Match the term with the respective description

IT Questions BankCategory: IT Essentials 8Match the term with the respective description

Case 1:
Match the term with the respective description

Explanation: Place the options in the following order:

A chip designed to secure hardware by storing encryption keys, digital certificates, passwords and data. TPM
A UEFI standard that specifies the OS that is trusted by the manufacturer. Secure boot
Updating an EEPROM boot chip without opening the computer. Flashing the BIOS
A security feature that reports device information and location to a monitoring center. LoJack

Case 2:
Match the term with the respective description.

Explanation: Place the options in the following order:

Interference from generators and lightning. Noise
Sudden increase in voltage exceeding 100% of the normal voltage on a line. Spike
Dramatic increase in voltage above the normal flow of electrical current. Power surge
Supplies a consistent level of electrical power to a computer or other device. Uninterrupted power supply (UPS)
Provides a backup battery to supply power when the incoming voltage drops below the normal-Stand. by power supply (STP)

Case 3:
Match the term with the respective description.

Explanation: Place the options in the following order:

This comprises of multiple pieces of code are executed simultaneously in the CPU. Hyper-Threading
This is a high-speed connection between the CPU and the Northbridge chip. Hyper-Transport
This is a technique used to make a processor work at a faster speed than its original specification. Power surge
Supplies a consistent level of electrical power to a computer or other device. Uninterrupted power supply (UPS)
Provides a backup battery to supply power when the incoming voltage drops below the normal-Stand by power supply (STP)

Exam with this question: IT Essentials v8 Chapter 3 Check Your Understanding

Case 4:

Match the term with the respective description.

Explanation: Place the options in the following order:

Uses a special mobile OS and has small screen sizes averaging 5 inches. Touch screens with no physical keyboard. Bluetooth, Wi-Fi and cellular data capability, Software apps are downloadable from app stores. Smartphone
Runs a mobile OS. Larger touch screens with most being about 8 inches diagonally. Runs apps downloadable from an app store. Have Wi-Fi and Bluetooth connectivity. Some have cellular capability. Tablet
A wearable device with a very small touchscreen display. Runs a special OS and apps. Offers sensors that exchange data with a smartphone over Bluetooth. Often includes body monitoring and fitness tracking capability. May include GPS, Wi-Fi and limited cellular data connectivity. Some have cellular capability. Smartwatch
Special purpose wearable device that monitors heart function and physical activity. USB connectivity and may include Bluetooth. Higher-end models may have Wi-Fi and GPS. Fitness-Tracker
Special purpose device with a 6 inch or larger black and white display optimized for reading text. May have Bluetooth, Wi-fi and limited cellular data capability. E-reader
Can run on battery or be plugged in. Usually runs a full OS and can run desktop software. CPU power, RAM resources and fixed desktop storage are similar to desktop computers. RAM and storage are upgradeable. Laptop

Case 5:

Match the term with the respective description.

Explanation: Place the options in the following order:

This uses a fluorescent backlight to illuminate the display. LCD
This converts the touch actions into digitized signals. Digitizer
This converts direct current into alternating current. Inverter
This uses individually lit pixels. OLED
This uses fluorescent tubes that are connected to an inverter used to convert DC to AC. CCFL

Exam with this question: IT Essentials v8 Chapter 7 Check Your Understanding

Case 6:

Match the term with the respective description.

Explanation: Place the options in the following order:

To avoid creating too much traffic at a single website, some manufacturers distribute their signature files for download from multiple download sites. Mirrors
Designed to invade privacy, steal information, damage the computer, delete, or corrupt data. Malware
Always download these from the manufacturer's website to make sure the update is authentic and not corrupted by malware. Signature Files
Antivirus programs are commonly referred to as this because many of them can also detect and block Trojans, rootkits, ransomware, spyware, keyloggers, and adware programs. Anti-Malware
Many anti-malware programs allow you to start in this mode. This prevents most drivers from loading. Safe Mode

Case 7:

Match the term with the respective description.

Explanation: Place the options in the following order:

Network-based solution using a home or small office wireless router. These devices not only provide routing and WI-FI services, but they also provide NAT, DHCP, and firewall services. SOHO
Using software such as Windows Defender Firewall. Host Based
Used to disable or re-enable the firewall or change notifications for a network. Turn Windows Defender Firewall on or off
Applied to incoming internet traffic and traffic leaving your computer going to the network. These rules can specify ports, protocols, programs, services, users, or computers. Inbound and Outbound Rules
Secure traffic between two computers. It requires that both computers have the same rules defined and enabled. Connection Security Rules

Exam with this question: IT Essentials v8 Chapter 13 Check Your Understanding

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments