0% found this document useful (0 votes)
21 views6 pages

Module A

IC3 exam Module A

Uploaded by

nwj4mdtb9k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views6 pages

Module A

IC3 exam Module A

Uploaded by

nwj4mdtb9k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1)What are two possible uses of an Ethernet port on a laptop? (Choose two.

)
1. Connect the laptop to a wireless network.
2. Connect the laptop to USB devices.
3. Connect the laptop to a nearby router.
4. Connect the laptop to a local area network.

2)Which two notifications are examples of push notifications? (Choose 2)


1. An app installation completion message.
2. A new email message notice.
3. A web form field requirement message.
4. A login error.

3)Which three methods allow you to transfer files from a smartphone to a


desktop computer? (Choose three.)
1. Remove the phone's sim card and plug it into the computer.
2. Use a cloud service to synchronize files between the device, the cloud, and
the desktop computer.
3. Use an app on the smartphone to transfer files wirelessly from the device
to the desktop computer.
4. Connect the smartphone to the desktop computer with an Ethernet cable
and use the computer's file system to copy or move the files.
5. Connect the device to the desktop computer using a USB cable and use the
computer's file system to copy or move the files.

4)What is a disadvantage of a cellular - enabled tablet compared to a Wi - Fi only


tablet?
1. The tablet and data service cost more.
2. The tablet has less memory and a lower processing speed.
3. The tablet is heavier.
4. The tablet is unable to connect to Wi-Fi.

A disadvantage of a cellular-enabled tablet compared to a Wi-Fi-only tablet is:


The tablet and data service cost more:
Cellular-enabled tablets typically require an additional cost for cellular data
plans, whereas Wi-Fi-only tablets solely rely on Wi-Fi connections without the
need for separate data plans.

5)Which statement is true of online backups?


1. Online backups store everything on the cloud instead of using hardware
devices.
2. Online backups are the least secure method of backing up files.
3. Online backups are accessible on the Internet.
4. Online backups are the quickest form of backup.

The statement "Online backups are accessible on the Internet" is true.


Online backups are stored on remote servers accessed via the Internet, providing
convenience and accessibility from anywhere with an internet connection.

6)What are two advantages to securing a home wireless (Wi - Fi) network?
(Choose two.)
1. Extends the range of the network.
2. Significantly increases bandwidth.
3. Data transfer will be encrypted.
4. Provides control over access to the network.

7)What is an advantage to using web apps or Software as a Service (SaaS ) as


opposed to using programs stored on a local
1. Cloud- based software is less complex to understand and use.
2. You only have a one-time fee to pay for the programs you use.
3. You will be using the most recent and reliable version of the software.
4. Your personal data and computer applications work together better in the
cloud.

8)What are three advantages of using a smartphone over a basic cellular phone?
(Choose three)
1. Send/Receive SMS Make video calls
2. Listen to music Use of email apps.
3. Advanced Internet browsing
4. Access voice mail

9)Which two statements are true regarding compressing files? (Choose )


1. Compressing files automatically indexes them for easier retrieval via
searches.
2. Compressing files by itself automatically encrypts them, providing a level
of security and privacy.
3. One can compress files within folders, preserving the file organization.
4. Compressing files reduces their size, speeding both upload and download
time.

10)Which two statements are true about Software as a Service (SaaS)? ( Choose
two.) A hybrid of web and local apps where
1. SaaS applications are hosted in the cloud. applications are provided by a vendor

2. Sometimes SaaS is referred to as on-demand software SaaS applications.


3. let users collaborate but not share information.
4. Updates are managed by the user.

11)Which two options might prevent a device from connecting to a specific


secure wireless (Wi-Fi) network? (Choose two)
1. The network password has changed.
2. There are more than eight devices connected to the router.
3. The network bandwidth is too high.
4. The wireless network card on the device is deactivated.
5. The presence of another wireless network.

12)What are two likely indicators that a website is a safe place to make a
purchase? (Choose two)
1. The website's URL begins with http ://site and there are good reviews
written on the homepage.
2. The website is a -known online store with a good reputation
3. The website asks users to send a private email with payment information
rather than transmitting information through the site.
4. The website has a detailed Privacy Statement and/or Terms and
Conditions Statement.

13)Which two operating systems are open source? (Choose two.)


1. Linux Which two operating systems are
2. Android proprietary? (Choose two)
3. Windows
1- iOS
2- Windows
14)What is the primary function of a cell phone's SIM card?
1. A SIM card provides the ability to transfer data wirelessly from a camera
or smartphone to another device.
2. A SIM card is used to expand the data storage capacity of a cell phone.
3. A SIM card ensures your upload and download speeds are equal.
4. A SIM card identifies the account holder of the phone.

The primary function of a cell phone's


SIM card is: "A SIM card identifies the account holder of the phone." It contains
information necessary to authenticate the subscriber's identity and account on a
mobile network.

15)Currently, what is the fastest type of cell phone network?


1. 4G
2. 4G LTE
3. LTE

16)You created a Word document on your computer and would like to place it in
your OneDrive online storageHow is this done?
1. Upload it to your Google Drive account 4
2. Save as a file in your local OneDrive folder 1
3. Open a new document with Word Online 3
4. Drag it to your OneNote Notebook 2

To place a Word document in your OneDrive online storage, you can follow these
steps:
Save as a file in your local OneDrive folder Locate the file on your computer,
then drag and drop it into your OneDrive folder. This folder is usually synced
with your OneDrive online storage, so the file will automatically upload to your
OneDrive account.

17)Which three steps need to be completed in order to connect two Bluetooth


enabled devices? (Choose three)
1. Ensure devices are discoverable
2. Ensure no existing connections
3. Activate Bluetooth
4. Pair the devices

18)What is an advantage of a cellular network over a wired or Wi-Fi network?


1. Accessible from more places.
2. Significantly faster connection speeds.
3. Less likely to be hacked.
4. More reliable inside large buildings.

An advantage of a cellular network over a wired or Wi-Fi network is: "Accessible


from more places." Cellular networks provide coverage in a wider range of
locations, allowing access to network services in remote or less densely
populated areas where wired or Wi-Fi networks might not be available.

19)In which two situations should you avoid transferring files over a public
wireless network? ( Choose two .)
1. Two devices or computers are using different operating systems.
2. The information in the files is private or sensitive.
3. The size of the file(s) to be transferred is large.
4. The wireless network has other users connected to it.

20)Which are two typical cloud activities?


(Choose two.)
1. Store your photo on a desktop app.
2. Upload a photo to Instagram.
3. Save a file to an encrypted USB drive.
4. Save a file to Google Drive

21)Closing an application will free memory in which hardware component?


1. Random Access Memory (RAM)
2. Hard Drive
3. Application Interface Card (AIC)
4. Read Only Memory (ROM )
Closing an application will free memory in the Random Access Memory (RAM).
When an application is closed, the memory it was using in the RAM is released,
allowing that space to be available for other applications or processes.

22)What is a Virtual Private Network (VPN)?


1. A network that allows for virtual connections without authentication.
2. A secure and encrypted wireless network.
3. A network that extends a secure or private connection over a public
network.
4. A network that is private because it is setup for a single person in a
building.

A Virtual Private Network (VPN) is: "A network that extends a secure or private
connection over a public network." It creates a secure and encrypted connection,
often used to ensure privacy and security while accessing the internet or
connecting to a private network from a remote location over a public network
like the internet.

23)What are the two benefits of using anti-virus software? (Choose two.)
1. Eliminates and removes most viruses.
2. Prevents most known viruses from harming your computer.
3. Blocks hackers from entering your computer.
4. Does not allow any viruses or malware onto your computer.

24)What can affect your Internet connection's bandwidth? (Choose three)


1. Cable modem
2. Amount of memory
3. Wireless router
4. Internet service provider
5. Processor

25)What are three characteristics of a phishing email? (Choose three)


1. You will be directed to a phony website.
2. It will appear to come from a well-known source.
3. It will threaten you with fake alerts.
4. You can identify the true sender by opening the attachment is evidence
that your friend's email account has been hacked.

26) What type of organization would benefit the most from using cellular
enabled tablets over standard tablets?
1. A grocery store.
2. A flower delivery service.
3. A library.
4. A small restaurant.
27)What are three ways organizations can use the cloud to collaborate?
(Choose three.)
1. Hold a Web conference.
2. Use of a Web-based Customer Relationship Management (CRM) tool.
3. Share files within the local area network.
4. Simultaneously working on a document.
5. Establish a conference call using phone lines.

28) What are two valid reasons for you to zip files? (Choose two.)
1. To flag a file to let the system know it is ready to be archived.
2. To keep the organization of a set of files or directories when sharing
with others.
3. To perform routine backups of data and files.
4. To reduce the size of files to be sent to others online.

29) What are two benefits of using a web application instead of a desktop
application? (Choose two.)
1. Web applications do not need to be installed.
2. Web applications perform better than desktop applications.
3. Web applications are accessible outside the office.
4. Web applications are confined to a physical location.
5. Web applications require significantly less network connectivity.

30) Which three types of networks wit a cedular-enabled tablet allow you to
connect to without additional cost? (Choose three )
1. An Ethernet network.
2. A public witeless network
3. A secure wireless network
4. A home wireless network
5. A cellular network

31) In which three ways might identify that occur through social media sites?
(Choose three )
1. By responding to am email requesting you to update account
information
2. By using low-level privacy settings.
3. By reading email.
4. By watching a video in your newsfeed
5. By accepting invitations from people you do not know.

You might also like