What type of hard drive does not require defragging?

Assignment Help Basic Computer Science
Reference no: EM13864795

Question 1
What is the primary limitation of free versions of antivirus applications?


A. They don't protect in real time.

B. They only perform quick scans.

C. They cannot scan the Windows directory.

D. They only install on 64-bit operating systems.


Question 2
Which selection below lists two operating systems that include BitLocker?


A. Windows XP Professional and Windows 7 Professional

B. Vista Ultimate and Windows 8 Enterprise

C. Windows 7 Professional and Windows 8 Professional

D. Windows 7 Ultimate and Windows 8 Professional

 

Question 3
You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?


A. Use BitLocker with the new OS to copy and paste the files to a USB drive.

B. Use the Administrator account of the new OS to take ownership of the files.

C. Decrypt the files using the encryption key of the new OS on the system volume.

D. Decrypt the files using the newly installed certificate from the new OS.


Question 4
Your mom's computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?


A. A fragmented volume

B. Spyware

C. A bad printer driver

D. Not enough memory

Question 5
Your AV software is unable to detect a recent virus that has infected your computer. You want to download another AV application to see if it can detect the virus. Which application below will do this?


A. CCleaner

B. Disk Cleanup

C. MalwareBytes

D. Auslogics Disk Defrag

Question 6
Why is it best to run AV scans when the computer isn't being utilized?


A. The scans consume resources and can impede computer performance.

B. Executable files can't be scanned if a user is using them within an application.

C. The Windows directory can't be scanned if the computer is being used.

D. AV applications can only do full scans if the computer is in safe mode.

Question 7
What type of hard drive does not require defragging?


A. A hard drive for a server

B. A hard drive for a 64-bit operating system

C. A solid-state drive hosting Windows 7

D. An SCSI drive hosting Server 2008

Question 8
Which statement below is not true about EFS?


A. It can only be implemented on an NTFS partition.

B. It requires a user to type in a PIN.

C. It is supported by the Windows operating system.

D. It doesn't require TPM compatibility.

Question 9
You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?


A. Inbound rules only

B. Outbound rules only

C. Neither inbound nor outbound rules

D. Both inbound and outbound rules

Question 10
Which of the events below would automatically create a new restore point on your Windows 8 computer?


A. Deleting the temporary files

B. Installing a new printer

C. Downloading music files

D. Creating a new Internet favorite


Question 11
What is a limiting factor of EFS when compared to BitLocker?


A. It only works on 32-bit operating systems.

B. It only works with a public certificate.

C. It only works under the Administrator account.

D. It only works at the file or folder level.


Question 12
Which of the actions below will not create more room on your hard drive?


A. Defragging your hard drive

B. Uninstalling an application

C. Deleting temporary Internet files

D. Deleting image and video files

Question 13
You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?


A. CHKDSK /f

B. CHKDSK /r

C. CHKDSK /e

D. CHKDSK /RD

Question 14
In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:


A. be 32-bit.

B. host a virtualized enabled BIOS.

C. be TPM-compatible.

D. have a USB 3.0 interface.


Question 15
A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?


A. From the Processes tool in the Control Panel

B. From the Process tab in Task Manager

C. From the Performance tab in Task Manager

D. From the Windows Defrag console

Question 16
Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?


A. Ccleaner

B. TreeSize

C. MalwareBytes

D. Auslogics Disk Defrag

Question 17
Which type of Windows updates below is strictly security-related?


A. Critical

B. Optional

C. Recommended

D. Service Pack


Question 18
You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?


A. CCleaner

B. ZoneAlarm

C. Microsoft Security Essential

D. MalwareBytes

 

Question 19
You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?


A. 3%

B. 5%

C. 10%

D. 15%


Question 20
Which of the instances below is an example of a Trojan horse?


A. An attachment in an email that is really a malicious file

B. A link in an email that downloads a virus

C. An executable file that replicates throughout the network

D. A computer game that creates a backdoor into your computer

 

 

Reference no: EM13864795

Questions Cloud

What are they saying about disability as social construct : Read the Erevelles article on Race and Disability: Summarize the key arguments-What are they saying about disability as social construct rather than clinical category? How does disability oppression intersect with racial and gender oppression
Forces acting on member abe : Q1. Determine all of the forces acting on member ABE of the frame shown below.
Definition of marriage : The definition of marriage has changed over the past years and the recent Supreme Court ruling. Review Figure 11.6 on page 276 of the textbook. Identify your state's status on same-sex marriage
Explain the pros and cons of various strategies : Compare the pros and cons of various strategies, and recommend a strategic alternative that appears to best match the company's current position with the environmental circumstances.
What type of hard drive does not require defragging? : what type of hard drive does not require defragging?
Internet shopping cart is an example of which version of web : The Internet shopping cart is an example of which version of the web?
What might you predict about the future of poverty and women : Why might PRWORA (Personal Responsibility and Work Opportunity Reconciliation Act) be so controversial? In your opinion, was this an effective measure or not? What might you predict about the future of poverty and women? Why
What methods did you use and exactly how did you use them : What methods did you use and exactly how did you use them? What sources did you use and exactly how did you use them? Discuss how essential job functions for positions are identified, reviewed, documented, and updated.
Present worth on incremental investment calculations : Show the present worth on incremental investment calculations and identify the best alternative. Show your work at the same level of detail as possible

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Qualitative method will be used to analyze

Qualitative method will be used to analyze and explain the theory and quantitative method will be used to provide and support the theory.

  Outside gridlines not affected table''s border true false

The outside gridlines are not affected by a table's border attribute; only the internal gridlines are changed. True False

  Write a mips program to complete the following functions

Write a MIPS program to complete the following functions. You must write comments and follow the register convention. [30 points] (1) Declare an integer array of 20 elements and other variables and labels; [5]

  Create an online questionnaire

Create an online questionnaire using your account on SurveyMonkey® or QuestionPro, Give your participants a few days to complete the online questionnaire.

  Data breaches and regulatory requirements

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics.

  Determine many blocks of main memory in direct-mapped cache

Asumme that computer using direct-mapped cache has 2^24 words of main memory and cache of 64 blocks, where each cache block contains 16 words. How many blocks of main memory are there?

  Dtermine whether the implementation of hypervisors has an

a hypervisor is computer hardware platform virtualization software that allows multiple different operating systems os

  Explain various features associated with different erp

Create a timeline that shows ERP evolution Label important milestones in evolution of ERP systems Explain various features associated with different ERP Explain how the development of earlier ERP systems led to more sophisticated systems

  Determine what check bits would be stored in memory

Suppose an 8-bit data word stored in memory is 11000010. Using the Hamming algorithm, determine what check bits would be stored in memory with data word. Show how you got your answer.

  Draw an entity-relationship diagram

Draw an entity-relationship diagram that describes the following business environment.

  What are instance variables

What are instance variables

  Use a one-dimensional c-style array to solve

Use a one-dimensional C-style array to solve the following problem. Read in up to 20 numbers from the keyboard, each of the numbers should be between 10 and 100, inclusive.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd