Q.1
Skype is a ________.
  • crowdfunding app
  • Voice over IP service
  • Social network
  • Wi-fi hotspot
Q.2
Velocity is both ____ and _____.
  • speed , direction
  • direction, mass
  • volume, density
  • direction, magnitude
Q.3
What stage comes first when planning a new system?
  • Design test data results.
  • Configure software interface.
  • Implement maintenance schedule.
  • Analyze users' needs.
Q.4
What is the command line to display a computer's IP address?
  • ShowIP.
  • ConfigIP.
  • IPconfig.
  • IPshow.
Q.5
What method of user training will cause the least distribution to the operation of a business?
  • Phased upgrade.
  • Simultaneous upgrade.
  • Virtual upgrade.
  • Sandboxed upgrade.
Q.6
What application is used for troubleshooting in Microsoft Windows?
  • Scandisk.
  • Check-disk.
  • SAGE
  • AOL
Q.7
What is a correct IT helpdesk procedure?
  • To deal with important queries only.
  • To log calls with major problems.
  • To write a detailed report on all calls received.
  • To log all calls received.
Q.8
What is a stage in the production of a risk assessment?
  • Ensure loose cables are secured.
  • Estimate the impact of the hazard.
  • Conduct environmental impact study.
  • Circulate fire safety policy.
Q.9
Which definition best describes active listening?
  • taking notes whilst communicating.
  • Making eye contact whilst listening.
  • Concentrating on more than one person talking.
  • Ignoring the person talking to you.
Q.10
What is a type of email protocol?
  • NTP.
  • SQLs.
  • DHCP.
  • POP.
Q.11
What tool is a common electrical testing device?
  • A circuit breaker.
  • A soldering iron.
  • A multi-meter.
  • An oscilloscope.
Q.12
What is legacy software?
  • It is open source.
  • It is developed in- house.
  • It belongs to the manufacturer.
  • It is older or non-current.
Q.13
What is primary purpose of user training?
  • It provides a needed analysis.
  • It generates reliable test data.
  • It compiles with installation directives.
  • It ensures the correct operation of software.
Q.14
What software issue will prevent a user from printing a web page?
  • An incorrect log-in
  • A faulty browser plug-in.
  • An out of data device driver.
  • A forgotten password.
Q.15
What action can be carried out to minimize data theft?
  • Fix Kingston locks.
  • Configure firewall.
  • Install anti-virus software.
  • Encrypt operating systems.
Q.16
How does data flow in a ring network?
  • It moves through a central hub.
  • It waits for a network token before moving.
  • It may collide with data from other hosts.
  • It passes onto a cable with terminators at both ends.
Q.17
What is a key benefits of using a commercial application to manage an organization network?
  • It can be easily adapted by users.
  • It has been rigorously tested.
  • It is free of licensing restrictions.
  • It works across all operating systems.
Q.18
What definition best describes Linux?
  • It can install Windows based software.
  • It is open source and can be modified.
  • There is only one version that never needs updating.
  • It is easy to use for inexperienced developers.
Q.19
What is a denial of service attack?
  • It uses the resources of a computer for a malicious puposes.
  • It infects a computer with a range of viruses.
  • It prevents a computer from being used.
  • It manipulates the data stored on a computer.
Q.20
In networking, what is the purpose of a bridge?
  • It joins 4 networks together.
  • It joins two cables together.
  • It joins two networks together.
  • It divides the storage capacity of a network.
0 h : 0 m : 1 s