ITE Pretest Exam Answer v6 001
    ITE Pretest Exam Answer v6 001
    • The user double-clicked a desktop icon.
    • The user right-clicked a desktop icon.
    • The user highlighted an icon and then pressed Enter.
    • The user highlighted an icon and then pressed the Esc key.
  10. Which two operating systems are used in smartphones? (Choose two.)
    • iOS
    • OS X
    • Android
    • Snow Leopard
    • Windows 7
  11. A student purchased a new WiFi enabled tablet computer. What is required to connect this device to the Internet?
    • a 3G or 4G network
    • a telephone company
    • a wireless LAN
    • a mobile phone service provider
  12. Which two general precautions should be followed when using hand tools? (Choose two.)
    • Use tools that are the right size and right type.
    • Always carry pointed tools by your side with the pointed end up.
    • Keep cutting tools sharp and in good condition.
    • Carry the tools used most often in your pockets.
  13. Which precaution should be taken before any electronic component is removed from a computer system?
    • place the computer on an insulating mat
    • make sure that the computer is unplugged
    • attach a grounding wire to the case
    • use only approved metal tools
  14. Which problem could occur if a screwdriver is used to pry the top off of a computer case?
    • The screwdriver could slip and cause harm to the technician or to nearby individuals.
    • The screwdriver could cause deformation to the adapter cards.
    • The screwdriver could break and short out the motherboard.
    • The screwdriver could scratch the case, causing the motherboard to short circuit.
  15. What would be the most environmentally friendly procedure to consider in the design of a server room?
    • Share one monitor with several servers.
    • Implement power line conditioning and redundancy.
    • Filter the air in the room.
    • Maintain a constant room temperature throughout the year.
  16. In the event that a mobile device is lost or stolen, which two procedures can help protect private information that is stored on the device? (Choose two.)
    • Use a secure email client.
    • Encrypt the storage media.
    • Enable the device access password.
    • Turn off the device when it is not in use.
    • Turn off the wireless connection when it is not in use.
  17. What password would be considered a strong password?
    • password123
    • Excellent
    • 18273645
    • Il0veMyj0b
  18. The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed?
    • 8
    • 10
    • 12
    • 15
  19. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians that each work the same amount of time to perform the refresh?
    • 5 hours
    • 8 hours
    • 10 hours
    • 12 hours
  20. A classmate is creating an imaginary language. Here are some words the classmate has created:
    stalopheah means good day
    stalopjink means goodness
    drahplunk means light house
    flinsjink means happiness
    plunkgrecki means house fly

    What would your classmate use to mean “daylight”?
    • jinkstalop
    • stalopflins
    • heahflins
    • heahdrah
    • drahjink
    • heahgrecki
  21. A user is looking for a wireless headphone for listening to songs stored on a smartphone. What wireless technology would the headphone use?
    • 3G/4G
    • Wi-Fi
    • infrared
    • Bluetooth
  22. A customer connects a smartphone to a cloud service operated by the service provider. What can the cloud service provide to the customer?
    • phone calls
    • remote print
    • data storage
    • device troubleshooting
  23. What is the default subnet mask for the IP address 172.16.4.22?
    • 255.255.255.255
    • 255.255.255.0
    • 255.255.0.0
    • 255.0.0.0
  24. Which network protocol is used to automatically assign an IP address to a computer on a network?
    • FTP
    • DHCP
    • ICMP
    • SMTP
    • APIPA
  25. Match the icon to its likely associated use. (Not all options are used.)
    • Question
      ITE Pretest Exam v6 Question 001
      ITE Pretest Exam v6 Question 001
    • Answer
      ITE Pretest Exam v6 Answer 001
      ITE Pretest Exam v6 Answer 001
  26. Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?
    • DVI
    • HDMI
    • PS/2
    • DB-15
  27. Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?
    • F1
    • F8
    • F12
    • Alt-Z
    • Windows key
  28. A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?
    • Computer Management
    • Device Manager
    • My Computer
    • System Tools
  29. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?
    • Task Manager
    • Add or Remove Programs
    • Event Viewer
    • System Restore
  30. Which action can reduce the risk of ESD damage when computer equipment is being worked on?
    • working on a grounded antistatic mat
    • lowering the humidity level in the work area
    • moving cordless phones away from the work area
    • keeping the computer plugged into a surge protector
  31. When should a technician avoid wearing an antistatic wrist strap?
    • when installing RAM
    • when replacing a power supply unit
    • when installing a hard drive
    • when opening a computer case
  32. What can be tested with a digital multimeter?
    • wireless signal strength and access point positioning
    • basic functionality of computer ports
    • copper cable location
    • quality of electricity in computer components
  33. A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?
    • Grant the users read permissions on all files.
    • Give the users administrator rights on their computers.
    • Make the users members of a group called Backup Operators.
    • Check the Folder is Ready for Archiving box in the properties of each folder.
  34. What characterizes a DDoS attack?
    • Many hosts participate in a coordinated attack.
    • Infected computers are called daemons.
    • It is easy to identify the source of the attack.
    • All hosts must be in the same geographic area.
  35. Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled?
    • Aim just above the flame, squeeze the lever, and sweep from side to side.
    • Aim at the base of the flame, squeeze the lever, and sweep from side to side.
    • Aim directly at the center of the flame, squeeze the lever, and sweep from side to side.
    • Aim at the base of the flame, squeeze the lever, and sweep from the base to the top of the flame.
    • Aim just above the flame, squeeze the lever, and sweep from the top to the base of the flame.
  36. What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss?
    • surge suppressor
    • uninterruptible power supply
    • standby power supply
    • power inverter
  37. Which measure can help control RFI effects on wireless networks?
    • Ensure the humidity and temperature levels are set as low as possible.
    • Ensure the number of wireless NICs exceeds the number of wireless phones.
    • Ensure the wireless network is on a different frequency than the offending source.
    • Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
  38. A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
    • It cannot communicate outside its own network.
    • It can communicate on the local network as well as on the Internet.
    • It can communicate with networks inside a particular company with subnets.
    • It has a public IP address that has been translated to a private IP address.
  39. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
    • 22
    • 53
    • 80
    • 143
    • 443
  40. A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
    • The total cost of the new solution is considerably lower.
    • Data is more secure in the event of hardware failures.
    • Individual users are in control of their own computers and network resources.
    • Data resources and access are centrally controlled.
    • Personnel costs are lower because a dedicated network administrator is no longer necessary.

Comments

Popular posts from this blog

IT Essentials (ITE v6.0) Chapter 2 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 3 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 8 Exam Answers