Technical Support Fundamentals Coursera Quiz & Assessment Answers | Google IT Support Professional Certificate in 2021

Hello Peers, Today we are going to share all week assessment and quizzes answers of Technical Support Fundamentals, Google IT Support Professional course launched by Coursera for totally free of cost✅✅✅. This is a certification course for every interested student.

In case you didn’t find this course for free, then you can apply for financial ads to get this course for totally free.

Check out this article for“How to Apply for Financial Ads?”

About this Course-

Introduction to IT

Welcome to Technical Support Fundamentals, the first course of the IT Support Professional Certificate! By enrolling in this course, you are taking the first step to kickstarting your career in tech. In the first week of the course, we’ll learn about how computers were invented, how they’ve evolved over time, and how they work today. We will also learn about what an “IT Support Specialist” is and what they do in their job. By the end of this module, you will know how to count like a computer using binary and understand why these calculations are so powerful for society. So let’s get started!

Here, you will find IT Security Exam Answers in Bold Color which are given below.

Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.

Apply Link –
Technical Support Fundamentals

Technical Support Fundamentals Coursera Quiz & Assessment Answers

1. Introduction To IT

Binary Quiz

Question 1

Which of these is a valid byte? Check all that apply.

  • 11011011
  • 00000000
  • 11100
  • 10022011

A byte is composed of eight bits of zeros and ones.

Question 2

How many possible values can we have with 8 bits?

  • 127
  • 8
  • 256
  • 1 byte

Bits use the binary system, which is also known as the base-2 numeral system. So 2^8 allows us 256 values from 0 to 255.

Question 3

Why did UTF-8 replace the ASCII character-encoding standard?

  • UTF-8 only uses 128 values.
  • ASCII can represent emoji.
  • UTF-8 can store a character in more than one byte.
  • ASCII can store a character in more than one byte.

UTF-8 replaced the ASCII character-encoding standard because it can store a character in more than a single byte. This allowed us to represent a lot more character types, like emoji.

Question 4

What is the highest decimal value we can represent with a byte?

  • 255
  • 256
  • 2
  • Any number

There are 256 values in a byte, from the decimal number 0 to 255.

Question 5

The binary value of the ASCII letter “c” is 0110 0011. Using the handy chart that we learned in the lesson, convert this number to its decimal value. You’ll need to use some math for this question.

  • 99
  • 123
  • 45
  • 100

The decimal value 99 is same as the binary value 0110 0011. So the numbers that are turned ON are 64, 32, 2, and 1 and added up together. In other words, 64 + 32 + 2 + 1 = 99.

Computer Architecture

Question 1

What are the four layers of the computer architecture?

  • Hardware, Windows, Software, User
  • Computer, Operating System, Software, User
  • Binary, Hardware, Operating System, Software
  • Hardware, Operating System, Software, User

The layers of computer architecture are the hardware, operating system, software, and user layers.

Question 2

Write a paragraph on examples of abstraction that you encounter in your day-to-day life. For example, driving a car is an example of abstraction, you don’t need to understand how a car works underneath the hood in order to drive one.

Compiler is an example of abstraction, you don't need to understand how they convert your source code to a machine language

From Abacus to Analytical Engine

What cards had holes in them that were historically used to store data?

  • Floppy disks
  • Hard drive platters
  • Punch cards
  • Magnetic tape

Punch cards were the first binary system used for machines.

A(n) __ is a series of steps that solve specific problems.

  • recipe
  • automated system
  • combination
  • algorithm

Algorithms are a series of steps that solve specific problems.

The Path to Modern Computers

What are the three main desktop operating systems used today? Check all that apply.

  • Windows
  • MacOS
  • Linux
  • Chrome OS

The main desktop operating systems in use today are Windows, Macintosh, and Linux.

What is software called when it can be freely distributed, modified, and shared?

  • Open-source
  • Closed-source
  • Commercial
  • Proprietary

Commercial software is paid for, while open-source software can be freely distributed, modified, and shared.

Computer Language

What does the following binary code translate to? Tip: Use an ASCII “character to binary” chart to help you find an answer.

01101000 01100101 01101100 01101100 01101111

Answer: hello


In punch card systems, a hole represents the number __.

  • 1
  • 0

We use the number 1 to represent a hole in a punch card.

Graded Assessment

2. Hardware


Question 1

What characteristics distinguish a Solid State Drive from a Hard Disk Drive? Check all that apply.

Smaller form factor

  • Uses Disk Platters
  • Non-moving parts
  • High RPMs

SSDs have non-moving parts, are a smaller form factor, and also utilize non-volatile memory.

Question 2

True or false: If you plug in a 220v appliance into a 120v outlet, the appliance could get damaged.

  • TRUE

While plugging a 220v appliance into a 120v outlet won’t cause immediate harm to your appliance, it could still cause appliance deterioration.

Question 3

How long will it take to transfer a file size of 1GB on a USB 2.0 and a USB 3.0 drive?

  • ~17 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive
  • ~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
  • ~ 17 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
    8 ~ 20 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive

Theoretically, USB 2.0 has a bandwidth of 480 Mb/s, which is roughly 60 MB/s. It would take around 17 seconds to transfer 1024 MB of data.

Question 4

Which of these is used to charge devices? Check all that apply.

  • USB A.
  • HDMI Port.
  • DisplayPort.
  • USB C.

These are types of USB ports.

Starting It Up

Question 1

What is the difference between a ROM chip and a RAM chip? Check all that apply.

  • A ROM chip stores temporary data. A RAM chip stores permanent data.
  • A ROM chip stores permanent data. A RAM chip stores temporary data.
  • A ROM chip is non-volatile and will keep its data in the case of a power failure
  • A RAM chip is volatile and will wipe its data in the case of a power failure.

A ROM chip stores permanent data and will keep its data if there is a power failure. A RAM chip stores temporary data and will wipe its data in a power failure.

Question 2

Which of these functions does the BIOS perform? Check all that apply.

  • Checks what devices are connected to the computer
  • POST
  • Installs drivers
  • Initializes hardware

The BIOS performs a POST to check what devices are connected to the computer. It also initializes hardware on boot.

Question 3

Where are your BIOS settings stored?

  • CMOS chip
  • RAM
  • Hard drive
  • Flash drive

Your BIOS settings are stored in the CMOS chip.

Question 4

What is the difference between a traditional BIOS and UEFI? Check all that apply.

  • UEFI is meant to become the new standard for BIOS.
  • A traditional BIOS has better compatibility with newer hardware.
  • UEFI has become the default BIOS on new systems.
  • UEFI has better compatiblity with newer hardware.

UEFI is the new standard for BIOS. It has become the default BIOS on new systems and it has better compatibility with newer hardware.

The Modern Computer

Question 1

Where does the CPU store its computations?

  • Binary
  • Registers
  • Processor
  • External Data Bus

When the CPU does computation, it stores information in registers first.

Question 2

Which mechanisms do we use to transport binary data and memory addresses? Check all that apply.

  • Address Bus
  • The External Data Bus
  • School Bus
  • DBus

The EDB is used to transport binary data and the Address Bus is used to transport memory addresses.

Introduction to Computer Hardware

To extend the functionality of a computer, we can plug devices into connection points on it. What are these connection points known as?

  • Hardware
  • Ports
  • Desktops

Ports are used to plug devices into a computer.


True or false: If you turn off a machine that uses SDRAM, the data on the SDRAM will be wiped out.

  • True
  • False

SDRAM is volatile and will wipe its data if it loses power.

Putting it All Together

True or false: Before you work on the physical components of your machine, you should ground yourself to prevent electrostatic discharge.

  • True
  • False

Even the slightest bit of electricity can cause damage to delicate computer components, so you should always make sure to ground yourself.

Peer Graded Assessment

3. Operating System

Installing an Operating System

Question 1

True or false: If you have a 32-bit CPU architecture, it’s recommended to use a 64-bit operating system.

  • TRUE

To have better compatibility with your OS and CPU, you should be using the same CPU and OS architecture.

Question 2

If you want to boot into a USB drive, how do you change your boot settings?

  • Go into the BIOS settings and change the boot settings
  • Login to the machine.
  • Wipe the computer.
  • Replace the CPU.

To change any boot settings, you’ll need to modify your BIOS settings before the computer loads up the operating system.

Question 3

What is the file manager in macOS called?

  • Finder
  • File Explorer
  • Konqueror
  • Midnight Commander

The file manager in MacOS is called Finder.

Question 4

What command can you use to create a file using bash?

  • cat
  • ls
  • touch
  • mkfile

You got it! You can use the touch command to create a file using bash.

Question 5

A __ is an emulation of a physical machine.

  • BIOS
  • virtual machine
  • driver
  • kernel

A virtual machine is used to emulate a physical machine.

What is an Operating System?

Question 1

What are the two main parts that make up an operating system?

  • Windows and Mac
  • Kernel and Userspace
  • Users and Software
  • Kernel and Packages

The two parts that make up an operating system are the kernel and the user space.

Question 2

What are the main components of file management? Check all that apply.

  • File data
  • NTFS
  • File system
  • Metadata

The main components of file management are the storage of data, the file metadata, and the filesystem.

Question 3

Which of these are true? Check all that apply.

  • You can have many processes running for one program.
  • A program is initially stored in RAM. A process is initially stored in the hard drive.
  • A program is an application that we can run. A process is a program that is executed.
  • A program is a process that is executed. A process is a program that we can run.

A program is an application, and a process is an application that is executed. You can have many processes running for the same program.

Question 4

What are the characteristics of virtual memory? Check all that apply.

  • Allows our computer to have more memory than it physically has.
  • Combination of RAM and hard drive space.
  • Stores pages that are currently not in use by physical memory.
  • It is where we store pages that are being executed

Virtual memory allows us to extend the physical memory on our machine.

Question 5

Which of these is a GUI? Check all that apply.

  • Option One
  • Option Two
  • Option Three
  • Option Four

These are all examples of a GUI.

Question 6

Which of these are considered I/O devices? Check all that apply.

  • Hard disk drives
  • Web cams
  • Monitors
  • Speakers

Any devices that receive input or send out output are considered I/O devices.

Question 7

What is the last step in booting a computer?

  • Load up drivers.
  • User space is launched.
  • Execute the bootloader.
  • Perform a POST.

The last step in booting a computer is launching the user space, like a login window, GUI, and more.


__ are files that record system events on our computer just like a system’s diary. Check all that apply.

  • Metadata
  • Kernels
  • Logs
  • Bootloaders

Logs are our computer’s system diary.

Peer Graded Assessment

4. Networking

Limitations of the Internet

Question 1

True or false: The Internet is the World Wide Web.

  • TRUE

The Internet is mistakenly referred to as the World Wide Web, but it’s just the physical connection of computers and wires around the world. The Web is the information on the Internet.

Question 2

What is the fundamental protocol that the Internet uses today?

  • DHCP
  • TCP/IP
  • FTP
  • HTTP

The TCP/IP protocol is what allowed computers to share information outside their network, which stemmed the creation of the Internet as we know it today.

Question 3

Free text: In what other ways has the Internet changed the way society functions?

Business, healthcare, education, etc.

It’s crazy to think about how the Internet has completely changed our lives. Thank you for submitting your response to this prompt. In the future, you may even see the Internet change things that we have yet to imagine.

Question 4

True or false: You should only worry about computer security if you work in a computer security role.

  • TRUE

Computer security affects everyone whether it’s in your personal life or work life. You and everyone around you should exercise good computer security practices.

Question 5

There are 4 bytes in an IPv4 address. What is the highest decimal value you can have for one byte?

  • 128
  • 255
  • 256
  • 512

There are 256 available values in a byte with decimal values ranging from 0 to 255.

Question 6

Which of the following protocols is the primary infrastructure that creates the Internet?

  • DNS
  • NAT
  • HTML
  • TCP/IP

The TCP/IP protocol is what allowed computers to share information outside their network, which stemmed the creation of the Internet as we know it today.

Course Quiz

Basics of Networking

A(n) __ is an interconnection of computers.

  • service
  • packet
  • ethernet cable
  • network

You can connect many computers together to form a network.

In an IT field, managing, building, and designing networks is known as __.

  • coding
  • networking
  • engineering
  • management

The management and building of networks is known as networking.

Internet of Things

True or false: The Internet of Things is a concept that’s allowing more devices to be connected to the Internet.

  • True
  • False

Common manual devices, like thermostats, kitchen appliances, and more, are being connected to the Internet thanks to the Internet of Things.

Graded Assessment

5. Software

Interacting with Software

Question 1

In the Linux distribution Ubuntu, what command would you use to install an application?

  • apt
  • execute
  • application
  • run

apt is a command we use in Ubuntu for package installs.

Introduction to Software

Question 1

Which of these is application software? Check all that apply.

  • RAM
  • Web browser
  • Email client
  • CPU

Your web browser and email clients are considered application software.

Question 2

Which of these is system software? Check all that apply.

  • Windows OS
  • BIOS
  • CPU
  • Text editor

The Windows OS and the BIOS are considered system software.

Question 3

What is the difference between an interpreted and a compiled language? Check all that apply

  • Interpreted languages are not broken into machine instructions beforehand.
  • Interpreted languages are broken into machine instructions beforehand.
  • Compiled languages are not translated into machine instructions beforehand.
  • Compiled languages are translated into machine instructions beforehand.

Interpreted languages are not broken into machine instructions beforehand, like compiled languages are.

What is Software?

__ is translating one language to another.

  • Coding
  • Transcribing
  • Encrypting
  • Transforming

Coding is translating one language to another.

When writing code, a(n) __ is usually used to perform a single- or limited-range task.

  • program
  • software
  • application
  • script

Scripts are used as a way to perform a single or limited task.

Types of Software

A type of software that can allow freedom of use, modification, and sharing is known as:

  • Commercial software
  • Open-source software
  • Application software
  • System software

Software that can be free to use, modified, and shared is known as open-source software.

Which of these software is firmware?

  • Windows Operating System
  • Calculator app
  • BIOS
  • Web browser

The BIOS is software that is stored permanently on hardware.

Which of the following software versions is the highest?

  • 4.1.2
  • 3.0.9

A software version of 4.1.2 is greater than the software version 3.0.9.

Revisiting Abstraction

The concept of taking a complex system and simplifying it for use is known as __.

  • coding
  • abstraction
  • obsfucation
  • encryption

In all facets of computing, we use the concept of abstraction to help make our lives easier.

Recipe for Computing

Before we had compilers, what language was used to allow human readable instructions to be assembled into machine code?

  • Assembly
  • C++
  • Cobol
  • Basic

Assembly language was used to make semi-human readable instructions into machine code.

Managing Software

True or false: When managing software, you should only be worried about how to install software.

  • True
  • False

Managing software includes many tasks such as installing, updating, and removing software.

Installing, Updating, and Removing Software on Windows

True or false: When using a 64-bit OS, you should install 64-bit applications.

  • True
  • False

Remember with CPU architecture, you want to use the same application and OS architecture for better compatibility.

Software Automation

__ makes processes work automatically.

  • Software management
  • Compilation
  • Automation
  • Abstraction

With the help of automation, we can make processes work automatically.

Graded Assessment

6. TroubleShooting

Ungraded Plugin: Customer Service

Question 1

You are taking on the role of an IT professional in four different scenarios. Use your best judgement to solve problems presented by users in this choose-your-own-path exercise.

Scenario 1 of 4

Executive Talking Over You

A user calls in and states that they’re a director, and they need some software installed immediately. You explain that this hasn’t been checked for malicious software yet and could infect his computer. While you can perform this check for him, it will take a little time. The users cuts you off, raising his voice and demanding you do it!

What would you do?

Pause and stay silent about 10 seconds, after he’s done talking, and then respond.

You pause and try again to assure the director that you understand his desire to expedite this request. You start to explain the need for security, but he talks over you again.

What do you do?

Pause a little longer. When you talk again, you immediately state that the process will take about 20 minutes, and that you can start on it immediately.

While it’s good to explain the “why” of a situation, if the user is in a big rush, get to the point. Let them know upfront what you can do to resolve the situation and get the process going.

Scenario 2 of 4

Customer Chat

Name: Ali Ababwa\
Customer number: 1434216\
Issue: I can’t get my photos and files off my computer, HELP!\
Machine: Windows 10

Chat log:

Tech: Hi Ali, how are you today? It looks like you’re having issues accessing your photos and data. Can you give me more details?\
User: I’m awful ;( I have a presentation in an hour and all of my photos and files are gone! Please transfer them to a new machine ASAP.\
Tech: I’m so sorry to hear that! I will do everything I can to help you. When did this happen? What are you trying to do to retrieve them?\
User: My computer fell in the pool at my hotel, and now it won’t turn on.

What would you do?

Show concern, then ask if he has backups to the cloud setup.

Tech:Oh my, that isn’t good! Have you saved your files to another medium, like a hard drive or a USB drive? Or perhaps you used a program that saves things to the cloud?\
User: Ugh, no. If I had done these things, do you think I’d be so upset! Can you or can you not retrieve my files?\
Tech: I understand that you’re upset. I’m looking at all of your options to see what we can do to fix this. The computer is dead if it went into the pool, so we need to see what our other options are.\
User: This is ridiculous! Why do I pay for tech support if you can’t support me?

What would you do?

Ask Ali if he emailed the presentation to any of his co-workers, and remind him that you’re here to help.

While it’s easy to give up on someone when they’re getting upset, it’s important to remember that they may be under a tremendous amount of stress. By coming up with alternatives, you can let them know that you’re on their side and that you’re not going to give up. This doesn’t mean that you should take verbal abuse. Make sure you’re clear with your manager about what you will and won’t accept from a user.

Scenario 3 of 4

Customer Chat

Name: Yuki Saitō\
Customer number: 674213\
Issue: I need more bandwidth

Chat log:

Mia: Hi Yuki, how are you today? I see that you are concerned about needing more bandwidth. I’d be happy to help.\
Yuki: Thanks, I really need it!

What would you do?

Ask them what they mean by “bandwidth.”

People sometimes confuse technical terms. Make sure that you’re using the same vocabulary as the user by clarifying what they mean or probing to understand what they’re trying to accomplish.

Mia: Can I ask what you mean by “bandwidth?”\
Yuki: I mean that everytime I try to use my computer after lunch, it’s incredibly slow. I think I’m using all the bandwidth in the morning.

What would you do?

Ask more questions about what programs they’re using.

Ask if this happens for the rest of the day, or just a period of the day?

While both B and D answer options are correct, this response shows that you were paying attention to the little clues that people leave. The user mentions that this always happens after lunch. Pinpointing the exact time of day and programs used will help you better diagnose the issue faster.

Scenario 4 of 4

Customer Ticket

From the user:

My machine is saying I have to reboot, but this is silly. I have a ton of processes running, I don’t want to have to reload everything. This is a waste of time. I’ve included a screenshot of the message. Please advise.


From the tech:

Hi Aditya,

(1) Thanks for contacting support.\
(2) Please restart the computer, there are no other options in this case.\
(3) Regards,


What could Amelia have done better in the intro of this email?

Thanks for contacting support. I see that you’re concerned about rebooting your machine.

Acknowledge the information that the user has provided. This also allows you to clarify the problem and ensure that you’re on the same page with the user.

What could Amelia have done better in the probing of this email?

Based on the screenshot you provided, it looks like you received the reboot prompt because a new program was installed. In order for the program to start working, you’ll need to reboot your machine. Is it possible to save your commands beforehand, so that you can get to them again?

You’re letting the user know that you’ve looked at the information they provided, explained why the reboot is needed, and suggested a possible workaround to their concern.

What could Amelia have done better in the closing of this email?

If this doesn’t work, or you have any questions, please let me know. Regards,

This lets the user know the next steps and opens the door for further dialogue.

Customer Service

Question 1

Free response: What’s the difference between good and great customer service? What’s the most important part of customer service to you?

Good customer service provides solution that customers need and make them satisfied.
Great customer service do the same thing -- but also create good relationship and make them loyal.

Great customer service is unique to each individual. A good rule of thumb is treat others like you would like to be treated.

Question 2

You’re doing desktop support and the company policy is that you can only help with company equipment. A user walks in:

Tech: Hi there, how can I help you?

User: My computer is really slow and I can barely use it. Can you help me figure out what’s wrong?

Tech: It looks like this is a personal computer. Are you talking about your work computer?

User: Uh, no, this is the one that I need help with. I figured you’re good with computers and you could help. My daughter needs it for a school assignment that’s due tomorrow, but it’s too slow for her to get anything done.

What would you do?

  • Forget about that pesky policy and help him! His poor daughter needs to finish her assignment!
  • Politely tell him that it’s against the company policy, and you can’t help him.
  • Explain why you can’t troubleshoot the issue, per the company policy. But give him some tips on what common issues could be slowing down his computer, and how he might go about fixing them.
  • Tell him you can’t help him and suggest that he go to a local tech store for help.

This response sets expectations and then gives some helpful suggestions. Here, you’re showing the user that you care about their issue, even if you can’t help them.

Question 3

Situation: You work for a company that requires a visual verification when resetting passwords. The verification doesn’t have to be done through your company account. However, you must see the person “live” (not through a picture), so that you can match them to their photo before resetting their account.

Scenario: Phone call

Anastasia: Thanks for calling. My name is Anastasia. How can I help you?

Ling: Hi, Anastasia. This is Ling. I need to reset my account password.

Anastasia: Hi, Ling. I’d be happy to help you with that, but first I need to verify your identity. Can you do a video call with me through Skype?

Ling: I can’t get into my work account. That’s why I’m calling.

What would you do in this situation? Check all that apply.

  • Offer to set up a video call through Skype, Facetime, or Hangouts.
  • Suggest that the user does a video call with you through their phone.
  • Ask the user if they have a personal account to use for Skype.
  • Kindly tell them that they will have to wait until the next day to meet with someone live.

You’re all about thinking outside the box to figure out what else the user can do to set up that call. You could potentially suggest that they go to an internet cafe or local library with wifi, too.

Question 4

A user needs their password reset. The IT Support Specialist is pulling up the necessary information while the user starts asking a bunch of questions: Why does the password have to have a capital and a symbol? Why can’t I write it down? Why does it change so often? Isn’t this a waste of time?

How would you respond to the user?

  • Stop what you’re doing and explain to the user that passwords should have numbers and symbols for security purposes, and that this is more important than productivity.
  • Kindly ask the user to stop asking questions, since you’re trying to solve their problem.
  • Ignore the user and keep working on resetting the password so that you don’t lose your place.
  • Let the user know that you’re working on their issue and will be sure to answer all of their questions once you’re done.

You’re acknowledging the user’s questions, but setting a clear agenda of what you want to accomplish. This allows them to understand what they should anticipate and helps you keep control of the conversation.

Question 5

A user walks in to get IT support. The IT Support Specialist is a female. The user is male. There’s also a male IT Support Specialist in the room. The user explains to the IT Support Specialist that his co-worker is on leave and he needs to access her files. The female technician attempts to explain the policy, which doesn’t allow for this, given security issues. The male user demands to speak with the male IT Support Specialist to reach a solution.

If you were the male technician in this situation, what would you do?

  • Step in and answer the user’s question.
  • Ignore it.
  • After the user has left, see how the female tech is doing and give her tips on how to deal with similar situations in the future.
  • Tell the user that there is no difference in knowledge and understanding between you and your co-worker.

You are not going as far as confronting the user, which can be really difficult. Rather, you’re reinforcing and supporting her work as a fellow IT Support Specialist. It’s not always the person being undermined who is responsible for “sticking up for herself.”

Troubleshooting Best Practices

Question 1

Scenario: You’re working in an IT Support position and a user comes to you and says they can’t access their online bank account. Choose the best response.

  • Let’s try to test this by logging in on my computer.
  • Please restart your computer.
  • It might be the Internet. Make sure you’re connected to a network first.
  • Can you explain to me in detail what you mean by not being able to access your online bank account? What specific part doesn’t work?

Remember, when tasked with a problem, don’t jump to conclusions. Ask questions first and gather more information. The issue be an incorrect login, a poor network connection, a server issue with the bank, or something else. Always ask questions first!

Question 2

Scenario: You’re working in an IT Support position. You have a computer that won’t connect to the network. You’ve already asked the user all the necessary questions, and now you begin troubleshooting. What’s the next best first step you can take?

  • Wipe and format the machine from scratch.
  • Isolate the problem to either the computer or the network.
  • Ask more questions.
  • Restart the computer. It could be a weird Internet issue.

Since you’ve already gathered information about the problem, it’s time to start figuring out what the issue is. There are two things that could be wrong: either the computer is having issues or it’s the network. You can rule one out by testing whether or not someone else is able to connect to the network.

Question 3

Scenario: You’re working in an IT Support position and a user comes to you and says they can’t login to their computer. Choose the best response.

  • Ask the user, “when was the last time you were able to login? What has changed since then?”
  • Check if the user has their caps lock enabled.
  • Restart the computer. It could be a weird login issue.
  • Check the network device they’re connected to.

Remember to ask questions in order to try to figure out what happened before the issue came up.

Question 4

Scenario: You’re working with a computer that doesn’t run your newly installed software correctly. You’ve already asked the right questions, but you can’t seem to isolate the problem to anything specific. Which of the following responses is the next best step to take?

  • Run diagnostic tools, which will take about an hour.
  • Wipe the computer and format it from scratch, which will take a few hours.
  • Restart the computer. It could be an issue of the software installation needing a reboot, restarting takes about 2 minutes.
  • Reinstall the software again, which will take about 15 minutes.

A reboot might be required for the software to be fully installed. In this case, a reboot is also the quickest troubleshooting step to take.

Peer Graded Assessment

67 thoughts on “Technical Support Fundamentals Coursera Quiz & Assessment Answers | Google IT Support Professional Certificate in 2021”

  1. I simply needed to appreciate you again. I do not know the things I could
    possibly have handled without the actual hints documented by you about
    such question. It was a real frightful scenario for me personally,
    nevertheless finding out the very specialised form you handled it took me to jump for fulfillment.

    Now i’m grateful for your assistance and as well , expect you
    realize what a powerful job you were accomplishing instructing the
    others via your webpage. Most probably you’ve never met any of

    Feel free to surf to my site – Black Falcon Pro Drone

  2. I’ve been browsing online more than 3 hours today,
    yet I never found any interesting article like yours.
    It is pretty worth enough for me. Personally, if all webmasters and bloggers made good content as you did, the
    web will be a lot more useful than ever before.

  3. obviously like your web site however you have to take a look at
    the spelling on quite a few of your posts. Several of them are rife with spelling problems and I in finding it very bothersome to
    tell the reality however I’ll surely come back again.

  4. Good day! This is my first comment here so I just wanted to give a quick shout out and say I really enjoy reading your posts.
    Can you recommend any other blogs/websites/forums that go over the same subjects?

    Thanks a ton!

  5. Hello great website! Does running a blog like this take a large amount of work?
    I’ve no knowledge of programming but I was hoping to start my own blog soon.
    Anyway, should you have any suggestions
    or techniques for new blog owners please share. I know this is off subject however I
    just needed to ask. Thanks!

  6. Приглашаю вас на сайт чемоданов, где есть [url=]купить недорогие чемоданы[/url] всегда в наличии. Наш интернет магазин это широй ассортимент чемоданов на любой вкус. Своевременная доставка и хорошее качество продукции. Особенно важно чтобы чемодан был качественным. Именно такие у нас и есть. Кроме классических чемоданов здесть есть чемоданы из пластика, чемоданы из полипропилена.

  7. Pretty great post. I just stumbled upon your blog and wished to say that I have truly
    loved browsing your weblog posts. In any case I will be subscribing for your feed and
    I am hoping you write once more soon!

  8. This is the right blog for anybody who wants to understand this topic.
    You understand a whole lot its almost hard to argue with you (not that I really will need to…HaHa).
    You definitely put a brand new spin on a topic which has
    been discussed for years. Great stuff, just great!

  9. ทางเรา ต้องขอบอกได้เลยว่า เป็นตัวแทนหลักอย่างเป็นทางการในไทย ที่ใหญ่ที่สุด และเป็นเจ้าเดียวกับ RELX THAILAND สินค้าทุกแบรนด์ ทุกรุ่น เราได้ทำการคัดสรร บุหรี่ไฟฟ้า ที่เป็นหนึ่งในนวัตกรรม ช่วยเลิกบุหรี่ ที่มีประสิทธิดีเยี่ยม และช่วยได้จริง
    มาให้ลูกค้าได้เลือกใช้ Relx Infinity plus ,
    Ks quik , Ks Kurve , Ks Kurve lite , Kardinal Stick , ks pod โดยสินค้าทุกชิ้นของเรา สั่งตรงจากโรงงาน

  10. Hmm it appears like your blog ate my first comment (it was super long) so I
    guess I’ll just sum it up what I wrote and say, I’m thoroughly enjoying your
    blog. I too am an aspiring blog blogger but I’m still
    new to everything. Do you have any helpful hints for novice blog writers?
    I’d certainly appreciate it.

  11. An impressive share! I have just forwarded this onto a friend who had been doing a
    little homework on this. And he in fact
    bought me breakfast due to the fact that I discovered it for
    him… lol. So let me reword this…. Thank YOU for the
    meal!! But yeah, thanks for spending the time to discuss this matter here on your
    internet site.

    My web blog; 비트코인선물거래

  12. You actually make it seem so easy with your presentation but I find this topic to be actually something that I think I would never understand.
    It seems too complex and very broad for me. I am
    looking forward for your next post, I’ll try to get the hang of it!

  13. Hey just wanted to give you a quick heads up and let you know a few of the
    images aren’t loading properly. I’m not sure why but I
    think its a linking issue. I’ve tried it in two different internet browsers and
    both show the same outcome.

    Visit my site … 온라인홀덤

  14. Wonderful work! That is the type of info that are meant
    to be shared around the net. Disgrace on Google for no longer positioning
    this submit upper! Come on over and seek advice from my
    site . Thank you =)

  15. Just desire to say your article is as amazing. The clearness in your post is simply excellent
    and that i can suppose you are knowledgeable in this subject.
    Well together with your permission allow me to grasp your
    RSS feed to stay updated with approaching post.

    Thank you 1,000,000 and please carry on the enjoyable work.

  16. Today, while I was at work, my sister stole my iPad and tested to see if it can survive a 40 foot drop,
    just so she can be a youtube sensation. My iPad is now broken and she
    has 83 views. I know this is completely off topic but I
    had to share it with someone!

  17. Amazing blog! Do you have any helpful hints for aspiring writers?
    I’m hoping to start my own blog soon but I’m a little lost on everything.
    Would you propose starting with a free platform like WordPress or go for a
    paid option? There are so many choices out there that I’m totally confused ..
    Any ideas? Cheers!

  18. Hey I know this is off topic but I was wondering if you
    knew of any widgets I could add to my blog that automatically tweet my newest twitter updates.
    I’ve been looking for a plug-in like this for quite
    some time and was hoping maybe you would have some experience with something like this.
    Please let me know if you run into anything. I truly enjoy reading
    your blog and I look forward to your new updates.

  19. I absolutely love your blog and find the majority of your post’s to be just
    what I’m looking for. Do you offer guest writers to write content to suit your needs?
    I wouldn’t mind creating a post or elaborating on most of
    the subjects you write about here. Again, awesome site!

  20. slotpg แตกบ่อย เว็บตรงสล็อตออนไลน์ ฝากถอนไม่มีขั้นต่ำ อันดับ 1
    ที่ได้รับความนิยมกันอย่างมากในกลุ่มนักพนันจากทั่วโลก slot pg เว็บตรง ของเราเป็น เว็บไซต์slot ที่เปิดบริการ เกมสล็อตออนไลน์ ผ่านระบบอินเตอร์เน็ตซึ่งจะประกอบไปด้วยเกมต่างๆหลายอย่างที่จะทำให้ทุกๆคนได้เจอกับประสบการณ์ใหม่ที่ไม่เคยเจอ
    ไม่ว่าจะเป็นเกม สล็อต,แทงบอล
    , baccarat , roulette , หวย , blackjack , โป๊กเกอร์ , เกมยิงปลาออนไลน์ และอีกหลายอย่างที่จะทำให้ SLOT PG เว็บใหญ่ ของเราสามารถดูแลสมาชิกของเราทั้งโลก เนื่องด้วยทางเข้าของพวกเราอยู่ต่างประเทศ จะทำให้สามารถรองรับนักเดิมพันได้ทั่วโลกได้แก่ทุกคนที่อยู่มูมไหนของโลก PG SLOT แตกง่าย ของเราก็พร้อมเปิดบริการผู้เล่น
    อยู่ประจำกับทีมงานมากประสิทธิภาพมีประสบการณ์การทำงานมากกว่า 2 ปีมีทีมงานมากกว่า
    200 คนที่พร้อมบริการนักพนันตลอด 24 ชั่วโมง หรือนักพนันเกิดข้อสงสัย ต้องการปรึกษาเกี่ยวกับ เว็บไซต์เกมสล็อต ของพวกเรา ก็สามารถทักหาทีมงานเราได้ตลอดเวลา สล็อตpg แตกบ่อย คือ ค่ายสล็ออตที่เล่นง่ายที่สุด โบนัสแตกบ่อย แตกบ่อยที่สุด พวกเรามีเกมให้นักเดิมพันเล่นกันไม่อั้นเกม สล็อตพีจี เว็บใหม่ ที่เราได้รวบรวมมากยิ่งกว่า 500 เกม ที่มีโบนัสแตกหนัก
    แจ็คพอตแตกบ่อยทุกคนสามารถเล่นเกม SLOTได้อย่างเพลิดเพลิน มาพร้อมเปิดบริการดีๆมากมายไม่ว่าจะเป็น สล็อต PG แตกบ่อย เครดิตฟรี ที่นักพนันทุกคนสามารถเล่นเกมสล็อตฟรีได้ทุกเกมของเราซึ่งทุกๆคน ระบบ slot damoได้ง่ายๆ PG SLOT แตกง่าย มีรูปแบบ เกมที่เข้าใจง่าย เล่นง่ายไม่ซับซ้อน มาด้วยกราฟฟิกที่สวยสมจริง เสียงที่คมชัด เอฟเฟคเสียงที่น่าตื่นตาตื่นใจ มาพร้อมระบบและบริการและบริการดีๆต่างๆหลากหลายเพราะเปิดให้บริการจากผู้ผลิตโดยตรงจากต่างประเทศ pg slot เว็บตรง มีใบรับรอง พร้อมกับสิทธิประโยชน์หลากหลายได้แก่ โปรโมชั่นต่างที่ เราได้เตรียมมาให้ทุกท่าน เพียงแค่ทุกท่าน
    สมัครสมาชิก SLOT ONLINE เว็บตรง กับ พวกเราเท่านั้นสมัครเพียงไม่กี่ขั้นตอนทุกท่านก็จะได้ โปรโมชั่นมากมาย กับทาง PGSLOT
    แตกง่าย ค่ายเกมที่ให้ ค่ายสล็อตออนไลน์ ค่ายเกมสล็อตออนไลน์ ที่ให้หลายกว่า ค่ายสล็อตออนไลน์ อื่นๆกันเลย เว็บตรง ฝากถอนไม่มีขั้นต่ำ ของพวกเราเปิดบริการแล้วผ่าน
    ระบบฝากถอนออโต้ฝากถอนไม่มีขั้นต่ำ เพื่ออำนวยความสะดวกนักพนันให้หลายที่สุด พร้อมระบบและบริการต่างๆต่างหลากหลาย เช่น ถอนเงินไม่มีขั้นต่ำ
    ฝากเงินไม่มีขั้นต่ำ หรือ ฝากถอน ไม่มีขั้นต่ำ 1 บาทก็สามารถเล่น
    , ฝากถอนไม่มีขั้นต่ำ ภายใน
    10 วินาที , ไม่จำกัดจำนวนครั้งในการฝากถอน ระบบและบริการฝากถอน
    ออโต้ฝากเงิน ไม่มีขั้นต่ำผู้เล่นที่เข้ามาเป็นสมาชิกของเรา ถึงทุนน้อยก็สามารถร่วมสนุกสนานกับพวกเราได้ได้ เดิมพัน 1บาทก็สามารถเล่น เว็บตรงสล็อต ไม่มีขั้นต่ำ ได้ทุกเกมเพื่อให้ทุกคนที่มีทุนน้อยได้สนุกกับ สล็อต
    pg เว็บใหม่ ค่ายสล็อต เกมที่ให้ ค่ายสล็อต ต่างๆที่เราได้รวบรวมมาให้ทุกๆท่านกันเลย
    ยังไม่หมดเท่านั้น สล็อต
    PG เว็บใหม่ ที่พวกเรารวมรวมมาไม่เพียงแต่ ค่ายสล็อตออนไลน์ SLOT PG เว็บใหม่ เท่านั้นยังมี สล็อตพีจี เว็บใหญ่ , XOสล็อต แตกหนัก , ทางเข้าเล่น สล็อต joker , superslot เว็บใหญ่ , ambbet เว็บใหญ่ ,
    pragmatic เว็บใหม่ และค่ายสล็อตอื่นๆอีกมากมาย ที่จะทำให้ทุกคนสามารถเล่น แตกบ่อย , สล็อตXO เว็บใหม่ได้ไม่เบื่ออีกต่อไปเล่นได้ไม่อั้นเพิ่มความสนุกถึงขั้นสุด ทางเข้า PG SLOT

  21. I know this if off toplic but I’m looking into starting my oown weblog and was curious what all is required to get setup?

    I’m assuming having a blog like yours would cost a pretty penny?
    I’m not very internet savvy so I’m not 100% sure.
    Any recommendations orr advice would be greatly appreciated.
    Thank you
    타다라필 직구

  22. Hello There. I found your blog using msn. This is a
    really well written article. I’ll make sure to bookmark it and come back to read
    more of your useful information. Thanks for the post.

    I’ll definitely return.

    Here is my web blog … 토토사이트 (Norris)

  23. Hey would you mind letting me know which hosting company you’re using?

    I’ve loaded your blog in 3 different browsers and I must say this blog
    loads a lot quicker then most. Can you suggest a good web hosting provider
    at a reasonable price? Thank you, I appreciate


Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker🙏.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock