Sunteți pe pagina 1din 19

Test 3

Select from the list the 4 options that answer the following question. In
addition to the connection data, what network parameters can be configured when
connecting a computer to a wireless network?
Server DNS
Door from link
Mask from subnet
IP Address

Why is it that despite the convenience and freedom offered by wireless


networks, wired connections are still used in many devices?
Due to the fact that cable transmission speed is still superior

How can I verify that the wireless connection is enabled or available?


Clicking onthe network icon in the taskbar will display a list of nearby networks.

Most modern computers have different ways of connecting to a network. One


of them is ethernet and the options can be accessed from the window:
Network and Internet configuration

According to the definition of local area network, reflect and choose the
correct answer. There are 6 computers in an office. 3 are connected to modem-router
A and 3 are connected to modem-router B. How many local networks are there? 2,
because each modem creates its own local network

Why is it that despite the convenience and freedom offered by wireless


networks, wired connections are still used in many devices?
Because the speed of cable transmission is still higher than the speed of cable
transmission

How can I verify that the wireless connection is enabled or available?


Clicking onthe network icon in the taskbar will display a list of nearby networks.
When networking equipment the cable can have 2 configurations. Cross
configuration allows 2 computers to be connected to each other, while a cable with
configuration is used to connect a computer to a modem:
Direct

Some wireless connection devices have protection to encrypt the connection,


in addition to the password, what information do you need to know in case you are
asked to connect?
Type of security

The manual configuration of network parameters is done in the


"properties"window of the Ethernet adapter, by double clicking on the option:
Internet Protocol version 4.

According to the definition of IP address, which of the following is a correct


IP address?
192.168.10.31

If a local network works with IP addresses just like the Internet, is it possible
to access a web server without connecting to the Internet?
Yes, it is possibleif the server is connected to the same local network and its IP
address is known.

According to the definition and characteristics of the modem-router,


selects the 4 functions included in this device.
Codify y decode the signal from internet
Separate the network local from internet
Interconnect devices by cable
terconnecting wireless devices

According to the definition of "default gateway", in a home network, to which


device does the IP address of the gateway belong?
To modem-router

For wired or cabled networking, the devices are equipped with ports marked
with the network symbol or labeled with the acronym LAN. These ports are called:
Ethernet

Level 2
Test 1
You want to register on a social network to communicate and keep in touch
with friends and family, which feature of these networks allows you to manage the
privacy of your identity?
Choose who can see my name or picture

To find information on the Internet efficiently, the best tools are search
engines. These are:
Websites

If you have 9 tabs with content pages of interest, but you are currently only
working with 4 of them, according to the good practices with tabs, what can you do
with the rest of the pages to avoid cluttering the window without losing the links?
Save pages in bookmarks for later reference and close those tabs

If you have already used the maximum of 6 simultaneous tabs but you want to
consult the link of a page that you think may be useful, what should you do?
Open the linkin a new tab and if useful save it in a bookmark before closing it.

Reflect on the concepts of domain and URL structure and choose the option
that correctly relates both concepts.
The domain is part of the URL by replacingthe IP of the server where the file
specified in the URL path is located with

What risk can you expose yourself to if a discussion or conversation with


another user of a social network goes on for too long?
To cybercriminals getting personal information

Which of the following sites encrypt their content with an SSL certificate?
https://institucioneducativa.edu

Reflect on the concepts of domain and URL structure and choose the option
that correctly relates both concepts.
he domain is part of the URL by replacingthe IP of the server on which the file
specified in the URL path is placed with

According to the definitions of website, web page and hyperlink, which of the
following sentences is correct?
The link on this page points to a page on a different website.

A person visited a web page. 2 days later he used the history to search for the
page he had seen before. Since the page is useful to you, you visit it frequently and
each time you do so, you look it up in the history. What tool would save you from
havingto look it up in the history?
Markers

When you use a search engine, the browser stores information about your
activity that the search engine uses to provide you with more accurate results
according to the user's "preferences". However, sometimes this can backfire. To
avoid situations where results are influenced by "preferences", you must:
Activate incognito mode

What keyboard shortcut should you use to close tabs that you do NOT use
efficiently?

If you are using the web browser and you need to visit a web page without
leaving the page you have open, which browser feature will allow you to keep both
pages open in the same window?
Tabbed browsing

If you wish to register on a website that requests some personal data, what
document should you consult or request on the site to make sure that your data will
NOT be disclosedor shared with other users or third parties?
Privacy Policy
Test 2
Marking unwanted messages with useless or fraudulent information helps e-
mail providers to identify and block potentially dangerous senders. This type of
message is also called:
Spam

When setting up an e-mail client, what type of protocol should you use if you
want to transfer messages to your local computer and delete them from the server?
POP

In the"juan.perez@micorreopersonal.com" account, what is the e-mail user


name?
juan.perez

According to best practices for creating a strong password, which of the


following is the best cue for creating a password?
Juanito 1997

For the following message, what would be the subject line that clearly and
briefly describes the reason for the message?
"Dear user, we inform you that we have recently detected a series of attempts to
access your Social Network account with an incorrect password, these attempts were
made between 4 and 5pm on 01/01/2019, please verify that your account has not
beenbreached. Greetings."
Unauthorized access attempt

Which of the following examples of e-mail accounts is correct according to


the parameters for defining user names?
juan_perez99@micorreo.mx

Which application will allow you to use and manage multiple emailaccounts
from the same interface?
E-mail client

When configuring a mail client manually, in addition to entering the address


of the IMAP/POP server, you must enter the address of the server responsible for
forwarding the messages sent by the user to the corresponding recipients. This server
is called:
SMTP
If you receive a message copied to other users, what should you do to reply
and add other people?
Use the "reply toall" option, add the additional address and notify the main recipient.

Due to the large number of users, when you create an email account it is likely
that the first name you choose will be busy. What should you do if this happens?
Add a short nickname or number

If a person must send a message to the supervisor of a company, the manager


must be informed about the issue and the supervisor is NOT required to reply to the
manager, in which fields should their respective mailing addresses be added?
Add the supervisor's email in the "to" field and the director's email in the "blind
copy" field.

In a mail interface, which elements allow the user to consult the


messages received?
Trays from e-mail
Bar from search
Reading section

In which field should you add the addresses of the recipients of the following
message? "Dear employees, we hereby inform you that next Tuesday we will not be
working in this office for maintenance reasons. Have a good afternoon."
All addresses in the recipient field (To)

When you manage an e-mail account, it is common that after a certain time
the amount of messages makes it difficult to search and consult old messages.
According to good practices in the use of mail, which measure makes it easier to
search for messages?
Organizing messages in folders and marking them with labels

Test 3
Which cloud-based service allows you to create files and modify them
collaboratively with otherusers?
Online file editing

Which cloud service should you use to schedule events and set remindersby
date and time?
Calendar

Why should you NOT upload files with sensitive information such as financial
or personal data?
Because, like any Internet-based service, it is exposed tocomputer threatsand
information can be stolen and used for malicious purposes.

If the collaborative editing of a file that you must perform to ensure the
security of the information has been completed , you must: Remove any permissions
that are no longer needed.

From the following list, select the 3 cloud-based services that are aimed at
facilitating communication.
Storage
Contacts/Calendar
Directory

Why do cloud storage services allow users to choose what kind of permission
they want to grant when sharingfiles?
To prevent unauthorized modifications to files

If you are going to use a cloud form service and have NO idea of the form
format you are going to create, this service allows you to: Choose a template from a
catalog

Which cloud-based service allows you to create files and modify them
collaboratively withother users?
Document editing

If the amount of files is very large, what feature will help you manage storage
space easily?
Organization in folders
It orders the steps of the procedure for uploading files in the traditional way to a
cloud storage service.
1. Choose the file
2. Make click at "load" o "new"
3. Access a the location at the window from charge
4. Select file
5. Make click at button "open"
6. Verify successful loading

It orders the steps for uploading files using the drag-and-drop function of a cloud
storage service.
1. Locate the file a upload at the explorer
2. Access at service storage at the browser
3. Position both windows at parallel
4. Make click sustained at the file from explorer
5. Drag file a the window from browser
6. Verify successful loading

When sharing a form with the users you want to survey, they may doubt or get
a negative idea of the purpose of the survey, so you must inform them of this purpose
in the form:
Description

Which cloud service allows you to upload and download files from any device
and share them with other users?
Storage

Which of the following is a risk you may be exposed to when sharing files
with peopleyou do NOT trust?
Information theft

If in your form you want your respondents to choose their country of birth,
what type of question should you create?
Drop-down list
Test 4
In which tab of the toolbar are the options for adding the header and footer?
Insert

When creating a long document, such as a book or a thesis, it is important to


visually highlight the headings, which you can do: Increasing the size and thickness
of the font.

Which of the following is an option you can choose when you display the
insert header menu?
Three columns

Which text fitting option allows the image to be integrated with the text by
having the text surround it?
Strait

Whenever you add content to the document, page numbers can be altered.
Therefore, it is important that you update the index. How can you update the auto-
generated table of contents in the word processor?
Select the indexand use the context menu to select the option "update fields".

What parameters must you specify to insert a table in a text document?


Number from rows
Number of columns

You can add page breaks from the "pages" section of the "insert" tab, this
allows you to leave the remaining space blank and start on a new sheet. Another way
to do it is with the keyboard shortcut: Ctrl+Enter

In which tab of the toolbar are the options for adding images and geometric
shapes?
Insert

By selecting a document element and displaying its context menu, we can


access a window that allows us to make specific settings and configurations of that
element, this window is called: Properties window
Test 5
According to the procedure for creating pivot tables, what should you do
before inserting the table?
Select range of cells to be included in the table

If the length of the data in a column is greater or less than the width of the
column, how can you make an automatic adjustment?
Dragging the marker between column labels

What happens if you enter the operation "=5/3" i.e. 5 divided by 3 as data in a
cell?
The cell shows the result in number format of the operation 5 divided by 3.

What happens if in an unformatted cell you enter the operation 10*2", i.e. 10
multiplied by 2?
l "*" is considered as acharacter and the cell takes the numbers as text.
eand them to the left

From the list below, select 4 cell formats that are available in the spreadsheets,
in addition to "number".
Currency
Percentage
Time
Date

What happens if you drag the lower right corner of a selected cell whose
content is a number into the lower three cells?
Its content is replicated in them

What happens if a cell with text formatting is given the valor 10.5? Cell
retains text formatting with left-aligned data

How can you prevent adjacent or empty cellsfrom being includedin a


spreadsheet printout? Setting the print area

What happens if the symbol "$" and the number 18 are entered manually in a
currency formatted cell?
Nothing happens because the currency format recognizes the data with or without a
symbol.
What happens if a mathematical formula is performed between a cell
reference and a whole number (e.g. "=A1*5")?
If the content of cell "A1" is text, the result will be a value error.

Which option in the spreadsheets allows you to preview the information as it


will look on a printout?
Print format

What formula will the third row have if a vertical series is filled in starting
from a cell with a formula such as "=B2+C2"?
"=B5+C5"

What happens if a mathematical formula is performed between a cell


reference and a whole number (e.g. "=A1*5")?
If the content ofcell "A1" is a number, the result of the operation is displayed.

What happens if a vertical series is filled and with the same cell selection a
horizontal fill is made?
Vertical series content is replicated horizontally

What should you do to use autofill to create a series of consecutive numbers


or letters?
Filling the first two cells of the series
Test 6
In addition to images and shapes, which of the following is a type of illustration
thatcan be added to a presentation?
3D models

A slide that appears with a blur refers to a blurring effect: Animation

The presentation editor has predefined graphic styles that are applied to the
entire presentation automatically. To access these you must search:
The themes option in the design tab of the toolbar

The presentation editor allows you to insert videos from the Internet, for this
it is necessary:
Know the URL of the video.

Select the 3 types of animation available in the toolbar.


Entrance
Emphasis
Output

Some slide layouts include a shortcut to add multimedia content, if NOT, it


can be used:
The "insert video" button in the "multimedia" section of the "insert" tab.

When youadd a transition effect you can adjust it:


The duration

According to the considerations you should take into account when choosing
a style, is the following example correct?
No, because the text blends into the background.

What happens if during a presentation the presentation is interrupted and the


F5 key is pressed to replay the presentation?
The presentation will be played from the beginning.

If you want to modify the graphical appearance and style of the presentation,
which tabs of the toolbar contain the options for this? Home, Insert and Layout

For slides with little content, tools can be used to make them attractive to the
audience, such as adding an eye-catching background. What should be done if the
background of a slide makes it difficult to read the text? Adding effects to text
Level 3
Test 1
Why are the forums NOT the best source of information to solve a compatibility
problem?
Because, even if they have solved the problem, the causes may be different and you
can't know if it will work for you.

If the peripheral continues to fail, sometimes a reboot may solve the problem,
this is due to the following reasons:
When theoperating system starts, it performs checks and, if it finds anomalies, tries
to fix them.

What are two preventive measures that should be taken before performing a
system reset?
Create a recovery drive for as long as the OS is functioning properly Periodically
back up files and documents

What does the operating system reset consist of?


User response:
To return the operating system to its original factory state

What problem can the drivers of a peripheral device present?


Operating system incompatibility

Is it necessary to restart the computer whenever a program update is installed?


No, but it allowsthe operating system toassimilate the new version and settings.

Is it necessary to restart the computer whenever a program update is installed?


No, but it allowsthe operating system toassimilate the new version and settings.

If a program has compatibility problems, can a rollback be done with a restore


point?
Yes, becauseprevious versions of the operating system and programs are restored.
What is the disadvantage of restore points as a system recovery method?
You never know when you will need to restore your computer, so you may not have
a restore point when you need it.

Why should you close other documents or programs while installing updates?
Because some programs make system-level changesthat can affect the operation of
other programs and cause errors.

What are system restore points useful for?


To recover the system and applications from problems in an easy way.

What problem can thes drivers of a peripheral device present? Operating


system incompatibility

Restore points are copies of the system so they take up considerable disk
space. What does the size of a restore point depend on?
From the number of applications and system configurations

What should you do if the device driver or software has undergone


modifications thatcaused the device to stop working?
Reinstall the software

What are two sources from which a device driver can be obtained?
From the manufacturer's website
From a disc included in the box
Test 2
If after visiting a suspicious web page, you suddenly experience abnormal
slowness on your computer even if you have few or no programs open, it is possible
that a remote code is using your computer to perform cryptomining, this type of
malware is known as a "cryptomining malware":
Exploit

The operating system's native security includes protection against network-


borne threats:
A firewall

Social engineering has different methods for distributing malware and


carrying out attacks. The most common is by e-mail due to the number of users and
their characteristics. This method is known as: Phishing.

Why is it necessary to purchase antimalware even though the operating


system has this type of protection?
Because specialized antimalware provides more comprehensive protection

There are a wide variety of antimalware vendors. What procedure should you
follow to choose one?
Search for comparisons and references on the Internet.

When a computer on a local network is infected and within a short time other
computers on the same network show the same problems and symptoms, it is likely
to be malware of the same type:
Propagation

What is the purpose of a proxy server incomputer security?


Filtering requests to dangerous or undesirable sites

Why can proxy servers be used by cybercriminals? Because theyallow you to


hide the address from which the traffic of a requestoriginates.

They identify a group and study their behavior to establish an efficient


method to carry out their attack. This is known as: Social engineering

Why is it necessary to perform a system reset when the malware is NOT


successfully removed?
Because thesystem resetremoves all software and performs a clean installation.
What is the purpose of a proxy server in computer securityd? Filtering
requests to dangerous or undesirable sites

What steps do you need to follow to access the operating system's native
security options?
Home -> Settings -> Update and Security -> Security

Select the two options that are symptoms of malware infection on a computer.
Windows are constantly opened withoutuser intervention
When opening the browser, excessive advertising is displayed

What procedure allows you to clean up your computer and prevent malware
from continuing to wreak havoc?
Restarting in fail-safe mode

Why do I experience slowness after installing antimalware?


Because in the first few minutes it runs a fullsystem scanfor existing threats which
consumes a lot of resources.
Level 4
Test 1
Select 2 typesof specialized multimedia content. ideogames for cell phones
architecture woolens

Select 4 types of specialized servers that exist in computing.


Storage
Mailing
DNS
From databases

Which of the following should you consider when replacing or upgrading the
cooling system?
Space required depending on the type of cooling

Which of the following should you consider when replacing or upgrading


your hard drive?
Hard disk capacity does not affect the performance of the equipment.

Select 2 pieces of equipment that are considered high performance for their
application.
Audiovisual production equipment
Gaming equipment

Order the steps to install the components of a computer in the cabinet.


1. Place the IO shield on the cabinet
2. Fasten the power supply to the cabinet.
3. Mount the motherboard using the posts or holes to hold the motherboard.
4. Remove the modular caps corresponding to the expansion cards.
5. Insert the expansion cards in thecorresponding PCIe ports
6. Fasten the hard disks in the internal bays of the cabinet.
7. Inserting optical or disk drives into the front bays

Which of the following should you consider when replacing or upgrading a


graphics card?
PCIe ports and available space on the motherboard
Select 4 types of multimedia content that are popular. Audio recordings
2D Animations
Photographs
Vector illustrations
Why is it difficult, and in some cases impossible, to upgrade microcomputer
components?
Because its components are tailor-made

Select 4 basic tools you need to assemble computers.


Antistatic bracelet
Screwdrivers
Cutting tweezers
Tip tweezers

What components are the alternative if a cooling system is required for high
performance equipment?
Liquid cooling systems

What kind of components are a high-performance alternative to hard disks?


Solid state disks

Sometimes, excess or messy cables make it difficult to assemble components


and, once the computer is turned on, can cause jams. What should be done with
them?
Fasten them to the cabinet using the available holes and plastic ties.

In what type of equipment canmicrocomputers be found?


In personal devices connected to the Internet (IoT)

Order the steps to begin the assembly of computer components.

S-ar putea să vă placă și