Documente Academic
Documente Profesional
Documente Cultură
Computer Technician (Office)
Computer Technician (Office)
Select from the list the 4 options that answer the following question. In
addition to the connection data, what network parameters can be configured when
connecting a computer to a wireless network?
Server DNS
Door from link
Mask from subnet
IP Address
According to the definition of local area network, reflect and choose the
correct answer. There are 6 computers in an office. 3 are connected to modem-router
A and 3 are connected to modem-router B. How many local networks are there? 2,
because each modem creates its own local network
If a local network works with IP addresses just like the Internet, is it possible
to access a web server without connecting to the Internet?
Yes, it is possibleif the server is connected to the same local network and its IP
address is known.
For wired or cabled networking, the devices are equipped with ports marked
with the network symbol or labeled with the acronym LAN. These ports are called:
Ethernet
Level 2
Test 1
You want to register on a social network to communicate and keep in touch
with friends and family, which feature of these networks allows you to manage the
privacy of your identity?
Choose who can see my name or picture
To find information on the Internet efficiently, the best tools are search
engines. These are:
Websites
If you have 9 tabs with content pages of interest, but you are currently only
working with 4 of them, according to the good practices with tabs, what can you do
with the rest of the pages to avoid cluttering the window without losing the links?
Save pages in bookmarks for later reference and close those tabs
If you have already used the maximum of 6 simultaneous tabs but you want to
consult the link of a page that you think may be useful, what should you do?
Open the linkin a new tab and if useful save it in a bookmark before closing it.
Reflect on the concepts of domain and URL structure and choose the option
that correctly relates both concepts.
The domain is part of the URL by replacingthe IP of the server where the file
specified in the URL path is located with
Which of the following sites encrypt their content with an SSL certificate?
https://institucioneducativa.edu
Reflect on the concepts of domain and URL structure and choose the option
that correctly relates both concepts.
he domain is part of the URL by replacingthe IP of the server on which the file
specified in the URL path is placed with
According to the definitions of website, web page and hyperlink, which of the
following sentences is correct?
The link on this page points to a page on a different website.
A person visited a web page. 2 days later he used the history to search for the
page he had seen before. Since the page is useful to you, you visit it frequently and
each time you do so, you look it up in the history. What tool would save you from
havingto look it up in the history?
Markers
When you use a search engine, the browser stores information about your
activity that the search engine uses to provide you with more accurate results
according to the user's "preferences". However, sometimes this can backfire. To
avoid situations where results are influenced by "preferences", you must:
Activate incognito mode
What keyboard shortcut should you use to close tabs that you do NOT use
efficiently?
If you are using the web browser and you need to visit a web page without
leaving the page you have open, which browser feature will allow you to keep both
pages open in the same window?
Tabbed browsing
If you wish to register on a website that requests some personal data, what
document should you consult or request on the site to make sure that your data will
NOT be disclosedor shared with other users or third parties?
Privacy Policy
Test 2
Marking unwanted messages with useless or fraudulent information helps e-
mail providers to identify and block potentially dangerous senders. This type of
message is also called:
Spam
When setting up an e-mail client, what type of protocol should you use if you
want to transfer messages to your local computer and delete them from the server?
POP
For the following message, what would be the subject line that clearly and
briefly describes the reason for the message?
"Dear user, we inform you that we have recently detected a series of attempts to
access your Social Network account with an incorrect password, these attempts were
made between 4 and 5pm on 01/01/2019, please verify that your account has not
beenbreached. Greetings."
Unauthorized access attempt
Which application will allow you to use and manage multiple emailaccounts
from the same interface?
E-mail client
Due to the large number of users, when you create an email account it is likely
that the first name you choose will be busy. What should you do if this happens?
Add a short nickname or number
In which field should you add the addresses of the recipients of the following
message? "Dear employees, we hereby inform you that next Tuesday we will not be
working in this office for maintenance reasons. Have a good afternoon."
All addresses in the recipient field (To)
When you manage an e-mail account, it is common that after a certain time
the amount of messages makes it difficult to search and consult old messages.
According to good practices in the use of mail, which measure makes it easier to
search for messages?
Organizing messages in folders and marking them with labels
Test 3
Which cloud-based service allows you to create files and modify them
collaboratively with otherusers?
Online file editing
Which cloud service should you use to schedule events and set remindersby
date and time?
Calendar
Why should you NOT upload files with sensitive information such as financial
or personal data?
Because, like any Internet-based service, it is exposed tocomputer threatsand
information can be stolen and used for malicious purposes.
If the collaborative editing of a file that you must perform to ensure the
security of the information has been completed , you must: Remove any permissions
that are no longer needed.
From the following list, select the 3 cloud-based services that are aimed at
facilitating communication.
Storage
Contacts/Calendar
Directory
Why do cloud storage services allow users to choose what kind of permission
they want to grant when sharingfiles?
To prevent unauthorized modifications to files
If you are going to use a cloud form service and have NO idea of the form
format you are going to create, this service allows you to: Choose a template from a
catalog
Which cloud-based service allows you to create files and modify them
collaboratively withother users?
Document editing
If the amount of files is very large, what feature will help you manage storage
space easily?
Organization in folders
It orders the steps of the procedure for uploading files in the traditional way to a
cloud storage service.
1. Choose the file
2. Make click at "load" o "new"
3. Access a the location at the window from charge
4. Select file
5. Make click at button "open"
6. Verify successful loading
It orders the steps for uploading files using the drag-and-drop function of a cloud
storage service.
1. Locate the file a upload at the explorer
2. Access at service storage at the browser
3. Position both windows at parallel
4. Make click sustained at the file from explorer
5. Drag file a the window from browser
6. Verify successful loading
When sharing a form with the users you want to survey, they may doubt or get
a negative idea of the purpose of the survey, so you must inform them of this purpose
in the form:
Description
Which cloud service allows you to upload and download files from any device
and share them with other users?
Storage
Which of the following is a risk you may be exposed to when sharing files
with peopleyou do NOT trust?
Information theft
If in your form you want your respondents to choose their country of birth,
what type of question should you create?
Drop-down list
Test 4
In which tab of the toolbar are the options for adding the header and footer?
Insert
Which of the following is an option you can choose when you display the
insert header menu?
Three columns
Which text fitting option allows the image to be integrated with the text by
having the text surround it?
Strait
Whenever you add content to the document, page numbers can be altered.
Therefore, it is important that you update the index. How can you update the auto-
generated table of contents in the word processor?
Select the indexand use the context menu to select the option "update fields".
You can add page breaks from the "pages" section of the "insert" tab, this
allows you to leave the remaining space blank and start on a new sheet. Another way
to do it is with the keyboard shortcut: Ctrl+Enter
In which tab of the toolbar are the options for adding images and geometric
shapes?
Insert
If the length of the data in a column is greater or less than the width of the
column, how can you make an automatic adjustment?
Dragging the marker between column labels
What happens if you enter the operation "=5/3" i.e. 5 divided by 3 as data in a
cell?
The cell shows the result in number format of the operation 5 divided by 3.
What happens if in an unformatted cell you enter the operation 10*2", i.e. 10
multiplied by 2?
l "*" is considered as acharacter and the cell takes the numbers as text.
eand them to the left
From the list below, select 4 cell formats that are available in the spreadsheets,
in addition to "number".
Currency
Percentage
Time
Date
What happens if you drag the lower right corner of a selected cell whose
content is a number into the lower three cells?
Its content is replicated in them
What happens if a cell with text formatting is given the valor 10.5? Cell
retains text formatting with left-aligned data
What happens if the symbol "$" and the number 18 are entered manually in a
currency formatted cell?
Nothing happens because the currency format recognizes the data with or without a
symbol.
What happens if a mathematical formula is performed between a cell
reference and a whole number (e.g. "=A1*5")?
If the content of cell "A1" is text, the result will be a value error.
What formula will the third row have if a vertical series is filled in starting
from a cell with a formula such as "=B2+C2"?
"=B5+C5"
What happens if a vertical series is filled and with the same cell selection a
horizontal fill is made?
Vertical series content is replicated horizontally
The presentation editor has predefined graphic styles that are applied to the
entire presentation automatically. To access these you must search:
The themes option in the design tab of the toolbar
The presentation editor allows you to insert videos from the Internet, for this
it is necessary:
Know the URL of the video.
According to the considerations you should take into account when choosing
a style, is the following example correct?
No, because the text blends into the background.
If you want to modify the graphical appearance and style of the presentation,
which tabs of the toolbar contain the options for this? Home, Insert and Layout
For slides with little content, tools can be used to make them attractive to the
audience, such as adding an eye-catching background. What should be done if the
background of a slide makes it difficult to read the text? Adding effects to text
Level 3
Test 1
Why are the forums NOT the best source of information to solve a compatibility
problem?
Because, even if they have solved the problem, the causes may be different and you
can't know if it will work for you.
If the peripheral continues to fail, sometimes a reboot may solve the problem,
this is due to the following reasons:
When theoperating system starts, it performs checks and, if it finds anomalies, tries
to fix them.
What are two preventive measures that should be taken before performing a
system reset?
Create a recovery drive for as long as the OS is functioning properly Periodically
back up files and documents
Why should you close other documents or programs while installing updates?
Because some programs make system-level changesthat can affect the operation of
other programs and cause errors.
Restore points are copies of the system so they take up considerable disk
space. What does the size of a restore point depend on?
From the number of applications and system configurations
What are two sources from which a device driver can be obtained?
From the manufacturer's website
From a disc included in the box
Test 2
If after visiting a suspicious web page, you suddenly experience abnormal
slowness on your computer even if you have few or no programs open, it is possible
that a remote code is using your computer to perform cryptomining, this type of
malware is known as a "cryptomining malware":
Exploit
There are a wide variety of antimalware vendors. What procedure should you
follow to choose one?
Search for comparisons and references on the Internet.
When a computer on a local network is infected and within a short time other
computers on the same network show the same problems and symptoms, it is likely
to be malware of the same type:
Propagation
What steps do you need to follow to access the operating system's native
security options?
Home -> Settings -> Update and Security -> Security
Select the two options that are symptoms of malware infection on a computer.
Windows are constantly opened withoutuser intervention
When opening the browser, excessive advertising is displayed
What procedure allows you to clean up your computer and prevent malware
from continuing to wreak havoc?
Restarting in fail-safe mode
Which of the following should you consider when replacing or upgrading the
cooling system?
Space required depending on the type of cooling
Select 2 pieces of equipment that are considered high performance for their
application.
Audiovisual production equipment
Gaming equipment
What components are the alternative if a cooling system is required for high
performance equipment?
Liquid cooling systems