B.3.1 FC0-U61 Domain 1: Concepts and Terminology

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following exist to help consumers know what products they're buying?

A trademark is any word, picture, or symbol that's used to distinguish a good from other similar goods. They exist to protect consumers, making it easy to know who makes certain products and establishing a standard of quality that consumers can expect.

Which of the following lists the basic computing and processing steps in order?

Input, processing, output, and storage are the basic computing and processing steps performed by a computer in order. Retrieval is not a basic part of the process.

Firewalls, data encryption, backups, and passwords are designed to protect computing devices. These technologies are all examples of what?

Common device security controls include such things as device passwords, firewalls, data encryption, backups, anti-malware software, anti-spam software, and data destruction.

Dan is using Search on his web browser to find Clearwater Beach, which could be in Alabama or Florida. Which of the following search phrases would help Dan find the beach location MOST effectively?

"Clearwater Beach" tells the search engine to find an exact match for the beach name, while OR tells the search engine that it could be in Alabama or Florida. This search phrase would be the most effective in finding the beach location.

Which of the following transfer rates is the FASTEST?

1,480 Mbps is equal to 1.48 Gbps, and so it is the fastest transfer rate listed because it is greater than 1.24 Gbps. In summary, 1,480 Mbps > 1.24 Gbps > 181 Mbps > 1,282 Kbps.

Greg is a network administrator for a medical supply company and has identified a problem with an access control list (ACL) failing to filter out data packets that have been restricted. What is the next step Greg should take to troubleshoot the ACL problem?

After identifying the problem, Greg should check knowledge base articles, network topology diagrams, the internet, and any other documents that may provide helpful information.

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?

Boolean is used to store a true or false value and cannot be used to store characters or numbers.

A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process?

Processing occurs after input has been provided to a computer. In this case, the user's input was a text string and mouse click. Processing takes the mouse click on the search icon to start the search process.

Which of the following throughput transmission units is frequently used when linking data centers, cities, and countries?

Tbps (terabit per second) is equal to 1,000,000,000,000 bits per second and is often used when linking data centers, cities, and countries.

An example of a MAC address is 00-B0-D0-63-C2-26. Which of the following notational systems is MOST likely used to represent a MAC address?

The hexadecimal number system uses sixteen digits - the numerals 0 through 9 and the letters A through F. MAC addresses are typically composed of six groups of two hexadecimal digits separated by hyphens or colons.

A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that variable. Which of the following data types is the BEST for this purpose?

The integer data type is used for whole numbers. These include both positive and negative numbers, as well as zero.

Identifying the problem is the first step in CompTIA's troubleshooting model. Which of the following are tasks associated with this step? (Select three.)

To identify the problem, you need to perform tasks such as: Duplicating the problem (if possible) Identifying the symptoms of the problem Questioning users about the issue

The legal protection of rights to ideas and discoveries is called a copyright. What are the other ways that intellectual property can be legally protected? (Select two.)

Two other ways that intellectual property can be legally protected are through patents and trademarks.

Which of the following encoding schemes would MOST likely be used to represent an emoji?

Unicode is an international 16-bit encoding standard and is capable of representing millions of different characters with enough space for every character from every human language. Developers have even started assigning Unicode values to pictures, called emoji.

When you are identifying possible causes of a problem, which of the following are troubleshooting methods you should try? (Select two.)

When identifying possible causes of a problem, the first thing to do is check for simple, obvious, and common issues.

Which of the following lists the throughput rates (bits per second) from slowest to fastest?

Kbps, Mbps, Gbps, and Tbps are the slowest to fastest throughput rates. Kbps is 1,000 bits per second, Mbps is 1,000,000 bits per second, Gbps is 1,000,000,000 bits per second, and Tbps is 1,000,000,000,000 bits per second.

Which of the following is the correct binary representation of the number 22?

10110 in binary is the same as 22 in decimal.

Which of the following is the binary number equivalent of the hexadecimal number F5C8?

1111010111001000 is the correct conversion of the hexadecimal number to binary. You can calculate the conversion by breaking down the hexadecimal number's four individual characters (5, F, 8, and C) and then converting each individual character into its hexadecimal equivalent (F = 1111, 5 = 0101, C = 1100, and 8 = 1000).

Which of the following are security controls you can use to help protect the data on your network? (Select three.)

A backup is a copy of your data and a security control to help protect network data. In the event of data loss or corruption, the data can be retrieved from the backup. Access controls are used to protect who can see and change your data and are a type of security control. This would include employees as well as competitors. Fault tolerance is the high availability of data and is a type of security control. Fault tolerance refers to the ability of a system (computer, network, cloud cluster, etc.) to continue operating even when one or more of its components fail without any noticeable delay.

April, a programmer, wants to convert the binary number 1111001101011011 to a hexadecimal number. What is the recommended first step to perform this conversion manually?

A better way to represent a binary number is to translate it into hex by first breaking it up into chunks of four digits and finding the hex value for each chunk.

Which of the following is the best definition of a bit?

A bit is a single 1 or 0 in a binary digital signal. Eight bits together form a byte.

Which of the following statements BEST describes a firewall?

A firewall restricts how hosts and network applications are accessible to each other by checking each bit of data (called a packet) that tries to enter your network to make sure that it is safe.

Arrange the following from smallest to largest.

A kilobyte is the same as 1024 bytes. A megabyte is about a million bytes, or 1024 kilobytes. A gigabyte is about a billion bytes, or 1024 megabytes. A terabyte is about a trillion bytes, or 1024 gigabytes.

Which of the following is a significant difference between a patent and a trademark?

A patent is a government-issued license that provides a temporary monopoly of an invention to its creators. Unlike patents, which are intended to protect creators, trademarks exist to protect consumers.

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?

Bar graphs work well for displaying data that has distinct categories and independent measurements.

Which of the following are examples of input devices? (Select two.)

Before a computer can work, someone needs to physically put information into it. In computer terms, this is called input. Pressing a key on a keyboard, clicking a mouse, tapping a touchscreen, pushing a button on a game controller, and speaking into a microphone are all examples of input.

A system administrator has completed the entire troubleshooting process. Some employees at the office were plugging their Ethernet cable into the wrong port and not getting access to network resources. Although the administrator tested the solution, a couple weeks later other employees begin help tickets for the same issue. Which of the following BEST describe what the administrator might have missed doing during the troubleshooting process?

Besides simply testing the solution, the administrator should have taken any action to prevent the problem from happening again. In this case, labelling the correct network jack connection might have prevented other employees from having the same problem.

What is the number of instructions a CPU can perform per second measured in?

CPU cycles are measured in hertz.

Which of the following describes the process of turning data points into useful information?

Data analytics is the process of turning data points into useful information.

Which of the following BEST describes what a kilobyte is a measurement of?

Data storage usually refers to the number of bytes. Storage space on a disk is measured in kilobytes (KB), megabytes (MB), gigabytes (GB), and terabytes (TB).

Which of the following describes using data analytics to inform business operations?

Data-driven business decisions are decisions made by an organization that use data analytics to inform business operations, such as finding ways to streamline production and use resources more efficiently.

Which of the following are specifically designed to help protect digital products? (Select two.)

Digital Rights Management (DRM) tools are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data. Technological Protection Measures (TPM) are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data.

A system administrator has a problem with a network server dropping its connection to the network on a regular basis. The administrator decides to list all the probable causes for the issue and then test each one individually to try and isolate what is causing the issue. Which of the follow BEST describes this troubleshooting technique?

Dividing and conquering is a troubleshooting technique that helps you isolate what is actually causing a problem by individually testing each potential issue.

Which of the following are features of using an Excel table to store data? (Select two.)

Excel tables provide multiple advantages over using a simple range of data. Column sorting and the ability to add rows are two helpful ones.

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?

Fair Use allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting. However, it should be noted that fair use is not a right; it's merely a legally defensible position.

Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time?

Storage is where output data is retained for later use.

What common method do file systems use to keep track of which users can read, write, move, or delete a file or folder?

File systems use an Access Control List, or ACL, for each file and folder in the system. The ACL keeps track of which users can read, write, move, or delete each file.

Which of the following does a computer use to make sure that people, hardware, and software can interface with each other?

For a computer system to function, three very different things need to work together: hardware, application software, and a human being. An operating system, or OS, is a computer program that makes it so people, hardware, and software can interface with each other in a meaningful way.

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?

Here are the steps for identifying the problem: Gather information Duplicate the problem, if possible Question users Identify symptoms Determine if anything has changed Approach multiple problems individually

A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users. Which of the following is the BEST approach to solving these problems?

If multiple problems exist, tackle each one separately.

You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first?

If the built-in monitor isn't working, connect an external monitor to the laptop. If the display appears on an external monitor but not the built-in display, the problem could be a malfunctioning LED assembly or it could be due to the display output being redirected to the external monitor port using the Fn key. If you don't get a display on the internal or external monitor, you can assume that there is a problem with the video card. Repairing the video card typically means replacing the motherboard. You should calibrate the battery if your battery seems to be losing the ability to hold a charge or if the power drops shortly after starting to use it.

A system administrator has been troubleshooting a problem with a database server not providing the information necessary to generate reports from a customer application. The administrator has tried testing several theories, but nothing seems to resolve the issue. Which of the following describes the MOST effective action the administrator should take next to try to resolve the problem?

If you cannot identify the cause of a problem, or if it is beyond your ability to fix, it is recommended that you escalate the problem to someone more capable of handling it.

Which of the following makes sure that all the computer system hardware is in working order before loading the operating system?

If your computer does have power, it runs a Power-On Self-Test (POST) when booted. This test ensures that all the computer hardware is in working order before loading the operating system.

When Jacob first starts his computer, he hears several warning beeps and nothing else happens. Which of the following is sending out the beeps?

If your computer does have power, it'll run a Power-On Self-Test (POST) when booted. If your computer encounters an issue before POST has completed, an audible beep code will occur before loading the operating system. The number and frequency of those beeps indicate a specific issue. The beeps are pEmily is using Search on her web browser to try and find a recipe for pecan pie. However, she wants to make sure it's a recipe from her home state of Mississippi. Which of the following search phrases will help her find exactly what she needs?rovided by the Power-On Self-Test (POST).

Which of the following BEST describes computer data processing?

Input devices (keyboards, mice, etc.) send data to the computer memory. The computer then performs calculations on the input data (based on instructions from the OS or application software), converting the data into information. This is called data processing.

Which of the following is available in Windows to provide usage restrictions for data files?

You can use NTFS Permissions (a form of usage restrictions) to help control the users who can read, write, move, or delete each file.

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played. Which troubleshooting step should you take first? (Select two.)

You should first verify that the speakers are plugged in correctly and powered on. You should also verify that the volume isn't muted in the operating system.

As part of the troubleshooting process, you need to establish a plan of action to remove the root cause of the problem without destabilizing other parts of the system. What should your plan of action include?

Your plan of action in this scenario should include detailed steps and the resources needed to implement the solution.

Given the numerical value 1010101.71, which of the following number systems is MOST likely represented?

1010101.71 represents a decimal number with two decimal places. In fact, the word "decimal" in decimal point refers to the decimal number system.

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?

A trademark is any word, picture, or symbol that's used to distinguish a good from other similar goods.

A network administrator is following the troubleshooting process to try and resolve a third-party application problem. After researching the issue and backing up the system, what is the next step in the troubleshooting process for the administrator?

After researching knowledge bases, the internet and any other documents that may provide helpful information, and then backing up the system where the application resides, the next step for the administrator is to establish a theory of probably cause.

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations?

Analysts use statistical tools and formulas to look for trends, patterns, and correlations. For example, stores have found that customers who buy ice cream are more likely to buy bananas than customers who don't. This type of information is typically presented in a report to business executives.

A developer is writing a program that will store the value of a single character. Which of the following data types will work BEST to store this value?

Char is used to hold a single character.

Which of the following are exclusively associated with copyright protection? (Select three.)

Copyright includes the rights to reproduce, lend, and make derivatives of a work.

What is the collective name for creations that are not the intellectual property of anybody?

Creations whose period of copyright protection expires fall into the public domain. Once in the public domain, a work can be used for any purpose without having to pay.

A network engineer needs to convert the binary number 1101100110110011 to a hexadecimal number. Which of the following is the correct hexadecimal number?

D9B3 is the correct conversion of the binary number to hexadecimal notation. You can calculate the conversion by breaking down the binary number into sets of four digits (1101, 1001, 1011, and 0011). Then you convert each set of four digits into its hexadecimal equivalent (1101 = D, 1001 = 9, 1011= B, and 0011 = 3).

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?

Line graphs work well for viewing information that changes over time and has time intervals.

Mary is a data analyst for a large pharmaceutical company. The company wants to know how their new organic line of over-the-counter cold relief medications is being perceived by customers and what they can do to better promote the product. Mary has collected a significant amount of raw data and has analyzed it to find connections and links between the data points. The insights are significant, and now she needs to inform company management. What is Mary's next step in the data analytics process?

Meaningful reporting is the final step in the data analytics process. It presents data for people to analyze and interpret. The system content can include features such as search and query tools, charts, graphs, and tables.

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

Microsoft Access provides the ability to generate reports from the data in a database that can then be analyzed.

Jonathan has a computer with an older PC bus interface and is getting a fiber optic connection for his home office. Which of the following BEST describes the processing speed environment?

Older PC bus interfaces run at a MHz (megahertz) processing speed. Fiber optic network equipment runs at a GHz (gigahertz) processing speed. The based unit of measurement for processing speeds is a hertz (Hz). 1 kilohertz (KHz) equals one thousand Hz, one megahertz equals one million Hz, and 1 gigahertz (GHz) equals one billion Hz.

The first step in data analytics is to collect raw data and summarize the information. What is the next step in data analytics?

Once raw data has been collected, analysts use statistical tools and formulas to look for trends, patterns, and data correlations.

How many bits are in a single byte?

One byte is made of eight bits. Each byte has 256 possible combinations from 00000000 to 11111111.

One option that a computer has for the information gathered in data processing is to return information to the user. Which of the following BEST describes this process?

One option that a computer has for the information gathered in data processing is to return information to the user. This is called output. Examples of output are images on a screen, sounds from speakers, and printed pages.

Which of the following accurately describes the characteristics of patents? (Select two.)

Patent holders are required to provide the public with clear and detailed disclosure of how their invention works. Patent holders are allowed to prevent other people from making, selling, or using their patented invention for a certain amount of time.

A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following is the storage capacity of a modern hard disk drive (HDD) purchased from a computer store?

Storage of modern hard disk drives are available in multiples of terabytes. The other capacities are too small to work well for video storage. Listed in order of increased capacity: kilobyte > megabyte > gigabyte > terabyte.

Mark wants to include a string in his computer program that lets users know they have selected the correct option. He wants to include the option in double quotes. However, the entire string also needs to be delimited by double quotes. Which of the following is the string Mark should use to include the option in double quotes?

Strings in a program are commonly delimited by single or double quotes (such as "Hello World!"). If you want to use a delimiter in a string, you need to use the escape character (\) in front of it. In this example, the string "Congratulations! \"Launch Audit\" is the correct option." contains the escape character before the double quotes surrounding "Launch Audit". By adding the escape character (\) in front of each double quote surrounding "Launch Audit", you are identifying the double quotes as characters in the string instead of string delimiters.

As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use?

The String data type is used to store more than one character, such as a word, a sentence, or a combination of letters and numbers. As such, it would be appropriate for postal codes.

Which of the following processing speeds runs at one billion cycles per second?

The base unit of measurement for processing speed is hertz (Hz). One hertz means one cycle per second. One gigahertz (GHz) is equal to one billion cycles per second.

In the decimal number system, you can think of each digit representing a place (or column) in the number. For example, in the decimal number 652, the two, the five, and the six are all in different places and each place can be expressed as 10 to a specific power. Which power of 10 does 6 in the above example represent?

The decimal number 652 is made of six 100s, five 10s, and two 1s. The 6 is in the hundreds place and is 10 to the second power.

A network host has an IPv4 address of 192.168.12.155. Which of the following notational systems is used to represent this IP address?

The decimal number system uses ten digits from 0 to 9. The IP address shown is in dotted decimal notation.

Dave, a videographer, wants to purchase a network switch that will improve the performance of transferring video from his video editing workstation to a backup server. Which of the following transfer rates currently available to consumers is the FASTEST for network switches?

The fastest network switch available to consumers is a gigabit switch with transfer rates measured in Gbps. Previously, transfer rates were commonly Mbps for network switches. Kbps and Tbps are not available for consumers, as Kbps is too slow and Tbps is experimental.

The basic (and smallest) unit of computer information is the bit (binary digit). Memory and file sizes are commonly measured in multiples of bits. What is the first multiple of a bit called?

The first multiple of a bit is called a byte, which is eight bits.

Sharon works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Which of the following is the first step Sharon needs to perform in the analysis process?

The first step in the data analytics process is to consider how your data will be captured. This could be from varying sources, such as tracking systems like those used gathered data by scanning sensors, or perhaps by the information found in log files use by web server.

What is the first step of the data analytics process?

The first step of the analytics process is to collect raw data.

You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. Which of the following is the MOST likely first step that should be taken in troubleshooting the issue?

The first thing you should do when a "blue screen of death" has been displayed is identify the source of the error. Search for the text of the error message in Microsoft's knowledgebase or across the Internet in general using a search engine such as Google. This will help you identify what's causing the problem so you can troubleshoot it.

While both the integer data type and float data type can be used for whole numbers, what advantage does the float data type have over integers?

The float data type is used for numbers that have decimal places.

A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values?

The float data type is used for numbers that have decimal places. It's called "float" because the computer stores two values behind the scenes: the digits in the number and the location of the decimal point, which can "float" around to any location within the number.

What is the general purpose and use of software?

The general purpose and use of software is to create information from data. For example, a spreadsheet program takes rows and columns of data that can be converted into information, such as a bar chart showing a comparison of sales for the past few years.

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?

The last step in the troubleshooting methodology is to document findings/lessons learned, actions, and outcomes.

Which of the following Unicode character encoding standards is MOST commonly used for building web pages?

The most commonly used encodings are UTF-8, UTF-16. For example, web pages often use UTF-8 encoding.

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?

The most important assets for a small business are the data and information used to run their business. If data is lost, such as a customer or order database, the business is at great risk of failing.

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform?

The next step in the troubleshooting methodology is to establish a plan of action to solve the problem and identify potential effects.

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology?

The next step in the troubleshooting methodology is to establish a theory of probable cause. Here is the troubleshooting methodology in order: Identify the problem Research knowledge base/Internet, if applicable Establish a theory of probable cause Test the theory to determine the cause Establish a plan of action to solve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventive measures Document findings/lessons learned, actions, and outcomes

Which of the following tools would you use to check connectivity between two computers?

The ping command verifies connectivity between two nodes on a network.

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.

These data are often called "Big Data."

Emily is using Search on her web browser to try and find a recipe for pecan pie. However, she wants to make sure it's a recipe from her home state of Mississippi. Which of the following search phrases will help her find exactly what she needs?

Using double quotation marks (") around a search phrase tells the search engine to find an exact match.

An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should you take first? (Select two.)

When troubleshooting the power supply, always check the following before opening up the computer: Make sure the power cord is plugged into the wall. Verify any surge protectors are plugged in and in the on position. Make sure the power supply's switch is in the on position. Only after you identify the power supply is the problem should you replace it. The keyboard and mouse being unplugged will not prevent the computer from powering on. Testing the power supply using a multimeter should be done only after the obvious has been ruled out.

Which of the following is the first thing you should do in the troubleshooting process when trying to identify possible causes of a problem?

When trying to identify the possible causes of a problem, you should start by checking for simple, obvious, and common issues. For example, check power cords, connectors, and common user errors.

Martina works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Martina is determining whether the 25-36 age group of customers purchases organic products from the company more frequently than inorganic products. Which of the following describes this step of the analytics process?

With your data captured, you can sometimes make better business decisions by seeing if there is any correlation between the data collected. For examples, did customers who bought blouses also buy a skirt?


Conjuntos de estudio relacionados

Electricity and Basic Electronics: Chapter 4

View Set

MIS Chapter 6: Systems Development

View Set

Finance Ch. 6 B: Conceptual Questions

View Set

Domain II: Examination, Assessment, Diagnosis

View Set

Peds test 2 prac questions prac *

View Set