A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
A. Input
B. Output
C. Storage
D. Processing
Which of the following BEST describes a LAN-hosted application? (Choose two.)
A. Internet access required
B. Services required
C. Network required
D. Files saved to the cloud
E. Internet access not required
F. Cloud availability
A technician is configuring computers for a mass deployment. As part of a web-based application, several new windows need to open once a user logs in. Which of the following should the technician configure to ensure the browsers open properly?
A. Unrestricted PowerShell execution policy
B. Pop-up blocker exceptions
C. Applications to run in private mode
D. Security extensions setting to disable
A project team wants to graphically illustrate the logic of a subprogram. Which of the following would be the BEST choice?
A. Image editing software
B. Word processing software
C. Presentation software
D. Visual diagramming software
Which of the following wireless technologies has the shortest transmission distance?
A. NFC
B. IR
C. Bluetooth
D. Wi-Fi
Which of the following may be prevented by adding locks and video cameras to the refuse collection location?
A. Eavesdropping
B. Social engineering
C. Tailgating
D. Dumpster diving
A user is having trouble accessing an application. Which of the following should a help desk analyst do first?
A. Determine whether the trouble is an access or a network issue.
B. Check the user's permissions to ensure the user has access.
C. Reset the user's credentials for the application.
D. Document the solution and notify the user.
A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?
A. Delete the tracking cookies.
B. Avoid password reuse.
C. Use a complex password.
D. Clear the browser cache.