SlideShare a Scribd company logo
CIS 312 week 4 quiz
For more classes visit
www.snaptutorial.com
• Question 1
The CompTIA six-step troubleshooting process includes a step
in which you “Verify full system functionality and, if applicable,
implement preventative measures.” Which number is this step?
• Question 2
You check the contents of your computer toolkit before
performing upgrades on a desktop computer. Which of the following
tools in your toolkit should you use to verify proper operation of the
power supply?
• Question 3
CompTIA has created a six-step process for troubleshooting.
The first step in the process is to identify the problem. Which of the
followings steps resembles the next step in the methodology?
• Question 4
CompTIA has created a six-step process for troubleshooting.
The first step in the process is to identify the problem. Which of the
followings steps resembles the next step in the methodology?
• Question 5
Toolkits generally have _____ for the removal and
replacement of jumpers.
• Question 6
0 out of 2.5 points
Which of the following are the two types of USB
connectors found on recent devices?
• Question 7
A USB port can support a total of ______ devices through the
use of hubs.
• Question 8
USB 1.1 ports run at a top speed of ______ per second.
• Question 9
Which of the following is not a type of USB ports found on
systems?
• Question 10
A (n) ______ card is used to facilitate the input and output of
analog audio, with new cards enabling the playback of digital audio
sources.
• Question 11
The maximum length for a USB cable attached to 12Mbps or
480Mbps device is ______ meter(s).
• Question 12
To force-quit an app on an iOS-based device, press and hold
the Sleep/Wake button for a few seconds until a red slider appears. What
is the next step?
• Question 13
Which of these is not a consideration when configuring a
mobile device to receive email?
• Question 14
POP3 uses which port by default?
• Question 15
The process to synchronize a Bluetooth device to a mobile
device is called ______.
• Question 16
Which of the following is not a way for mobile devices to
connect to the Internet?
• Question 17
When troubleshooting mobile wireless connections, which of
these is unlikely to be a factor?
• Question 18
A(n) ________ adds the measurements of pitch, roll, and yaw
to mobile devices, just like in the concept of flight dynamics.
• Question 19
__________ is the practice to track and record the location of
a mobile device over time.
• Question 20
IMAP uses which port by default?
********************************************************
CIS 312 Week 8 Quiz 2
For more classes visit
www.snaptutorial.com
• Question 1
You are about to install an operating system on a computer.
Which of the following is necessary to do?
• Question 2
When you clone a system, you produce a system that is
identical in every way to the original. The cloned system has the same
SID as the original system. If both systems are placed on the network,
you will have a conflict. What tool/utility can you use to modify the
Windows SID?
• Question 3
You are instructing a user who wants to upgrade as to whether
her Windows XP system can support Windows 7. To provide this
information you want to access the Windows System Information. Which
of the following provides that access from a run-line utility?
• Question 4
What should you do to verify a complete and successful
Windows installation? (Choose all that apply.)
• Question 5
_______ is a Windows 7 log file that contains information
about the user directory structure, including security identifiers.
• Question 6
Which of the following log files contains information about
setup actions during the installation of Windows Vista?
• Question 7
The GUI-based application for analyzing and configuring
hard drives is ________.
• Question 8
When using wildcard symbols at the command prompt, the
asterisk (*) replaces _______.
• Question 9
Windows XP needs which minimum requirements to install
successfully? (Choose all that apply.)
• Question 10
In Widows 7 Administrative Tools, what do you use to view
and edit Group Policy security settings?
• Question 11
Which one of the following is the minimum RAM requirement
needed for Windows 7 32-bit?
• Question 12
To enable applications written for older versions of Windows
to run properly on Windows 7/Vista/XP, you can use the
__________Wizard built into Windows.
• Question 13
Antistatic mats and wrist straps prevent______, which can
damage parts and systems.
• Question 14
STOP errors (blue screen—also known as a blue screen of
death) can be caused by which of the following?
• Question 15
As a technician on the job, you are required to perform
several tests in addition to investigating clues you received during the
initial interview. Which of the following tests are you not required to
perform?
• Question 16
Which of the following files are involved in the boot process?
(Choose all that apply.)
• Question 17
The ability to diagnose and troubleshoot problems depends
upon a combination of technical skill and the ability______.
• Question 18
When a stop error/BSOD occurs, by default Windows 7 writes
the debugging information to the hard drive in a file called
___________.
• Question 19
Which of these keys is used to access startup options
immediately after the computer starts up?
• Question 20
If a disk access time gets longer over time, what could be the
possible cause?
********************************************************
CIS 312 Week 10 Assignment 2 Network Design
For more classes visit
www.snaptutorial.com
Assignment 2: Network Design
Due Week 10 and worth 110 points
Imagine that you have been hired as a contractor by a local business
that has recently purchased new office space for its growing business.
Design a network for the local business based on the following
information: The business has approximately fifty (50) employees, and
the new office space will stretch across the third and fifth floors of a
building. The fourth floor is currently occupied by another tenant.
Write a two to four (2-4) page paper in which you:
Suggest the equipment that you would utilize to design and implement a
network, based on the scenario. Justify the need for your suggestions.
Recommend the strategy that you would use to combat the design
challenge of occupying non-adjacent floors. Suggest a solution that
includes the cabling / connecting of the two (2) differing office space
floors.
Determine the primary security concerns regarding the scenario in
question. Explain the controls you would implement in order to lessen
those concerns.
Detail the specifics of your network design through the use of graphical
tools in Visio, or an open source alternative such as Dia. Note: The
graphically depicted solution is not included in the required page length
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Explain the complexities in an information technology environment by
applying best practices and using appropriate technologies and
methodologies.
Describe protocols for inter process communication for communication
across networks.
Outline why the Information Assurance and Security perspective needs
to pervade all aspects of information technology.
Use technology and information resources to research issues in
information technology.
Write clearly and concisely about introductory information technology
topics using proper writing mechanics and technical style conventions.
********************************************************
CIS 312 Week 11 Quiz 3
For more classes visit
www.snaptutorial.com
• Question 1
0 out of 2.5 points
A ______ is a network node that provides a connection between
a LAN and a WAN or the Internet.
• Question 2
Which of the following network types are considered short range
and low speed? (Choose all that apply.)
• Question 3
All email systems provide the transfer of text messages and
attachments to the corresponding recipients. Nonetheless, to configure
an email client, a mail server protocol type is required. Which of the
following protocols are considered mail server types?
• Question 4
What cable type is known for transmitting signal through light
rather than electrical signals?
• Question 5
A domain name is used to identify one or more IP addresses or
URLs to a particular web page. Which of the following sections are
needed to make a complete domain name, from the end of the name to
the start? (Choose all that apply.)
• Question 6
An IPV4 address consists of ______ numbers that range from 0
to 255.
• Question 7
Which of the following Internet access methods represents
broadband Internet service?
• Question 8
A ______ is a computer on the network that provides other
computers within the network with access to resources, such as disk
drives, folders, printers, modems, scanners, and Internet access.
• Question 9
What protocol is used by both web browsers or specialized
programs to exchange and manipulate files over an Internet protocol
computer network?
• Question 10
What network protocol enables data to be exchanged between
two computers over a secure channel?
• Question 11
All the following are standards for wireless encryption except
________?
• Question 12
Biometrics refers to the biological information gathered from a
human body to authenticate a user. All the following are types of
biometrics except ________?
• Question 13
Which of the following features can be used as a simple firewall
within wireless routers and WAPs?
• Question 14
There are three standard account levels within Windows XP.
Which of the following is not a standard account level?
• Question 15
Windows XP can be installed on either _____ or ______ file
systems.
• Question 16
Two-way firewalls provide protection against unauthorized
______ and ______ traffic.
• Question 17
Social engineering is composed of a variety of methods to
manipulate users into performing actions or providing information.
Which of the following are among the many methods used during social
engineering?
• Question 18
Which of the following settings could affect a user from joining a
wireless network? (Choose all that apply.)
• Question 19
Which of the following wireless encryption standards uses AES
encryption?
• Question 20
A software ______ is a program designed to block unauthorized
data packers while permitting authorized data packets on a network.
********************************************************

More Related Content

Similar to CIS 312 Success Begins / snaptutorial.com

VOCI Final Presentation
VOCI Final PresentationVOCI Final Presentation
VOCI Final Presentation
Elisabeth Brooks
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking System
Bharat Kalia
 
Webcast july6ipccp6informationtechnology
Webcast july6ipccp6informationtechnologyWebcast july6ipccp6informationtechnology
Webcast july6ipccp6informationtechnology
PSPCL
 
Focused Question and Answer for Job Portal
Focused Question and Answer for Job PortalFocused Question and Answer for Job Portal
Focused Question and Answer for Job Portal
IRJET Journal
 
Cis 329 week 8 quiz 3
Cis 329 week 8 quiz 3Cis 329 week 8 quiz 3
Cis 329 week 8 quiz 3
Laynevine
 
Educational courses/tutorialoutlet.com
Educational courses/tutorialoutlet.comEducational courses/tutorialoutlet.com
Educational courses/tutorialoutlet.com
Crookstonz
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
hoolikar77
 
Resume
ResumeResume
Mis 589 Success Begins / snaptutorial.com
Mis 589  Success Begins / snaptutorial.comMis 589  Success Begins / snaptutorial.com
Mis 589 Success Begins / snaptutorial.com
WilliamsTaylor44
 
Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.com
Stephenson185
 
Cis 175 Success Begins / snaptutorial.com
Cis 175 Success Begins / snaptutorial.comCis 175 Success Begins / snaptutorial.com
Cis 175 Success Begins / snaptutorial.com
Robinson066
 
Cis 175 Enthusiastic Study / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.comCis 175 Enthusiastic Study / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.com
GeorgeDixon96
 
ops300 Project(3)
ops300 Project(3)ops300 Project(3)
ops300 Project(3)
trayyoo
 
ops300 Project(4)
ops300 Project(4)ops300 Project(4)
ops300 Project(4)
trayyoo
 
Information Management chapter 2
Information Management chapter 2Information Management chapter 2
Information Management chapter 2
KaleemSarwar2
 
Higher Homework
Higher HomeworkHigher Homework
Higher Homework
mrsmackenzie
 
The 5S Approach to Performance Tuning by Chuck Ezell
The 5S Approach to Performance Tuning by Chuck EzellThe 5S Approach to Performance Tuning by Chuck Ezell
The 5S Approach to Performance Tuning by Chuck Ezell
Datavail
 
Online-Voting-System.doc
Online-Voting-System.docOnline-Voting-System.doc
Online-Voting-System.doc
ShangaviS2
 
Online examination management system..pdf
Online examination management system..pdfOnline examination management system..pdf
Online examination management system..pdf
Kamal Acharya
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET Journal
 

Similar to CIS 312 Success Begins / snaptutorial.com (20)

VOCI Final Presentation
VOCI Final PresentationVOCI Final Presentation
VOCI Final Presentation
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking System
 
Webcast july6ipccp6informationtechnology
Webcast july6ipccp6informationtechnologyWebcast july6ipccp6informationtechnology
Webcast july6ipccp6informationtechnology
 
Focused Question and Answer for Job Portal
Focused Question and Answer for Job PortalFocused Question and Answer for Job Portal
Focused Question and Answer for Job Portal
 
Cis 329 week 8 quiz 3
Cis 329 week 8 quiz 3Cis 329 week 8 quiz 3
Cis 329 week 8 quiz 3
 
Educational courses/tutorialoutlet.com
Educational courses/tutorialoutlet.comEducational courses/tutorialoutlet.com
Educational courses/tutorialoutlet.com
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
 
Resume
ResumeResume
Resume
 
Mis 589 Success Begins / snaptutorial.com
Mis 589  Success Begins / snaptutorial.comMis 589  Success Begins / snaptutorial.com
Mis 589 Success Begins / snaptutorial.com
 
Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.com
 
Cis 175 Success Begins / snaptutorial.com
Cis 175 Success Begins / snaptutorial.comCis 175 Success Begins / snaptutorial.com
Cis 175 Success Begins / snaptutorial.com
 
Cis 175 Enthusiastic Study / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.comCis 175 Enthusiastic Study / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.com
 
ops300 Project(3)
ops300 Project(3)ops300 Project(3)
ops300 Project(3)
 
ops300 Project(4)
ops300 Project(4)ops300 Project(4)
ops300 Project(4)
 
Information Management chapter 2
Information Management chapter 2Information Management chapter 2
Information Management chapter 2
 
Higher Homework
Higher HomeworkHigher Homework
Higher Homework
 
The 5S Approach to Performance Tuning by Chuck Ezell
The 5S Approach to Performance Tuning by Chuck EzellThe 5S Approach to Performance Tuning by Chuck Ezell
The 5S Approach to Performance Tuning by Chuck Ezell
 
Online-Voting-System.doc
Online-Voting-System.docOnline-Voting-System.doc
Online-Voting-System.doc
 
Online examination management system..pdf
Online examination management system..pdfOnline examination management system..pdf
Online examination management system..pdf
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 

CIS 312 Success Begins / snaptutorial.com

  • 1. CIS 312 week 4 quiz For more classes visit www.snaptutorial.com • Question 1 The CompTIA six-step troubleshooting process includes a step in which you “Verify full system functionality and, if applicable, implement preventative measures.” Which number is this step? • Question 2 You check the contents of your computer toolkit before performing upgrades on a desktop computer. Which of the following tools in your toolkit should you use to verify proper operation of the power supply? • Question 3 CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology? • Question 4 CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?
  • 2. • Question 5 Toolkits generally have _____ for the removal and replacement of jumpers. • Question 6 0 out of 2.5 points Which of the following are the two types of USB connectors found on recent devices? • Question 7 A USB port can support a total of ______ devices through the use of hubs. • Question 8 USB 1.1 ports run at a top speed of ______ per second. • Question 9 Which of the following is not a type of USB ports found on systems? • Question 10 A (n) ______ card is used to facilitate the input and output of analog audio, with new cards enabling the playback of digital audio sources. • Question 11 The maximum length for a USB cable attached to 12Mbps or 480Mbps device is ______ meter(s). • Question 12
  • 3. To force-quit an app on an iOS-based device, press and hold the Sleep/Wake button for a few seconds until a red slider appears. What is the next step? • Question 13 Which of these is not a consideration when configuring a mobile device to receive email? • Question 14 POP3 uses which port by default? • Question 15 The process to synchronize a Bluetooth device to a mobile device is called ______. • Question 16 Which of the following is not a way for mobile devices to connect to the Internet? • Question 17 When troubleshooting mobile wireless connections, which of these is unlikely to be a factor? • Question 18 A(n) ________ adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics. • Question 19 __________ is the practice to track and record the location of a mobile device over time.
  • 4. • Question 20 IMAP uses which port by default? ******************************************************** CIS 312 Week 8 Quiz 2 For more classes visit www.snaptutorial.com • Question 1 You are about to install an operating system on a computer. Which of the following is necessary to do? • Question 2 When you clone a system, you produce a system that is identical in every way to the original. The cloned system has the same SID as the original system. If both systems are placed on the network,
  • 5. you will have a conflict. What tool/utility can you use to modify the Windows SID? • Question 3 You are instructing a user who wants to upgrade as to whether her Windows XP system can support Windows 7. To provide this information you want to access the Windows System Information. Which of the following provides that access from a run-line utility? • Question 4 What should you do to verify a complete and successful Windows installation? (Choose all that apply.) • Question 5 _______ is a Windows 7 log file that contains information about the user directory structure, including security identifiers. • Question 6 Which of the following log files contains information about setup actions during the installation of Windows Vista? • Question 7 The GUI-based application for analyzing and configuring hard drives is ________. • Question 8 When using wildcard symbols at the command prompt, the asterisk (*) replaces _______. • Question 9
  • 6. Windows XP needs which minimum requirements to install successfully? (Choose all that apply.) • Question 10 In Widows 7 Administrative Tools, what do you use to view and edit Group Policy security settings? • Question 11 Which one of the following is the minimum RAM requirement needed for Windows 7 32-bit? • Question 12 To enable applications written for older versions of Windows to run properly on Windows 7/Vista/XP, you can use the __________Wizard built into Windows. • Question 13 Antistatic mats and wrist straps prevent______, which can damage parts and systems. • Question 14 STOP errors (blue screen—also known as a blue screen of death) can be caused by which of the following? • Question 15 As a technician on the job, you are required to perform several tests in addition to investigating clues you received during the initial interview. Which of the following tests are you not required to perform? • Question 16
  • 7. Which of the following files are involved in the boot process? (Choose all that apply.) • Question 17 The ability to diagnose and troubleshoot problems depends upon a combination of technical skill and the ability______. • Question 18 When a stop error/BSOD occurs, by default Windows 7 writes the debugging information to the hard drive in a file called ___________. • Question 19 Which of these keys is used to access startup options immediately after the computer starts up? • Question 20 If a disk access time gets longer over time, what could be the possible cause? ******************************************************** CIS 312 Week 10 Assignment 2 Network Design
  • 8. For more classes visit www.snaptutorial.com Assignment 2: Network Design Due Week 10 and worth 110 points Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant. Write a two to four (2-4) page paper in which you: Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions. Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.
  • 9. Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Explain the complexities in an information technology environment by applying best practices and using appropriate technologies and methodologies. Describe protocols for inter process communication for communication across networks. Outline why the Information Assurance and Security perspective needs to pervade all aspects of information technology. Use technology and information resources to research issues in information technology.
  • 10. Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions. ******************************************************** CIS 312 Week 11 Quiz 3 For more classes visit www.snaptutorial.com • Question 1 0 out of 2.5 points A ______ is a network node that provides a connection between a LAN and a WAN or the Internet. • Question 2 Which of the following network types are considered short range and low speed? (Choose all that apply.)
  • 11. • Question 3 All email systems provide the transfer of text messages and attachments to the corresponding recipients. Nonetheless, to configure an email client, a mail server protocol type is required. Which of the following protocols are considered mail server types? • Question 4 What cable type is known for transmitting signal through light rather than electrical signals? • Question 5 A domain name is used to identify one or more IP addresses or URLs to a particular web page. Which of the following sections are needed to make a complete domain name, from the end of the name to the start? (Choose all that apply.) • Question 6 An IPV4 address consists of ______ numbers that range from 0 to 255. • Question 7 Which of the following Internet access methods represents broadband Internet service? • Question 8 A ______ is a computer on the network that provides other computers within the network with access to resources, such as disk drives, folders, printers, modems, scanners, and Internet access. • Question 9
  • 12. What protocol is used by both web browsers or specialized programs to exchange and manipulate files over an Internet protocol computer network? • Question 10 What network protocol enables data to be exchanged between two computers over a secure channel? • Question 11 All the following are standards for wireless encryption except ________? • Question 12 Biometrics refers to the biological information gathered from a human body to authenticate a user. All the following are types of biometrics except ________? • Question 13 Which of the following features can be used as a simple firewall within wireless routers and WAPs? • Question 14 There are three standard account levels within Windows XP. Which of the following is not a standard account level? • Question 15 Windows XP can be installed on either _____ or ______ file systems. • Question 16
  • 13. Two-way firewalls provide protection against unauthorized ______ and ______ traffic. • Question 17 Social engineering is composed of a variety of methods to manipulate users into performing actions or providing information. Which of the following are among the many methods used during social engineering? • Question 18 Which of the following settings could affect a user from joining a wireless network? (Choose all that apply.) • Question 19 Which of the following wireless encryption standards uses AES encryption? • Question 20 A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network. ********************************************************