What type of hard drive does not require defragging?

Assignment Help Basic Computer Science
Reference no: EM13864795

Question 1
What is the primary limitation of free versions of antivirus applications?


A. They don't protect in real time.

B. They only perform quick scans.

C. They cannot scan the Windows directory.

D. They only install on 64-bit operating systems.


Question 2
Which selection below lists two operating systems that include BitLocker?


A. Windows XP Professional and Windows 7 Professional

B. Vista Ultimate and Windows 8 Enterprise

C. Windows 7 Professional and Windows 8 Professional

D. Windows 7 Ultimate and Windows 8 Professional

 

Question 3
You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?


A. Use BitLocker with the new OS to copy and paste the files to a USB drive.

B. Use the Administrator account of the new OS to take ownership of the files.

C. Decrypt the files using the encryption key of the new OS on the system volume.

D. Decrypt the files using the newly installed certificate from the new OS.


Question 4
Your mom's computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?


A. A fragmented volume

B. Spyware

C. A bad printer driver

D. Not enough memory

Question 5
Your AV software is unable to detect a recent virus that has infected your computer. You want to download another AV application to see if it can detect the virus. Which application below will do this?


A. CCleaner

B. Disk Cleanup

C. MalwareBytes

D. Auslogics Disk Defrag

Question 6
Why is it best to run AV scans when the computer isn't being utilized?


A. The scans consume resources and can impede computer performance.

B. Executable files can't be scanned if a user is using them within an application.

C. The Windows directory can't be scanned if the computer is being used.

D. AV applications can only do full scans if the computer is in safe mode.

Question 7
What type of hard drive does not require defragging?


A. A hard drive for a server

B. A hard drive for a 64-bit operating system

C. A solid-state drive hosting Windows 7

D. An SCSI drive hosting Server 2008

Question 8
Which statement below is not true about EFS?


A. It can only be implemented on an NTFS partition.

B. It requires a user to type in a PIN.

C. It is supported by the Windows operating system.

D. It doesn't require TPM compatibility.

Question 9
You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?


A. Inbound rules only

B. Outbound rules only

C. Neither inbound nor outbound rules

D. Both inbound and outbound rules

Question 10
Which of the events below would automatically create a new restore point on your Windows 8 computer?


A. Deleting the temporary files

B. Installing a new printer

C. Downloading music files

D. Creating a new Internet favorite


Question 11
What is a limiting factor of EFS when compared to BitLocker?


A. It only works on 32-bit operating systems.

B. It only works with a public certificate.

C. It only works under the Administrator account.

D. It only works at the file or folder level.


Question 12
Which of the actions below will not create more room on your hard drive?


A. Defragging your hard drive

B. Uninstalling an application

C. Deleting temporary Internet files

D. Deleting image and video files

Question 13
You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?


A. CHKDSK /f

B. CHKDSK /r

C. CHKDSK /e

D. CHKDSK /RD

Question 14
In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:


A. be 32-bit.

B. host a virtualized enabled BIOS.

C. be TPM-compatible.

D. have a USB 3.0 interface.


Question 15
A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?


A. From the Processes tool in the Control Panel

B. From the Process tab in Task Manager

C. From the Performance tab in Task Manager

D. From the Windows Defrag console

Question 16
Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?


A. Ccleaner

B. TreeSize

C. MalwareBytes

D. Auslogics Disk Defrag

Question 17
Which type of Windows updates below is strictly security-related?


A. Critical

B. Optional

C. Recommended

D. Service Pack


Question 18
You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?


A. CCleaner

B. ZoneAlarm

C. Microsoft Security Essential

D. MalwareBytes

 

Question 19
You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?


A. 3%

B. 5%

C. 10%

D. 15%


Question 20
Which of the instances below is an example of a Trojan horse?


A. An attachment in an email that is really a malicious file

B. A link in an email that downloads a virus

C. An executable file that replicates throughout the network

D. A computer game that creates a backdoor into your computer

 

 

Reference no: EM13864795

Questions Cloud

What are they saying about disability as social construct : Read the Erevelles article on Race and Disability: Summarize the key arguments-What are they saying about disability as social construct rather than clinical category? How does disability oppression intersect with racial and gender oppression
Forces acting on member abe : Q1. Determine all of the forces acting on member ABE of the frame shown below.
Definition of marriage : The definition of marriage has changed over the past years and the recent Supreme Court ruling. Review Figure 11.6 on page 276 of the textbook. Identify your state's status on same-sex marriage
Explain the pros and cons of various strategies : Compare the pros and cons of various strategies, and recommend a strategic alternative that appears to best match the company's current position with the environmental circumstances.
What type of hard drive does not require defragging? : what type of hard drive does not require defragging?
Internet shopping cart is an example of which version of web : The Internet shopping cart is an example of which version of the web?
What might you predict about the future of poverty and women : Why might PRWORA (Personal Responsibility and Work Opportunity Reconciliation Act) be so controversial? In your opinion, was this an effective measure or not? What might you predict about the future of poverty and women? Why
What methods did you use and exactly how did you use them : What methods did you use and exactly how did you use them? What sources did you use and exactly how did you use them? Discuss how essential job functions for positions are identified, reviewed, documented, and updated.
Present worth on incremental investment calculations : Show the present worth on incremental investment calculations and identify the best alternative. Show your work at the same level of detail as possible

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd